Use passwords and keep them safe
When you choose a password you should make it personally memorable but difficult for others to guess.
Make sure that your password comprises at least 8 characters but do not use special characters…
Password Usage and Management policy
This policy applies to everyone who uses University computing facilities. It is your responsibility to choose strong passwords and protect them.
The numbers in brackets refer to the section in the …
Use email with care
Email attachments can carry program 'viruses' that can spy on you or corrupt your data; only open them if you are certain they are safe - and you have anti-virus software install…
Secure your personal computer
Always use (and keep up to date) anti-virus software (for personal/home).
Always use a quality software 'firewall' to prevent spying on or hacking of your computer (for perso…
Protect your electronic identity
Always use a screen-saver with password protection.
Watch-out for 'shoulder-surfers' in public places.
Always log-off (don't just close a Web browser).
We are all responsible for IT security
All of us need to protect our own data and computers and ensure we safeguard others' data and copyright.
The University (IT, Faculties and Services) will provide reso…
Ten Golden Rules
The Ten Golden Rules are a quick ten point guide to keeping your (and the University's) information secure:
We are all responsible for IT Security
Use passwords and keep th…
Selecting a strong password and managing it securely
Your password is both your electronic identity and the key which you use to access University data. It is your responsibility to select a strong password and to manage it securely as you are personall…
Encrypting Microsoft Word, PowerPoint and Excel files
To help keep your information secure, you can protect Microsoft Word, PowerPoint and Excel files with a password or passphrase.
In Microsoft Office 2010:
Open your file in Word, PowerPoint…
This page provides guidance about device security including information about encryption, securing devices, portable devices, using private devices, network connectivity and disposal.