Guidance: how to conform with policy
Guidance on how to conform with information protection policies.
Use University services
Store your files on supported University services. Use University email for University business. Protect University passwords.
Encrypt your laptop
Protect University information from being leaked if your laptop is lost or stolen.
Smartphones and tablets
These have access to all our email. Even if they are your own devices, encrypt them, and automatically lock them.
Protecting information when working from home, or while travelling
Advice for when you use University information outside your office, at home, while travelling or when going to different countries.
Protecting research data
We need to protect our research intellectual property, and need to open it out to all when we publish it.
Care we need to take whether working outside work hours or not, or even using a private social media account.