4. In handling the data held in IRAMS the User shall comply with the University’s Information Security policy.
6. Any data downloaded from IRAMS shall be held in a secure and confidential manner and shall be held only for as long as it is needed for IRAMS purposes.
7. If data is downloaded to a laptop or other portable device, the device shall be encrypted.
8. If leaving their desk, the User shall log out of IRAMS or lock their computer.
9. If accessing IRAMS remotely (i.e. away from their workplace), the User shall ensure that data displayed on the screen is not visible to unauthorised persons.