BYOD and the Law (May I Text You That Writ?)

389 views

Published on

Presentation on Bring Your Own Device and the Law, delivered by Jason Miles-Campbell at the RSC Scotland Bring Me That Horizon Annual Conference, Edinburgh on 7 June 2013.

Published in: Education, Technology, Business
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total views
389
On SlideShare
0
From Embeds
0
Number of Embeds
4
Actions
Shares
0
Downloads
5
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide
  • Plug resources – especially top tips and policy checklist as each only one side of A4.Also, video resources useful for Scotland, England, N Ireland, Wales.
  • TurningPointContext of learning. Notice and Take Down, Acceptable Use. “authorise”.
  • Likely to be Safeguarding officer or e-Safety OfficerMake someone ultimately responsible for e-safety, for planning, co-ordinating approach, implementation, training and response. Senior member of staff who already has child protection training and knowledge of working with other agencies.Someone approachable, set right tone, strong leadership role.
  • Represent cross section of college community, stakeholders.Consultation, variety of approach.Learner input!Depends on college.
  • Online tools to help – Generator, National Education Network etc (see links on our site)Assess what is working well and what needs further input. Inform all parties of the audit.Prioritise next steps.
  • TurningPoint
  • Set the ground rules, mitigate liability, make all users aware of limits and boundaries.All staff and students to be aware of rights and responsibilities when using ICTEasily understood by learnersClarify when and in what circumstances it will apply e.g. broad in scope, include mobile technologies, learners hardware (?)Scrutiny by Inspectorate.Link to other relevant policies, particularly AUP – see JISC Legal’s checklist.
  • Think ahead – key to safeguarding.Assess risk in context e.g. off site learning, vulnerable learners, school links etc.What can we do to make it safer?Enhanced procedures for vulnerable learners etc.Consistency crucial.
  • TurningPoint
  • Essential step to meet your duties.Learner input.Develop positive behaviours.Monitor complaints to determine trends, underlying issues.
  • Learners input.Focus group.Act on feedback given.Further support.
  • TurningPoint
  • TurningPoint
  • Plug resources – especially top tips and policy checklist as each only one side of A4.Also, video resources useful for Scotland, England, N Ireland, Wales.
  • BYOD and the Law (May I Text You That Writ?)

    1. 1. May I Text You That Writ?BYOD and the LawFriday, 7 June2013Edinburgh
    2. 2. Jason Miles-CampbellJisc Legal Service Managerwww.jisclegal.ac.ukinfo@jisclegal.ac.uk0141 548 4939Hello!
    3. 3. 3About Jisc Legal• Role: to avoid legal issues becoming abarrier to the use of technology in tertiaryeducation• Information service: we cannot takedecisions for you when you are faced with arisk
    4. 4. This presentationon Slideshare(or search forslideshare jisclegal)
    5. 5. Slide 6 of 39Have you heard of Jisc Legal before?1. Hello again, Jason2. Yes, fairly often3. Yes, used occasionally4. Vague acquaintance5. What’s that, then?1. 2. 3. 4. 5.21%24%17%21%17%
    6. 6. Slide 7 of 39When it comes to legal issues...1. I’m confident2. I’ve a fair idea3. I dabble4. I ask others5. I hide in the toilet1. 2. 3. 4. 5.4%19%7%41%30%
    7. 7. 8Why Comply?• It’s the law• Confidence v uncertainty• Example• Reputation• Quality inspection• But risk management
    8. 8. Slide 9 of 39Legal bill for defamation accusation...1. They’ll do it for free2. 65p3. £6.504. £65005. £6,500,0001. 2. 3. 4. 5.4%0%13%83%0%
    9. 9. The IssuesCopyright (using other people’s stuff)Data protection (respecting privacy)e-Safety (protecting users)e-Security (protecting the organisation)
    10. 10. The DifferenceNot linked to place (mobile!)Personal, invasive and pervasiveOwn deviceCombines access and communication
    11. 11. Slide 12 of 39What’s the biggest issue aboutmobile?Slide 11 of 271. Copyright2. Data protection3. e-Safety4. e-Security5. Haggis1. 2. 3. 4. 5.20% 20%15%20%25%
    12. 12. “ … 47% of all UK adults now use theirpersonal smartphone, laptop or tabletcomputer for work purposes. But lessthan 3 in 10 who do so are providedwith guidance on how their devicesshould be used in this capacity, raisingworrying concerns that people may notunderstand how to look after thepersonal information accessed andstored on these devices…”http://www.ico.gov.uk/news/latest_news/2013/survey-guidance-on-byod-personal-devices-07032013.aspx
    13. 13. Copyright & Mobile DevicesHow to be ‘AppyT&Cs‘Personal use’Per device, per user,multi-use
    14. 14. Slide 15 of 39Do you have a mobile device withcopyright infringing content with you?1. Can I call my lawyer?2. Maybe.3. I’m looking around and seewhat option others arepressing.4. Yes.5. Definitely not, guv. Honest.1. 2. 3. 4. 5.11%33%22%30%4%
    15. 15. Data Protection & BYODCompliance and privacyPurposes / purpose creepSurveillanceMarketing - PECRs
    16. 16. e-Safety & Mobile DevicesEnables new, pervasivecommunicationAnonymity and accessDuty of careCriminal offences
    17. 17. e-Security & Mobile DevicesBYODBYOVRDLYODDP, liability,breach of T&Cs
    18. 18. Think about mobileaccess/delivery whenchoosing learningresources.
    19. 19. Ensuredata protectionawareness.Don’t let techieenthusiasm run away.Slide 12 of 28
    20. 20. Ensure your e-safetypolicies and procedurescover BYOD.Ensure you have e-safety policiesand procedures in the first place.
    21. 21. Slide 22 of 39Are you confident learners knowhow to report concerns?1. 2. 3.30% 30%41%1. Yes2. No3. Don’t know
    22. 22. Ensure your e-securityand acceptable usepolicies are fit forBYOD.
    23. 23. Keep legal risk inperspective.Have risk assessmentprocedures in place.Slide 18 of 27
    24. 24. Slide 25 of 39What should we do about risk?1. 2. 3. 4. 5.0%8%4%88%0%1. Ignore it2. Eliminate it3. Think about it4. Take steps tomanage it5. Run around screaming
    25. 25. Monitor impact andeffectiveness.
    26. 26. Ask for feedback,provide support.
    27. 27. Slide 28 of 39Are learners involved with development,review and impact of policy?Slide 22 of 271. 2. 3. 4. 5.4%35%4%35%23%1. Always2. Sometimes3. Seldom4. Never5. Depends who’s asking
    28. 28. New Guidance
    29. 29. Slide 30 of 39Next steps?1. 2. 3. 4. 5. 6.0%15% 15%23%31%15%Slide 23 of 271. Go back and say well done!2. Start a conversation withmanagement3. Re-write a few policies4. Monitor what’s in place already5. Get further support6. Point at the guy/gal over thereand say ‘his problem!’
    30. 30. Contact Jisc Legalinfo@jisclegal.ac.uk0141 548 4939www.jisclegal.ac.ukhttp://twitter.com/JiscLegal
    31. 31. 32Your questions
    32. 32. 33Jisc Legal is hosted by the University of Strathclyde,a charitable body, registered in Scotland,with registration number SC015263.This work, with the exception of logos, and any other content marked with aseparate copyright notice, is licensed under a Creative Commons Attribution 3.0Unported Licence. Attribution should be “© Jisc Legal – www.jisclegal.ac.uk –used under Creative Commons Attribution 3.0 Unported Licence” (with clickableURLs where possible). The use of logos in the work is licensed for use only onnon-derivative copies. Further information atwww.jisclegal.ac.uk/CopyrightPolicy.
    33. 33. http://www.slideshare.net/JISCLegal/130426-rsc-sw-byod-jmcThis presentationon Slideshare(or search forslideshare jisclegal)

    ×