IT-regulations

Read the IT-regulations.

IT security

When we use IT to process information certain security requirements of the tool to be used must apply. This goes both to the built-in security mechanisms of the tools as well as requirements upon users not to use the tool in an unsafe manner. IT tools can also be used wrong, or be misused in a way causing the security of the information to be lost.

IT security

When we use IT to process information certain security requirements of the tool to be used must apply. This goes both to the built-in security mechanisms of the tools as well as requirements upon users not to use the tool in an unsafe manner. IT tools can also be used wrong, or be misused in a way causing the security of the information to be lost.

Security violation may be due to events internally at NTNU, or it may be due to external "attacks". All security violations must be reported to the "appropriate person" (see right column). The IT division is the central coordinator for IT security at NTNU. In addition, each unit, e.g. faculties, has got entities for reception of security violation notifications.

The IT security at NTNU is regulated by procedures, directions and instructions. These set the framework for how the individual user shall behave in order to comply with safety requirements, and for how IT personnel and system users should implement security. The main documents constitute the minimum requirements for IT security.

The main document is the IT regulations. It provides general guidelines for how NTNU's IT-systems can be used, and it is intended for the ordinary user. The document also determines what requirements the IT staff can put upon the user and which sanctions NTNU can use in case of abuse.

Other documents cover the special cases. Examples are the "Guidelines for the management of user names, passwords and other authentication data" and "Instructions for the disclosure of electronically stored material to the police or the prosecuting authority".

The key documents are published through this portal. It also contains articles and links to information of assistance when users want to secure their computers and themselves to achieve the desired IT security.

The maintenance of the IT security at the individual unit are the responsibility of the unit itself. Each unit can have their own rules in addition to the key documents. The individual unit is responsible of publishing the local rules themselves.


Mon, 14 Jun 2010 12:42:03 +0200

Contact:

Orakeltjenesten (Support Services)

Phone: (735) 91500
E-mail: orakel@ntnu.no
IT support for employees
IT support for students

Visit addresses: 
Gløshaugen: Sentralbygg II, room 202
Dragvoll:         Bygg 8, level 5

 

Notification of security violations

Violation of IT security rules must be reported to the central reception, or to the security reception by the local unit.

Central security reception:
abuse@ntnu.no

Local security reception:
abuse@ab.ntnu.no
abuse@dmf.ntnu.no
abuse@hf.ntnu.no
abuse@ime.ntnu.no
abuse@ivt.ntnu.no
abuse@nt.ntnu.no
abuse@svt.ntnu.no
abuse@vm.ntnu.no

Critical messages:
Notification of security violations that require very fast action can be reported by phone:

Orakel: (735) 91 500
(8:00 - 16:00) - (monday - friday)

Network Guard: (735) 97 002
(16:00 - 8:00) - (all days)