- Seek advice from the IT Service Desk if you are unclear about any aspect of information security.
|
|
|
- Use a personal email account for conducting University business.
|
|
- Undermine or seek to undermine the security of computer systems.
|
|
- Make copies of restricted University information without permission.
|
|
- Provide access to University information or systems to those who are not entitled to access it.
|
|
- Use your University password as the password for any other service.
|
|
- Connect personally owned storage or mobile devices to University owned equipment if you are a member of staff or a research postgraduate.
|
|
|
|
- Leave your computers unlocked when left unattended.
|
- Do assume that Information Security is relevant to you. See the Information security website for comprehensive information on all aspects of information security at the University.
|
- Leave hard copies of information classified as Confidential or above unattended or unsecured. See the University's Record Management advice.
|