- Seek advice from the IT Service Desk if you are unclear about any aspect of information security.
|
|
|
|
|
- Undermine or seek to undermine the security of computer systems.
|
|
- Make copies of restricted University information without permission.
|
|
- Provide access to University information or systems to those who are not entitled to access.
|
|
|
|
- Connect personally owned storage or mobile devices to University owned equipment if you are a member of staff or a research postgraduate.
|
|
|
|
- Leave your computers unlocked when left unattended.
|
- Do assume that Information Security is relevant to you. See the Information security website for comprehensive information on all aspects of information security at the University.
|
|