How to contact us



Phone: +44 (0) 20 7107 5000

Extension: 5000

Location: S86, St Clements Building

Information Security Policies, Procedures and Guidelines

There are a number of policies and processes that apply across LSE.These policies are critical for providing assurance to funders, regulators, auditors and governments that LSE takes seriously the confidentiality, integrity and availability of data placed in its care. There are also a number of guidelines that you may find useful, especially if you are working with confidential and/or personal data.

Information Security Policy and Information Classification

Policies and regulations

  • Access Control Policy (pdf) - IMT's approach to controlling access to IT resources.
  • Application Control Policy (pdf) - LSE's approach to the use of applications on its network.
  • Antivirus Policy (pdf) - Antivirus must be installed on LSE-owned computers, and personally-owned devices without antivirus may be blocked from accessing the network for the safety of all other connected devices.
  • Asset Management Policy  (pdf) - Everyone's responsibilities in regards to IT assets such as workstations or laptops.
  • Conditions of use of IT facilities at LSE (pdf) - The conditions everyone must sign up to in order to use LSE IT facilities.
  • Conditions of use of the Residences network (pdf) - Additional conditions for those using network connections at halls of residence.
  • Electronic Messaging Policy (pdf) - Rules and considerations governing the use of LSE's email systems, including the sending of confidential data and the privacy of people's email accounts.
  • IT User Accounts Policy (pdf) - What types of user accounts we provide, what they give access to and when they expire.
  • Monitoring and Logging Policy (pdf) - How and Why we monitor and log traffic and activities across our systems and networks.
  • Passwords - How to keep your password safe and how to choose a good password.
  • Remote Access Policy (pdf) - What systems are available for use remotely and what considerations to make when using them.