IT Acceptable Use and Security Policy


This Policy sets out the principles applicable to the use of University IT and expresses the commitment of the University to providing and maintaining secure, effective and reliable IT infrastructure and services to support the University's operations in research, teaching, learning, and administration. By observing the acceptable use and security requirements, University IT users and custodians can help to prevent service disruptions and data breaches caused by cyberattacks and other threats.


If you require access to IT devices or applications that do not comply with our IT Acceptable Use and Security Policy, including specialist remote access, you will need to submit an exception request: via the MyIT portal: (ServiceNow).

Please refer to the Policy Directory for the latest version.