Following the announcement from the Welsh government on plans for the PSBA, please find attached a document which outlines Jisc's continued support, through Janet, for our Welsh customers....
[this article is based on the draft text published by the European Council on 28th January 2016. Recital and article numbers, at least, will change before the final text]The final version of the Data Protection Regulation's breach ...
With Parliament now on its summer break, the legal position under the Counter-Terrorism and Security Act 2015 is unlikely to change till September. That makes this a good time for HE and FE providers in England, Wales and Scotland (the duty doesn't cover Northern Ireland – see s51(1)) to review the guidance that has been published and plan what they will need to do to...
Stealthwatch: Janet and Janet Aberdeen have worked together to ensure the continuation of the Stealthwatch monitoring tool, although it is not run by Janet itself and was procured by AbMAN outside the Janet Partner Agreement. When Janet took over direct operation it was clearly understood that part of the overall service would be the continued use of Stealthwatch.Topology: ...
Looking at yet another of those web registration forms that seems to collect more data than required, it occurred to me that there might be quite a neat way to meet the General Data Protection Regulation's requirements for positive, recorded consent.First step, as with anything under the GDPR, it to think about which information is really necessary to provide the service, r...
[UPDATE: thanks for your feedback. Final text has now gone into the Jisc production process :)]Jisc has been providing expert, trusted advice on digital technology in the education sector for more than 30 years. We know that technology and data have the ability to transform the student experience. But, as a membership organisation owned by research and educational institutions,...
There are quite a few talks at the FIRST conference this week about getting computers to automatically receive, process and distribute information about security events. However I was particularly interested in a session on the human issues that need to accompany any such information exchange.Organisations, which ultimately means individuals, need to trust one another before in...
JiscCommunity has been this blog's home for eight years, but I'm now moving over to JiscInform. That has many nice features, notably that it works really well on...