Information Security Policies
All users of the computing or information services provided by the University should be familiar with and abide by the Information Security Policy.
Having read the Information Security Policy you should then be familiar with all other policies that are appropriate for your course, research or role.
Extra care should be taken when dealing with sensitive information; if you are in any doubt about the sensitivity of information, or how it should be handled, then please contact the CiCS Helpdesk. Examples of sensitive information include personal information, financial data and unpublished research.
Data Protection
Our Data Protection Policies relate to anybody handling sensitive (and particularly personal) information.
Freedom of Information
The Freedom of Information Act 2000 (FOIA) gives a general right of access to all types of recorded information held by the University of Sheffield. It also sets out exemptions from that right and places a number of obligations on the University when responding to requests for information.
Personal Information on Portable Computers and Media
Personal Information may only be created, processed or stored on portable computers or portable media in accordance with the policy below.
Personal Information on Portable Computers and Media
Records Management
The aim of records management is to assist departments in managing their records in an orderly and accountable manner. In order to do this we adhere to a range of standards and best practice.
Security Incident Policy
All incidents involving actual or potential breaches of Information Security must be reported in accordance with the policy below.
