- Policies and Procedures – Frequently Asked Questions
- Copyright Act: Notice And Notice Regime
- Data Classification and Handling Standards
- Policies and Procedures
Policies and Procedures – Frequently Asked Questions
Copyright Act: Notice And Notice Regime
On January 2, 2015, the Notice and Notice regime of the Copyright Modernization Act came into force. The goal of the Notice and Notice regime is to discourage online copyright infringement.
Learn more about the Copyright Act’s Notice And Notice Regime (facts and FAQ)
Data Classification and Handling Standards
All members of the Carleton University community have a responsibility to protect the confidentiality, integrity, and availability of data and information generated, accessed, modified, transmitted, stored or used by the University, irrespective of the medium on which the data resides and regardless of format; e.g., electronic, paper or other.
Learn more about the university’s data classification and handling requirements
Policies and Procedures
To access university policy documents, please visit the University Secretariat website using this list as a guide to IT-related policies.
ITS-specific polices are listed and accessible here.
University Policies
- Acceptable Use Policy for Information Technology
- Access to Information and Privacy
- Acquisition of Wireless Cellular Services Policy
- Anti-Spam Compliance
- Cloud Computing Security
- Data and Information Classification and Protection
- Desktop and Laptop Computer Equipment
- Email (Electronic Mail) Use
- Information Security Incident Response
- Information Security Policy
- Information Technology (IT) Security
- Mobile Technology Security
- Password Policy for Information Systems
- Remote Network Access
- Telecommunications Cabling and Wiring
- Web Content
ITS Policies
- Banner Change Management
- Cardholder Data Network
- ITS Account Management
- ITS Change Management
- CUNET Domain Membership and Access Policy
- Data Backup and Restore
- Data Centre Access
- Domain Name Services (DNS)
- Internet Bandwidth Management
- Network Services
- Radio Frequency Interference
- Signing Authority (ITS)
- Voice Services
- Vulnerability Management
- Wireless Network Operations