Version number:
2024
Policy owner:
The University of Chichester
Effective date:
07/08/2024 - reviewed (at least) annually.
Electronic Information Security PolicyPolicy StatementElectronic information is...
Version number:
2024
Policy owner:
The University of Chichester
Effective date:
07/08/2024 - reviewed (at least) annually.
Electronic Information Security PolicyPolicy StatementElectronic information is...If you have seen someone who appears to be doing something with computers that you are concerned about please call the SIZ in confidentiality.
If you have accessed something that you are concerned might increase the risks of cyber-attack, please also contact us as soon as possible so that...
You can borrow Kensington security cables from the SIZ to lock your laptop securely while you walk around the library
Most laptops will have a Kensington connection (located on the side or back of the laptop)
Many desks in the open access areas...
When sending emails to recipients outside of the University from your staff or generic email account (@chi.ac.uk), it is sometimes difficult to determine if these emails are being accessed using a secure method. This is particularly important when the information being sent includes personal...
This page now redirects to the Electronic Information Security Policy - IT Code of Conduct
The University’s emergency phone number operates 24 hours a day for on campus emergencies: 01243 816363 (extension 6363 from an internal phone). This number can be used to request first aid support, or to report security issues or lift breakdowns.
Where appropriate please call 999 for...
At the University of Chichester, we're committed to providing as best an experience for gaming as we can, whilst remaining within the confines of a secure environment for all staff and students.
To facilitate this, we have implemented a dual boot system, where-by computers in the BRC Tech...
Access to the Business School Webserver is provided by a username and password sent to you in an email. If you don't have an email with these details, and you feel you should have access, then please log a support call at https://supportme.chi.ac.uk or speak with your lecturer.
In your...
Although we take all of the cyber security precautions that any other major organisation should do, there are some vulnerabilities that technology alone cannot fully avoid, and example of which, is social engineering (see section lower down). It is important that you are aware of how to...