Do's and don'ts
| Do | Don't | 
|---|---|
| 
 Seek advice from the IT Service Desk if you are unclear about any aspect of information security.  | 
 Disclose your password to anyone. Read our information on keeping your passwords safe.  | 
| 
 Report any loss or suspected loss of data. Find out how to report lost or stolen hardware or data.  | 
 Use a personal email account for conducting University business.  | 
| 
 Change your password if you have any suspicion that it may have been compromised.  | 
 Undermine or seek to undermine the security of computer systems.  | 
| 
 Ensure that personally owned equipment which has been used to store or process University data is disposed of securely. See further information on hardware and data disposal.  | 
 Make copies of restricted University information without permission.  | 
| 
 Encrypt your mobile devices and make sure that restricted information is always encrypted before it's sent to others. See further information on encryption.  | 
 Provide access to University information or systems to those who are not entitled to access it.  | 
| 
 Password protect your personally owned devices. See further information on mobile security.  | 
 Use your University password as the password for any other service.  | 
| 
 Keep all of the software on your personally owned devices up to date. See further information on protecting your computer.  | 
 Connect personally owned storage or mobile devices to University owned equipment if you are a member of staff or a research postgraduate.  | 
| 
 Comply with the law and University policies. See further information on compliance.  | 
 Send unauthorised bulk email (spam). See the University's mass emailing policy.  | 
| 
 Be mindful of the risks of using open (unsecured) wifi hotspots or computers in internet cafes, public libraries etc. See information on travelling with University data.  | 
 Leave your computers unlocked when left unattended.  | 
| 
 Do assume that Information Security is relevant to you. See the Information security website for comprehensive information on all aspects of information security at the University.  | 
 Leave hard copies of information classified as Confidential or above unattended or unsecured. See the University's Record Management advice.  |