Your SlideShare is downloading. ×
120822 mobile learning (uhi)
120822 mobile learning (uhi)
120822 mobile learning (uhi)
120822 mobile learning (uhi)
120822 mobile learning (uhi)
120822 mobile learning (uhi)
120822 mobile learning (uhi)
120822 mobile learning (uhi)
120822 mobile learning (uhi)
120822 mobile learning (uhi)
120822 mobile learning (uhi)
120822 mobile learning (uhi)
120822 mobile learning (uhi)
120822 mobile learning (uhi)
120822 mobile learning (uhi)
120822 mobile learning (uhi)
120822 mobile learning (uhi)
120822 mobile learning (uhi)
120822 mobile learning (uhi)
120822 mobile learning (uhi)
120822 mobile learning (uhi)
120822 mobile learning (uhi)
120822 mobile learning (uhi)
120822 mobile learning (uhi)
120822 mobile learning (uhi)
120822 mobile learning (uhi)
120822 mobile learning (uhi)
Upcoming SlideShare
Loading in...5
×

Thanks for flagging this SlideShare!

Oops! An error has occurred.

×
Saving this for later? Get the SlideShare app to save on your phone or tablet. Read anywhere, anytime – even offline.
Text the download link to your phone
Standard text messaging rates apply

120822 mobile learning (uhi)

490

Published on

Presentation delivered on 22 August 2012 at University of the Highlands and Islands, Inverness, in collaboration with RSC Scotland.

Presentation delivered on 22 August 2012 at University of the Highlands and Islands, Inverness, in collaboration with RSC Scotland.

Published in: Education, Technology, Business
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total Views
490
On Slideshare
0
From Embeds
0
Number of Embeds
1
Actions
Shares
0
Downloads
0
Comments
0
Likes
0
Embeds 0
No embeds

Report content
Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
No notes for slide
  • Plug resources – especially top tips and policy checklist as each only one side of A4.Also, video resources useful for Scotland, England, N Ireland, Wales.
  • TurningPointContext of learning. Notice and Take Down, Acceptable Use. “authorise”.
  • Likely to be Safeguarding officer or e-Safety OfficerMake someone ultimately responsible for e-safety, for planning, co-ordinating approach, implementation, training and response. Senior member of staff who already has child protection training and knowledge of working with other agencies.Someone approachable, set right tone, strong leadership role.
  • Represent cross section of college community, stakeholders.Consultation, variety of approach.Learner input!Depends on college.
  • Online tools to help – Generator, National Education Network etc (see links on our site)Assess what is working well and what needs further input. Inform all parties of the audit.Prioritise next steps.
  • TurningPoint
  • Set the ground rules, mitigate liability, make all users aware of limits and boundaries.All staff and students to be aware of rights and responsibilities when using ICTEasily understood by learnersClarify when and in what circumstances it will apply e.g. broad in scope, include mobile technologies, learners hardware (?)Scrutiny by Inspectorate.Link to other relevant policies, particularly AUP – see JISC Legal’s checklist.
  • Think ahead – key to safeguarding.Assess risk in context e.g. off site learning, vulnerable learners, school links etc.What can we do to make it safer?Enhanced procedures for vulnerable learners etc.Consistency crucial.
  • TurningPoint
  • Essential step to meet your duties.Learner input.Develop positive behaviours.Monitor complaints to determine trends, underlying issues.
  • Learners input.Focus group.Act on feedback given.Further support.
  • TurningPoint
  • TurningPoint
  • Transcript

    • 1. Mobile Learning and the LawAre you remotely interested? Inverness, Wednesday, 22 August 2012
    • 2. Hello!Jason Miles-CampbellJISC Legal Service Managerwww.jisclegal.ac.ukinfo@jisclegal.ac.uk0141 548 4939 2
    • 3. About JISC Legal• Role: to avoid legal issues becoming a barrier to the use of technology in tertiary education• Information service: we cannot take decisions for you when you are faced with a risk 3
    • 4. Have you heard of JISC Legal before? 45%1. Hello again, Jason2. Yes, fairly often3. Yes, used 20% 20% occasionally 10%4. Vague acquaintance 5%5. What’s that, then? 1 2 3 4 5
    • 5. When it comes to legal issues... 40%1. I’m confident2. I’ve a fair idea 30%3. I dabble 20%4. I ask others 10%5. I hide in the toilet 0% 1 2 3 4 5
    • 6. Why Comply?• It’s the law• Confidence v uncertainty• Example• Reputation• Quality inspection• But risk management 7
    • 7. Legal bill for defamation accusation... 68%1. They’ll do it for free2. 30p3. £3 32%4. £30005. £3,000,000 0% 0% 0% 1 2 3 4 5
    • 8. The IssuesData protection (respecting privacy)Copyright (using other people’s stuff)e-Safety (protecting users)e-Security (protecting the organisation)
    • 9. The DifferenceNot linked to place (mobile!)Personal, invasive and pervasiveOwn deviceCombines access and communication
    • 10. What’s the biggest issue about mobile? 1. Copyright 33% 29% 29% 2. Data protection 3. e-Safety 4. e-Security 10% 5. Haggis 0% 1 2 3 4 5Slide 11 of 27
    • 11. Think about mobileaccess/delivery when choosing learning resources.
    • 12. Do you have a mobile device with copyright infringing content with you?1. Can I call my lawyer? 58%2. Maybe.3. I’m looking around and see what option others are pressing. 26%4. Yes.5. Definitely not, guv. Honest. 5% 5% 5% 1 2 3 4 5
    • 13. Ensure data protection awareness. Don’t let techie enthusiasm run away.Slide 12 of 28
    • 14. Ensure your e-safety policies and procedures cover mobile.Ensure you have e-safety policies and procedures in the first place.
    • 15. Are you confident learners know how to report concerns? 52%1. Yes2. No 29%3. Don’t know 19% 1 2 3
    • 16. Ensure your e-security and acceptable use policies are fit for mobile use.
    • 17. Keep legal risk in perspective. Have risk assessment procedures in place.Slide 18 of 27
    • 18. What should we do about risk?1. Ignore it 90%2. Eliminate it3. Think about it4. Take steps to manage it5. Run around screaming 0% 5% 0% 5% 1 2 3 4 5
    • 19. Monitor impact and effectiveness.
    • 20. Ask for feedback, provide support.
    • 21. Are learners involved with development, review and impact of policy? 1. Always 2. Sometimes 3. Seldom 4. Never 5. Depends who’s askingSlide 22 of 27
    • 22. Next steps? 1. Go back and say well done! 38% 2. Start a conversation with management 25% 3. Re-write a few policies 19% 4. Monitor what’s in place already 13% 5. Get further support 6% 6. Point at the guy over there and 0% say ‘his problem!’ 1 2 3 4 5 6Slide 23 of 27
    • 23. Contact JISC Legalinfo@jisclegal.ac.uk0141 548 4939www.jisclegal.ac.ukhttp://twitter.com/JISCLegal
    • 24. Your questions 25
    • 25. JISC Legal is hosted by the University of Strathclyde, a charitable body, registered in Scotland, with registration number SC015263. This work, with the exception of logos, and any other content marked with aseparate copyright notice, is licensed under a Creative Commons Attribution 3.0Unported Licence. Attribution should be “© JISC Legal – www.jisclegal.ac.uk –used under Creative Commons Attribution 3.0 Unported Licence” (with clickableURLs where possible). The use of logos in the work is licensed for use only on non-derivative copies. Further information at www.jisclegal.ac.uk/CopyrightPolicy. 26

    ×