Do you know how to recognise a personal data breach, and would you be confident of the process to follow if you discovered one? Questions about data breaches are among the most common queries we receive, and it is also the topic that can cause the most anxiety, with fear of hefty financial...
Search results
Overview
Although we take all of the cyber security precautions that any other major organisation should do, there are some vulnerabilities that technology alone cannot fully avoid, and example of which, is social engineering (see section lower down). It is important that you are aware of how to...
Version number:
2024
Policy owner:
The University of Chichester
Effective date:
04/04/2024 (reviewed annually)
IT Privacy and Monitoring Policy1. Policy Statement1.1. The Electronic Information Security...