Information Security Policy

This policy provides a framework for the management of information security throughout the University.

Posted on Last updated on Was this page helpful? Yes NoThanks for your feedback!Please tell us more:

IT Acceptable Use Policy

The acceptable use policy (AUP) stipulates constraints and practices that a user must agree to before they access the Edge Hill network. All employees or students should read the acceptable use policy before being granted access to the  network.

Posted on Last updated on Was this page helpful? Yes NoThanks for your feedback!Please tell us more: