Jump to content
Home
AAU-logo på Create.

AAU's Security Rules and Policies

What are the rules surrounding information security at AAU?

AAU-logo på Create.

AAU's Information Security Policy

What do availability, confidentiality and integrity have to do with information security?

En gruppe sidder og debatterer foran deres computere.
Read more about AAU's information security policy on staff.aau.dk

AAU's Information Security Policy

What do availability, confidentiality and integrity have to do with information security?

Read more about AAU's information security policy on staff.aau.dk
En gruppe sidder og debatterer foran deres computere.

AAU's Security Handbook

Do you need a deeper insight into information security at AAU? The Security Handbook describes information security in different areas at AAU.

Fire personer sidder ved et rundt bord med deres computere set oppefra.
Read more about the Security Handbook here

AAU's Security Handbook

Do you need a deeper insight into information security at AAU? The Security Handbook describes information security in different areas at AAU.

Read more about the Security Handbook here
Fire personer sidder ved et rundt bord med deres computere set oppefra.

AAU's Password Policy

Your first line of defence against people trying to steal your information is your password. Make sure your passwords comply with AAU's password policy. This is how you keep your information safe at Aalborg University.

Fire personer sidder på række ved deres computere.
Read more about the password policy here

AAU's Password Policy

Your first line of defence against people trying to steal your information is your password. Make sure your passwords comply with AAU's password policy. This is how you keep your information safe at Aalborg University.

Read more about the password policy here
Fire personer sidder på række ved deres computere.

IT Security Best Practices

Are you a project manager, system owner or system architect - or are you just interested in learning more about AAU's best practices in IT security?

To personer arbejder med videofiler.
Read more about good IT security practices

IT Security Best Practices

Are you a project manager, system owner or system architect - or are you just interested in learning more about AAU's best practices in IT security?

Read more about good IT security practices
To personer arbejder med videofiler.
To personer i kitler står sammen og kigger på en brochure.

Frequently Asked Questions (FAQ)

Do you have a question that you haven't found the answer to yet? Then you might be lucky that others have asked the same question before. On this page you will find the most frequently asked questions about information security at Aalborg University.

To personer i kitler står sammen og kigger på en brochure.
Find frequently asked questions (FAQ)