Information security

When using the university's IT systems or work with analogue information, it is important to be aware of information security, so that you do not lose your own data or other people’s data, or leak confidential information. Information security is very much about your behaviour when working with data 

Use this checklist to ensure that the information you are working with is processed securely.

1. Protect your passwords

Your passwords are your personal 'keys' to information and systems.

Basically, a cybercriminal can get access to a password, and thereby your data, in two ways: By asking or by trying different methods. 

  • Do not share your passwords with others – not even your study group or the IT support team.
  • Use strong passwords. The stronger your password, the less likely it is that you will become a victim of hacking. 

2. Keep your computer and smartphone up-to-date

Even if you do not always see the difference when you have updated your computer or smartphone, it is important that you make sure to keep your devices up-to-date. The updates will close the 'security gaps' that hackers can exploit, thereby reducing the risk of being hacked.

3. Remember to lock your computer...

It is important that you lock your computer even if you leave it for just a moment in the reading room. This will prevent others from getting hold of your files and data.

4. Protect personal data (GDPR)

It is important that we protect personal data.

You are responsible for protecting other people's personal data, for example if you process personal data for an assignment. 

5. Beware of fake emails


Cybercriminals use various methods to get you to share confidential information or to trick you into installing malware. 

When the King of Zimbabwe wants to leave you five million American dollars if you just send your bank details to, we all know not to answer such an email.

But can you always spot a fake email – a so-called phishing email? The fact of the matter is that phishing emails have become so sophisticated that it can be difficult to determine whether they actually come from Aarhus University, the tax authorities or another public institution.  

Fortunately, these emails have a number of typical characteristics that can help you avoid falling into the trap if you are familiar with them.

6. Remember to back up

Regularly back up your files, so you do not lose your work. 

When you save your files and data on the university's network drives, they are automatically backed up.
NOTE! Storing material not relevant to your studies on the university network drives is not allowed.  

If you store files and data elsewhere, you need to make sure that you have a backup.

NOTE! Some of the university's data must not be stored on cloud services such as DropBox or Google Drive.    

If something goes wrong...

Has your smartphone/computer been stolen? Have you lost your USB flash drive containing AU data? Have you been hacked? 

If something goes wrong, please contact your local IT support team. Contact information.

If you know that personal data has been compromised, you can report the security breach to AU’s data protection officer using this form.