Do's and don'ts
Do | Don't |
---|---|
Seek advice from the IT Service Desk if you are unclear about any aspect of information security. |
Disclose your password to anyone. Read our information on keeping your passwords safe. |
Report any loss or suspected loss of data. Find out how to report lost or stolen hardware or data. |
Use a personal email account for conducting University business. |
Change your password if you have any suspicion that it may have been compromised. |
Undermine or seek to undermine the security of computer systems. |
Ensure that personally owned equipment which has been used to store or process University data is disposed of securely. See further information on hardware and data disposal. |
Make copies of restricted University information without permission. |
Encrypt your mobile devices and make sure that restricted information is always encrypted before it's sent to others. See further information on encryption. |
Provide access to University information or systems to those who are not entitled to access it. |
Password protect your personally owned devices. See further information on mobile security. |
Use your University password as the password for any other service. |
Keep all of the software on your personally owned devices up to date. See further information on protecting your computer. |
Connect personally owned storage or mobile devices to University owned equipment if you are a member of staff or a research postgraduate. |
Comply with the law and University policies. See further information on compliance. |
Send unauthorised bulk email (spam). See the University's mass emailing policy. |
Be mindful of the risks of using open (unsecured) wifi hotspots or computers in internet cafes, public libraries etc. See information on travelling with University data. |
Leave your computers unlocked when left unattended. |
Do assume that Information Security is relevant to you. See the Information security website for comprehensive information on all aspects of information security at the University. |
Leave hard copies of information classified as Confidential or above unattended or unsecured. See the University's Record Management advice. |