Do you know how to recognise a personal data breach, and would you be confident of the process to follow if you discovered one? Questions about data breaches are among the most common queries we receive, and it is also the topic that can cause the most anxiety, with fear of hefty financial...
Search results
We tend to think of social media like real life. We have a conversation or a thought and then move on – forgetting that in the digital world a copy could be kept forever, unless we take steps to remove it. This guide explains how to minimise any potential damage your previous use of social media...
How many times have you clicked to download a zip file, image, or document to find that your computer has automatically saved the file to a folder called “Downloads”… and how many times have you deleted the files in this folder?
Many of us will have a Downloads folder that is full of files...
If you have seen someone who appears to be doing something with computers that you are concerned about please call the SIZ in confidentiality.
If you have accessed something that you are concerned might increase the risks of cyber-attack, please also contact us as soon as possible so that...
Pop-ups are web pages that are forced to open in separate windows.
Pop-ups may contain useful information; however, be cautious of online advertisement pop-ups or websites attempting to use pop-ups to install malicious programs or viruses.
Below are some guides on how to enable or...
When sending emails to recipients outside of the University from your staff or generic email account (@chi.ac.uk), it is sometimes difficult to determine if these emails are being accessed using a secure method. This is particularly important when the information being sent includes personal...
In the past when sending emails containing personal data or sensitive information to recipients both inside and outside of the University from your staff or generic email account (@chi.ac.uk), there were no controls regarding where this email could go. It could be forwarded and the contents...
You can virus scan University files, folders, or devices.
If you believe you have a virus, or the scan results indicate you have, please contact SIZ immediately.
Single file / folder / USB scanIf you communicate by email with members of staff from the University of Chichester, it is likely you have been sent an encrypted email if it contains sensitive or personal information.
While instructions are provided in the email on how to decrypt the message, a more detailed guide is...
Browsing data includes: cookies, cache, history and saved passwords. Occasionally you may need to clear some or all of this data. Different browsers have slightly different methods. The links below take you to guides produced by the browsers.
Please note:
According to a recent survey, most students have only met half of their Facebook contacts, and consider only 25% or less as close friends. But they still share personal information on their page.
Version number:
2024
Policy owner:
The University of Chichester
Effective date:
04/04/2024 (reviewed annually)
IT Privacy and Monitoring Policy1. Policy Statement1.1. The Electronic Information Security...
Social media tools such as Instagram, X, TikTok and Facebook are a part of everyday life. Used well, they can add to your learning experience at university, and make you more employable when you graduate. But used poorly, they can cause lasting damage to you and others.
Your responsibility...
Although we take all of the cyber security precautions that any other major organisation should do, there are some vulnerabilities that technology alone cannot fully avoid, and example of which, is social engineering (see section lower down). It is important that you are aware of how to...
Different methods have been made available to students and staff which allow you to report emails which are considered as either Spam or Phishing.
Spam or Junk emails are often classed as unsolicited emails which may focus on advertising and selling goods or services. You may have never...