Externally Hosted Web 2.0 Services

1,611 views

Published on

Chris Adie discusses issues impinging on HEI policy for the JISC Web 2.0 study

Published in: Business, Technology
1 Comment
0 Likes
Statistics
Notes
  • Find coupons for your hosting. Get a promo deal before you purchase hosting http://www.scriptcoupons.com/coupons/hosting/
       Reply 
    Are you sure you want to  Yes  No
    Your message goes here
  • Be the first to like this

No Downloads
Views
Total views
1,611
On SlideShare
0
From Embeds
0
Number of Embeds
40
Actions
Shares
0
Downloads
169
Comments
1
Likes
0
Embeds 0
No embeds

No notes for slide

Externally Hosted Web 2.0 Services

  1. 1. Externally Hosted Web 2.0 Services What should the policy be? Chris Adie, Information Services, University of Edinburgh 3 May 2007
  2. 2. Outline <ul><li>Background </li></ul><ul><li>Legislative issues </li></ul><ul><li>University regulations </li></ul><ul><li>Service concerns </li></ul><ul><li>Risk management </li></ul><ul><li>Conclusions </li></ul>
  3. 3. Background <ul><li>What are Externally Hosted Web 2.0 Services? </li></ul><ul><li>Why use them? </li></ul><ul><li>Users want guidance </li></ul><ul><li>Development process for guidelines </li></ul><ul><li>Status of guidelines </li></ul><ul><li>What do they say? </li></ul>
  4. 4. Legislative issues <ul><li>Data Protection Act </li></ul><ul><ul><li>University-supplied information </li></ul></ul><ul><ul><li>Information supplied by the individual </li></ul></ul><ul><li>Freedom of Information Act </li></ul><ul><li>Disability Discrimination Acts </li></ul>
  5. 5. University regulations <ul><li>Assessment </li></ul><ul><li>Branding </li></ul><ul><li>Computing Regulations </li></ul>
  6. 6. Service concerns <ul><li>Security of service provider </li></ul><ul><li>Confidentiality </li></ul><ul><li>Data ownership </li></ul><ul><li>Data security </li></ul><ul><li>Performance </li></ul><ul><li>Reliability </li></ul><ul><li>Support </li></ul><ul><li>Single sign-on </li></ul><ul><li>Lock-in </li></ul><ul><li>Longevity </li></ul><ul><li>Functional stability </li></ul>
  7. 7. Risk management <ul><li>Risk register </li></ul><ul><ul><li>Probability, Impact, Mitigation, Early warning </li></ul></ul><ul><li>Template </li></ul><ul><ul><li>Some risks pre-populated </li></ul></ul><ul><li>Anticipated use </li></ul>
  8. 8. Conclusions <ul><li>Very early days, feeling our way </li></ul><ul><li>Important to establish feedback routes </li></ul><ul><li>Get users thinking about the risks without unnecessarily discouraging them! </li></ul><ul><li>Other things: </li></ul><ul><ul><li>External user access to internal Web 2.0 services </li></ul></ul>

×