Information Security

Information security means protecting information against unwanted access, modification, or loss. On this page, you can read more about what this entails. If you discover any deviations related to information security, you can report the deviation via the Report! portal.

See more!

Information Security

What do we mean by information security?

Information security means protecting information against unwanted access, modification, or loss. It's about ensuring that data is:

  • Confidential – only available to those who have the right to it.
  • Correct – not modified or destroyed.
  • Available – when you need them.

NLA University College works to ensure that the college's information assets are handled safely and in accordance with applicable laws and internal guidelines.

Information security includes both data stored in digital systems and physically stored information. Information security is essential to protect privacy, maintain trust in the institution, and ensure stable and secure operation of the business.

The goal of information security is:

  • To reduce the risk of digital attacks and unwanted incidents.
  • To create security for employees, students and partners.
  • To contribute to a robust and resilient digital infrastructure.

How can you contribute to security at NLA?

  • Use strong passwords, enable two-factor authentication.
  • Do not share sensitive information uncritically.
  • Use encryption of files and documents
  • Use secure storage solutions
  • Update apps and software regularly
  • Be careful with email and links – do not click on anything you do not trust.
  • Report anything suspicious, such as fraud or data breaches.

Cybercriminals are getting smarter all the time. They use artificial intelligence, social manipulation and hidden methods to trick you.

When you use services based on artificial intelligence:

  • Focus on information security and privacy
  • Only use open data in AI tools found on the internet
  • Personal information must not be entered as input/prompt in tools based on artificial intelligence
  • Be aware of errors, biases and weaknesses when using the services
  • Be critical of the answers the tool gives

Learn how to detect and stop the latest cyber threats: Information Security – Security Month 2025