Online awareness course Improve your skills to keep your data safe and avoid the various "cyber" threats we all now face.
Secure yourself
Protect your personal information and avoid identify theft
Secure your data
Policies and procedures
- University IT Regulations
- Password Policy - for creating strong passwords
- Network Connection Policy - for connecting systems to the campus network
- Server Management Policy - for the configuration and management of servers
- Patch and Vulnerability Management Policy - for applying security updates and addressing vulnerabilities
- Guidelines for System and Network administrators - roles and responsibilities
- Monitoring Policy - for network and systems monitoring
- Information Security Incident Handling Policy - for handling IT security incidents and breaches of information security policies
- Guidelines for Handling Confidential Data
- Information Risk Classifications
- Mobile Device Encryption Policy
- Cloud Policy
- Extraordinary Circumstances IT Access Policy
- IT Equipment Disposal Policy
- Wireless Local Area Network Policy - for deployment, administration and support of wireless LANs
- Universal Access Policy - for the provision of Universal access to information resources
- Blocking of Network Access - Guidelines and Procedures
- Spam Email Policy and procedures
- Peer to Peer (P2P)
- Information Governance Group
- Data Protection Policy & Strategy
- Website: Terms of use
- Freedom of Information