Information security guidelines
Content
- Quick guide to information security
- Sensitive data handling in research
- Information security and mobile phones
- Data security of voice recorders and cameras
- Secure remote work
- Information security guidelines for abroad travelling
- Information security guidelines for setting up remote meetings and interviews using Teams or Zoom
- Temporary attendees in recurring meetings
- Disposal of confidential material
- Examples of phishing messages
- Password management software