What are Procedures?
As per the Policy on Information Security and the Protection of Digital Assets, procedures are:
Required practises for protecting Digital Assets as developed through input from the Information Security Council and approved by the President or designate. (For example, Procedures to be followed when disposing of computing devices.) Procedures will be developed and revised as appropriate over time.
Where do I find approved Procedures?
Approved procedures are found on http://www.provost.utoronto.ca/policy.htm
What about our own Procedures?
A number of units already have internal procedures they follow to enable secure practices in meeting their own needs.
If you have a procedure you would like this page to link to, please contact ISEA.
Please see a recommended procedure for Incident reporting to the left.
Please see tab to the left