Security
Security contents
📄️ Device policy
This page describes OET's device policy, including OET laptop policy, approved use of bring-your-own devices (BYOD), and use of personal mobile devices.
📄️ Incident management
This procedure provides a structured approach for managing information security incidents at OET.
📄️ Information security
Security classification
📄️ Secure software development
At OET, we build the tools that power the global energy transition. Because our software is used for critical infrastructure planning, the integrity of our code and the protection of our research data are vital.
