Last updated: 
4 days 2 hours ago
Blog Manager

One of Jisc’s activities is to monitor and, where possible, influence regulatory developments that affect us and our customer universities, colleges and schools as operators of large computer networks. Since Janet and its customer networks are classified by Ofcom as private networks, postings here are likely to concentrate on the regulation of those networks.

Postings here are, to the best of our knowledge, accurate on the date they are made, but may well become out of date or unreliable at unpredictable times thereafter. Before taking action that may have legal consequences, you should talk to your own lawyers.

NEW: To help navigate the many posts on the General Data Protection Regulation, I've classified them as most relevant to developing a GDPR compliance process, GDPR's effect on specific topics, or how the GDPR is being developed. Or you can just use my free GDPR project plan.

Blog Article

There's a tension between network neutrality - essentially the principle that a network should be a dumb pipe that treats every packet alike - and network security, which may require some packets to be dropped to protect either the network or its users. Some current attacks simply can't be dealt with by devices at the edge of the network: if a denial of service attack is filling your access link with junk then nothing you do at the far end of that link can help.

Blog Article

A short but interesting note from BEREC (the group of European Telecoms Regulators) on information they have collected from 400 mobile and fixed line operators on their traffic management practices. I get the impression BEREC were surprised at how varied the reports were!

Blog Article

Ofcom’s latest statement on Network Neutrality provides some more insight into their thinking about when it might be necessary to regulate the provision of Internet services. They see two different approaches to traffic management, which they believe should co-exist: managed services (for example prioritising delay-sensitive applications), and best-efforts internet access (which may still involve some traffic management if necessary to deal with congestion).

Prev | Next