University of Buckingham Banner

IT corporate information

Background

Policy

Acceptable use policy

Outlines the University of Buckingham's approach to acceptable use of its computing facilities.

Policy

Access control policy

Outlines the University’s approach to access control of its computing facilities.

Factsheet

Accessibility statements for third party systems

Find advice on using our websites and systems, plus instructions on overcoming known accessibility issues.

Policy

Anti-virus/malware policy

Outlines the University’s approach to anti-virus/malware protection for its computing facilities.

Policy

Asset management policy

Outlines the University’s approach to management of its information technology assets.

Policy

Client Device Policy

Key policy facts, responsibilities, and processes in relation to the management of client devices for University employees and research postgraduate students.

Policy

Cyber vulnerability management policy

This policy provides cybersecurity strategy and aims for a secure IT environment.

Factsheet

Data protection for remote working

How personal data must be stored, shared, and used when remote / home working.

Policy

Disposal of all waste electronic and electrical equipment

Our policy on how to dispose of waste electrical and electronic equipment (WEEE).

Policy

Electronic messaging policy

Outlines the University’s approach to use of its electronic messaging facilities.

Policy

Electronic Signing Policy

This policy sets out how e-signatures are to be used in the University and also the underpinning principles to support electronic business models.

Charter

Information Charter

Our Information Charter and Principles.

Policy

Information security awareness policy

Outlines the University’s approach to information security awareness.

Policy

Information security policy

Outlines the University’s approach to information security management.

Policy

IT policies - relevant legislation

The governance underpinning the University of Dundee information and cyber security policies, standards, and other guidance.

Policy

Laptop Loan Scheme Terms and Conditions

Outlines the university's long and short term loan of university equipment to students.

Policy

Mobile and bring your own device (BYOD) policy

Outlines the University’s approach to use of mobile devices and ‘bring your own device’ (BYOD).

Policy

Patch management policy

Outlines the University’s approach to the patch management of its infrastructure assets.

Policy

Recording meetings Data Protection guidance

The following relates specifically to recording online meetings or group calls.

Policy

Remote access policy

Outlines the University’s approach to remote access to its computing facilities.