Information Security team
IT security’s main task is to support Aalto University’s work by ensuring reliable and secure environment for the university’s and its stakeholders’ data.
Aalto International Talent Program
Aalto International Talent Program is a group mentoring initiative bringing together our international degree students and companies looking for talent. Join us!
ClimATE
ClimATE is an expanded exhibition and events programme across multiple sites and spaces in Aalto University’s Otaniemi Campus.
News of EECAT2020
Cancellation of the 4th International Symposium on Catalytic Science and Technology in Sustainable Energy and Environment (EECAT 2020)
Abstract submission and personal data collection of EECAT2020 1
The abstract submission and personal data collection will be opened on 1st Nov. 2019.
School of Science graduates in working life
Graduates from the School of Science at Aalto University have very good employment prospects in positions corresponding to their education. On this page, you can find information about employment and career development five years after graduation.
School of Engineering graduates in working life
Our graduates are highly successful in finding jobs corresponding to their education – 98% are employed or entrepreneurs 5 years after graduation.
School of Electrical Engineering graduates in working life
Graduates from the School of Electrical Engineering at Aalto University have very good employment prospects in positions corresponding to their education. On this page, you can find information about employment and career development five years after graduation.
A18 Compliance
The compliance (ISMS A18) binding guideline outlines issues related to compliance from the point of view of information security. Aalto University's operations are governed by a very wide range of different regulations and legislation. In addition to legislation, official regulations and contractual obligations can create requirements for activities that are taken into account as part of Aalto University's activities
A17 Operational continuity
The key to ensuring the continuity of Aalto University’s operations is the continuity of processes. At Aalto University, operational continuity management means that we safeguard our core operations according to predefined models in normal conditions, during incidents in normal conditions and in emergency conditions. Continuity planning is aprocess that is an integral part of Aalto University’s operations, processes, and services.
A16 Information security incident management
Information security incident management includes defining responsibilities, preparing for information security incidents, identifying vulnerabilities and responding to incidents and learning from them. An information security incident can be intentional or unintentional. As a result of the incident, the integrity, confidentiality or level of availability of the information and services under the organization's responsibility has been compromised or may be compromised.
A15 Supplier relationships
Supplier relationships (ISMS A15) binding guideline defines how Aalto University takes care of the security of supplier relationships. The guideline also describes how services are supervised and how changes can be made.
A14 System acquisition, development and maintenance
System acquisiton, development and maintenance (ISMS A14) binding guideline defines security and privacy guidelines for information systems in Aalto university. The guideline also describes usage of test data as well as secure development and support processes.
A13 Communications security
Communications security (ISMS A13) binding guideline defines the permitted management and use of Aalto University's networks. The guideline also describes the protection of data transmission, communications and non-disclosure agreements
A12 Operational security
Operational security (ISMS A12) illustrates the principles of governing the secure use of IT systems and the monitoring of data processing operations. Guideline defines operational security's responsibilities and processes.
A11 Physical and environmental security
Physical and environmental security (ISMS A11) binding guideline illustrates how physical environmental cyber security needs to be taken care of. This guideline defines facility protection levels, access rights processes, protection of physical devices and processing of classified materials.
A10 Encryption
Encryption (ISMS A10) binding guideline defines why and when it is required to use encryption. Guideline also deals with principles of encryption key management. Technologies used for encryption are decided by Aalto Cyber security team.
A9 Access control
Access control (ISMS A9) binding guideline defines requirements and processes for Aalto University usernames and access control. Access control binding guideline outlines how access is restricted and monitored ÄûÃʵ¼º½ systems and spaces where confidential data is stored or processed.