IT Security

ITO is charged with protecting the security of University’s networks from malicious computer attacks, malware infection, data leakage, service interruptions and network harassment.

Examples of security incidents include:

  • Unauthorised modification or deletion of data;
  • Unauthorised modification of the system software, hardware or connections;
  • Modification of system hardware, software or connections in breach of the Information Security Policy;
  • Hacking or attempted hacking by insiders or outsiders;
  • Suspected or actual illegal activity;
  • Unauthorised use of systems for personal gain or purposes; and
  • Unauthorised copying of information or software.

 

To log an Incident Request, please click here.

ITO Information Security Newsletter
JUCC Information Security Newsletter (Volume 2)
JUCC Information Security Newsletter (Volume 1)
Free of Charge