Skip to content
Kaksi henkilöä ja katsovat ulos kuvasta oikealle ja hymyilevät. Toisella on tietokone sylissä ja he istuvat sohvalla.

IT rules and guidelines

On this page you will find a summary of HAMK’s IT guidelines and rules of use.

Why is information security important?

There are various security threats associated with day-to-day data processing. One serious threat is malware spread via networks and email. They can, for example, steal or destroy your files, pass your login and password information to a malicious programmer, or slow down the operation of your computer networks. Anti-malware software cannot protect against all malware, as more and more is constantly emerging. Other serious threats include identity theft and financial gain through the use of user data.

By using common sense and following the guidelines, you can protect your data, the workstations you use and your networks from security threats. Protect not only your own data, but also the data of others in your possession. Information that should be protected from third parties includes personal and contact details, bank details, health information and email messages. For logins, use two-factor authentication (MFA) where possible.

Computer requirements and using your own computer for studying

IT rules and student data security