TE5 - Access and Identity Management
Policies, processes and technology used to manage user's digital identity including provision and removal of IT usernames and access management controlling user access to services.
SAP Account Management System (SAM)
SAP is available to staff that require access to Finance, Human Resources, Logistics (Purchasing, Sales and Plant Maintenance) or Research information as part of their role within the University.
Data Centre Strategy - application survey
University have engaged ANS (www.ans.co.uk)
to assess, plan and execute the migration of University applications, servers
and storage into a new hosting service as part of the Data Centre Strat…
This page shows you how to create surveys and questionnaires quickly using Microsoft Forms
Important Notice: Please note that as data is stored by Microsoft
in the US, do not include confidentia…
Information Protection Policy
Here is an overview of the University's Information Protection Policy.
The purpose of this Policy is to define the
key principles behind the Universitys handling of …
How to connect to the VPN using Linux
This is some general advice on how a user of a Linux operating system should be able to connect to the University VPN service
The OpenConnect VPN client software can be used to conn…
How to write an IT Summary Sheet
A summary sheet is a simple précis of a key piece of work or a
project. Speak your audiences language. Use plain, simple English - not
jargon. The recommended maximum word length is 500 words inc…
Between 23rd and 27th October 2017 we sent out emails designed to look like a phishing attack, with the subject 'User Account Corruption'. Don't panic if you clicked on the link, your data i…
Security of Data
This page contains guidance on the security of data, including storage of classified data, cloud services, using the M: drive and storing data where you need to give access to other people.
Mass or bulk emailing using Office 365
Office 365 email has limits which can prevent use of the service for mass mailing but there are alternatives available, such as the University's mailing list system.
What are the limits …