- Information Security Questionnaire (.doc)
- Security considerations in outsourced IT management arrangements
- Computer Security Incident Reporting Procedures
- Operational Criteria for Wireless Access Installations (Wireless Access Point registration)
- Use of Email
- E-learning Communication Tools
- Handling Computer Accounts and Electronic Data of Leavers
- Security Considerations in Tendering Processes
- Guidelines on Using Skype within UCL
- Classification of information held by UCL personnel, for security management purposes - removed and replaced by UCL Information Management Policy
- Guidelines on the Use of Software and General Computing Resources Provided by Third Parties
- Guidelines for Using Web 2.0 Services for Teaching and Learning
- Information Security Architectural Principles
- Classification Tool: https://opinio.ucl.ac.uk/s?s=45808
- Guidance on Travelling Abroad for Research and Meetings