The IT Systems Policies and Procedures contained in these web pages are the most current and supersede all other versions.
|Document||Purpose of Document||Status||Approval Date|
|Access to IT Services||This procedure explains which staff members are entitled to IT services||approved|
|Access to Staff Accounts||Procedure Relating to Access by or Disclosure to a Third Party of Information in a Staff Member's Files or Email Account||approved||07/05/2004|
|Access to Student Accounts||Procedure Relating to Access by or Disclosure to a Third Party of Information in a Student's Files or Email Account||approved||07/05/2004|
|Data Classification Procedure||This procedure explains how all data in University College Cork is classified and an owner for all data sets is defined||approved|
|Data Security Breach Management Procedures||
Provides a framework for reporting and managing data security breaches affecting personal or sensitive personal data held by the University.
|Incident Handling||This procedure explains to user how a breach of IT policy is dealt with and escalated||approved|
|Requesting Additional Network Points||This document outlines the policies and standards relating to the development of the network.It also details the procedure for requesting additional network points.||approved||10/01/2013|
|Social Media Notice and Takedown||This procedure explains how the University will remove content deemed unacceptable by the University from its websites and social media accounts||approved||17/05/2013|
|Social Media Official Accounts||The purpose of the document is to information a member of the UCC community on how to establish and use an official university social media account.||approved||17/05/2013|
|Social Media Other Accounts||This procedure outlines the steps required in order to establish and use a UCC organisational unit social media account.||approved||17/05/2013|