Good information security practices will help you keep your personal information and the University's information secure.
Get in touch
If you think your device has been attacked or other activity of concern is taking place, contact the Computer Emergency Response Team.
If you're unsure about anything to do with Information Policy, just ask:
If you don't handle information appropriately you may:
The Information Security Policy explains the ways that the University ensures the secure handling of its information while providing appropriate access.
It is supported by more specific policies which provide detail on how we handle activities which have information security implications.
The University's approach is based on ISO27001:2013. This is the international standard which defines the information security management processes that should be in place in an organisation, and the detailed control guidelines (ISO27002:2013).
The Protecting Information (PDF
, 1,238kb) booklet is your quick guide to the key things you need to remember.
It includes:
- the Seven Golden Rules of information security
- a summary of the Information Classification and Handling Scheme
- legal information
If you read nothing else, read this!
The IT Services security website provides a wide range of practical information to help you keep your information and devices secure.
Protecting information in your role is continually developed to provide guidance related to your role and the activities you may undertake.
All information security policies and their associated guidance are listed on the University Information Policy index.