SlideShare une entreprise Scribd logo
1  sur  32
Mobile Learning and the Law
     Virtual Realities 2
       Friday, 18 January 2013
Hello!
Jason Miles-Campbell
Jisc Legal Service Manager

www.jisclegal.ac.uk
info@jisclegal.ac.uk
0141 548 4939


                             2
About Jisc Legal
• Role: to avoid legal issues becoming a
  barrier to the use of technology in tertiary
  education
• Information service: we cannot take
  decisions for you when you are faced with a
  risk


                        3
Have you heard of Jisc Legal before?
                                                   45%
1. Hello again, Jason
2. Yes, fairly often
3. Yes, used occasionally   20%   20%


4. Vague acquaintance                   10%

5. What’s that, then?                         5%



                            1     2      3     4     5
When it comes to legal issues...
                                           40%

1. I’m confident
                               30%
2. I’ve a fair idea
3. I dabble                          20%



4. I ask others                                  10%



5. I hide in the toilet   0%

                          1    2      3     4      5
Why Comply?
•   It’s the law
•   Confidence v uncertainty
•   Example
•   Reputation
•   Quality inspection
•   But risk management

                    7
Legal bill for defamation accusation...
                                           68%

1. They’ll do it for free
2. 65p
3. £6.50                                         32%



4. £6500
5. £6,500,000               0%   0%   0%

                            1    2    3     4      5




                     8
The Issues

Copyright (using other people’s stuff)
Data protection (respecting privacy)
e-Safety (protecting users)
e-Security (protecting the organisation)
The Difference

Not linked to place (mobile!)
Personal, invasive and pervasive
Own device
Combines access and communication
What’s the biggest issue about
                      mobile?
                                                  33%

       1. Copyright                   29%   29%


       2. Data protection
       3. e-Safety
                                10%
       4. e-Security
       5. Haggis                                        0%

                                1     2      3     4     5


Slide 11 of 27
Copyright & Mobile Devices

How to be ‘Appy
T&Cs
‘Personal use’
Per device, per user,
multi-use
Do you have a mobile device with copyright
       infringing content with you?      58%

1. Can I call my lawyer?
2. Maybe.
3. I’m looking around and see          26%

   what option others are pressing.
4. Yes.                           5%         5%   5%

5. Definitely not, guv. Honest.    1   2     3     4   5
Data Protection & Mobile Devices
Compliance and privacy
Purposes / purpose creep
Surveillance
Marketing - PECRs
e-Safety & Mobile Devices
Enables new, pervasive
communication
Anonymity and access
Duty of care
Criminal offences
e-Security & Mobile Devices
BYOD
BYOVRD
LYOD
DP, liability,
breach of T&Cs
Think about mobile
access/delivery when
  choosing learning
     resources.
Ensure
                  data protection
                    awareness.
                    Don’t let techie
                 enthusiasm run away.
Slide 12 of 28
Ensure your e-safety
 policies and procedures
      cover mobile.
Ensure you have e-safety policies
 and procedures in the first place.
Are you confident learners know
     how to report concerns?
                         52%
1. Yes
2. No                          29%

3. Don’t know                        19%




                         1      2      3
Ensure your e-security
  and acceptable use
   policies are fit for
      mobile use.
Keep legal risk in
                   perspective.
                  Have risk assessment
                  procedures in place.

Slide 18 of 27
What should we do about risk?
1. Ignore it                             90%


2. Eliminate it
3. Think about it
4. Take steps to
   manage it
5. Run around screaming   0%
                               5%
                                    0%
                                               5%


                          1    2    3     4     5
Monitor impact and
  effectiveness.
Ask for feedback,
 provide support.
Are learners involved with development,
           review and impact of policy?
                                      60%


     1. Always
     2. Sometimes
     3. Seldom                              25%



     4. Never                                     10%
                                                        5%
                                 0%
     5. Depends who’s asking
                                 1    2      3     4     5

Slide 22 of 27
Next steps?
 1. Go back and say well done!                              38%


 2. Start a conversation with
    management                                        25%


 3. Re-write a few policies                19%


 4. Monitor what’s in place already                               13%

 5. Get further support                          6%

 6. Point at the guy over there and   0%

    say ‘his problem!’                1    2     3     4     5      6


Slide 23 of 27
Contact Jisc Legal

info@jisclegal.ac.uk
0141 548 4939
www.jisclegal.ac.uk
http://twitter.com/JiscLegal
Did you find this presentation useful?

  1. Utterly fantastic             95%




  2. Brilliant
  3. Pretty good
  4. Good
  5. Sorry, I was on Facebook...         0%   0%   0%
                                                        5%


                                    1    2    3     4    5

Slide 22 of 27
Your questions




                 30
Jisc Legal is hosted by the University of Strathclyde,
         a charitable body, registered in Scotland,
           with registration number SC015263.

  This work, with the exception of logos, and any other content marked with a
separate copyright notice, is licensed under a Creative Commons Attribution 3.0
 Unported Licence. Attribution should be “© Jisc Legal – www.jisclegal.ac.uk –
used under Creative Commons Attribution 3.0 Unported Licence” (with clickable
URLs where possible). The use of logos in the work is licensed for use only on
                  non-derivative copies. Further information at
                      www.jisclegal.ac.uk/CopyrightPolicy.




                                      31
Mobile Tech and the Law

Contenu connexe

Similaire à Mobile Tech and the Law

Bcc risk advisory irisscon 2013 - vulnerability management by the numbers a...
Bcc risk advisory   irisscon 2013 - vulnerability management by the numbers a...Bcc risk advisory   irisscon 2013 - vulnerability management by the numbers a...
Bcc risk advisory irisscon 2013 - vulnerability management by the numbers a...Eoin Keary
 
Think you’re secure? You May Be Surprised
Think you’re secure? You May Be SurprisedThink you’re secure? You May Be Surprised
Think you’re secure? You May Be SurprisedChief Optimist
 
Continuing Education Conferance
Continuing Education ConferanceContinuing Education Conferance
Continuing Education ConferanceTommy Riggins
 
Bad Advice, Unintended Consequences, and Broken Paradigms: Think & Act Di...
Bad Advice, Unintended Consequences, and Broken Paradigms: Think & Act Di...Bad Advice, Unintended Consequences, and Broken Paradigms: Think & Act Di...
Bad Advice, Unintended Consequences, and Broken Paradigms: Think & Act Di...Steve Werby
 
Charge ahead but not so fast
Charge ahead but not so fastCharge ahead but not so fast
Charge ahead but not so fastNancyZCates
 
How Boards Can Learn to Stop Avoiding & Start Loving Cyber Risk!
How Boards Can Learn to Stop Avoiding & Start Loving Cyber Risk!How Boards Can Learn to Stop Avoiding & Start Loving Cyber Risk!
How Boards Can Learn to Stop Avoiding & Start Loving Cyber Risk!Dottie Schindlinger
 
Phish, Spoof, Scam: Insider Threats, the GDPR & Other Regulations
Phish, Spoof, Scam: Insider Threats, the GDPR & Other RegulationsPhish, Spoof, Scam: Insider Threats, the GDPR & Other Regulations
Phish, Spoof, Scam: Insider Threats, the GDPR & Other RegulationsObserveIT
 
OER IPR Support
OER IPR SupportOER IPR Support
OER IPR SupportJISC Legal
 
IT Consumerization – iPad’ing the Enterprise or BYO Malware?
IT Consumerization – iPad’ing the Enterprise or BYO Malware?IT Consumerization – iPad’ing the Enterprise or BYO Malware?
IT Consumerization – iPad’ing the Enterprise or BYO Malware?Barry Caplin
 
2021 Global Privacy Survey: Emerging Trends, Benchmarking Research and Best P...
2021 Global Privacy Survey: Emerging Trends, Benchmarking Research and Best P...2021 Global Privacy Survey: Emerging Trends, Benchmarking Research and Best P...
2021 Global Privacy Survey: Emerging Trends, Benchmarking Research and Best P...TrustArc
 
Mis tue sponsored breakfast trus te
Mis tue sponsored breakfast   trus teMis tue sponsored breakfast   trus te
Mis tue sponsored breakfast trus teMediaPost
 
Social Media Security Risk Slide Share Version
Social Media Security Risk Slide Share VersionSocial Media Security Risk Slide Share Version
Social Media Security Risk Slide Share Versionfamudal
 
ethicsincyberspace2-130423152958-phpapp02.pdf
ethicsincyberspace2-130423152958-phpapp02.pdfethicsincyberspace2-130423152958-phpapp02.pdf
ethicsincyberspace2-130423152958-phpapp02.pdfSheejamolMathew
 
Ethics in cyber space
Ethics in cyber spaceEthics in cyber space
Ethics in cyber spacenitss007
 
Seven signs of ethical collapse
Seven signs of ethical collapseSeven signs of ethical collapse
Seven signs of ethical collapsemuratatak
 
Cybersecurity and the regulator, what you need to know
Cybersecurity and the regulator, what you need to knowCybersecurity and the regulator, what you need to know
Cybersecurity and the regulator, what you need to knowCordium
 
Outpost24 webinar - Bridging your cyber hygiene gap to prevent enterprise hac...
Outpost24 webinar - Bridging your cyber hygiene gap to prevent enterprise hac...Outpost24 webinar - Bridging your cyber hygiene gap to prevent enterprise hac...
Outpost24 webinar - Bridging your cyber hygiene gap to prevent enterprise hac...Outpost24
 
Webinar for December 2018 Cybersecurity – Implications for the insurance indu...
Webinar for December 2018 Cybersecurity – Implications for the insurance indu...Webinar for December 2018 Cybersecurity – Implications for the insurance indu...
Webinar for December 2018 Cybersecurity – Implications for the insurance indu...The Digital Insurer
 
Security and risk in a mobile world
Security and risk in a mobile worldSecurity and risk in a mobile world
Security and risk in a mobile worldBrian Katz
 

Similaire à Mobile Tech and the Law (20)

Bcc risk advisory irisscon 2013 - vulnerability management by the numbers a...
Bcc risk advisory   irisscon 2013 - vulnerability management by the numbers a...Bcc risk advisory   irisscon 2013 - vulnerability management by the numbers a...
Bcc risk advisory irisscon 2013 - vulnerability management by the numbers a...
 
Think you’re secure? You May Be Surprised
Think you’re secure? You May Be SurprisedThink you’re secure? You May Be Surprised
Think you’re secure? You May Be Surprised
 
Continuing Education Conferance
Continuing Education ConferanceContinuing Education Conferance
Continuing Education Conferance
 
Bad Advice, Unintended Consequences, and Broken Paradigms: Think & Act Di...
Bad Advice, Unintended Consequences, and Broken Paradigms: Think & Act Di...Bad Advice, Unintended Consequences, and Broken Paradigms: Think & Act Di...
Bad Advice, Unintended Consequences, and Broken Paradigms: Think & Act Di...
 
Charge ahead but not so fast
Charge ahead but not so fastCharge ahead but not so fast
Charge ahead but not so fast
 
How Boards Can Learn to Stop Avoiding & Start Loving Cyber Risk!
How Boards Can Learn to Stop Avoiding & Start Loving Cyber Risk!How Boards Can Learn to Stop Avoiding & Start Loving Cyber Risk!
How Boards Can Learn to Stop Avoiding & Start Loving Cyber Risk!
 
Phish, Spoof, Scam: Insider Threats, the GDPR & Other Regulations
Phish, Spoof, Scam: Insider Threats, the GDPR & Other RegulationsPhish, Spoof, Scam: Insider Threats, the GDPR & Other Regulations
Phish, Spoof, Scam: Insider Threats, the GDPR & Other Regulations
 
OER IPR Support
OER IPR SupportOER IPR Support
OER IPR Support
 
IT Consumerization – iPad’ing the Enterprise or BYO Malware?
IT Consumerization – iPad’ing the Enterprise or BYO Malware?IT Consumerization – iPad’ing the Enterprise or BYO Malware?
IT Consumerization – iPad’ing the Enterprise or BYO Malware?
 
2021 Global Privacy Survey: Emerging Trends, Benchmarking Research and Best P...
2021 Global Privacy Survey: Emerging Trends, Benchmarking Research and Best P...2021 Global Privacy Survey: Emerging Trends, Benchmarking Research and Best P...
2021 Global Privacy Survey: Emerging Trends, Benchmarking Research and Best P...
 
Mis tue sponsored breakfast trus te
Mis tue sponsored breakfast   trus teMis tue sponsored breakfast   trus te
Mis tue sponsored breakfast trus te
 
(Webinar Slides) How to Ethically Use Technology in Your Practice
(Webinar Slides) How to Ethically Use Technology in Your Practice(Webinar Slides) How to Ethically Use Technology in Your Practice
(Webinar Slides) How to Ethically Use Technology in Your Practice
 
Social Media Security Risk Slide Share Version
Social Media Security Risk Slide Share VersionSocial Media Security Risk Slide Share Version
Social Media Security Risk Slide Share Version
 
ethicsincyberspace2-130423152958-phpapp02.pdf
ethicsincyberspace2-130423152958-phpapp02.pdfethicsincyberspace2-130423152958-phpapp02.pdf
ethicsincyberspace2-130423152958-phpapp02.pdf
 
Ethics in cyber space
Ethics in cyber spaceEthics in cyber space
Ethics in cyber space
 
Seven signs of ethical collapse
Seven signs of ethical collapseSeven signs of ethical collapse
Seven signs of ethical collapse
 
Cybersecurity and the regulator, what you need to know
Cybersecurity and the regulator, what you need to knowCybersecurity and the regulator, what you need to know
Cybersecurity and the regulator, what you need to know
 
Outpost24 webinar - Bridging your cyber hygiene gap to prevent enterprise hac...
Outpost24 webinar - Bridging your cyber hygiene gap to prevent enterprise hac...Outpost24 webinar - Bridging your cyber hygiene gap to prevent enterprise hac...
Outpost24 webinar - Bridging your cyber hygiene gap to prevent enterprise hac...
 
Webinar for December 2018 Cybersecurity – Implications for the insurance indu...
Webinar for December 2018 Cybersecurity – Implications for the insurance indu...Webinar for December 2018 Cybersecurity – Implications for the insurance indu...
Webinar for December 2018 Cybersecurity – Implications for the insurance indu...
 
Security and risk in a mobile world
Security and risk in a mobile worldSecurity and risk in a mobile world
Security and risk in a mobile world
 

Plus de JISC Legal

IPR and Creative Commons for Interactive Learning Resources for Skills
IPR and Creative Commons for Interactive Learning Resources for SkillsIPR and Creative Commons for Interactive Learning Resources for Skills
IPR and Creative Commons for Interactive Learning Resources for SkillsJISC Legal
 
Core Training in Copyright Law
Core Training in Copyright LawCore Training in Copyright Law
Core Training in Copyright LawJISC Legal
 
NWLP - a quick introduction to using other people’s stuff
NWLP - a quick introduction to using other people’s stuffNWLP - a quick introduction to using other people’s stuff
NWLP - a quick introduction to using other people’s stuffJISC Legal
 
NWLP - The Brave New World - the changing face of copyright
NWLP - The Brave New World - the changing face of copyrightNWLP - The Brave New World - the changing face of copyright
NWLP - The Brave New World - the changing face of copyrightJISC Legal
 
121205 e assessment (rsc y&h, jmc)
121205 e assessment (rsc y&h, jmc)121205 e assessment (rsc y&h, jmc)
121205 e assessment (rsc y&h, jmc)JISC Legal
 
JISC Legal National Stem Programme OER & Creative Commons Workshop Bath
JISC Legal National Stem Programme OER & Creative Commons Workshop BathJISC Legal National Stem Programme OER & Creative Commons Workshop Bath
JISC Legal National Stem Programme OER & Creative Commons Workshop BathJISC Legal
 
JISC Legal National Stem Programme OER & Creative Commons Workshop York
JISC Legal National Stem Programme OER & Creative Commons Workshop YorkJISC Legal National Stem Programme OER & Creative Commons Workshop York
JISC Legal National Stem Programme OER & Creative Commons Workshop YorkJISC Legal
 
110916 oer and creative commons
110916 oer and creative commons110916 oer and creative commons
110916 oer and creative commonsJISC Legal
 
Top Ten Legal Issues for IWMW 2011
Top Ten Legal Issues for IWMW 2011Top Ten Legal Issues for IWMW 2011
Top Ten Legal Issues for IWMW 2011JISC Legal
 
Top Ten Copyright Tips for Librarians
Top Ten Copyright Tips for LibrariansTop Ten Copyright Tips for Librarians
Top Ten Copyright Tips for LibrariansJISC Legal
 
Copyright and e-Learning for GTAs
Copyright and e-Learning for GTAsCopyright and e-Learning for GTAs
Copyright and e-Learning for GTAsJISC Legal
 
100903 e assessment (dundee)
100903 e assessment (dundee)100903 e assessment (dundee)
100903 e assessment (dundee)JISC Legal
 
JISC Legal OER Showcase
JISC Legal OER ShowcaseJISC Legal OER Showcase
JISC Legal OER ShowcaseJISC Legal
 
Using Other People’s Stuff Online – Copyright Without Tears
Using Other People’s Stuff Online – Copyright Without TearsUsing Other People’s Stuff Online – Copyright Without Tears
Using Other People’s Stuff Online – Copyright Without TearsJISC Legal
 
JISC Legal: Overview Legal Issues and BCE
JISC Legal: Overview Legal Issues and BCEJISC Legal: Overview Legal Issues and BCE
JISC Legal: Overview Legal Issues and BCEJISC Legal
 
JISC Legal Law and e-Assessment
JISC Legal Law and e-AssessmentJISC Legal Law and e-Assessment
JISC Legal Law and e-AssessmentJISC Legal
 
Legal aspects of web 2.0 and social networking JISC Legal
Legal aspects of web 2.0 and social networking JISC LegalLegal aspects of web 2.0 and social networking JISC Legal
Legal aspects of web 2.0 and social networking JISC LegalJISC Legal
 
OER, IPR and the Law JISC Legal
OER, IPR and the Law JISC LegalOER, IPR and the Law JISC Legal
OER, IPR and the Law JISC LegalJISC Legal
 
Jisc Legal Copyright in Learning Environment
Jisc Legal Copyright in Learning EnvironmentJisc Legal Copyright in Learning Environment
Jisc Legal Copyright in Learning EnvironmentJISC Legal
 
JISC Legal Copyright Ten Tips
JISC Legal Copyright Ten TipsJISC Legal Copyright Ten Tips
JISC Legal Copyright Ten TipsJISC Legal
 

Plus de JISC Legal (20)

IPR and Creative Commons for Interactive Learning Resources for Skills
IPR and Creative Commons for Interactive Learning Resources for SkillsIPR and Creative Commons for Interactive Learning Resources for Skills
IPR and Creative Commons for Interactive Learning Resources for Skills
 
Core Training in Copyright Law
Core Training in Copyright LawCore Training in Copyright Law
Core Training in Copyright Law
 
NWLP - a quick introduction to using other people’s stuff
NWLP - a quick introduction to using other people’s stuffNWLP - a quick introduction to using other people’s stuff
NWLP - a quick introduction to using other people’s stuff
 
NWLP - The Brave New World - the changing face of copyright
NWLP - The Brave New World - the changing face of copyrightNWLP - The Brave New World - the changing face of copyright
NWLP - The Brave New World - the changing face of copyright
 
121205 e assessment (rsc y&h, jmc)
121205 e assessment (rsc y&h, jmc)121205 e assessment (rsc y&h, jmc)
121205 e assessment (rsc y&h, jmc)
 
JISC Legal National Stem Programme OER & Creative Commons Workshop Bath
JISC Legal National Stem Programme OER & Creative Commons Workshop BathJISC Legal National Stem Programme OER & Creative Commons Workshop Bath
JISC Legal National Stem Programme OER & Creative Commons Workshop Bath
 
JISC Legal National Stem Programme OER & Creative Commons Workshop York
JISC Legal National Stem Programme OER & Creative Commons Workshop YorkJISC Legal National Stem Programme OER & Creative Commons Workshop York
JISC Legal National Stem Programme OER & Creative Commons Workshop York
 
110916 oer and creative commons
110916 oer and creative commons110916 oer and creative commons
110916 oer and creative commons
 
Top Ten Legal Issues for IWMW 2011
Top Ten Legal Issues for IWMW 2011Top Ten Legal Issues for IWMW 2011
Top Ten Legal Issues for IWMW 2011
 
Top Ten Copyright Tips for Librarians
Top Ten Copyright Tips for LibrariansTop Ten Copyright Tips for Librarians
Top Ten Copyright Tips for Librarians
 
Copyright and e-Learning for GTAs
Copyright and e-Learning for GTAsCopyright and e-Learning for GTAs
Copyright and e-Learning for GTAs
 
100903 e assessment (dundee)
100903 e assessment (dundee)100903 e assessment (dundee)
100903 e assessment (dundee)
 
JISC Legal OER Showcase
JISC Legal OER ShowcaseJISC Legal OER Showcase
JISC Legal OER Showcase
 
Using Other People’s Stuff Online – Copyright Without Tears
Using Other People’s Stuff Online – Copyright Without TearsUsing Other People’s Stuff Online – Copyright Without Tears
Using Other People’s Stuff Online – Copyright Without Tears
 
JISC Legal: Overview Legal Issues and BCE
JISC Legal: Overview Legal Issues and BCEJISC Legal: Overview Legal Issues and BCE
JISC Legal: Overview Legal Issues and BCE
 
JISC Legal Law and e-Assessment
JISC Legal Law and e-AssessmentJISC Legal Law and e-Assessment
JISC Legal Law and e-Assessment
 
Legal aspects of web 2.0 and social networking JISC Legal
Legal aspects of web 2.0 and social networking JISC LegalLegal aspects of web 2.0 and social networking JISC Legal
Legal aspects of web 2.0 and social networking JISC Legal
 
OER, IPR and the Law JISC Legal
OER, IPR and the Law JISC LegalOER, IPR and the Law JISC Legal
OER, IPR and the Law JISC Legal
 
Jisc Legal Copyright in Learning Environment
Jisc Legal Copyright in Learning EnvironmentJisc Legal Copyright in Learning Environment
Jisc Legal Copyright in Learning Environment
 
JISC Legal Copyright Ten Tips
JISC Legal Copyright Ten TipsJISC Legal Copyright Ten Tips
JISC Legal Copyright Ten Tips
 

Mobile Tech and the Law

  • 1. Mobile Learning and the Law Virtual Realities 2 Friday, 18 January 2013
  • 2. Hello! Jason Miles-Campbell Jisc Legal Service Manager www.jisclegal.ac.uk info@jisclegal.ac.uk 0141 548 4939 2
  • 3. About Jisc Legal • Role: to avoid legal issues becoming a barrier to the use of technology in tertiary education • Information service: we cannot take decisions for you when you are faced with a risk 3
  • 4.
  • 5. Have you heard of Jisc Legal before? 45% 1. Hello again, Jason 2. Yes, fairly often 3. Yes, used occasionally 20% 20% 4. Vague acquaintance 10% 5. What’s that, then? 5% 1 2 3 4 5
  • 6. When it comes to legal issues... 40% 1. I’m confident 30% 2. I’ve a fair idea 3. I dabble 20% 4. I ask others 10% 5. I hide in the toilet 0% 1 2 3 4 5
  • 7. Why Comply? • It’s the law • Confidence v uncertainty • Example • Reputation • Quality inspection • But risk management 7
  • 8. Legal bill for defamation accusation... 68% 1. They’ll do it for free 2. 65p 3. £6.50 32% 4. £6500 5. £6,500,000 0% 0% 0% 1 2 3 4 5 8
  • 9. The Issues Copyright (using other people’s stuff) Data protection (respecting privacy) e-Safety (protecting users) e-Security (protecting the organisation)
  • 10. The Difference Not linked to place (mobile!) Personal, invasive and pervasive Own device Combines access and communication
  • 11. What’s the biggest issue about mobile? 33% 1. Copyright 29% 29% 2. Data protection 3. e-Safety 10% 4. e-Security 5. Haggis 0% 1 2 3 4 5 Slide 11 of 27
  • 12. Copyright & Mobile Devices How to be ‘Appy T&Cs ‘Personal use’ Per device, per user, multi-use
  • 13. Do you have a mobile device with copyright infringing content with you? 58% 1. Can I call my lawyer? 2. Maybe. 3. I’m looking around and see 26% what option others are pressing. 4. Yes. 5% 5% 5% 5. Definitely not, guv. Honest. 1 2 3 4 5
  • 14. Data Protection & Mobile Devices Compliance and privacy Purposes / purpose creep Surveillance Marketing - PECRs
  • 15. e-Safety & Mobile Devices Enables new, pervasive communication Anonymity and access Duty of care Criminal offences
  • 16. e-Security & Mobile Devices BYOD BYOVRD LYOD DP, liability, breach of T&Cs
  • 17. Think about mobile access/delivery when choosing learning resources.
  • 18. Ensure data protection awareness. Don’t let techie enthusiasm run away. Slide 12 of 28
  • 19. Ensure your e-safety policies and procedures cover mobile. Ensure you have e-safety policies and procedures in the first place.
  • 20. Are you confident learners know how to report concerns? 52% 1. Yes 2. No 29% 3. Don’t know 19% 1 2 3
  • 21. Ensure your e-security and acceptable use policies are fit for mobile use.
  • 22. Keep legal risk in perspective. Have risk assessment procedures in place. Slide 18 of 27
  • 23. What should we do about risk? 1. Ignore it 90% 2. Eliminate it 3. Think about it 4. Take steps to manage it 5. Run around screaming 0% 5% 0% 5% 1 2 3 4 5
  • 24. Monitor impact and effectiveness.
  • 25. Ask for feedback, provide support.
  • 26. Are learners involved with development, review and impact of policy? 60% 1. Always 2. Sometimes 3. Seldom 25% 4. Never 10% 5% 0% 5. Depends who’s asking 1 2 3 4 5 Slide 22 of 27
  • 27. Next steps? 1. Go back and say well done! 38% 2. Start a conversation with management 25% 3. Re-write a few policies 19% 4. Monitor what’s in place already 13% 5. Get further support 6% 6. Point at the guy over there and 0% say ‘his problem!’ 1 2 3 4 5 6 Slide 23 of 27
  • 28. Contact Jisc Legal info@jisclegal.ac.uk 0141 548 4939 www.jisclegal.ac.uk http://twitter.com/JiscLegal
  • 29. Did you find this presentation useful? 1. Utterly fantastic 95% 2. Brilliant 3. Pretty good 4. Good 5. Sorry, I was on Facebook... 0% 0% 0% 5% 1 2 3 4 5 Slide 22 of 27
  • 31. Jisc Legal is hosted by the University of Strathclyde, a charitable body, registered in Scotland, with registration number SC015263. This work, with the exception of logos, and any other content marked with a separate copyright notice, is licensed under a Creative Commons Attribution 3.0 Unported Licence. Attribution should be “© Jisc Legal – www.jisclegal.ac.uk – used under Creative Commons Attribution 3.0 Unported Licence” (with clickable URLs where possible). The use of logos in the work is licensed for use only on non-derivative copies. Further information at www.jisclegal.ac.uk/CopyrightPolicy. 31

Notes de l'éditeur

  1. Plug resources – especially top tips and policy checklist as each only one side of A4.Also, video resources useful for Scotland, England, N Ireland, Wales.
  2. TurningPointContext of learning. Notice and Take Down, Acceptable Use. “authorise”.
  3. Likely to be Safeguarding officer or e-Safety OfficerMake someone ultimately responsible for e-safety, for planning, co-ordinating approach, implementation, training and response. Senior member of staff who already has child protection training and knowledge of working with other agencies.Someone approachable, set right tone, strong leadership role.
  4. Likely to be Safeguarding officer or e-Safety OfficerMake someone ultimately responsible for e-safety, for planning, co-ordinating approach, implementation, training and response. Senior member of staff who already has child protection training and knowledge of working with other agencies.Someone approachable, set right tone, strong leadership role.
  5. Represent cross section of college community, stakeholders.Consultation, variety of approach.Learner input!Depends on college.
  6. Online tools to help – Generator, National Education Network etc (see links on our site)Assess what is working well and what needs further input. Inform all parties of the audit.Prioritise next steps.
  7. TurningPoint
  8. Set the ground rules, mitigate liability, make all users aware of limits and boundaries.All staff and students to be aware of rights and responsibilities when using ICTEasily understood by learnersClarify when and in what circumstances it will apply e.g. broad in scope, include mobile technologies, learners hardware (?)Scrutiny by Inspectorate.Link to other relevant policies, particularly AUP – see JISC Legal’s checklist.
  9. Think ahead – key to safeguarding.Assess risk in context e.g. off site learning, vulnerable learners, school links etc.What can we do to make it safer?Enhanced procedures for vulnerable learners etc.Consistency crucial.
  10. TurningPoint
  11. Essential step to meet your duties.Learner input.Develop positive behaviours.Monitor complaints to determine trends, underlying issues.
  12. Learners input.Focus group.Act on feedback given.Further support.
  13. TurningPoint
  14. TurningPoint
  15. TurningPoint