Physical and Environmental Security Policy Overview
Introduction
This policy promotes good practice to ensure that University information assets remain uncompromised, and that there is no interruption to University business. All computer equipment must be kept secure, physical security methods to restrict access where necessary must be in place, and network infrastructure located safely and securely. File servers and communications equipment should be recorded and equipment disposed of in accordance with the Disposal of IT Equipment Policy.
Key Points
- All IT equipment should be kept secure,
- Entry to secure areas must be restricted to authorised users only,
- Wherever possible, IT infrastructure should be located safely and securely,
- Regular checks must be performed.
The Policy Document
The complete policy can be found here
Guidance
Further guidance is currently under development.