Information security guidelines
Content
- Artificial intelligence (AI) and information security
- Data security of voice recorders and cameras
- Disposal of confidential material
- Examples of phishing messages
- Information security and mobile phones
- Information security guidelines for abroad travelling
- Information security guidelines for setting up remote meetings and interviews using Teams or Zoom
- Instant messaging
- Password management software
- Quick guide to information security
- Secure remote work
- Sensitive data handling in research
- Temporary attendees in recurring meetings