These documents are important to keep you, your data and the University's reputation secure.
The Information Protection policy is for all members of the University and explains the steps that must be taken to protect the security of 'sensitive information'.
This policy applies to everyone who uses University computing facilities. It is about managing and using accounts on computers.
This policy is for staff who access University systems from home or other remote locations using either privately owned or University owned equipment.
This policy applies to everyone who uses University computing facilities. It is your responsibility to choose strong passwords and protect them.
This policy provides general guidance for the safeguarding and security of all University data. The full policy is available as a PDF.
This policy sets out how IT staff should deal with security and computer misuse incidents.
This policy applies to systems administrators and computer support staff and is about keeping computer secure by applying up to date security patches and critical patches.
This policy is for IT staff who are responsible for the purchase, installation and de-installation of software, and the maintenance of software records, and anyone who does similar activities.
This Policy is aimed at systems administrators and IT staff who are responsible for the development and maintenance of IT/IS facilities. It defines the controls which are required for the security of systems. The full policy is available as a PDF
This policy applies to everyone who uses University computing facilities.
This policy applies mainly to systems administrators and technical support staff, but is also relevant to anyone else who has a responsibility for preventing the introduction of viruses to the University network.
Access policies have been approved by University senior officers and the Information Security Group. They are in place to control what users can do with certain categories of data when accessed via the service.
This page provides links to other University policies that are related to information security.