Last updated: 
3 months 2 weeks ago
Blog Manager
One of Jisc’s activities is to monitor and, where possible, influence regulatory developments that affect us and our customer universities, colleges and schools as operators of large computer networks. Since Janet and its customer networks are classified by Ofcom as private networks, postings here are likely to concentrate on the regulation of those networks. Postings here are, to the best of our knowledge, accurate on the date they are made, but may well become out of date or unreliable at unpredictable times thereafter. Before taking action that may have legal consequences, you should talk to your own lawyers. NEW: To help navigate the many posts on the General Data Protection Regulation, I've classified them as most relevant to developing a GDPR compliance process, GDPR's effect on specific topics, or how the GDPR is being developed. Or you can just use my free GDPR project plan.

Group administrators:

Information Security Updates at Networkshop

Wednesday, April 2, 2014 - 17:32

A strong common (and unplanned, honest!) theme emerged from the information security session at Networkshop yesterday: that information security, or information risk, is ultimately the responsibility of individual users. Only they can decide which documents it is safe to read on a train, which phone calls they can make in a public place. The role of information services departments should be to help organisations develop the structures, policies, processes and technologies that make it reasonable to expect users to take that responsibility, increase the likelihood that they will exercise it correctly, and deal with the occasions when they don’t. In that way information security becomes an enabler, helping the organisation to achieve its objectives. The alternative approach of trying to "do" information security for users will, at best, mean the organisation misses opportunities to benefit from its data and people, and at worst that we create incentives for users to work in unsafe ways.

Bridget Kenyon explained how organisations and projects can use ISO27001 to identify information risks and appropriate mitigations, and to comply with other standards and requirements. Sean Duffy reported on Birmingham’s experience of enabling users to make the right security decisions. I spoke about how this approach could be encouraged by new requirements to deliver appropriate security for research data throughout its lifecycle.

The other thing we all agreed on was that universities and colleges are complex places and that 'enterprise' approaches that try to impose the same security requirements on everyone are very unlikely to be appropriate. Instead we should be focussing on the information, systems, and activities that present particularly high risks. UniversitiesUK’s recent paper on protecting sensitive research data and RUGIT’s assessment of the SANS/CPNI Top20 controls provide a good basis for identifying those risks and controls.