Search results

Document search


Results

774 results found

ENhance Case Study - AI in Professional Practice

Dr Janis MacCallum shares practice on supporting appropriate Generative Artificial Intelligence use for biology students in the School of Applied Sciences, building on DLTE resources such as the AI Toolkit and AI Coversheet.

Learning and teaching > ENhance curriculum framework
Last reviewed 25 February 2025
PDF 108KB
Information

ENhance Case Study - Authentic Assessment in Criminology

This case study showcases the changes made to assessment in the Introduction to UK Criminal Justice Systems module, to improve student learning, inclusivity and mitigate against improper use of Generative AI.

Learning and teaching > ENhance curriculum framework
Last reviewed 7 March 2025
PDF 444KB
Information

Electronic information security policy - user policy

This subsidiary policy covers everything that an information technology ‘user’ requires to know. ‘Users’ are those that only use services provided to them as part of their role at the University and in the way the services are intended to be used by the service provider.

Information technology > Information security
Last reviewed 7 March 2025
PDF 111KB
Policy

Electronic information security policy - monitoring and logging policy

This subsidiary policy covers the monitoring and logging of all uses of information technology.

Information technology > Information security
Last reviewed 7 March 2025
PDF 128KB
Policy

Electronic information security policy

This policy applies to all use of information and information technology on the University’s premises, to all information technology provided by the University wherever it is used, and to all external access to the University’s information technology from wherever this is initiated.

Information technology > Information security
Last reviewed 2 October 2024
PDF 167KB
Policy

Your University laptop - guidance for overseas colleagues

How to use a University laptop for colleagues based overseas.

Information technology > Devices and IT equipment
Last reviewed 7 March 2025
PDF 464KB
Guidance

Multi-Factor Authentication (MFA) - QR Code setup guide

This guide explains how to set up MFA for staff and students.

Information technology > Devices and IT equipment
Last reviewed 7 March 2025
PDF 756KB
Procedure

Mobile computing policy

This policy details how to ensure safe mobile working and ease of use and with the capability to connect and access resources such as email, online storage, and University business systems and data sources.

Information technology > Information security
Last reviewed 7 March 2025
PDF 150KB
Policy

Third-party privileged access policy

This policy covers the anyone who accesses the University's systems, in any sort of support, administrative or privileged user capacity, where their primary affiliation is to an organisation other than the University.

Information technology > Information security
Last reviewed 11 March 2024
PDF 152KB
Policy

Performance Improvement Policy

This policy provides a clear framework for the consistent management of underperformance and applies to all employees.

Working here > Pay, benefits and conditions
Last reviewed 5 March 2025
PDF 2MB
Policy