PCI-DSS Security Policies
This section covers policies and information relating to the Payment Card Industry Data Security Standard (PCI-DSS).…
PCI-DSS Security Policy
This policy sets out the requirements to protect the security of all credit and debit card payments received and processed by the University which are governed by the Payment Card Industry Data Securi…
Desktop Anywhere access policies
Access policies have been approved by University senior officers and
the Information Security Group. They are in place to control
what users can do with certain categories of data when accessed vi…
Sometimes you'll get an email that appears to come from your bank, the IT Service Desk or similar, but in fact it is trying to trick you into revealing important information such as your username and …
Conditions governing the use of the Network Behaviour Analysis Tool (NetBat)
Find out more about the University's Network Behaviour & Analysis Tool (NetBAT) and when and how it can be used.
The University's Systems Security & Network Access & Management Policy …
Application for administrative access to IT Windows Servers
This form must be completed by anyone requesting administrative rights to a server or application managed by the IT Windows Server Team. A prerequisite is to have requested a separate account from IT …
Acceptable use of clusters
There are rules regarding acceptable use of University computer clusters covering things like eating and drinking, using mobile phones, reserving computers and security on computers.
Conditions of use of computer systems for visitors
This page tells you about the rules that visitors and other temporary users must follow when using computers and/or systems owned or operated by the University of Leeds.
These rules apply to the u…
Travelling abroad with an encrypted laptop, mobile and data
All University-owned laptops must be encrypted. However, in some countries you need permission before you can bring in an encrypted laptop or other device.
In addition some encryption software requ…