Information Security

In brief,

  • It helps protect the work and reputation of the University and prevents unecessary cost and risk: good information security protects us from threats such as theft of equipment, deliberate attacks on our data or human error.
  • It combines the physical and technical security of premises and systems with agreed procedures and policies. Day to day actions taken by individuals to protect the confidentiality, integrity and availability of data in any form are vital in implementing the procedures.
  • This means we must all take personal responsibility for making authorised use of information and systems, for securing premises, for protecting passwords and for keeping information confidential and secure.

Good physical security of our premises and technical security of our ICT systems will help the University protect itself from threats to its information security. But our staff and the way that they go about their daily tasks are also vital to this. The University Records Manager is responsible for providing help and guidance on developing operational procedures to maintain information security.

There is also extensive guidance on the use of ICT systems including the IT Security Policy and IT Security Procedure Manual .

Complying with the Data Protection Act also encompasses a need for good information security.

Guidance on information security

  • Introduction
  • Acceptable use of information
  • Acceptable use of ICT systems
  • Clear desk and screen
  • Mobile equipment
  • Passwords
  • Remote access to University data
  • Shared printers and faxes

The IT Security Procedure Manual contains rules relating to the use of ICT systems and equipment as laid down in the IT Security Policy .

© 2017 University of Huddersfield - All rights reserved

VAT registration number 516 3101 90