Information Security Policy Management
Purpose
This policy aims to ensure the maintenance, regular updating, and communication of information security policies, standards, and procedures within the university.
Scope of the Policy
This policy applies to all members of UTAS-Sur, whether on a temporary or permanent basis as well as any third parties working with or contracted by the university, it covers all environments where the university’s information systems are operated.
Executive Responsibility
Information Systems and Educational Technologies Center.
Policy Custodian
Assistant Vice Chancellor for UTAS – Sur.
Enforcement
Any violation of this policy by all members or third parties (suppliers, contractors, business partners, etc.) will be subject to disciplinary and legal actions in accordance with the laws of the Sultanate of Oman, including regulations related to cybersecurity, university’s policies, labor laws, and electronic transactions.
Policies and Controls
- Information security policies, procedures, and standards must be reviewed and updated annually based on risk assessment results, international practices, and legal requirements.
- Information Systems and Educational Technologies Center is responsible for updating and ensuring compliance with information security policies and procedures.
- The Information Security Policy Document must be regularly communicated to all relevant university departments and external stakeholders.
- Any significant changes affecting the security risk environment must be reviewed and approved before implementation.
Effective Date of the Policy
This policy shall take effect from the approval date.