A16 Information security incident management
Information security incident management includes defining responsibilities, preparing for information security incidents, identifying vulnerabilities and responding to incidents and learning from them. An information security incident can be intentional or unintentional. As a result of the incident, the integrity, confidentiality or level of availability of the information and services under the organization's responsibility has been compromised or may be compromised.
A15 Supplier relationships
Supplier relationships (ISMS A15) binding guideline defines how Aalto University takes care of the security of supplier relationships. The guideline also describes how services are supervised and how changes can be made.
A14 System acquisition, development and maintenance
System acquisiton, development and maintenance (ISMS A14) binding guideline defines security and privacy guidelines for information systems in Aalto university. The guideline also describes usage of test data as well as secure development and support processes.
A13 Communications security
Communications security (ISMS A13) binding guideline defines the permitted management and use of Aalto University's networks. The guideline also describes the protection of data transmission, communications and non-disclosure agreements
A12 Operational security
Operational security (ISMS A12) illustrates the principles of governing the secure use of IT systems and the monitoring of data processing operations. Guideline defines operational security's responsibilities and processes.
A11 Physical and environmental security
Physical and environmental security (ISMS A11) binding guideline illustrates how physical environmental cyber security needs to be taken care of. This guideline defines facility protection levels, access rights processes, protection of physical devices and processing of classified materials.
A10 Encryption
Encryption (ISMS A10) binding guideline defines why and when it is required to use encryption. Guideline also deals with principles of encryption key management. Technologies used for encryption are decided by Aalto Cyber security team.
A9 Access control
Access control (ISMS A9) binding guideline defines requirements and processes for Aalto University usernames and access control. Access control binding guideline outlines how access is restricted and monitored ºÚÁÏÍø systems and spaces where confidential data is stored or processed.
A8 Asset management
Asset management (ISMS A8) binding guideline defines what are assets in Aalto point of view and how these assets can be used. Assets include for example terminal devices, data systems and data.
A7 Human resources security
This binding guideline (A7 Human resources security) describes the practices related to human resources security in terms of information security.
A6 Organization and responsibilities of information security in Aalto university
Information security and data protection are involved in the daily work and studies of every Aaltoer at Aalto University. The organization and responsibilities of information security at Aalto University (ISMS A6) binding guideline describes information security responsibilities and obligations related to different roles.
A5 Information Security Policy
Aalto University's Information Security Policy describes the university’s commitment and intent in information security matters.
Cyber security for projects and small scale development
Information security instructions that must be followed before purchasing or implementing IT systems, digital services or licenses
Doctoral graduates of Aalto University in working life
Skills learned during doctoral education are valuable in working life
School of Chemical Engineering graduates in working life
Graduates from the School of Chemical Engineering at Aalto University have very good employment prospects in positions corresponding to their education. On this page, you can find information about employment and career development five years after graduation.
Information Security Management System (ISMS) frequently asked questions
Information Security Management System (ISMS) frequently asked questions
Accessibility statement – Aalto University
Aalto University's aalto.fi website and its mobile application are subject to the EU's accessibility directive, the aim of which is to ensure equality in a digitalised society and set uniform requirements for accessibility. Aalto University is committed to observing accessibility standards.