This document provides guidance on the safe access and management of security-sensitive or extremism-related material used for either research or teaching. It does not seek to restrict students or staff from carrying out research into any area, rather it is in place to safeguard academic freedom and freedom of speech in line with the University’s Code of Practice on Academic Freedom and Freedom of Speech), and protect staff and students who engage in or supervise sensitive or extremism-related teaching and/or research from the risk of investigation under counter-terrorism legislation. The term ‘material’ is taken to include material used for teaching related to security or extremism or accessed in relation to taught provision, as well as material used directly for research.
The University must comply with the Prevent duty, guidance for which states that “For further and higher education providers, there should be clear policies in place for students and staff using IT equipment and networks to research terrorism and counter-terrorism in the course of their learning.”
(Prevent Duty, 188, IT Policies)
The process outlined below ensures:
The Code of Practice and Principles for Good Ethical Governance (paragraph 2.15) states that: Particular care needs to be taken with regard to research and other academic activities related to political extremism and terrorism. Any such activities must be reviewed by the local research ethics committee; in addition, the chair of the local research ethics committee should inform the Secretary of the Academic Ethics and Compliance Committee that a proposed activity of this nature has been submitted. Where necessary, advice should be sought from the University's Prevent Lead.
Those who access potentially security-sensitive material must not share or disseminate such material, even if it is already publicly accessible elsewhere, and must ensure that appropriate systems are in place for the storage and handling of such material. Universities UK Guidance (see Further resources) must be followed: material should be stored on specially designated university servers, and personal computers or the VLE should not be used.
Material which could be classified as "security-sensitive or extremism-related" may include anything which could be interpreted as promoting, endorsing or planning terrorism, radicalisation, or extremism.
The requirement to access restricted material must be included in an application to your local research ethics committee, and if required, the process regarding Research Ethics and Prevent should be followed in addition. This requirement applies whether the material is being used for research or teaching purposes.
You must also contact the cyber security team via itsupport@york.ac.uk. They can offer guidance about suitable controls, the aim will be to ensure the objectives in "background and purpose" are met.
As per Regulation 11: Using University information, the University monitors and records the use of its IT services and may access data during investigations as described in the IT Investigations and Data Access Policy.
Breaches of this procedure may warrant disciplinary action under the disciplinary procedure.
HM Government - Prevent duty guidance: for specified authorities in England and Wales
UUK - Oversight of security sensitive research material in UK universities
University of York - Code of Practice and Principles for Good Ethical Governance
Academic Ethics and Compliance Committee
List of Research Ethics Committees
Regulation 11: Using University information
IT Investigations and Data Access Policy
Status of this document
Document owner: RIKE
Date of next review: 2028