Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.

Externally Hosted Web 2.0 Services


Published on

Chris Adie discusses issues impinging on HEI policy for the JISC Web 2.0 study

Published in: Business, Technology
  • Find coupons for your hosting. Get a promo deal before you purchase hosting
    Are you sure you want to  Yes  No
    Your message goes here
  • Be the first to like this

Externally Hosted Web 2.0 Services

  1. 1. Externally Hosted Web 2.0 Services What should the policy be? Chris Adie, Information Services, University of Edinburgh 3 May 2007
  2. 2. Outline <ul><li>Background </li></ul><ul><li>Legislative issues </li></ul><ul><li>University regulations </li></ul><ul><li>Service concerns </li></ul><ul><li>Risk management </li></ul><ul><li>Conclusions </li></ul>
  3. 3. Background <ul><li>What are Externally Hosted Web 2.0 Services? </li></ul><ul><li>Why use them? </li></ul><ul><li>Users want guidance </li></ul><ul><li>Development process for guidelines </li></ul><ul><li>Status of guidelines </li></ul><ul><li>What do they say? </li></ul>
  4. 4. Legislative issues <ul><li>Data Protection Act </li></ul><ul><ul><li>University-supplied information </li></ul></ul><ul><ul><li>Information supplied by the individual </li></ul></ul><ul><li>Freedom of Information Act </li></ul><ul><li>Disability Discrimination Acts </li></ul>
  5. 5. University regulations <ul><li>Assessment </li></ul><ul><li>Branding </li></ul><ul><li>Computing Regulations </li></ul>
  6. 6. Service concerns <ul><li>Security of service provider </li></ul><ul><li>Confidentiality </li></ul><ul><li>Data ownership </li></ul><ul><li>Data security </li></ul><ul><li>Performance </li></ul><ul><li>Reliability </li></ul><ul><li>Support </li></ul><ul><li>Single sign-on </li></ul><ul><li>Lock-in </li></ul><ul><li>Longevity </li></ul><ul><li>Functional stability </li></ul>
  7. 7. Risk management <ul><li>Risk register </li></ul><ul><ul><li>Probability, Impact, Mitigation, Early warning </li></ul></ul><ul><li>Template </li></ul><ul><ul><li>Some risks pre-populated </li></ul></ul><ul><li>Anticipated use </li></ul>
  8. 8. Conclusions <ul><li>Very early days, feeling our way </li></ul><ul><li>Important to establish feedback routes </li></ul><ul><li>Get users thinking about the risks without unnecessarily discouraging them! </li></ul><ul><li>Other things: </li></ul><ul><ul><li>External user access to internal Web 2.0 services </li></ul></ul>