Library items tagged:

Document Reference: GEN-DOC-005 - Please see here for additional document control information.
Document Reference: GEN-DOC-005 - Please see here for additional document control information.
Version: 8 Issued: 18 November 2024 Reference: GEN-DOC-005  Owner: John Chapman (based on a previous version by A. Cormack & Mark O'Leary) Last Reviewed Date: 18/11/2024
Title: Guest and Public Network Access Reference: GEN-DOC-002 Issue: 9 Document Owner: John Chapman Authorised by: John Chapman Date: 5 September 2024 Last Reviewed Date: 5/09/2024 Document control 1. Superseded documents: PB/INFO/073 2. Changes made:
Please see https://www.jisc.ac.uk/guides/networking-computers-and-the-law/gui
Version: 4 Issued: January 2024 Reference: GEN-DOC-006 Owner: John Chapman Last Reviewed Date: 21/01/2025
Version: 5 Issued: January 2024 Reference: GEN-DOC-007 Owner: John Chapman  Last Reviewed Date: 21/1/2025 A number of Janet connected organisations have asked whether they are permitted to allocate email addresses under their ‘organisation.ac.uk’ domain to former students (alumni). This factsheet discusses the issues this is likely to raise.
Version: 5 Issued: January 2024 Reference: GEN-DOC-008  Owner: John Chapman Last Reviewed Date: 21/01/2025
The following notes provide some hints and tips about the use of e-mail. They cover the content and format of e-mails, sending and receiving attachments, courtesy and general housekeeping tips. Common Courtesy Always consider the feelings of recipients when composing e-mails. Good manners are also important when dealing with incoming e-mail. E-mail should be read at least once a day if possible. If users are away for long periods, try to let people know.
PB/INFO/016 Most computer users will have been very grateful for the existence of backups. Although they are often seen as a way to recover files lost due to typing errors or misplaced mouse clicks there are other reasons to make and keep secure copies of files. However each of these purposes creates different requirements for the backup and recovery system, so it is important to be clear which purpose is involved and choose an appropriate backup strategy and technology to deliver it.