Policies

  • Accounts Policy
    This policy applies to employees with privileged access to accounts, systems, or information within systems, as well those who implement, deploy or manage systems.
  • BackUp Policy
    The goal of this policy is to ensure timely restoration of information in the event of accidental deletion, corruption, system failure, or disaster.
  • Identity and Access Management Policy

    The goal of this policy is to protect information by ensuring that only authorized users, according to their duties and responsibilities, can access it.

  • Politique de gestion des identités et des accès Français

    L'objectif de cette politique est de protéger les informations en veillant à ce que seuls les utilisateurs autorisés, conformément à leurs fonctions et responsabilités, puissent y accéder.

  • IT Incident Management Policy
    This policy defines the protocol to report, assess, resolve and follow-up IT incidents
  • IT Security Policy
    This document outlines your responsibilities, as an employee and user of IT resources, regarding IT security. It complements and gives concrete examples but does not replace existing policies and legislation.
  • Politique de sécurité informatique Français

    Ce document décrit vos responsabilités, en tant que membre du personnel et utilisateur ou utilisatrice des services informatiques, en ce qui concerne la sécurité informatique. Il complète et donne des exemples concrets, mais ne remplace pas les politiques et la législation existantes.

  • IT User Policy
    The goal of this policy is to ensure that the College’s IT resources are used to support Dawson’s Mission and to define the standard of conduct expected from users.
  • Password Policy
    All employees, students, and other users of the College’s IT resources are responsible for taking the appropriate steps, as outlined in the document above, to select and secure their password(s).
  • Politique relative aux mots de passe Français

    Il incombe à tous les employés, étudiants et autres utilisateurs des ressources informatiques du Collège de prendre les mesures appropriées, comme indiqué ci-dessous, pour choisir et sécuriser leur(s) mot(s) de passe.



Last Modified: June 18, 2024