- Do not open e-mail attachments from strangers, regardless of how enticing the Subject Line or attachment may be. Be suspicious of any unexpected e-mail attachment from someone you do know because it may have been sent without that person’s knowledge from an infected machine.
- Do not keep computers online when not in use. Either shut them off or physically disconnect them from Internet connection.
- Do not use anyone else’s username and password and don’t let anyone use yours
- Do not infringe copyright or the intellectual property of others
Do not deliberately misuse, corrupt or break any of our IT facilities
- Do not leave personal data displayed on your monitor. If you leave your PC unattended please ensure it is locked. Press Ctrl + Alt + Delete to do so.
- Passwords should not be written down.
- Passwords should not be names or proper nouns. Your password should include a mixture of alpha numeric characters. If you believe your password has been divulged it should be changed immediately via the IT Service desk
- Training and testing data should be kept separate from live data and secured from unauthorised access
- Demonstrations should not use live data if possible
- Do not use personal USB storage devices to store and move University data. Please request an approved secured memory stick from ITS