3. 3
About Jisc Legal
• Role: to avoid legal issues becoming a
barrier to the use of technology in tertiary
education
• Information service: we cannot take
decisions for you when you are faced with a
risk
4. Slide 4 of 39
Have you heard of Jisc Legal before?
1. Hello again, Jason
2. Yes, fairly often
3. Yes, used occasionally
4. Vague acquaintance
5. What’s that, then?
1. 2. 3. 4. 5.
11%
19%
26%
30%
15%
5. Slide 5 of 39
When it comes to legal issues...
1. I’m confident
2. I’ve a fair idea
3. I dabble
4. I ask others
5. I hide in the toilet
1. 2. 3. 4. 5.
0%
7%
18%
32%
43%
7. 7
Openness and the Law
• What does ‘open’ mean legally?
• What do you want it to mean?
• It’s “open” if you can do what you
want to do with it...?
• It’s “open” if you meet someone
else’s agenda...?
8. When does ‘open’ matter?
Open Educational Resources
Open Access
Open Data
9. Slide 9 of 39
What’s the biggest issue concerning
‘openness’?
Slide 11 of 27
1. Legal risk
2. Academic culture
3. Management culture
4. Political will
5. Something else...
1. 2. 3. 4. 5.
22%
35%
13%13%
17%
11. Slide 11 of 39
Have you published something under an
open licence as part of your job?
1. Yes, lots.
2. Yes, some.
3. I’m not sure.
4. No, I have had the
opportunity.
5. No, my institution doesn’t
permity that.
1. 2. 3. 4. 5.
0%
32%
0%
52%
16%
17. Slide 17 of 39
Not everything is clear cut in CC.
What should we do about risk?
1. 2. 3. 4. 5.
0% 0%
4%
83%
13%
1. Ignore it
2. Eliminate it
3. Think about it
4. Take steps to
manage it
5. Run around screaming
18. Slide 18 of 39
Next steps?
1. 2. 3. 4. 5. 6.
0%
23%
0%
32%
36%
9%
Slide 23 of 27
1. Go back and say well done!
2. Start a conversation with
management
3. Re-write a few policies
4. Monitor what’s in place already
5. Get further support
6. Point at the guy/gal over there
and say ‘his problem!’
TurningPointContext of learning. Notice and Take Down, Acceptable Use. “authorise”.
Online tools to help – Generator, National Education Network etc (see links on our site)Assess what is working well and what needs further input. Inform all parties of the audit.Prioritise next steps.
Likely to be Safeguarding officer or e-Safety OfficerMake someone ultimately responsible for e-safety, for planning, co-ordinating approach, implementation, training and response. Senior member of staff who already has child protection training and knowledge of working with other agencies.Someone approachable, set right tone, strong leadership role.
Represent cross section of college community, stakeholders.Consultation, variety of approach.Learner input!Depends on college.
Set the ground rules, mitigate liability, make all users aware of limits and boundaries.All staff and students to be aware of rights and responsibilities when using ICTEasily understood by learnersClarify when and in what circumstances it will apply e.g. broad in scope, include mobile technologies, learners hardware (?)Scrutiny by Inspectorate.Link to other relevant policies, particularly AUP – see JISC Legal’s checklist.
Think ahead – key to safeguarding.Assess risk in context e.g. off site learning, vulnerable learners, school links etc.What can we do to make it safer?Enhanced procedures for vulnerable learners etc.Consistency crucial.
TurningPoint
TurningPoint
Plug resources – especially top tips and policy checklist as each only one side of A4.Also, video resources useful for Scotland, England, N Ireland, Wales.