Page 20 - UITS_AnnualReport_2013-2014

Basic HTML Version

UAEU is committed to safeguard intellectual property and UITS infrastructure of its stakeholders with regards to IT
services provided by the University. UAEU intends to provide the highest level of protection possible in all aspects of
information flowing through its IT infrastructure. The information security policy is framed around:
Assures that the processes, policies, and controls are used to ensure only authorized users have prompt
access to information. The objective is to safeguard against intentional or accidental attempts to deny
legitimate users access to information or systems.
Assures that the adequate processes, policies, and controls are being employed to protect information
of customers and the institution against unauthorized access or use.
Assures that the adequate processes, policies, and controls are used to develop confidence that
technical and operational security measures work as intended. Assurance levels are part of the
systems design.
Assures that the adequate processes, policies, and controls are used to ensure
information has not been altered in an unauthorized manner and that systems are
free from unauthorized manipulation that will compromise accuracy, completeness,
and reliability.
Assures that the adequate processes, policies, and controls are in place that are
necessary to trace actions to their source. Accountability directly supports
non-repudiation, deterrence, intrusion prevention, security monitoring, recovery, and
legal admissibility of records.
The Information Security Policy in UAEU is governed and implemented as per ISO/IEC 27001:2013 standards.
Information Security Policy Statement
Availability
Confidentiality
Assurance
Integrity
Accountability
17
Dec 8, 2014
Dec 13, 2017
Oct 17, 2022