Conditional formatting is a feature that has a variety of uses. Mainly surrounding different ways of displaying data corresponding to the value found within the cell or range of data. This can help you visualise the data faster...
Conditional formatting is a feature that has a variety of uses. Mainly surrounding different ways of displaying data corresponding to the value found within the cell or range of data. This can help you visualise the data faster...
This page contains broad information around the following:
Although we take all of the cyber security precautions that any other major organisation should do, there are some vulnerabilities that technology alone cannot fully avoid, and example of which, is social engineering (see section lower down). It is important that you are aware of how to...
All current University of Chichester staff and students have full free access to the Library Service. You are automatically a member of the library when you join the University. Your campus ID card is also your library card and you will find your library account number on your campus ID card. ...
Pivot tables can be used for many things however their best function is served by collating data for you. This is easier to create when the data is presented in log format. What we mean by this is that you should log each transaction individually and not...
SupportMe is a self-service portal for raising support calls e.g. IT Support calls, reporting lost property, requesting library books to be sent cross-campus for you etc.
Calls can also be logged to Estate Management via the 'Request Estates Support' link...
It is the policy of the University of Chichester (“The University”) to ensure that its staff, students and other stakeholders have equipment suitable to the fulfilment of their role and to enable them to participate in and innovate in the University’s learning...
Version number:
2024
Policy owner:
The University of Chichester
Effective date:
04/04/2024 (reviewed annually)
IT Privacy and Monitoring Policy1. Policy Statement1.1. The Electronic Information Security...