skip to content

IT Help and Support

University Information Services

Understand the risks of working and studying online and how to mitigate them

All University staff, College staff, students and other users, who use University information services must complete the University’s cyber security awareness training annually. Please refer to the Information Services Acceptable Use Policy for more information.

The required cyber security training is hosted on the MyCompliance Cloud e-learning platform. You must be logged in with your University identity – [CRSid] email address and University account password (formerly called Raven).

If you have not completed the course yet, or if you are due to repeat your cyber security training, you will receive an email from no-reply[@] on behalf of the University asking you to complete the cyber security awareness training that has been assigned to you in the MyCompliance Cloud. Please note that you must complete all sections of the course.

  1. Access your course by clicking the 'MyCompliance Cloud Login' (blue) button at the bottom of your email.
    If you have more than one Microsoft account...
    You must use your University Microsoft account to log in to MyCompliance Cloud. If you are currently logged in to Microsoft 365 with your institutional email address, for example, you may get an error message or will not see your course listed. Log out of your institutional account and log in again with your University Microsoft account. Follow these instructions.
  2. Log in using your email address and University account password (formerly called Raven). 

    If you have problems logging in, please see Logging in to MyCompliance and ensure you are using your University Microsoft account, not an institutional or College account.


Logging in to MyCompliance


If you log into your University account using your [ CRSid] email address before following the link to your MyCompliance Cloud course, you won't need to enter your University password again.

If you prefer not to follow links in emails, you can also log in to MyCompliance Cloud independently and find the course on your homepage or watch videos in the MyCompliance library.

You must sign in using your University Microsoft account

Note that it's important to log in using your University Microsoft account using your email address, not an institutional email address such as If you don't, you may see an error message stating that the course doesn't exist, or you may not be able to access MyCompliance Cloud.

You must also ensure you're not already logged in to your institutional Microsoft account in another tab or window. If you are, you'll need to log out and log in again with your University Microsoft account. Alternatively, you can set up another browser profile for your University account.

How to set up another browser profile

This example uses Chrome, but you can follow similar steps for other browsers, such as Edge or Safari. 

  1. Click on your profile icon in the top-right corner:
  2. Click on Add and click Sign in:
  3. Use your account email to log in to the new profile.


Your MyCompliance Cloud homepage

Log in to MyCompliance Cloud. On your homepage, you can access your outstanding training, assessments and policies.

You can access any assigned and outstanding training via your homepage, either by selecting the 'Compliance Library' tile or by clicking the 'MyCompliance Library' link in the left column:

You can find your outstanding training by selecting the 'Not Complete' section of the Training tile. 

Your completed content can be accessed by selecting the 'Complete' section of the Training tile.

Your 'User Status Report' provides a high-level overview of all content you have completed and what is still pending.



Questions about our cyber security training

Please direct all queries and feedback about the staff training to the UIS Service Desk, using the subject 'Cyber security training query':


Additional resources to supplement the training course

We recommend reading this additional University guidance and advice.

A student guide to scams

Passwords, passphrases, password management software

Multi-factor authentication

Information assets


Best practices of BYOD

Incident Reporting

Read more about cyber security and mitigating risks.