Do's and don'ts

Do: Don't
  • Seek advice from the IT Service Desk if you are unclear about any aspect of information security.
  • Use a personal email account for conducting University business. 
  • Undermine or seek to undermine the security of computer systems.
  • Make copies of restricted University information without permission.
  • Provide access to University information or systems to those who are not entitled to access it.
  • Use your University password as the password for any other service. 
  • Connect personally owned storage or mobile devices to University owned equipment if you are a member of staff or a research postgraduate.
  • Leave your computers unlocked when left unattended.
  • Do assume that Information Security is relevant to you. See the Information security website for comprehensive information on all aspects of information security at the University.
  • Leave hard copies of information classified as Confidential or above unattended or unsecured. See the University's Record Management advice.