When sending emails to recipients outside of the University from your staff or generic email account (@chi.ac.uk), it is sometimes difficult to determine if these emails are being accessed using a secure method. This is particularly important when the information being sent includes personal...
Search results
Although we take all of the cyber security precautions that any other major organisation should do, there are some vulnerabilities that technology alone cannot fully avoid, and example of which, is social engineering (see section lower down). It is important that you are aware of how to...
Pop-ups are web pages that are forced to open in separate windows.
Pop-ups may contain useful information; however, be cautious of online advertisement pop-ups or websites attempting to use pop-ups to install malicious programs or viruses.
Below are some guides on how to enable or...
According to a recent survey, most students have only met half of their Facebook contacts, and consider only 25% or less as close friends. But they still share personal information on their page.
In the past when sending emails containing personal data or sensitive information to recipients both inside and outside of the University from your staff or generic email account (@chi.ac.uk), there were no controls regarding where this email could go. It could be forwarded and the contents...
Version number:
2024
Policy owner:
The University of Chichester
Effective date:
04/04/2024 (reviewed annually)
IT Privacy and Monitoring Policy1. Policy Statement1.1. The Electronic Information Security...
If you communicate by email with members of staff from the University of Chichester, it is likely you have been sent an encrypted email if it contains sensitive or personal information.
While instructions are provided in the email on how to decrypt the message, a more detailed guide is...
IT Services encourages you to report any suspicious online activity using the reporting features built in to the different apps and services that you use at the University.
This guide will demonstrate how to report suspicious emails, and further down the...