Guides and other documents
Information and help on security, the University firewall, and the terms and condition of using the University network and services.
There are rules regarding acceptable use of University computer clusters covering things like eating and drinking, using mobile phones, reserving computers and security on computers.
This form must be completed by anyone requesting administrative rights to a server or application managed by the IT Windows Server Team. A prerequisite is to have requested a separate account from IT User Administration for the purpose of administrative access. This can be done by completing a yellow form which can be obtained from the IT Service Desk.
The standard provides guidance on installing and using closed circuit television (CCTV) at the University.
Find out more about the University's Network Behaviour & Analysis Tool (NetBAT) and when and how it can be used.
Remote connection tools are available to IT support staff, for the purpose of maintaining and supporting the operation of computer systems for members of the University. Such tools can only be used in accordance with the following conditions.
This page tells you about the rules that visitors and other temporary users must follow when using computers and/or systems owned or operated by the University of Leeds.
To help keep your information secure, you can protect Microsoft Word, PowerPoint and Excel files with a password or passphrase.
These standards apply to everyone in the University who host, operate or manage web servers and websites which are hosted either internally or externally.
Your password is both your electronic identity and the key which you use to access University data. It is your responsibility to select a strong password and to manage it securely as you are personally accountable for its use.
The Ten Golden Rules are a quick ten point guide to keeping your (and the University's) information secure:
There are terms and conditions that everyone who uses computers or devices connected to the residence network must follow.
To protect the Campus network from threats on the public Internet, there is a firewall at the boundary between the Campus network and the Internet.