Internal Communications course timetable
Monday 27 February
12:15 |
All University employees are invited to join an online open meeting to hear updates from Acting Vice-Chancellor Anthony Freeling and colleagues from the Pro-Vice-Chancellors Office and HR Division. Panellists will include:
The meeting will be chaired by James Helm, Director of Communications. |
Thursday 27 April
13:00 |
All University staff members are invited to join an online open meeting to hear updates about key University activities. Panellists will include the Acting Vice-Chancellor, Dr Anthony Freeling, Professor Kamal Munir, Pro-Vice-Chancelllor for University Community and Engagement, Andi Hudson, Director of HR, and Emma Rampton, Registrary. |
Tuesday 27 June
12:30 |
All University staff members are invited to join an online open meeting. The meeting will feature:
Panellists
Questions You can use this form to submit a question for the panel in advance. We will try to prioritise pre-submitted questions at the start of the Q&A session. Alternatively, you can ask a question on the day using the Teams chat function. |
Monday 4 September
10:00 |
The University is developing an Acceptable Use Policy (AUP) for its information services as part of a series of actions to reduce cyber security risk. Cyber crime is a persistent and ever-changing threat to the University and its people. Defining how IT services should be used appropriately is a significant step in protecting staff, students and the institution from harm. The AUP will set out how everyone who is authorised to use the University’s information services – including University and College staff, students, certain visitors and contractors – can help prevent security-related incidents and avoid harmful activities. These focus groups form part of a wider consultation on the draft policy. More information about the development of information security policies can be found on the UIS website. |
14:00 |
The University is developing an Acceptable Use Policy (AUP) for its information services as part of a series of actions to reduce cyber security risk. Cyber crime is a persistent and ever-changing threat to the University and its people. Defining how IT services should be used appropriately is a significant step in protecting staff, students and the institution from harm. The AUP will set out how everyone who is authorised to use the University’s information services – including University and College staff, students, certain visitors and contractors – can help prevent security-related incidents and avoid harmful activities. These focus groups form part of a wider consultation on the draft policy. More information about the development of information security policies can be found on the UIS website. |
Tuesday 5 September
10:00 |
Information services acceptable use policy: focus group event (University and College IT staff)
![]() The University is developing an Acceptable Use Policy (AUP) for its information services as part of a series of actions to reduce cyber security risk. Cyber crime is a persistent and ever-changing threat to the University and its people. Defining how IT services should be used appropriately is a significant step in protecting staff, students and the institution from harm. The AUP will set out how everyone who is authorised to use the University’s information services – including University and College staff, students, certain visitors and contractors – can help prevent security-related incidents and avoid harmful activities. These focus groups form part of a wider consultation on the draft policy. More information about the development of information security policies can be found on the UIS website. |
14:00 |
The University is developing an Acceptable Use Policy (AUP) for its information services as part of a series of actions to reduce cyber security risk. Cyber crime is a persistent and ever-changing threat to the University and its people. Defining how IT services should be used appropriately is a significant step in protecting staff, students and the institution from harm. The AUP will set out how everyone who is authorised to use the University’s information services – including University and College staff, students, certain visitors and contractors – can help prevent security-related incidents and avoid harmful activities. These focus groups form part of a wider consultation on the draft policy. More information about the development of information security policies can be found on the UIS website. |
Thursday 7 September
10:00 |
The University is developing an Acceptable Use Policy (AUP) for its information services as part of a series of actions to reduce cyber security risk. Cyber crime is a persistent and ever-changing threat to the University and its people. Defining how IT services should be used appropriately is a significant step in protecting staff, students and the institution from harm. The AUP will set out how everyone who is authorised to use the University’s information services – including University and College staff, students, certain visitors and contractors – can help prevent security-related incidents and avoid harmful activities. These focus groups form part of a wider consultation on the draft policy. More information about the development of information security policies can be found on the UIS website. |
14:00 |
The University is developing an Acceptable Use Policy (AUP) for its information services as part of a series of actions to reduce cyber security risk. Cyber crime is a persistent and ever-changing threat to the University and its people. Defining how IT services should be used appropriately is a significant step in protecting staff, students and the institution from harm. The AUP will set out how everyone who is authorised to use the University’s information services – including University and College staff, students, certain visitors and contractors – can help prevent security-related incidents and avoid harmful activities. These focus groups form part of a wider consultation on the draft policy. More information about the development of information security policies can be found on the UIS website. |