IT Security Procedure Manual
IT Security Procedure Manual
Scope
These procedures apply to all IT-related systems, hardware, services, facilities and
processes owned or otherwise made available by the University of Huddersfield or on its
behalf, whether utilising the University’s network and servers or those provided through
cloud-based environments. These procedures include, for the avoidance of doubt any
personally owned devices that are used in connection with University activities (together,
IT Systems).
1. Compliance
All staff members of the University, affiliates and third parties will comply with this IT
Security Procedure.
Access Examples
Sensitive To be accessed by a • Aligns to the
strictly controlled group GDPR’s definition of
of users, with the data special category
owner’s consent, and data
with the highest • Sensitive personal
security levels applied. data (i.e. information
Not to be passed on about a person’s
without consent. racial or ethnic
Subject to the Data origin, political
Protection Act. opinions, religious
beliefs, health,
criminal record and
trade union
membership)
• HR record
• Business critical
information such as
financial or
contractual details.
• Research data
concerning topics
such as terrorism or
radicalisation.
Access Examples
Confidential To be kept secure and • Aligns to GDPR’s
accessed only for definition of personal
business need. To be data
passed to third parties • A person’s address,
only as required for the phone number,
fulfilment of the student record,
University’s contract results, general
with the individual, financial information.
except with Information which is
permission. Subject to covered by ethical
the Data Protection guidelines, or by
Act. research-related
subject consent.
https://www.hud.ac.uk/informationgovernance/dataprotection/
Where a role requires access to specific business systems that contain sensitive
personal or financial information, individuals may be required to sign a data protection
declaration before they are sanctioned to carry out these duties. A pro-forma is given
in Appendix B of this document. Line managers will make staff aware if they are
required to do this and line managers will oversee the process within their School or
department. The completed pro-forma will be retained by the School or department
where the completion of data protection declaration is required.
3.2. Securing your computer when you are away from your desk.
When a computer is left unattended, it is essential that that no unauthorised person
can gain access to it.
There are two simple techniques that should be used.
• Log out.
This will prevent any access until a valid username and password is
entered. When you log out of a computer it also allows security updates to
take place so is good practice if you won’t be using the computer for longer
periods of time.
Microsoft Windows
Press + L key at the same time.
Apple macOS
Click the Icon and select Lock Screen
or
If in doubt never reply to the email; or click any links, open attachments, scan QR
codes or call phone numbers contained within the suspicious email. You should
always verify the authenticity of a dubious email with the individual directly if you
know them or gain a genuine contact number for a company from their official web
site.
Outlook desktop Open the email, click “Report Message” in the top right hand
client corner.
Outlook via a Open the email. Firstly click “…” (three dots symbol) in the
web browser top right hand corner to open ‘more actions’, the click
“Report”.
If you open an attachment, click a link, or scan a QR code from an email that you
later realise is probably malicious please contact the IT Support as soon as
possible so that steps can be taken to investigate.
It is the responsibility of the person arranging the purchase to find out if the customer
intends to use the portable device to hold or access sensitive or confidential data. If
so, encryption must be used (see below).
It is the responsibility of the device user to inform Computing and Library Services
(CLS) IT Support via the link here if changes in circumstances mean that a device will
need to hold or access sensitive or confidential data so that checks can be
undertaken to ensure the appropriate protection is in place.
Any data must be stored in such a way that it can easily be backed up or identified for
encryption. Any data of value to the University must be placed on secure institutional
storage such as OneDrive or SharePoint. IT Support or local technical staff will be
able to advise on the best way to achieve this.
• University Android mobile phones and tablets will be enrolled into Microsoft
InTune over Academic year 2023-2024 and device users will need to
comply with requests to enroll their device to InTune when requested.
• Mobile devices must be treated as carefully as if they were the user’s own
property.
• Mobile devices must be securely locked away when not in use and must not be
left unattended in a public place.
• If a securing cable is used, one key must be kept with the owner and another in a
secure separate location.
• When left in a vehicle, mobile devices must be locked away in the car boot and
not left on view inside a vehicle.
• Mobile devices must not be left within sight of ground floor windows or within
easy access of external doors.
• Mobile phones and tablets must have an initial PIN to access the device of no
less than six digits or a password in line with the password requirements. This
may be complimented with fingerprint ID once the PIN is configured.
• Never attempt to uninstall or change the settings of the security protections that
have been configured on devices.
Users must not circumvent any built-in mobile device security systems (known as ‘jail-
breaking’ or ‘rooting’) in order to download apps from sources other than the official
app stores, or to obtain ‘super-user’ privileges over the device.
Anti-virus software relies on daily updates to its virus definitions to be effective and to
know about new viruses. Users must ensure that devices, including spare stock are
regularly connected to the network or Internet in order to receive these important
updates.
The user must never disable or attempt to make changes to the anti-virus protection
in place as this can put University systems and information at risk.
CLS will investigate the incident and establish the nature and potential security threat
resulting from it.
Reportable incidents include, but are not limited to:
The University Data Protection Officer must also be informed if the incident involves
the loss or unauthorised disclosure of personal data. If you need to notify the
Public networks and Wi-Fi connections such as those in hotels and coffee shops may
not be secure and should be avoided. It is trivial for someone to set up a fake Wi-Fi
access point with a trusted name to encourage connections which they can then use
to view your internet traffic or gain access to your device. Where connection to a
public WiFi network is unavoidable always take steps to verify the Wi-Fi network with
the venue before connecting. If you are unsure of the security of any wired or wireless
network then you should not use it.
6. Systems Security
6.1. Access to business systems
University staff will be provided with a unique computer account providing access to a
limited range of business resources. This will usually consist of an email mailbox,
personal storage, and collaboration tools such as OneDrive, SharePoint and Teams.
Shared storage areas used by the wider team may also be provided.
Authorisation to use any of the University’s business applications must be requested
by the applicant or their line manager and approved by the system owner. The
prospective user may be required to undertake some basic training prior to enabling
use of the live system.
Requests for access to systems that contain sensitive or confidential information
(such as ASIS, iTrent, or PAPA) are handled specifically. Authorisation is granted by
the System Owner and the prospective user may be requested to sign a separate
Data Protection declaration and undertake training before being given access to the
system.
Anyone unsure of the procedure for obtaining authorisation to use any system should
create a support ticket with IT Support in the first instance, Via the link here.
System owners must ensure that all system components including hardware, operating
systems and applications that they are responsible for remain within vendor support
and that these are regularly patched with software security updates in order to reduce
the opportunity for the exploit of known vulnerabilities.
8. Network Security
8.1. Attachment of servers and other infrastructure to the network
The attachment of digital infrastructure including network hardware and servers to the
network brings with it a number of security considerations. These are focussed on
the data the infrastructure transmits or contains and the people who are going to
access it. For these reasons, all elements of digital infrastructure need to be
protected.
The University has a published network attachment protocol that provides instruction
and guidance on the steps you need to take before attaching a device to the network.
In all cases the Network Team will routinely undertake housekeeping of the
firewall rules in place. Where a rule has not been used for 90 days the open port
may be removed unless there is an approved and documented exception.
Provisions (a), (b) and (c) above shall not apply to the whole or any part of the
Information to the extent that it can be shown by <organisation name> to be:
i. known to <organisation name> prior to the date entered below and not
obtained directly or indirectly from any other party; or
ii. obtained from a third party who lawfully possesses such Information which
has not been obtained in breach of a duty of confidence owed to the
University; or
iii. in the public domain in the form in which it is possessed by the University
other than as a result of a breach of a duty of confidence owed to the
University; or
Name: _______________________________________
Signature: _______________________________________
Date: _______________
Under the terms of the Act, access to personal or individual data should be restricted to
those data items which are necessary in order to perform system management or
troubleshooting duties.
Additionally, data must not be disclosed to a third party without the express consent of
the data subject or owner. In practice this means that documents, information, or the
means to access them, should not be given to other members of the University or to
external individuals or agencies, including the police, unless in exceptional
circumstances; see below.
Staff should not use any additional access privileges granted to them to view or obtain
confidential information relating to their own role(s) within the University, either as staff or
student, which would not normally be available to them. Where any such access is likely
to occur in the performance of a system management or similar task, staff should consult
their line manager before proceeding.
A line manager may request access to the data stored in an absent employee’s individual
storage area, in order to assist the operation of the University, such as to retrieve lecture
notes or assessment material required urgently.
Staff should also be aware of the consequences of accessing data beyond that which is
necessary, or of disclosing personal or individual data without permission. In certain
cases this could lead to disciplinary action or prosecution of the individual.
Any queries regarding what information may or may not be accessed or disclosed should
be addressed to the University Secretary.
http://www.hud.ac.uk/informationgovernance/dataprotection/
Name: .................................,.......................................................................................
School/Service: ...................................................................................................................
Signature: .........................................................................................................................
Date: .........................................................................................................................
REVISION HISTORY