SlideShare une entreprise Scribd logo
1  sur  8
Externally Hosted Web 2.0 Services What should the policy be? Chris Adie, Information Services, University of Edinburgh 3 May 2007
Outline ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Background ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Legislative issues ,[object Object],[object Object],[object Object],[object Object],[object Object]
University regulations ,[object Object],[object Object],[object Object]
Service concerns ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Risk management ,[object Object],[object Object],[object Object],[object Object],[object Object]
Conclusions ,[object Object],[object Object],[object Object],[object Object],[object Object]

Contenu connexe

Tendances

Review of Microsoft HealthVault
Review of Microsoft HealthVaultReview of Microsoft HealthVault
Review of Microsoft HealthVaultguest2c899db
 
A Guide to Thoughtful Governance - Liberty and Justice for All
A Guide to Thoughtful Governance - Liberty and Justice for AllA Guide to Thoughtful Governance - Liberty and Justice for All
A Guide to Thoughtful Governance - Liberty and Justice for AllNirav Shah
 
Cloud Compliance Auditing - Closer 2011
Cloud Compliance Auditing - Closer 2011Cloud Compliance Auditing - Closer 2011
Cloud Compliance Auditing - Closer 2011Jonathan Sinclair
 
Understand Risk in Communications and Data Breach
Understand Risk in Communications and Data BreachUnderstand Risk in Communications and Data Breach
Understand Risk in Communications and Data BreachJon Gatrell
 
IT vs. Users? How Law Firms Can Maximize Security While Granting Access to th...
IT vs. Users? How Law Firms Can Maximize Security While Granting Access to th...IT vs. Users? How Law Firms Can Maximize Security While Granting Access to th...
IT vs. Users? How Law Firms Can Maximize Security While Granting Access to th...Authentic8
 
CA Self Regulation
CA Self RegulationCA Self Regulation
CA Self RegulationCASCouncil
 
Laserfiche regulatory + technology convergence webinar
Laserfiche regulatory + technology convergence webinarLaserfiche regulatory + technology convergence webinar
Laserfiche regulatory + technology convergence webinarLaserfiche
 
DevOpsDaysRiga 2018: Juris Puce - GDPR and other security regulation imposed ...
DevOpsDaysRiga 2018: Juris Puce - GDPR and other security regulation imposed ...DevOpsDaysRiga 2018: Juris Puce - GDPR and other security regulation imposed ...
DevOpsDaysRiga 2018: Juris Puce - GDPR and other security regulation imposed ...DevOpsDays Riga
 
Science Distributed's Chain Event: Blockchain Barriers - Heather Flannery
Science Distributed's Chain Event: Blockchain Barriers - Heather FlanneryScience Distributed's Chain Event: Blockchain Barriers - Heather Flannery
Science Distributed's Chain Event: Blockchain Barriers - Heather FlannerySean Manion PhD
 
Trusted Edge Ice For Owa 2009
Trusted Edge Ice For Owa 2009Trusted Edge Ice For Owa 2009
Trusted Edge Ice For Owa 2009Alexis Brown
 
Application Security in Times of Globalization
Application Security in Times of GlobalizationApplication Security in Times of Globalization
Application Security in Times of GlobalizationAujas Networks Pvt. Ltd.
 
Data security strategies and drivers
Data security strategies and driversData security strategies and drivers
Data security strategies and driversFreeform Dynamics
 
Security In Web Conferencing
Security In Web ConferencingSecurity In Web Conferencing
Security In Web Conferencingpchen
 
7 Best Practices to Protect Critical Business Information [Infographic]
7 Best Practices to Protect Critical Business Information [Infographic]7 Best Practices to Protect Critical Business Information [Infographic]
7 Best Practices to Protect Critical Business Information [Infographic]Citrix
 
Top Threats Facing Organizations Cloud / SaaS Data
Top Threats Facing Organizations Cloud / SaaS DataTop Threats Facing Organizations Cloud / SaaS Data
Top Threats Facing Organizations Cloud / SaaS DataSysCloud
 
Spe security and privacy enhancement framework for mobile devices
Spe security and privacy enhancement framework for mobile devicesSpe security and privacy enhancement framework for mobile devices
Spe security and privacy enhancement framework for mobile devicesLeMeniz Infotech
 

Tendances (20)

Review of Microsoft HealthVault
Review of Microsoft HealthVaultReview of Microsoft HealthVault
Review of Microsoft HealthVault
 
A Guide to Thoughtful Governance - Liberty and Justice for All
A Guide to Thoughtful Governance - Liberty and Justice for AllA Guide to Thoughtful Governance - Liberty and Justice for All
A Guide to Thoughtful Governance - Liberty and Justice for All
 
Cloud Compliance Auditing - Closer 2011
Cloud Compliance Auditing - Closer 2011Cloud Compliance Auditing - Closer 2011
Cloud Compliance Auditing - Closer 2011
 
SAT 2020 slide deck
SAT 2020 slide deckSAT 2020 slide deck
SAT 2020 slide deck
 
Understand Risk in Communications and Data Breach
Understand Risk in Communications and Data BreachUnderstand Risk in Communications and Data Breach
Understand Risk in Communications and Data Breach
 
IT vs. Users? How Law Firms Can Maximize Security While Granting Access to th...
IT vs. Users? How Law Firms Can Maximize Security While Granting Access to th...IT vs. Users? How Law Firms Can Maximize Security While Granting Access to th...
IT vs. Users? How Law Firms Can Maximize Security While Granting Access to th...
 
CA Self Regulation
CA Self RegulationCA Self Regulation
CA Self Regulation
 
Laserfiche regulatory + technology convergence webinar
Laserfiche regulatory + technology convergence webinarLaserfiche regulatory + technology convergence webinar
Laserfiche regulatory + technology convergence webinar
 
Presentation1
Presentation1Presentation1
Presentation1
 
DevOpsDaysRiga 2018: Juris Puce - GDPR and other security regulation imposed ...
DevOpsDaysRiga 2018: Juris Puce - GDPR and other security regulation imposed ...DevOpsDaysRiga 2018: Juris Puce - GDPR and other security regulation imposed ...
DevOpsDaysRiga 2018: Juris Puce - GDPR and other security regulation imposed ...
 
Edrms ark april 2007
Edrms ark april 2007Edrms ark april 2007
Edrms ark april 2007
 
Science Distributed's Chain Event: Blockchain Barriers - Heather Flannery
Science Distributed's Chain Event: Blockchain Barriers - Heather FlanneryScience Distributed's Chain Event: Blockchain Barriers - Heather Flannery
Science Distributed's Chain Event: Blockchain Barriers - Heather Flannery
 
Trusted Edge Ice For Owa 2009
Trusted Edge Ice For Owa 2009Trusted Edge Ice For Owa 2009
Trusted Edge Ice For Owa 2009
 
Application Security in Times of Globalization
Application Security in Times of GlobalizationApplication Security in Times of Globalization
Application Security in Times of Globalization
 
Data security strategies and drivers
Data security strategies and driversData security strategies and drivers
Data security strategies and drivers
 
Security In Web Conferencing
Security In Web ConferencingSecurity In Web Conferencing
Security In Web Conferencing
 
7 Best Practices to Protect Critical Business Information [Infographic]
7 Best Practices to Protect Critical Business Information [Infographic]7 Best Practices to Protect Critical Business Information [Infographic]
7 Best Practices to Protect Critical Business Information [Infographic]
 
Clifford wilke
Clifford wilkeClifford wilke
Clifford wilke
 
Top Threats Facing Organizations Cloud / SaaS Data
Top Threats Facing Organizations Cloud / SaaS DataTop Threats Facing Organizations Cloud / SaaS Data
Top Threats Facing Organizations Cloud / SaaS Data
 
Spe security and privacy enhancement framework for mobile devices
Spe security and privacy enhancement framework for mobile devicesSpe security and privacy enhancement framework for mobile devices
Spe security and privacy enhancement framework for mobile devices
 

En vedette

Communicare Wo W! Services (Corporate)
Communicare Wo W! Services (Corporate)Communicare Wo W! Services (Corporate)
Communicare Wo W! Services (Corporate)ngkaihoe
 
Content Creation and Open Educational Resources
Content Creation and Open Educational ResourcesContent Creation and Open Educational Resources
Content Creation and Open Educational Resourcesmarkvanharmelen
 
Introduction to CS60171 (2009)
Introduction to CS60171 (2009)Introduction to CS60171 (2009)
Introduction to CS60171 (2009)markvanharmelen
 
Occam Introduction
Occam IntroductionOccam Introduction
Occam Introductionngkaihoe
 
Playing with Constraints: The value of interactive prototypes in driving the ...
Playing with Constraints: The value of interactive prototypes in driving the ...Playing with Constraints: The value of interactive prototypes in driving the ...
Playing with Constraints: The value of interactive prototypes in driving the ...haiyan
 
Born To Sing Living Your Childhood Dreams
Born To Sing   Living Your Childhood DreamsBorn To Sing   Living Your Childhood Dreams
Born To Sing Living Your Childhood Dreamsngkaihoe
 
How To Add Email To Mailing List
How To Add Email To Mailing ListHow To Add Email To Mailing List
How To Add Email To Mailing Listngkaihoe
 
Enterprise2
Enterprise2Enterprise2
Enterprise2ngkaihoe
 
Web 2.0 supporting a Learning and Teaching Strategy -- Wassell
Web 2.0 supporting a Learning and Teaching Strategy -- WassellWeb 2.0 supporting a Learning and Teaching Strategy -- Wassell
Web 2.0 supporting a Learning and Teaching Strategy -- Wassellmarkvanharmelen
 
Internet Is Fun
Internet Is FunInternet Is Fun
Internet Is Funngkaihoe
 
Waiting For The Babel Fish
 Waiting For The Babel Fish Waiting For The Babel Fish
Waiting For The Babel Fishsbooth
 
Campi Bisenzio for Human rights
Campi Bisenzio for Human rightsCampi Bisenzio for Human rights
Campi Bisenzio for Human rightsAlessandro Giorni
 
Standards WakeUp: XHTML, CSS, Accessibilità e Semantica
Standards WakeUp: XHTML, CSS, Accessibilità e SemanticaStandards WakeUp: XHTML, CSS, Accessibilità e Semantica
Standards WakeUp: XHTML, CSS, Accessibilità e SemanticaSimone Onofri
 
Web 2.0 and Learning and Teaching
Web 2.0 and Learning and TeachingWeb 2.0 and Learning and Teaching
Web 2.0 and Learning and Teachingmarkvanharmelen
 
Communicare Wo W! Services (Personal)
Communicare Wo W! Services (Personal)Communicare Wo W! Services (Personal)
Communicare Wo W! Services (Personal)ngkaihoe
 

En vedette (20)

Hea.Keynote
Hea.KeynoteHea.Keynote
Hea.Keynote
 
Communicare Wo W! Services (Corporate)
Communicare Wo W! Services (Corporate)Communicare Wo W! Services (Corporate)
Communicare Wo W! Services (Corporate)
 
giornalino3M, terzo numero
giornalino3M, terzo numerogiornalino3M, terzo numero
giornalino3M, terzo numero
 
Presentazionegenerale
PresentazionegeneralePresentazionegenerale
Presentazionegenerale
 
Content Creation and Open Educational Resources
Content Creation and Open Educational ResourcesContent Creation and Open Educational Resources
Content Creation and Open Educational Resources
 
2010 Practice And Game Schedule
2010 Practice And Game Schedule2010 Practice And Game Schedule
2010 Practice And Game Schedule
 
Introduction to CS60171 (2009)
Introduction to CS60171 (2009)Introduction to CS60171 (2009)
Introduction to CS60171 (2009)
 
Occam Introduction
Occam IntroductionOccam Introduction
Occam Introduction
 
Playing with Constraints: The value of interactive prototypes in driving the ...
Playing with Constraints: The value of interactive prototypes in driving the ...Playing with Constraints: The value of interactive prototypes in driving the ...
Playing with Constraints: The value of interactive prototypes in driving the ...
 
Born To Sing Living Your Childhood Dreams
Born To Sing   Living Your Childhood DreamsBorn To Sing   Living Your Childhood Dreams
Born To Sing Living Your Childhood Dreams
 
How To Add Email To Mailing List
How To Add Email To Mailing ListHow To Add Email To Mailing List
How To Add Email To Mailing List
 
Enterprise2
Enterprise2Enterprise2
Enterprise2
 
Web 2.0 supporting a Learning and Teaching Strategy -- Wassell
Web 2.0 supporting a Learning and Teaching Strategy -- WassellWeb 2.0 supporting a Learning and Teaching Strategy -- Wassell
Web 2.0 supporting a Learning and Teaching Strategy -- Wassell
 
Internet Is Fun
Internet Is FunInternet Is Fun
Internet Is Fun
 
Waiting For The Babel Fish
 Waiting For The Babel Fish Waiting For The Babel Fish
Waiting For The Babel Fish
 
Campi Bisenzio for Human rights
Campi Bisenzio for Human rightsCampi Bisenzio for Human rights
Campi Bisenzio for Human rights
 
Standards WakeUp: XHTML, CSS, Accessibilità e Semantica
Standards WakeUp: XHTML, CSS, Accessibilità e SemanticaStandards WakeUp: XHTML, CSS, Accessibilità e Semantica
Standards WakeUp: XHTML, CSS, Accessibilità e Semantica
 
Policy and Strategy
Policy and StrategyPolicy and Strategy
Policy and Strategy
 
Web 2.0 and Learning and Teaching
Web 2.0 and Learning and TeachingWeb 2.0 and Learning and Teaching
Web 2.0 and Learning and Teaching
 
Communicare Wo W! Services (Personal)
Communicare Wo W! Services (Personal)Communicare Wo W! Services (Personal)
Communicare Wo W! Services (Personal)
 

Similaire à University Web 2.0 Policy Guide

Tizor_Data-Best-Practices.ppt
Tizor_Data-Best-Practices.pptTizor_Data-Best-Practices.ppt
Tizor_Data-Best-Practices.pptwebhostingguy
 
Tizor_Data-Best-Practices.ppt
Tizor_Data-Best-Practices.pptTizor_Data-Best-Practices.ppt
Tizor_Data-Best-Practices.pptwebhostingguy
 
Data protection and smart grids
Data protection and smart gridsData protection and smart grids
Data protection and smart gridsRónán Kennedy
 
Steve Wood Generative AI and Data Protection Asia Privacy Bridge October 202...
Steve Wood Generative AI and Data Protection Asia Privacy Bridge  October 202...Steve Wood Generative AI and Data Protection Asia Privacy Bridge  October 202...
Steve Wood Generative AI and Data Protection Asia Privacy Bridge October 202...stevewood900540
 
BANKING INTELLIGENCE THROUGH ARTIFICIAL INTELLIGENCE
BANKING INTELLIGENCE THROUGH ARTIFICIAL  INTELLIGENCEBANKING INTELLIGENCE THROUGH ARTIFICIAL  INTELLIGENCE
BANKING INTELLIGENCE THROUGH ARTIFICIAL INTELLIGENCEPARAMASIVANCHELLIAH
 
The Identity Project (Rhys Smith)
The Identity Project (Rhys Smith)The Identity Project (Rhys Smith)
The Identity Project (Rhys Smith)JISC.AM
 
The Connection Between Contactless Checkpoint Screening and Data Privacy.pdf
The Connection Between Contactless Checkpoint Screening and Data Privacy.pdfThe Connection Between Contactless Checkpoint Screening and Data Privacy.pdf
The Connection Between Contactless Checkpoint Screening and Data Privacy.pdfSecurityDetectionSol
 
2009 iapp-the corpprivacydeptmar13-2009
2009 iapp-the corpprivacydeptmar13-20092009 iapp-the corpprivacydeptmar13-2009
2009 iapp-the corpprivacydeptmar13-2009asundaram1
 
S nandakumar
S nandakumarS nandakumar
S nandakumarIPPAI
 
S nandakumar_banglore
S nandakumar_bangloreS nandakumar_banglore
S nandakumar_bangloreIPPAI
 
Shibboleth Guided Tour Webinar
Shibboleth Guided Tour WebinarShibboleth Guided Tour Webinar
Shibboleth Guided Tour WebinarJohn Lewis
 
The Federal Information Security Management Act
The Federal Information Security Management ActThe Federal Information Security Management Act
The Federal Information Security Management ActMichelle Singh
 
Privacy-ready Data Protection Program Implementation
Privacy-ready Data Protection Program ImplementationPrivacy-ready Data Protection Program Implementation
Privacy-ready Data Protection Program ImplementationEryk Budi Pratama
 
Directions Answer each question individual and respond with full .docx
Directions Answer each question individual and respond with full .docxDirections Answer each question individual and respond with full .docx
Directions Answer each question individual and respond with full .docxmariona83
 
Analysis of Payment Card Industry Data Security Standard [PCI DSS] Compliance...
Analysis of Payment Card Industry Data Security Standard [PCI DSS] Compliance...Analysis of Payment Card Industry Data Security Standard [PCI DSS] Compliance...
Analysis of Payment Card Industry Data Security Standard [PCI DSS] Compliance...IJERA Editor
 
Discussing Cyber Risk Coverage With Your Commercial Clients by Steve Robinson...
Discussing Cyber Risk Coverage With Your Commercial Clients by Steve Robinson...Discussing Cyber Risk Coverage With Your Commercial Clients by Steve Robinson...
Discussing Cyber Risk Coverage With Your Commercial Clients by Steve Robinson...Don Grauel
 
Federation Policy
Federation PolicyFederation Policy
Federation PolicyJISC.AM
 
Personally Identifiable Information Protection
Personally Identifiable Information ProtectionPersonally Identifiable Information Protection
Personally Identifiable Information ProtectionPECB
 
Gym Management System
Gym Management SystemGym Management System
Gym Management Systemijtsrd
 

Similaire à University Web 2.0 Policy Guide (20)

Tizor_Data-Best-Practices.ppt
Tizor_Data-Best-Practices.pptTizor_Data-Best-Practices.ppt
Tizor_Data-Best-Practices.ppt
 
Tizor_Data-Best-Practices.ppt
Tizor_Data-Best-Practices.pptTizor_Data-Best-Practices.ppt
Tizor_Data-Best-Practices.ppt
 
Data protection and smart grids
Data protection and smart gridsData protection and smart grids
Data protection and smart grids
 
Steve Wood Generative AI and Data Protection Asia Privacy Bridge October 202...
Steve Wood Generative AI and Data Protection Asia Privacy Bridge  October 202...Steve Wood Generative AI and Data Protection Asia Privacy Bridge  October 202...
Steve Wood Generative AI and Data Protection Asia Privacy Bridge October 202...
 
BANKING INTELLIGENCE THROUGH ARTIFICIAL INTELLIGENCE
BANKING INTELLIGENCE THROUGH ARTIFICIAL  INTELLIGENCEBANKING INTELLIGENCE THROUGH ARTIFICIAL  INTELLIGENCE
BANKING INTELLIGENCE THROUGH ARTIFICIAL INTELLIGENCE
 
The Identity Project (Rhys Smith)
The Identity Project (Rhys Smith)The Identity Project (Rhys Smith)
The Identity Project (Rhys Smith)
 
The Connection Between Contactless Checkpoint Screening and Data Privacy.pdf
The Connection Between Contactless Checkpoint Screening and Data Privacy.pdfThe Connection Between Contactless Checkpoint Screening and Data Privacy.pdf
The Connection Between Contactless Checkpoint Screening and Data Privacy.pdf
 
2009 iapp-the corpprivacydeptmar13-2009
2009 iapp-the corpprivacydeptmar13-20092009 iapp-the corpprivacydeptmar13-2009
2009 iapp-the corpprivacydeptmar13-2009
 
S nandakumar
S nandakumarS nandakumar
S nandakumar
 
S nandakumar_banglore
S nandakumar_bangloreS nandakumar_banglore
S nandakumar_banglore
 
InsiderAttack_p3.ppt
InsiderAttack_p3.pptInsiderAttack_p3.ppt
InsiderAttack_p3.ppt
 
Shibboleth Guided Tour Webinar
Shibboleth Guided Tour WebinarShibboleth Guided Tour Webinar
Shibboleth Guided Tour Webinar
 
The Federal Information Security Management Act
The Federal Information Security Management ActThe Federal Information Security Management Act
The Federal Information Security Management Act
 
Privacy-ready Data Protection Program Implementation
Privacy-ready Data Protection Program ImplementationPrivacy-ready Data Protection Program Implementation
Privacy-ready Data Protection Program Implementation
 
Directions Answer each question individual and respond with full .docx
Directions Answer each question individual and respond with full .docxDirections Answer each question individual and respond with full .docx
Directions Answer each question individual and respond with full .docx
 
Analysis of Payment Card Industry Data Security Standard [PCI DSS] Compliance...
Analysis of Payment Card Industry Data Security Standard [PCI DSS] Compliance...Analysis of Payment Card Industry Data Security Standard [PCI DSS] Compliance...
Analysis of Payment Card Industry Data Security Standard [PCI DSS] Compliance...
 
Discussing Cyber Risk Coverage With Your Commercial Clients by Steve Robinson...
Discussing Cyber Risk Coverage With Your Commercial Clients by Steve Robinson...Discussing Cyber Risk Coverage With Your Commercial Clients by Steve Robinson...
Discussing Cyber Risk Coverage With Your Commercial Clients by Steve Robinson...
 
Federation Policy
Federation PolicyFederation Policy
Federation Policy
 
Personally Identifiable Information Protection
Personally Identifiable Information ProtectionPersonally Identifiable Information Protection
Personally Identifiable Information Protection
 
Gym Management System
Gym Management SystemGym Management System
Gym Management System
 

Dernier

Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...Dave Litwiller
 
It will be International Nurses' Day on 12 May
It will be International Nurses' Day on 12 MayIt will be International Nurses' Day on 12 May
It will be International Nurses' Day on 12 MayNZSG
 
Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...
Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...
Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...amitlee9823
 
Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...
Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...
Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...Lviv Startup Club
 
Organizational Transformation Lead with Culture
Organizational Transformation Lead with CultureOrganizational Transformation Lead with Culture
Organizational Transformation Lead with CultureSeta Wicaksana
 
Cracking the Cultural Competence Code.pptx
Cracking the Cultural Competence Code.pptxCracking the Cultural Competence Code.pptx
Cracking the Cultural Competence Code.pptxWorkforce Group
 
Call Girls In Panjim North Goa 9971646499 Genuine Service
Call Girls In Panjim North Goa 9971646499 Genuine ServiceCall Girls In Panjim North Goa 9971646499 Genuine Service
Call Girls In Panjim North Goa 9971646499 Genuine Serviceritikaroy0888
 
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...Aggregage
 
Mondelez State of Snacking and Future Trends 2023
Mondelez State of Snacking and Future Trends 2023Mondelez State of Snacking and Future Trends 2023
Mondelez State of Snacking and Future Trends 2023Neil Kimberley
 
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRLMONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRLSeo
 
Best VIP Call Girls Noida Sector 40 Call Me: 8448380779
Best VIP Call Girls Noida Sector 40 Call Me: 8448380779Best VIP Call Girls Noida Sector 40 Call Me: 8448380779
Best VIP Call Girls Noida Sector 40 Call Me: 8448380779Delhi Call girls
 
Monthly Social Media Update April 2024 pptx.pptx
Monthly Social Media Update April 2024 pptx.pptxMonthly Social Media Update April 2024 pptx.pptx
Monthly Social Media Update April 2024 pptx.pptxAndy Lambert
 
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...Dipal Arora
 
Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...
Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...
Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...lizamodels9
 
Call Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangalore
Call Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service BangaloreCall Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangalore
Call Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangaloreamitlee9823
 
M.C Lodges -- Guest House in Jhang.
M.C Lodges --  Guest House in Jhang.M.C Lodges --  Guest House in Jhang.
M.C Lodges -- Guest House in Jhang.Aaiza Hassan
 
Boost the utilization of your HCL environment by reevaluating use cases and f...
Boost the utilization of your HCL environment by reevaluating use cases and f...Boost the utilization of your HCL environment by reevaluating use cases and f...
Boost the utilization of your HCL environment by reevaluating use cases and f...Roland Driesen
 
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...anilsa9823
 
KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...
KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...
KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...Any kyc Account
 
How to Get Started in Social Media for Art League City
How to Get Started in Social Media for Art League CityHow to Get Started in Social Media for Art League City
How to Get Started in Social Media for Art League CityEric T. Tung
 

Dernier (20)

Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
 
It will be International Nurses' Day on 12 May
It will be International Nurses' Day on 12 MayIt will be International Nurses' Day on 12 May
It will be International Nurses' Day on 12 May
 
Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...
Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...
Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...
 
Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...
Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...
Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...
 
Organizational Transformation Lead with Culture
Organizational Transformation Lead with CultureOrganizational Transformation Lead with Culture
Organizational Transformation Lead with Culture
 
Cracking the Cultural Competence Code.pptx
Cracking the Cultural Competence Code.pptxCracking the Cultural Competence Code.pptx
Cracking the Cultural Competence Code.pptx
 
Call Girls In Panjim North Goa 9971646499 Genuine Service
Call Girls In Panjim North Goa 9971646499 Genuine ServiceCall Girls In Panjim North Goa 9971646499 Genuine Service
Call Girls In Panjim North Goa 9971646499 Genuine Service
 
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
 
Mondelez State of Snacking and Future Trends 2023
Mondelez State of Snacking and Future Trends 2023Mondelez State of Snacking and Future Trends 2023
Mondelez State of Snacking and Future Trends 2023
 
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRLMONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
 
Best VIP Call Girls Noida Sector 40 Call Me: 8448380779
Best VIP Call Girls Noida Sector 40 Call Me: 8448380779Best VIP Call Girls Noida Sector 40 Call Me: 8448380779
Best VIP Call Girls Noida Sector 40 Call Me: 8448380779
 
Monthly Social Media Update April 2024 pptx.pptx
Monthly Social Media Update April 2024 pptx.pptxMonthly Social Media Update April 2024 pptx.pptx
Monthly Social Media Update April 2024 pptx.pptx
 
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
 
Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...
Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...
Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...
 
Call Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangalore
Call Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service BangaloreCall Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangalore
Call Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangalore
 
M.C Lodges -- Guest House in Jhang.
M.C Lodges --  Guest House in Jhang.M.C Lodges --  Guest House in Jhang.
M.C Lodges -- Guest House in Jhang.
 
Boost the utilization of your HCL environment by reevaluating use cases and f...
Boost the utilization of your HCL environment by reevaluating use cases and f...Boost the utilization of your HCL environment by reevaluating use cases and f...
Boost the utilization of your HCL environment by reevaluating use cases and f...
 
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
 
KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...
KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...
KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...
 
How to Get Started in Social Media for Art League City
How to Get Started in Social Media for Art League CityHow to Get Started in Social Media for Art League City
How to Get Started in Social Media for Art League City
 

University Web 2.0 Policy Guide

  • 1. Externally Hosted Web 2.0 Services What should the policy be? Chris Adie, Information Services, University of Edinburgh 3 May 2007
  • 2.
  • 3.
  • 4.
  • 5.
  • 6.
  • 7.
  • 8.