IT policies and guidelines
This page is no longer up to date for security documentation. Documents have been moved to Cyber Security hub and ISMS hub.
You can find documents referred in this page after the text chapters.
Policy of information systems usage at Aalto University
Formerly the policy of information systems usage at Aalto University and related guideline for the validity of the access rights in Aalto University’s information systems were followed when those information systems, which were either the responsibility or administrated by Aalto University, were in question or used.
However, this policy and guideline are no longer in force. Instead the acceptable use of the information systems is described in the binding instuction A8 and matters related to the validity of the access rights are discussed in the binding instruction A9.
Policy of sanctions for IT offences at Aalto University
Due to the heterogeneity of these user account holders, any IT offences will be dealt with on a case-by-case basis. The tables outline recommended sanctions for IT offences for the university's degree students, employees and others. The tables contain examples of typical offences linked with the use of information systems, grouped by the seriousness of the offence. The president has approved the use of policy 3/6/2010.
Aalto IT Security provides news and help on various information security topics for research, learning and daily work, including antivirus, work from home and travelling, phones, encryption and secure email.