Skip to navigation
Skip to content
Eng
·
繁體
·
简体
Computing Services Centre
About the CSC
Vision & Mission
Roles of the CSC
IT Infrastructure at-a-glance
Location and Floor Plan
Opening Hours
Privacy Policy Statement
Services & Facilities
Communication and Collaboraion
Network Connectivity and Management
User Support
End User Computing and Desktop Management
Printing and Scanning Facilities
Account and Access Management
Cloud, Data Centre and Server Hosting
High-Performance Computing (HPC) and Research Computing
Software Licenses and Deployment
User Training
IT News
Online Courses (LinkedIn Learning)
IT Forum
Security Advice and Best Practice
Help & Support
IT Service Desk
Service Portal (ServiceNow)
Classroom Support
Event Support (IT & AV)
User Guides and FAQs
By Category
By A to Z Index
New User Info
For New Staff
For New Student
Information Security
Information Security Policies and Standards (ISPS)
Introduction
Policies & Standards
Security Advice and Best Practice
Training and Awareness
Vulnerability Management
Policies & Guidelines
Contact Us
Information Security
Information Security Policies and Standards (ISPS)
Introduction
Policies & Standards
Security Advice and Best Practice
Training and Awareness
Vulnerability Management
Useful Links
Resource Booker
CSC e-Forms
CSC Work Request (for Request Operators only)
Software License Request (for Request Operators only)
Change Display Name
Grammarly Account Request
Request Provision for QuestionPro
Residential Connection Request
Department Connection Request
Security Advice and Best Practice
IT Security from a Personal Perspective
Physical Security
Managing & Protecting Your Computing and Storage Devices
Setting up and using Computer Account & Password Properly
Six Steps to Secure Your Computer
Be aware of Ransomware
Be a Smart Internet User
Dos and Don'ts of Information Security Awareness
Protecting Privacy - Using Computers and the Internet Wisely
Protecting Online Privacy - Use Social Network Sites Smartly
Security Advice for Staff Handling Personal Data
Information Classifications and Handling
Protect restricted or confidential information with password and
encryption
.
Dispose restricted or confidential information carefully after use
Erase all data stored in handheld smart devices and reset the devices before disposal or recycle use
Security advice for Webmasters
Awareness of Web Site Security
Information Protection Practices for Web Content Providers
Protecting Information from being cached by Public Search Engines
Removal of Cached Information from Public Search Engines
Policies, Guidelines and FAQ
Q&A related to the Use of Zoom for Online Teaching and Learning
Information Security Policies and Standards
Personal Data (Privacy) Issues
Policy on University Intellectual Property and Related Matters
Policies on Use of IT Services and Resources
Screen Saver Protection Guidelines
Security Guidelines for Setting Up IT Systems in Academic Departments
IT.ServiceDesk@cityu.edu.hk