- Guidelines for Information Security Risk Management
- Logging Policy
- Management of requests, incidents, events and problems
- Procedure for Managing Security Vulnerabilities
- Rules for Digital Identity
- Rules for Information Technology Development Work
- Rules for the Use of the University Domain and E-mail Service