Search results

Document search


Results

17 results found

Test 1

Test 1 file JK 19-02-25

Information technology > Devices and IT equipment
Last reviewed 19 February 2025
Word 13KB
Information

Test 1 file

Process test document - please ignore

Information technology > Devices and IT equipment
Last reviewed 6 February 2025
Word 13KB
Guidance

Password policy

This policy ensures that passwords are used in the most secure way, maintaining authorised access to systems and electronic information.

Information technology > Information security
PDF 154KB
Policy

Access control policy

This policy details how each user’s access privileges shall be authorised according to business needs.

Information technology > Information security
PDF 169KB
Policy

Bring your own device policy

This policy is intended to address the use in the workplace by staff and students of non-University owned electronic devices such as smart phones, tablets and other such devices to access and store University information, as well as their own.

Information technology > Devices and IT equipment
PDF 170KB
Policy

Print to a multi-function device (MFD) from a personal iPhone or iPad

This guide explains how to print to a MFD from a personal iPhone or iPad.

Information technology > Devices and IT equipment
PDF 640KB
Procedure

Print to a multi-function device (MFD) from a personal Apple MacBook

This guide explains how to print to a MFD from a personal Apple MacBook.

Information technology > Devices and IT equipment
PDF 635KB
Procedure

Print to a multi-function device (MFD) from a personal Android device

This guide explains how to print to a MFD from a personal Android device.

Information technology > Devices and IT equipment
PDF 90KB
Procedure

Print to a multi-function device (MFD) from a personal Microsoft Windows laptop

This guide explains how to print to a MFD from a personal Windows laptop.

Information technology > Devices and IT equipment
PDF 160KB
Procedure

Test 2 file

Process test document - please ignore

Information technology > Devices and IT equipment
Last reviewed 6 February 2025
PDF 13KB
Information

Third-party privileged access policy

This policy covers the anyone who accesses the University's systems, in any sort of support, administrative or privileged user capacity, where their primary affiliation is to an organisation other than the University.

Information technology > Information security
Last reviewed 11 March 2024
PDF 152KB
Policy

Mobile computing policy

This policy details how to ensure safe mobile working and ease of use and with the capability to connect and access resources such as email, online storage, and University business systems and data sources.

Information technology > Information security
Last reviewed 7 March 2025
PDF 150KB
Policy

Multi-Factor Authentication (MFA) - QR Code setup guide

This guide explains how to set up MFA for staff and students.

Information technology > Devices and IT equipment
Last reviewed 7 March 2025
PDF 756KB
Procedure

Your University laptop - guidance for overseas colleagues

How to use a University laptop for colleagues based overseas.

Information technology > Devices and IT equipment
Last reviewed 7 March 2025
PDF 464KB
Guidance

Electronic information security policy

This policy applies to all use of information and information technology on the University’s premises, to all information technology provided by the University wherever it is used, and to all external access to the University’s information technology from wherever this is initiated.

Information technology > Information security
Last reviewed 2 October 2024
PDF 167KB
Policy

Electronic information security policy - monitoring and logging policy

This subsidiary policy covers the monitoring and logging of all uses of information technology.

Information technology > Information security
Last reviewed 7 March 2025
PDF 128KB
Policy

Electronic information security policy - user policy

This subsidiary policy covers everything that an information technology ‘user’ requires to know. ‘Users’ are those that only use services provided to them as part of their role at the University and in the way the services are intended to be used by the service provider.

Information technology > Information security
Last reviewed 7 March 2025
PDF 111KB
Policy