Handbook overview
Purpose
This Handbook is a self-service resource providing you with short, practical pages filled with actionable steps and other supports related to common cyber security questions and requirements.
Audience
faculty researchers Admin staff IT staff students
On this page
Inspiration
U of T’s Information Security Handbook is based upon the SecureMyResearch Cookbook concept created at Indiana University. Thank you to Anurag Shankar and William Drake for your support and inspiration.
How-tos
How-tos are (relatively) short, practical documents which provide actionable steps or help for common (real-world, business use) cybersecurity questions and requirements. They provide help and step-by-step directions to assist community members in completing their work or task securely; use of them is voluntary. How-tos are written or curated (and referenced) by subject matter experts and revised in an agile and iterative fashion.
How-tos and the Information Security Handbook are meant to supplement the existing Information Security support and governance framework which “provides a baseline developed by the community, for the community in consultation with subject matter experts to: (1) enable the mission of the university, (2) increase trust and reduce risk, and (3) address regulatory and legal requirements the university must meet.”
Included
Pages to help address common information security requirements and questions.
Not included
Pages without a connection to information security requirements and questions.
Information not suitable for a general or public audiences.
The Enterprise Service Centre (ServiceNow) is a suitable solution for internal information that should require a UTORid to access.
Complex workflows and use cases.
Consultations often work best in these instances, so please reach out to your local IT group or Information Security for assistance.
Contributors
This service is provided by U of T’s Information Security program. Pages are written, reviewed, revised, and curated by relevant subject matter experts from within Information Security.
Approval process
New pages and revisions are determined in collaborative fashion between relevant subject matter experts from within Information Security. Handbook pages will be developed in an iterative way, so that information can be shared quickly with the community.
Search
Additional help
General
Contact us | Information Security (IS)
Researchers
Research Information Security - Information Security at University of Toronto
Related articles