Home > Find Answers
Useful Information on Network Security, Anti-Virus and Anti-Spyware
What should my department do after a vulnerability scanning is conducted by ITS?
Mandatory Advanced Training on Personal Data Protection
Download and install RMS sharing application in Windows 8/10
Open a protected file in Windows
Use of Information Rights Management (IRM) for Email and File Protection
Common Usage Scenarios of Information Rights Management
Installation and Setup Procedures for Microsoft Azure Information Protection (AIP) App on Android devices
Installation and Setup Procedures for Microsoft Azure Information Protection (AIP) App on iOS devices
Download and install RMS sharing application in Mac OS
AIP Viewer for Windows (for reading AIP protected documents only)
AIP Client for Windows
How to sign-in MS Office applications for using IRM?
What are the security measures of Zoom?
What kinds of user information is being stored by Zoom?
Procedure to scan a computer with Software Asset Management System
Where and how to report IT abuse case, including spam and phishing emails?
What is Software Asset Management (SAM) System?
Email – email@example.com
Hotline - 3917 0123
In Person –1/F, Library Building (Old Wing)