IT Security Policies

The University's IT Security policies consist of a number of documents which must be followed to protect all information the University holds, as well as our IT systems.

More details, forms and supporting documents can be found on our SharePoint site.

Subsidiary policies and standards

Robust Cyber and IT Governance protects University systems and data, ensuring their use in secure, efficient, and legally compliant ways. The following policies apply to all aspects of IT infrastructure, Information Assets and Cyber Security.

All Information and Cyber security policies can be found here

Regulations relating to the use of information technology facilities (including acceptable use) provide the detail for anyone that has any access to University computing, telecommunications or networking systems and services provided by, or accessed via, the University of Exeter.

The university adheres to the following external policies below, that set out the responsibilities for all users, including users of privately owned devices whilst using the Janet and eduroam network.

Janet Acceptable Use Policy

eduroam(UK) Policy

Our Information Governance Policies can be found here