Overview
This service helps departments identify risks, strengthen security controls, and respond appropriately to compliance-related concerns. Through assessments, consulting engagements, and coordinated review processes, the service supports informed decision‑making and promotes a secure operational environment across the university. It also assists with addressing audits, investigations, and internal or external compliance obligations.
Who can use this Service?
JMU faculty and staff
How can I get this Service?
The use of JMU secure computing services is dependent on University Role, level of requested access, approval of access and other requirements depending on the need of the request.
Where can I get Help/Support?
Report questions or any issues by contacting the IT Help Desk.
Quick-start FAQ's
Features:
- Audit Request: Request a security audit to determine internal and external vulnerabilities or compliance gaps as it relates to technology, data, and security.
- Internal Security Review: Evaluate systems and processes to identify risks and recommend security improvements.
- Legal/Administrative Action:Support for security inquiries driven by legal, HR, compliance, or administrative processes.
- Security Consulting Request: Consultative guidance for secure system design, risk mitigation, policy alignment, project or idea.