University IT Policy and Guidance.

 A policy guideline leaflet is available from  Direct links to policy in the page below.


Information Security Policy
This is a high level policy that describes how information and information systems are to be managed. Many of the other policies listed below are subsidiary to this one.

IT Acceptable Use Policy
All users of any University IT facilities should be familiar with the IT Acceptable Use policy. It comprises a short policy section with extensive guidance on use. The primary focus is to ensure the reader is aware of what is and is not permissible when using University IT facilities.

IT Remote Working Policy
The policy covers the use of both data transports (protocols permitting live remote access to University information and systems) and data transfers (the use of storage devices to transport data for remote working).

IT Privacy and Monitoring Policy
The policy describes the specific circumstances where the University may need (or be required) to examine the usage logs and datasets of users of University IT systems. This policy describes both the circumstances and the process that will be followed. 
IT Remote Working Policy

IT Hardware Asset Management Policy
This policy is primarily concerned with tracking IT hardware assets from the perspective of avoiding data loss. It mostly affects staff and the policy describes the separate responsibilities of Schools / Departments, individuals and the IT Department.
IT Software Asset Management Policy

IT Software Asset Management Policy
This policy informs everyone of the requirements with regard to purchasing, loading and using software on University equipment.

IT Administrative Privileges Code of Conduct

The code of conduct defines how administrator privileges on University owned workstations and laptops are to be used. The document also defines how users with standard rights may apply for this access, and what they may use this access for.

Guidance on the use of Social Media
The guidance covers both intended and unintended outcomes of the use of Social Media which staff, in particular, should be aware of. Clarity around the source of opinion in terms of it being personal or representative of the University is important

 To discuss any of these policies further you can contact the Information Assurance team at