This page contains broad information around the following:
Search results
Although we take all of the cyber security precautions that any other major organisation should do, there are some vulnerabilities that technology alone cannot fully avoid, and example of which, is social engineering (see section lower down). It is important that you are aware of how to...
Pivot tables can be used for many things however their best function is served by collating data for you. This is easier to create when the data is presented in log format. What we mean by this is that you should log each transaction individually and not...
SupportMe is a self-service portal for raising support calls e.g. IT Support calls, reporting lost property, requesting library books to be sent cross-campus for you etc.
Calls can also be logged to Estate Management via the 'Request Estates Support' link...
It is the policy of the University of Chichester (“The University”) to ensure that its staff, students and other stakeholders have equipment suitable to the fulfilment of their role and to enable them to participate in and innovate in the University’s learning...