The startpage is customised based on your choice, but institution-wide news items and content is always visible to everyone.
You can change your choice at any point by clicking "Content filtered for" in the page header.
If this dialogue doesn't disappear when you click the button, refresh the page and click the button again. We are investigating this problem.
By choosing “I’m a guest”, you will only see institution-wide content. Learn more about adapted content
Aurora
All information involving the University’s activities and operations is to be handled in a secure manner. This applies to research data, teaching materials and administrative tasks. The definition of information security and what applies to you as an employee or information owner is described here.
Information security is a matter of preventing data from being lost, corrupted or leaked. This applies regardless of whether the information is handled electronically, physically or in conversations among colleagues. Good protection of information involves procedures for processing, physical measures and protection in the form of technical solutions.
This may mean, for example, evaluating and storing information in an appropriate place based on the information's content and need for protection or following advice and guidance on information
Questions regarding information security
E-mail infosak@umu.se
Questions regarding IT-security
Contact Servicedesk
IT-security incidents
Personal data breach
Information security
IT-security
IT and online services
DISA - Digital information security training for everyone
Information security - Swedish Authority for Privacy Protection (IMY)
Information and tips for employees on how to safeguard information and IT in your daily work.
As an information owner, what you need to consider to achieve the right level of protection. For example, when starting a new project or a new research project.
When and how to classify information. Guidance in classifying information and resources to find the right level of protection.
How to conduct a risk analysis. Guidance in identifying risks, threats and undesirable events that may affect information security so you can develop and implement security measures that reduce or eliminate risks.
How to value and apply protection to documents and work materials in Microsoft 365 (M365).
How we work systematically with information security based on our information security management systems.