ºÚÁϳԹÏÍø

*/ "use strict"; function _defineProperty(obj, key, value) { if (key in obj) { Object.defineProperty(obj, key, { value: value, enumerable: true, configurable: true, writable: true }); } else { obj[key] = value; } return obj; } if (getCookie("CookieConsent")) { var cookieValue = "{" + '"cookieValue"' + ":" + getCookie("CookieConsent") + "}"; var jsonData = JSON.parse(cookieValue); } function getCookie(cname) { var name = cname + "=", decodedCookie = decodeURIComponent(document.cookie), ca = decodedCookie.split(";"); for (var i = 0; i < ca.length; i++) { var c = ca[i]; while (c.charAt(0) == " ") { c = c.substring(1); } if (c.indexOf(name) == 0) { return c.substring(name.length, c.length); } } return ""; } /* Everything below can sit in a

Information Security Policies

 

All staff, partner staff and contractors, and Governors are required to adopt procedures and practices that ensure the security, integrity and protection of information created and held by The ºÚÁϳԹÏÍø, and to abide by the university’s rules for the use of computer systems.

Acceptable Use Policy for Computers, and Information Systems

The Acceptable Use Policy sets out the obligations placed on all users of University computers, networks and information systems.

Highlighted points from the policy:

  • All staff and students must use their bolton.ac.uk email address for University correspondence
  • The University is asking staff not to use their bolton.ac.uk email for conducting or retaining personal/non-work related correspondence
  • All staff need to be aware of the university’s security classifications for data and information and take steps to protect data accordingly e.g. in email attachments, on pen drives, when accessing data from home

Information Security Policy Set (Single Document)

The Information Security Policy Set is a single document containing the policy statements and controls that staff, students, partner organisations, Governors must adhere to in order to ensure the safe management of University information, data and systems.

Guidance for the Use of Mobile Devices

Mobile devices (laptops, smartphones, tablets, pen drives, CD/DVD etc) are portable media devices and their mobility adds additional risks to safeguarding University data and info e.g. through device loss, theft or damage. The Guidance on Information Security with Mobile Devices sets out the practices and safeguards that staff, partner staff, contractors and researchers must adopt when accessing or moving university data, including email, around on portable media.

myBolton

Download the app for your smartphone from:

Help Centre

We have the answers to your questions, find all the advice and support in one place.

Part of the ºÚÁϳԹÏÍø Group

QQA

Help Centre

We have the answers to your questions, find all the advice and support in one place.

Part of the ºÚÁϳԹÏÍø Group

QQA