Search7 Results

This procedure defines the actions and responsibilities of the College users when a request is made to access another users’ account data.
Information is a valuable asset and access to it must be managed with care to ensure that confidentiality, integrity, and availability are maintained. This procedure outlines the rules relating to authorizing, monitoring, and controlling access to Fleming accounts, information and information systems.
Fleming College collects, creates, and maintains information resources to operate the College and is required to handle that information responsibly through controls and data governance practices. This procedure provides direction on handling electronic information with direction on creating, collecting, classifying, labelling, securing, storing, using, copying, transferring, and disposing of information.
The purpose of this procedure is to ensure that, in the event of a disaster, the College has appropriate and efficient plans in place to address business continuity. The objective is to ensure the timely recovery and return to service of all business-critical IT resources.
Compromises in information security can potentially occur at every level of computing from an individual's desktop computer to the largest and best-protected systems at the College. Incidents can be accidental or deliberate attempts to break into systems; purpose or consequence can be from benign to malicious. Regardless, each incident requires a careful response, at a level commensurate with its potential to cause harm to an individual and the College.
The purpose of the procedure is to provide guidance for appropriate employee use of social media. This procedure is designed to ensure that any and all interactions on behalf of Fleming College (the College) social media accounts represent the College’s best interests by providing employees with a clear understanding of how current laws and College policies apply to social media.
Remote network access is provided for Fleming College employees who find themselves working from a remote location, such as home or when on-call. This access can also be provided to consultants or contractors with the sponsorship of a Fleming College Employee. While the technology used follows industry best practice, remote access is inherently a security risk and must be controlled to ensure the confidentiality, integrity and availability of College systems and information. Consequently, standa