• Do not open e-mail attachments from strangers, regardless of how enticing the Subject Line or attachment may be. Be suspicious of any unexpected e-mail attachment from someone you do know because it may have been sent without that persons knowledge from an infected machine. 
  • Do not keep computers online when not in use. Either shut them off or physically disconnect them from Internet connection.
  • Do not use anyone else’s username and password and don’t let anyone use yours
  • Do not infringe copyright or the intellectual property of others
  • Do not deliberately misuse, corrupt or break any of our IT facilities

  • Do not leave personal data displayed on your monitor. If you leave your PC unattended please ensure it is locked. Press Ctrl + Alt + Delete to do so.
  • Passwords should not be written down.
  • Passwords should not be names or proper nouns. Your password should include a mixture of alpha numeric characters. If you believe your password has been divulged it should be changed immediately via the IT Service desk
  • Training and testing data should be kept separate from live data and secured from unauthorised access
  • Demonstrations should not use live data if possible
  • Do not use personal USB storage devices to store and move University data. Please request an approved secured memory stick from ITS