Procedures are step-by-step instructions for accomplishing an objective. Procedures published by the Central Information Security Officer are designed to reinforce University Policies and help ensure timely and consistent service delivery. Procedures may also be crucial to maintaining compliance with provincial or federal regulation. The following Procedures have been published by CISO. If you have any questions, comments, or concerns related to these Procedures, please don't hesitate to contact us at email@example.com.
- Procedure for Requesting Network Access to Corporate Information
- Procedure for Responding to a Compromised Computer
- Technology Risk Assessment Procedure
Published on and maintained in Cascade.