Search results

Document search


Results

15 results found

Multi-Factor Authentication (MFA) - QR Code setup guide

This guide explains how to set up MFA for staff and students.

Information technology > Devices and IT equipment
Last reviewed 7 March 2025
PDF 756KB
Procedure

Your University laptop - guidance for overseas colleagues

How to use a University laptop for colleagues based overseas.

Information technology > Devices and IT equipment
Last reviewed 7 March 2025
PDF 464KB
Guidance

Electronic information security policy

This policy applies to all use of information and information technology on the University’s premises, to all information technology provided by the University wherever it is used, and to all external access to the University’s information technology from wherever this is initiated.

Information technology > Information security
Last reviewed 2 October 2024
PDF 167KB
Policy

Electronic information security policy - monitoring and logging policy

This subsidiary policy covers the monitoring and logging of all uses of information technology.

Information technology > Information security
Last reviewed 7 March 2025
PDF 128KB
Policy

Electronic information security policy - user policy

This subsidiary policy covers everything that an information technology ‘user’ requires to know. ‘Users’ are those that only use services provided to them as part of their role at the University and in the way the services are intended to be used by the service provider.

Information technology > Information security
Last reviewed 7 March 2025
PDF 111KB
Policy