We tend to think of social media like real life. We have a conversation or a thought and then move on – forgetting that in the digital world a copy could be kept forever, unless we take steps to remove it. This guide explains how to minimise any potential damage your previous use of social media...
Search results
Pop-ups are web pages that are forced to open in separate windows.
Pop-ups may contain useful information; however, be cautious of online advertisement pop-ups or websites attempting to use pop-ups to install malicious programs or viruses.
Below are some guides on how to enable or...
According to a recent survey, most students have only met half of their Facebook contacts, and consider only 25% or less as close friends. But they still share personal information on their page.
Version number:
2024
Policy owner:
The University of Chichester
Effective date:
04/04/2024 (reviewed annually)
IT Privacy and Monitoring Policy1. Policy Statement1.1. The Electronic Information Security...
Although we take all of the cyber security precautions that any other major organisation should do, there are some vulnerabilities that technology alone cannot fully avoid, and example of which, is social engineering (see section lower down). It is important that you are aware of how to...