Library items tagged:

The Guidance makes a surprisingly broad distinction between public and private sector organisations, even when they process the same data for the same purposes. This would remove important protections when personal data are processed by the public sector, and does not appear to be required by the General Data Protection Regulation that the Guidance aims to implement.
These are Jisc's comments on the Article 29 Working Party's Guidelines on the Right to Data Portability (WP242).
This is Jisc's submission to the Intellectual Property Office Call for Views: Modernising the European Copyright Framework.
Jisc is the UK's expert body for digital technology and digital resources in higher education, further education and research. Since its foundation in the early 1990s, Jisc has played a pivotal role in the adoption of information technology by UK universities and colleges, supporting them to improve learning, teaching, the student experience and institutional efficiency, as well as enabling more powerful research.
As submitted to the House of Commons' Bill Committee
Click to follow link >> Hints and Tips for Connecting Problematic Devices to eduroam https://community.jisc.ac.uk/library/advisory-services/hints-and-tips-co... Document produced 2013
This document describes the architecture of the eduroam service for federated (wireless) network access in academia.
Security was a major requirement in the design of eduroam, to ensure that organisations that provide visitor facilities, and the guests who make use of them, are not exposed to additional risks outside their control. eduroam should present fewer risks than the existing ad hoc arrangements for guest users. The factsheet below explains the security measures within eduroam and how organisations can use them to protect their own security.
January 2016 - 20/01/2016 This advisory is relevant to all eduroam(UK) Home (IdP) service organisations that are using server certificates supplied through the Jisc Certificate Service (Janet Certificate Service) for RADIUS servers acting as authenticators. It describes the effect of the change to the new certificate authority which occurred in May 2015, together with the measures that need to be planned for and put into effect. Originator: Edward Wincott Background and Scope