fbpx P & P 2 | University of Limerick arrow
Search icon

P & P 2

NAME DESCRIPTION
IT Security policy The purpose of this IT security policy is to protect the information and IT assets of the University from all threats, internal, external, deliberate or accidental.

 

NAME DESCRIPTION
Acceptable Usage Policy University of Limerick seeks to promote and facilitate the proper and extensive use of Information Technology in the interests of learning, teaching and research, including business and community engagement partnerships

 

NAME DESCRIPTION
ITD Data Encryption Procedure University of Limerick is committed to complying with all applicable Data Protection, privacy and information security laws and regulations in the locations in which it operates.
ITD Email Management Procedure The purpose of this procedure is to ensure the proper use of the University's Email systems by its employees and students.
ITD Personal Devices Procedure The University of Limerick urges caution when using personally owned devices for work purposes. This document is about reducing the risk to both the University and the device owner.
UL Password Standards The purpose of this Procedure is to establish a standard for creation of strong passwords, the protection of those passwords, and the frequency of change. 
ITD Disaster Recovery Procedure The purpose of this procedure is to outline the University’s planned approach to recovering critical systems and operations in the event of a disaster and the testing of the plans and procedures in place for such an event.
ITD Mobile Device Procedure The University of Limerick has a requirement to protect its information assets in order to safeguard its customers, intellectual property and reputation. This document outlines a set of practices and requirements for the safe use of mobile devices and applications.
ITD User Access Control Procedure The purpose of this procedure is to set out the requirements for creating and managing University IT system user accounts and access requests to computing and network resources
ITD Network Security & Remote Access Procedure This procedure outlines the authority and responsibility of the Information Technology Division (ITD) for the overall operation and security of the data communications network on behalf of the University and its users.
Access to Library e-Resources and Computing Resources by Authorised Users The University registers staff members (whether on a permanent or temporary basis ) including retired members of staff, any teacher who teaches students of the university and contractors of the University as outlined in the UL Identification Cards Policy.
Sharepoint Site Administration and Training There are a number of risks associated with administering SharePoint Sites. Being a site owner is a crucial role within the SharePoint environment. The site owner acts as a ‘security guard’ for the departments’ or committees’ files and is generally responsible for how the site is used, housekeeping and granting access to the data on the site.
MCQ Procedures The Purpose of this procedure is to outline the system in place for ordering and correction of MCQ's
Access to Staff Offices by ITD Staff As part of the maintenance and cleaning of the University certain staff are authorised to enter individual offices in the absence of the occupier. The names of these staff are registered with the Buildings Office and Security. 
Lost and Found The official Lost and Found for the University of Limerick is located in Main Reception, block D, and level G in the Main Building of the University of Limerick.
The Ethical and Legal Use of Electronic Copyright Material Respect for intellectual labour and creativity is vital to academic discourse and enterprise. This principle applies to works of all authors and publishers in all media such as music, films, software and other literary and artistic works.