Resources

Resources

Policies

Our comprehensive IT security policies provide guidelines and frameworks for maintaining robust cybersecurity practices across KNUST's digital infrastructure.

ICT Policy

ICT is essential for universities to achieve their goals. By providing a platform for sharing knowledge both internally and externally, ICT plays a vital role in teaching, learning, and research. This has made it a core part of the university curriculum, reflecting its growing importance as a key skill for everyday life.

Read More

Data Protection Policy

AN ACT to establish a Data Protection Commission, to protect the privacy of the individual and personal data by regulating the processing of personal information, to provide the process to obtain, hold, use or disclose personal information and for related matters.

Read More
Resources

Standard Operating Procedures (SOPs)

Detailed step-by-step procedures for handling various cybersecurity incidents, system maintenance, and operational tasks to ensure consistent and effective security practices.

SOP For VPN Access

This Standard Operating Procedure (SOP) outlines the process for requesting and managing VPN access to the University's network. It ensures secure and authorized access to resources while maintaining compliance with security policies.

Read More

KNUST IT Risk Assessment SOP

This document outlines the process for conducting a risk assessment of KNUST's IT infrastructure. It includes the methodology, tools, and procedures for identifying, assessing, and mitigating risks to the University's information assets.

Read More

SOP For Data Backup and Recovery

This Standard Operating Procedure (SOP) outlines the process for backing up and recovering data from KNUST's IT systems. It ensures the availability and integrity of critical information during system failures or disasters.

Read More

ISTAD UAT Report Guide

This document provides a comprehensive guide for conducting User Acceptance Testing (UAT) reports for ISTAD. It outlines the process, requirements, and best practices for creating detailed and accurate UAT reports.

Read More