All University web hosted services will be at risk of downtime every Tuesday between 7am to 9am.

Jump to accessibility statement Skip to content

Information Security


Techical Services / University IT / What We Do / Information Security
Lp5

Information Security

Part of our remit is to make sure that the University’s IT services are secure and easy to use to allow the safe management and sharing of information across the University.

What We Do

We manage information concerning our students and staff which is sensitive, and must be kept confidential. In addition to a range of policies and procedures designed to protect the confidentiality of all the data we hold, we also implement a series of measures to protect our data from external attack. These measures are designed to protect information from loss or misuse, including identity fraud, breaches of confidentiality and invasions of privacy. Information can exist in many forms: it can be printed or written on paper, stored electronically, sent by post, or transmitted by electronic means such as email. Whatever form the information takes, or the means by which it is shared or stored, it should always be appropriately protected.

We take the security and confidentiality of our data very seriously, and take great care to ensure access is properly controlled and managed. All of our systems and services are fully compliant with the General Data Protection Regulations (GDPR), and we have implemented a data management policy to ensure compliance, with our Information Governance Manager & Data Protection Officer, Sam Seldon, taking overall responsibility for this important aspect of our operation.

We work in partnership with teams within Technical Services and groups across the University to ensure we are responsive to the information security requirements and needs of our many users.

What are the Threats?

Viruses

Viruses can attack from a wide variety of sources such as emails, websites, instant messaging, USB (memory) sticks and file sharing. Be aware that they can often arrive in emails that appear to be from people you know, and then forward themselves on to all the people in your address book.

Spyware

Spyware is unwanted software that either secretly monitors your online activity to aid advertising and marketing or steals private information from your PC. Spyware can search for your bank details, log your key strokes, or even allow outsiders to control your computer.

Adware

Adware is software that displays advertising banners. It often includes code that tracks a user's personal information and web browsing habits, and then passes this information to third parties without the user's authorisation or knowledge.

Phishing Emails

Phishing emails are designed to look like genuine messages (from the University, your bank or another institution) that ask for passwords or financial details. They are particularly dangerous because they often look like the real thing, using the logos and styling to exactly match that of the legitimate organisation.

Malicious Web Links

Malicious web links direct you to a website which then infects your computer with a virus or spyware.

Social Networking Sites

Social networking sites (Facebook, for example) can be used to import viruses, spyware or adware to your account. This can happen as a result of adding people you don't know to your 'friends'.

Identity Theft

Identity theft occurs when passports, driving licences or other forms of identity are obtained in your name. Your personal details can also be used to open bank accounts and to obtain credit cards, loans and state benefits.