IT corporate information

Outlines the University of Buckingham's approach to acceptable use of its computing facilities.
Outlines the University’s approach to access control of its computing facilities.
Find advice on using our websites and systems, plus instructions on overcoming known accessibility issues.
Outlines the University’s approach to anti-virus/malware protection for its computing facilities.
Outlines the University’s approach to management of its information technology assets.
Key policy facts, responsibilities, and processes in relation to the management of client devices for University employees and research postgraduate students.
This policy provides cybersecurity strategy and aims for a secure IT environment.
How personal data must be stored, shared, and used when remote / home working.
Our policy on how to dispose of waste electrical and electronic equipment (WEEE).
Outlines the University’s approach to use of its electronic messaging facilities.
This policy sets out how e-signatures are to be used in the University and also the underpinning principles to support electronic business models.
Our Information Charter and Principles.
Outlines the University’s approach to information security awareness.
Outlines the University’s approach to information security management.
The governance underpinning the University of Dundee information and cyber security policies, standards, and other guidance.
Outlines the university's long and short term loan of university equipment to students.
Outlines the University’s approach to use of mobile devices and ‘bring your own device’ (BYOD).
Outlines the University’s approach to the patch management of its infrastructure assets.
The following relates specifically to recording online meetings or group calls.
Outlines the University’s approach to remote access to its computing facilities.