Box is a cloud-based storage and collaboration service.  It allows you to collaborate on large files with your colleagues and external individuals.

At Imperial, Box was primarily introduced to support the management of Research data but is now used for a multitude of reasons by various teams.

Box can store files up to 150GB in size. Please be mindful of your storage and ensure data is relevant and still required.

Features and benefits

Box offers a secure and scalable solution that meets compliance requirements while ensuring unified policies are applied across every workload and device.

Features include:

  • Easy-to-use tools including the ability to edit, share, and restrict documents with a single click.
  • Simple document sharing and collaboration, internally and externally, using Microsoft Office and Apple/Google tools in a shared file repository
  • Deleted files and folders can be restored up to 60 days after deletion

Training and support

Staff can access training via the Box Education website:

If you require further support, please complete our dedicated ASK form.

Sensitive data

It is your responsibility to review the sensitivity of any data you store on Box.

You can find out more about sensitive data on the Data Protection webpages.

If you believe you have or may have sensitive data and wish to discuss storage options further, please complete our dedicated ASK form.

Access and permissions

Box is authenticated and accessed via single sign-on - you can use your Imperial username and password to log in to your account.

If you are collaborating with external individuals on files you have stored in Box, the Box site owner is responsible for ensuring that all external users are aware of their responsibility to comply with Imperial's Information Security Policy.

Log in to your Box account.

Box improvements

Completed

Shield threat detection has been applied to all Box accounts. This has set:

  • Anomalous download rules that detect account holders who use their access to steal data or access restricted content
  • Malicious content rules that rapidly identify and mitigate malware attacks, protecting you and your content
Upcoming
  • Replacing FTP with FTPS (encrypted) technology to ensure security levels are maintained
  • Introducing file classifications, e.g. Confidential, Highly Confidential with associated restrictions on sharing and downloading
  • Multi-Factor Authentication when logging in for external collaborators