This policy governs how University information and systems are accessed to protect sensitive data and maintain security. Access is permitted only through approved devices with strong passwords, encryption, and up-to-date software, while elevated privileges require enhanced authentication. Devices that do not meet security standards are blocked. Access rights are role-based, reviewed regularly, and logged. Physical security measures include ID card access and surveillance, and ID cards must be worn visibly, reported if lost, and replaced promptly. University credentials must never be reused externally, and classified data must always be secured.
The publication of the Policies forms part of the ongoing development of at the University lead by the Information Risk and Compliance team.