We use cookies to give you the best experience and to help improve our website.

Find out more about how we use cookies Thanks for letting me know
Skip to main content
Jisc logo 0203 697 5800
  • Digital content
    • eJournals
    • Learning and teaching resources
    • Maps and geospatial data
    • eBooks
    • Film and images
    • Archives
    Jisc Collections

    Finding, negotiating and providing digital content for education and research in the UK

  • Network & IT services
    • Security
    • Connectivity
    • Authentication
    • Procurement
    • Cloud
    • Email
    • Internet and IP services
    • Telecoms
    • Videoconferencing
    Janet

    Janet manages the operation and development of the UK’s research and education network

  • Advice
    • Student experience
    • Institutional management
    • Research excellence
    • Reducing costs
    • Future trends
    • Advisory services
    • Training
    Regional Support Centres

    Our 12 Regional Support Centres work across the UK, providing advice and support

  • Research & development
    Co-design

    Find out how we're piloting a new approach to projects and funding

    • Projects
    • Programmes
    • Funding and co-design
    • Running a Jisc project
Close search results

  • News
  • Blog
  • Events
  • Publications
  • About
  • Contact
  • Home
  • News
  • Resources to help combat cybercrime
News

Resources to help combat cybercrime

25 February 2011

Cybercrime is costing the UK around £1000 a second  according to the Government’s new report and now Jisc is highlighting six key resources to help universities and colleges ensure they do not fall victim. 

Institutions have a right - and sometimes a duty - to ensure that their computer systems are not being used for inappropriate purposes, like storage of pornographic images on university computers. They also have a responsibility to ensure the health and safety of students and staff.

Jason Miles-Campbell, manager of Jisc Legal, said: “Universities and colleges undertake a balancing act between open access to world-class technology, and ensuring the security of their systems. Institutions must make sure their systems aren’t used as instruments of illegality by criminals, in an age when cybercrime is often conducted through innocent users’ hijacked computers.” 

Computer crime can be classified as:

  • Content related crime, for example child pornography and criminal copyright infringement
  • Traditional crimes committed using a computer, for example harassment, fraud and theft
  • Attacks on computers and computer systems, for example hacking 

Jason added: “For trust, resilience and reliability, managers need to have the knowledge, policies and procedures in place to ensure illegal activity isn’t happening on the university or college’s servers. Getting it right means learners, researchers and staff can be confident in avoiding the time and trouble that often comes with illegal activity.”

If you're looking at how to make sure your students, staff and systems are protected, take a look at these: 

Jisc resources

  • Jisc Legal's cybercrime essentials
    Ensure that computer systems are not being used for inappropriate purposes by notice and takedown procedures rather than by actively monitoring in general - which may draw increased liability upon the institution
  • Legal risks and liabilities for IT services in further and higher education
    If you're not sure if your institution would be held liable for individual students and staff engaging in illegal activity, see this Jisc Legal paper
  • JANET acceptable use guidelines 
    Make sure that you foster a culture of computer use which complies with these Janet guidelines
  • Dealing with computer crime (PDF)
    If you find illegal materials on your institution's computer network, read this advice on the Janet website 
  • JANET's guide to firewalls
    A firewall is a simple protection against the spread of viruses. This guide is a good starting point 
  • UCISA infokit
    Need to refresh your information security policy to help meet audit requirements? This infoKit addresses threats to the confidentiality, integrity and availability of information systems

Read the government's cybercrime report

Most read
  • Changes to Jisc funding
  • Development underway for shared national library services in Scotland and Wales
  • Oxford University Press joins OAPEN-UK project
  • Jisc Collections boosts online learning resources for engineering and technology students
  • E-books for FE project provides new titles to improve online teaching and learning
Related
  • Students in earth and life sciences to benefit from new virtual microscopes
  • Launching the world’s first 3D virtual fossil collection
  • Text mining promises huge economic and research benefit, but barriers limit its use
  • Interactive maps reveal London's history in unprecedented detail
  • Interview: Online publishers embrace federated access management

You may also like…

Guides

Protect your business: look after your information

Report

Value and benefits of text mining

Popular content

  • Putting people at the heart of the digital revolution
  • Jisc Digital Festival 2014
  • Changes to Jisc funding
  • DIY augmented reality apps
  • Developing students' digital literacy

Useful links

  • Feedback
  • Using our content
  • Cookies
  • Website
  • Youtube
  • Facebook
  • Twitter
  • @Jisc
  • 'Caution on the road towards education-by-technology' http://t.co/4ftGUVuaRA (via @WorldCrunch) #edtech
Digital content
  • eJournals
  • Learning and teaching resources
  • Maps and geospatial data
  • eBooks
  • Film and images
  • Archives
Network & IT services
  • Security
  • Connectivity
  • Authentication
  • Procurement
  • Cloud
  • Email
  • Internet and IP services
  • Telecoms
  • Videoconferencing
Advice
  • Student experience
  • Institutional management
  • Research excellence
  • Reducing costs
  • Future trends
  • Advisory services
  • Training
Research & development
  • Projects
  • Programmes
  • Funding and co-design
  • Running a Jisc project
Creative Commons Attribution-NonCommercial-NoDerivs 2.0 UK: England & Wales
This work is licensed under CC BY-NC-ND