We use cookies to give you the best experience and to help improve our website.

Find out more about how we use cookies Thanks for letting me know
Skip to main content
Jisc logo 0203 697 5800
  • Digital content
    • eJournals
    • Learning and teaching resources
    • Maps and geospatial data
    • eBooks
    • Film and images
    • Archives
    Jisc Collections

    Finding, negotiating and providing digital content for education and research in the UK

  • Network & IT services
    • Security
    • Connectivity
    • Authentication
    • Procurement
    • Cloud
    • Email
    • Internet and IP services
    • Telecoms
    • Videoconferencing
    Janet

    Janet manages the operation and development of the UK’s research and education network

  • Advice
    • Student experience
    • Institutional management
    • Research excellence
    • Reducing costs
    • Future trends
    • Advisory services
    • Training
    Regional Support Centres

    Our 12 Regional Support Centres work across the UK, providing advice and support

  • Research & development
    Co-design

    Find out how we're piloting a new approach to projects and funding

    • Projects
    • Programmes
    • Funding and co-design
    • Running a Jisc project
Close search results

  • News
  • Blog
  • Events
  • Publications
  • About
  • Contact
  • Home
  • Protect your business: look after your information
Guides

Protect your business: look after your information

28 May 2013

The issue

The increasing use of cloud and mobile presents organisations with new information security challenges.  When you put information in the ‘cloud’ you are putting it outside your controlled institutional environment. 

Breaches in information security can have serious legal and financial consequences for an institution, jeopardising its reputation and even its ability to continue operating. Information must be secure but accessible so that staff and students do not seek alternative, less secure routes to the information they need.

What you can do

Develop a robust security policy

Institutions are developing information security policies that meet requirements for both accessibility and security.

If you need to develop, review or implement a policy, then the information security toolkit can help you through the steps.

Get trained – or train your staff

By training your staff and students in information security, you can greatly reduce the risk of security failures.  You might consider attending one of our training courses which include sessions on information security policies, managing IT security, the use of firewalls and log files and digital forensics in case of cybercrime.

Make sure the identities of staff and students remain safe

You will need to provide staff and students with an identity so that they can be authorised to access online information securely. See our videos for examples of how institutions have used identity management to restrict access to particular resources to a closed group or even an individual.

The identity management toolkit describes the roles, structures and policies required for good identity management and the systems and processes that support them.

Understand the law

We can provide you with briefings on a range of legal issues related to information security including data protection, computer misuse, cloud computing, liability, interception and monitoring - or call the Jisc Legal helpdesk for more information.

Key questions

What issues should we consider before signing-up to a US-hosted service? 

Our briefing describes how you can remain compliant with UK data protection requirements when transferring personal data to US organisations.

Can I see an example of a learning provider using the cloud securely?

Read our case studies to find out more about security in four different cloud computing scenarios.

Most read
  • Developing students' digital literacy
  • Engage students with mobile learning
  • How can I keep the curriculum relevant in a time of rapid change?
  • Student recruitment
  • Enable your staff to work with digital technologies
Related
  • Identity management
  • Engage students with mobile learning
  • Cloud computing
  • Understanding your data
  • Manage your research information

Field experts

Read more from our education experts

Christopher Brown

Chris is our expert on information security.

You may also like…

Guides

Identity management

Guides

Engage students with mobile learning

Popular content

  • Putting people at the heart of the digital revolution
  • Jisc Digital Festival 2014
  • Changes to Jisc funding
  • DIY augmented reality apps
  • Developing students' digital literacy

Useful links

  • Feedback
  • Using our content
  • Cookies
  • Website
  • Youtube
  • Facebook
  • Twitter
  • @Jisc
  • 'Caution on the road towards education-by-technology' http://t.co/4ftGUVuaRA (via @WorldCrunch) #edtech
Digital content
  • eJournals
  • Learning and teaching resources
  • Maps and geospatial data
  • eBooks
  • Film and images
  • Archives
Network & IT services
  • Security
  • Connectivity
  • Authentication
  • Procurement
  • Cloud
  • Email
  • Internet and IP services
  • Telecoms
  • Videoconferencing
Advice
  • Student experience
  • Institutional management
  • Research excellence
  • Reducing costs
  • Future trends
  • Advisory services
  • Training
Research & development
  • Projects
  • Programmes
  • Funding and co-design
  • Running a Jisc project
Creative Commons Attribution-NonCommercial-NoDerivs 2.0 UK: England & Wales
This work is licensed under CC BY-NC-ND