Security Compliance and Consulting

Overview

This service helps departments identify risks, strengthen security controls, and respond appropriately to compliance-related concerns. Through assessments, consulting engagements, and coordinated review processes, the service supports informed decision‑making and promotes a secure operational environment across the university. It also assists with addressing audits, investigations, and internal or external compliance obligations.

Who can use this Service?

JMU faculty and staff

How can I get this Service?

The use of JMU secure computing services is dependent on University Role, level of requested access, approval of access and other requirements depending on the need of the request.

Where can I get Help/Support?

Report questions or any issues by contacting the IT Help Desk.

Quick-start FAQ's

Features: 

  • Audit Request: Request a security audit to determine internal and external vulnerabilities or compliance gaps as it relates to technology, data, and security.
  • Internal Security Review: Evaluate systems and processes to identify risks and recommend security improvements.
  • Legal/Administrative Action:Support for security inquiries driven by legal, HR, compliance, or administrative processes.
  • Security Consulting Request: Consultative guidance for secure system design, risk mitigation, policy alignment, project or idea.
 
Request Internal Review Request Legal/Admin Action Request an Audit Request Security Assessment

Service Offerings (4)

Internal Security Review
Evaluates systems and processes to identify risks and recommend security improvements.
Legal or Administrative Action Request
Support for security inquiries driven by legal, HR, compliance, or administrative processes.
Request a Departmental Audit
Support for responding to internal and external audits related to technology, data, and security.
Security Assessment Request
Consultative guidance for secure system design, risk mitigation, and policy alignment.