SlideShare a Scribd company logo
#altc
What about GDPR?
Martin Hawksey
@mhawksey
Please feel free to share photos of slides. Various copyright licences are used in this presentation for both content and images. If an image on
a slide has no CC attribution assume it is a copyrighted source. This presentation is shared as CC-BY mhawksey.
Presented at: ELESIG Scotland,
University of Dundee
26 November 2018
Slides go.alt.ac.uk/elesig-gdpr
“
alt.ac.uk
Join and interact via zeetings.com
You can follow slides and take part in polls by
going to:
zeetings.com/mhawksey
Accessing this talk via zeetings.com is optional.
Slides also available from go.alt.ac.uk/elesig-gdpr
alt.ac.uk3/46
Image: CC-BY-SA ALT
https://flic.kr/p/LpT8wt
Image: CC-BY-NC Chris Jones
https://flic.kr/p/bupUcB
Nota Lawyer
Disclaimer: I’m not a lawyer, or data
protection expert and I’m only sharing
my interpretation of information I’ve
gathered for your consideration and
does not constitute as legal advice.
alt.ac.uk
How familiar are you with GDPR?
A. First time I’ve heard about GDPR
B. Aware of GDPR
C. Know a bit about GDPR and key
principles
D. Know a lot about GDPR and key
principles
alt.ac.uk
What level of support have you had?
A. No support at all
B. Self-directed study
C. Taken mandatory training provided by
my institution
D. Been provided guidance by my Data
Protection Officer and/or support staff
alt.ac.uk
Overview
♢ Introduction
♢ GDPR
○ Definitions
○ Lawful basis
○ Accountability
♢ Working with GDPR
Data is the new nuclear
Data isn’t the new oil —
it’s the new nuclear power
James Bridle Image Copyright: Leonardo Santamaria
9/46
Image: CC-BY Selfdestination
https://flic.kr/p/gGZYKK
The General Data Protection
Regulation (GDPR) (EU) 2016/679
is a regulation in EU law on data
protection and privacy for all
individuals within the European
Union. It also addresses the
export of personal data outside
the EU. - Wikipedia
GDPR compliance isn’t just
required by EU based
organisations. Any ‘enterprise’
processing ‘personal data’ from
EU citizens needs to be GDPR
compliant or they can face
“penalties of up to 4% of
worldwide turnover or €20
million, whichever is higher”.
Image: CC-BY MoneyBlogNewz
https://flic.kr/p/9eXnSq
Non compliance penalties
12/4
6
Brexit? Image: CC-BY Duncan Hull
https://flic.kr/p/UzBs6j
Personal data Photo by h heyerlein on Unsplash
Personal data means any
information relating to an
identified or identifiable natural
person (‘data subject’); an
identifiable natural person is
one who can be identified,
directly or indirectly - Article 4(1)
Personal Data
14/46
Personal data that has been
pseudonymised – eg key-coded –
can fall within the scope of the
GDPR depending on how difficult
it is to attribute the pseudonym
to a particular individual. – UK
ICO Key Definitions
Personal Data
15/46
16
Image: CC-BY-SA Dennis van Zuijlekom
https://flic.kr/p/ApBi1X
Image: CC-BY-NC-ND Matthijs
https://flic.kr/p/89w39B
Access Erasure
Controller
Photo by Matthew Henry on Unsplash
Data Controller - A controller
determines the purposes and
means of processing personal
data. (e.g. your institution)
Data Processor - A processor is
responsible for processing
personal data on behalf of a
controller. (e.g. any 3rd party
your institution contracts that
can access personal data)
Data Controller/Processor
18/46
Processing Image: CC-BY mhawksey
https://flic.kr/p/qbMRze
'processing' means any operation or set of
operations which is performed on personal data or
on sets of personal data, whether or not by
automated means, such as collection, recording,
organisation, structuring, storage, adaptation or
alteration, retrieval, consultation, use,
disclosure by transmission, dissemination or
otherwise making available, alignment or
combination, restriction, erasure or destruction;
-Article 4(2)
Processing
20/46
● Lawfulness, fairness and transparency
● Purpose limitation
● Data minimisation
● Accuracy
● Storage limitation
● Integrity and confidentiality (security)
● Accountability
GDPR Key Principles
21/46
22 Image: CC-BY-NC-ND Maia Weinstock
https://flic.kr/p/r7yWg2
Lawfulness
1. Consent
2. Contract
3. Legal obligation
4. Vital interests
5. Public task
6. Legitimate interests
Lawful basis
23/46
24 Photo by Ho Hyou on Unsplash
Samples
Photo by Gift Habeshaw on Unsplash
Consent
Copyright 2018 © Moodle Pty Ltd - CC SA - support@moodle.com
Digital age of consent
● Age and location check to
identify minors
(part of recent point
release)
● Default age of digital
consent is 16 years old
● Can specify countries with
other age requirements
● If the user is considered a
minor they will be asked
to contact the site admin
Copyright 2018 © Moodle Pty Ltd - CC SA - support@moodle.com
Policy Plugin
● If the user is above the
age of consent they will
be shown the policy
pages
● Ability to set policies for:
○ Site
○ Privacy
○ 3rd parties
● Policies are shown one
at time
Copyright 2018 © Moodle Pty Ltd - CC SA - support@moodle.com
Policy Plugin
● The Consent page lists a
summary of each policy
● The user is asked to
specifically agree to each
policy
● When the user agrees to
the policies they will be
taken to the standard user
registration form
Copyright 2018 © Moodle Pty Ltd - CC SA - support@moodle.com
Policy Plugin
● Overview of user
consents for the site
admin or privacy officer
● Ability to filter to a
specific policy to
determine who
consented at what time
● Ability to manually
consent on behalf of
users
Photo by Cytonn Photography on Unsplash
Contract
https://www.perth.uhi.ac.uk/t4-media/one-web/perth/about-us/policies-regulations-and-guidelines/Studen
t-Records---Higher-Education---Privacy-Notices.pdf
Image: CC-BY-SA Tim Evanson
https://flic.kr/p/bpBg2y
Legitimate Interests
https://www.ed.ac.uk/information-services/learning-technology/media-hopper-replay/privacy-statement
“
alt.ac.uk
● Lawful basis: We’re using legitimate interests of the University in providing the service to its
staff and students as the lawful basis for processing personal data within the Media Hopper
Replay service. The Data protection Officer and lawyers were very clear that this is the
appropriate basis (and that the consent lawful basis would actually not be appropriate for a
number of reasons, including ensuring consent is freely given, given the power imbalance
between the University and either a member of staff or a student, and some of the implications
for implementing any withdrawal of consent once a recording has been made.
Photo by Michael D Beckwith on Unsplash
Accountability
The processor shall not engage
another processor without prior
specific or general written
authorisation of the controller -
Article 28(2)
Processor
36/46
37
The following examples are provided by
Salman Usman (Academic E-learning
Developer) Kingston University London. You
are welcome to re-use/re-purpose these but
you will need to check with your Data
Protection Officer or equivalent first.
The personal data Padlet holds is staff account details for Padlet
and students placing their name or university ID in their Padlet
posts for the lecturer to identify them. In order to make the use
of Padlet mandatory for students and avoid the need for
students to sign a consent form, staff should undertake the
following measures:
● Staff should not use their KU email account and password
when creating an account with Padlet
● Password-protect the Padlet staff are using with their
students
● In their Padlet posts students should only include arbitrary
identifiers that are only known to the lecturer. Staff need to
store the mapping between student name/ university ID and
their identifier securely on university network drive.
Provided by: Salman Usman,Kingston University London
The personal data PeerWise holds is staff account details for
PeerWise and student identifier, username, password and email
address. In order to make the use of PeerWise mandatory for
students and avoid the need for students to sign a consent form,
staff should undertake the following measures:
● Although it is a requirement to provide KU email address, staff
should not use their KU email password when creating an
account with PeerWise
● Student identifiers provided to PeerWise should not be their
name, university ID or anything else that can identify them.
Instead, provide an arbitrary identifier for each student and
store the mapping of students’ university ID and their arbitrary
PeerWise identifiers securely on university network drive.
● Ask students that when setting up accounts, not to choose a
username that identifies them, not to use university password
for their PeerWise account password, and not to provide their
email address (which is optional anyway).
Provided by: Salman Usman,Kingston University London
The personal data that TEAMMATES holds is staff account details for
TEAMMATES, student KU email, feedback that students give to their peers and
receive from their lecturers and peers. In order to minimise risks associated
with using this tool, staff should undertake the following measures:
● The use of TEAMMATES should not be mandatory as it is not possible to
use it without providing students’ personal data.
● Staff and other members of teaching team should be made aware that
the tool is not supported by the university and that there may be risks
associated with handling of personal data. To this end, students need to
sign a consent form. Those students who wish to opt out should be
provided an alternative method to participate and it should not
disadvantage those that choose this method.
● Ensure that peer feedback is given anonymously to all group members (by
choosing appropriate settings)
● Staff should not use their KU email address and password when creating
Google account to use with TEAMMATES
● Delete all data after end of academic term
Provided by: Salman Usman,Kingston University London
Photo by Clem Onojeghuo on Unsplash
alt.ac.ukPhoto by rawpixel on Unsplash
No data processing agreement...
● Supported alternatives
● Make optional
● Obscure identity
● Limit functionality
CC-BY-SA miss Murasaki
https://flic.kr/p/bCafgG
Paws
Thank you
Salman Usman and ALT-MEMBERS
Slides go.alt.ac.uk/elesig-gdpr
@A_L_T/@mhawksey
Association for Learning Technology
Registered charity number: 1160039
www.alt.ac.uk @A_L_T

More Related Content

What's hot

GDPR Introduction and overview
GDPR Introduction and overviewGDPR Introduction and overview
GDPR Introduction and overview
Jane Lambert
 
General Data Protection Regulation (GDPR)
General Data Protection Regulation (GDPR) General Data Protection Regulation (GDPR)
General Data Protection Regulation (GDPR)
Kimberly Simon MBA
 
GDPR
GDPRGDPR
GDPR
Gopi PD
 
GDPR and Security.pdf
GDPR and Security.pdfGDPR and Security.pdf
GDPR and Personal Data Transfers 1.1.pdf
GDPR and Personal Data Transfers 1.1.pdfGDPR and Personal Data Transfers 1.1.pdf
GDPR and Personal Data Transfers 1.1.pdf
Andrey Prozorov, CISM, CIPP/E, CDPSE. LA 27001
 
GDPR Demystified
GDPR DemystifiedGDPR Demystified
GDPR Demystified
SPIN Chennai
 
GDPR for Dummies
GDPR for DummiesGDPR for Dummies
GDPR for Dummies
Caroline Boscher
 
Presentation on GDPR
Presentation on GDPRPresentation on GDPR
Presentation on GDPR
DipanjanDey12
 
GDPR training
GDPR training GDPR training
GDPR training
ASL
 
Le GDPR (General Data Protection Regulation) - Diaporama
Le GDPR (General Data Protection Regulation) - DiaporamaLe GDPR (General Data Protection Regulation) - Diaporama
Le GDPR (General Data Protection Regulation) - Diaporama
Jean-Michel Tyszka
 
Legal obligations and responsibilities of data processors and controllers und...
Legal obligations and responsibilities of data processors and controllers und...Legal obligations and responsibilities of data processors and controllers und...
Legal obligations and responsibilities of data processors and controllers und...
IT Governance Ltd
 
GDPR infographic
GDPR infographicGDPR infographic
Introduction to GDPR
Introduction to GDPRIntroduction to GDPR
Introduction to GDPR
Priyab Satoshi
 
Gdpr presentation
Gdpr presentationGdpr presentation
Gdpr presentation
Iain Wicks MCIPR
 
International Data Transfer Update
International Data Transfer UpdateInternational Data Transfer Update
International Data Transfer Update
TrustArc
 
Data protection
Data protectionData protection
Data protection
RaviPrashant5
 
UK GDPR: What New Direction?
UK GDPR:  What New Direction?UK GDPR:  What New Direction?
UK GDPR: What New Direction?
David Erdos
 
Présentation RGPD/GDPR 2018
Présentation RGPD/GDPR 2018Présentation RGPD/GDPR 2018
Présentation RGPD/GDPR 2018
Pierre Ammeloot
 
[Presentation] GDPR - How to Ensure Compliance
[Presentation] GDPR - How to Ensure Compliance[Presentation] GDPR - How to Ensure Compliance
[Presentation] GDPR - How to Ensure Compliance
AIIM International
 
Privacy & Data Protection in the Digital World
Privacy & Data Protection in the Digital WorldPrivacy & Data Protection in the Digital World
Privacy & Data Protection in the Digital World
Arab Federation for Digital Economy
 

What's hot (20)

GDPR Introduction and overview
GDPR Introduction and overviewGDPR Introduction and overview
GDPR Introduction and overview
 
General Data Protection Regulation (GDPR)
General Data Protection Regulation (GDPR) General Data Protection Regulation (GDPR)
General Data Protection Regulation (GDPR)
 
GDPR
GDPRGDPR
GDPR
 
GDPR and Security.pdf
GDPR and Security.pdfGDPR and Security.pdf
GDPR and Security.pdf
 
GDPR and Personal Data Transfers 1.1.pdf
GDPR and Personal Data Transfers 1.1.pdfGDPR and Personal Data Transfers 1.1.pdf
GDPR and Personal Data Transfers 1.1.pdf
 
GDPR Demystified
GDPR DemystifiedGDPR Demystified
GDPR Demystified
 
GDPR for Dummies
GDPR for DummiesGDPR for Dummies
GDPR for Dummies
 
Presentation on GDPR
Presentation on GDPRPresentation on GDPR
Presentation on GDPR
 
GDPR training
GDPR training GDPR training
GDPR training
 
Le GDPR (General Data Protection Regulation) - Diaporama
Le GDPR (General Data Protection Regulation) - DiaporamaLe GDPR (General Data Protection Regulation) - Diaporama
Le GDPR (General Data Protection Regulation) - Diaporama
 
Legal obligations and responsibilities of data processors and controllers und...
Legal obligations and responsibilities of data processors and controllers und...Legal obligations and responsibilities of data processors and controllers und...
Legal obligations and responsibilities of data processors and controllers und...
 
GDPR infographic
GDPR infographicGDPR infographic
GDPR infographic
 
Introduction to GDPR
Introduction to GDPRIntroduction to GDPR
Introduction to GDPR
 
Gdpr presentation
Gdpr presentationGdpr presentation
Gdpr presentation
 
International Data Transfer Update
International Data Transfer UpdateInternational Data Transfer Update
International Data Transfer Update
 
Data protection
Data protectionData protection
Data protection
 
UK GDPR: What New Direction?
UK GDPR:  What New Direction?UK GDPR:  What New Direction?
UK GDPR: What New Direction?
 
Présentation RGPD/GDPR 2018
Présentation RGPD/GDPR 2018Présentation RGPD/GDPR 2018
Présentation RGPD/GDPR 2018
 
[Presentation] GDPR - How to Ensure Compliance
[Presentation] GDPR - How to Ensure Compliance[Presentation] GDPR - How to Ensure Compliance
[Presentation] GDPR - How to Ensure Compliance
 
Privacy & Data Protection in the Digital World
Privacy & Data Protection in the Digital WorldPrivacy & Data Protection in the Digital World
Privacy & Data Protection in the Digital World
 

Similar to What about GDPR?

Digital Credentials Enabling Mobility and Verification of Educational Achieve...
Digital Credentials Enabling Mobility and Verification of Educational Achieve...Digital Credentials Enabling Mobility and Verification of Educational Achieve...
Digital Credentials Enabling Mobility and Verification of Educational Achieve...
Brandon Muramatsu
 
TEduChain: A Platform for Crowdsourcing Tertiary Education Fund using Blockch...
TEduChain: A Platform for Crowdsourcing Tertiary Education Fund using Blockch...TEduChain: A Platform for Crowdsourcing Tertiary Education Fund using Blockch...
TEduChain: A Platform for Crowdsourcing Tertiary Education Fund using Blockch...
eraser Juan José Calderón
 
Access Lab 2020: Saying ‘no’ the publisher’s personal data gathering – our ex...
Access Lab 2020: Saying ‘no’ the publisher’s personal data gathering – our ex...Access Lab 2020: Saying ‘no’ the publisher’s personal data gathering – our ex...
Access Lab 2020: Saying ‘no’ the publisher’s personal data gathering – our ex...
OpenAthens
 
Cyber security privacy-and-blockchain-perspective-14 nov2018-v01-public
Cyber security privacy-and-blockchain-perspective-14 nov2018-v01-publicCyber security privacy-and-blockchain-perspective-14 nov2018-v01-public
Cyber security privacy-and-blockchain-perspective-14 nov2018-v01-public
Secunoid Systems Inc
 
Smoothwall and Ampliphae - Networkshop46
Smoothwall and Ampliphae - Networkshop46Smoothwall and Ampliphae - Networkshop46
Smoothwall and Ampliphae - Networkshop46
Jisc
 
Uhmlg2011
Uhmlg2011Uhmlg2011
Uhmlg2011
SuzanneHardy
 
Rules, regulations and recommendations on social media in HE
Rules, regulations and recommendations on social media in HERules, regulations and recommendations on social media in HE
Rules, regulations and recommendations on social media in HE
Inger-Marie Christensen
 
Academic Integrity and Identity In Online Learning
Academic Integrity and Identity In Online LearningAcademic Integrity and Identity In Online Learning
Academic Integrity and Identity In Online Learning
Jason Rhode
 
GUL Network Infrastructure
GUL Network InfrastructureGUL Network Infrastructure
GUL Network InfrastructureMuhammad Zeeshan
 
National Volunteering Forum: May18
National Volunteering Forum: May18National Volunteering Forum: May18
National Volunteering Forum: May18
NCVO - National Council for Voluntary Organisations
 
Privacy and Data Security | Data Collection | Social Media
Privacy and Data Security | Data Collection | Social MediaPrivacy and Data Security | Data Collection | Social Media
Privacy and Data Security | Data Collection | Social Media
devbhargav1
 
SEC440: Incident Response Plan
SEC440: Incident Response PlanSEC440: Incident Response Plan
SEC440: Incident Response Plan
Thomas Christopher Ty
 
Social networking risks
Social networking risksSocial networking risks
Social networking risks
Padma Kannan
 
Develop a logic model for the formative evaluation of a new progra
Develop a logic model for the formative evaluation of a new prograDevelop a logic model for the formative evaluation of a new progra
Develop a logic model for the formative evaluation of a new progra
LinaCovington707
 
Emerging Trends in Information Security and Privacy
Emerging Trends in Information Security and PrivacyEmerging Trends in Information Security and Privacy
Emerging Trends in Information Security and Privacy
lgcdcpas
 
IRJET- Secure Social Network using Text Mining
IRJET- Secure Social Network using Text MiningIRJET- Secure Social Network using Text Mining
IRJET- Secure Social Network using Text Mining
IRJET Journal
 
B9_21_子供のプライバシー対策に必要なもの Speakers' slide deck for Privacy By Design Conference...
B9_21_子供のプライバシー対策に必要なもの Speakers' slide deck for Privacy By Design Conference...B9_21_子供のプライバシー対策に必要なもの Speakers' slide deck for Privacy By Design Conference...
B9_21_子供のプライバシー対策に必要なもの Speakers' slide deck for Privacy By Design Conference...
Keiko Tanaka
 
Implementing and Auditing General Data Protection Regulation
Implementing and Auditing General Data Protection Regulation Implementing and Auditing General Data Protection Regulation
Implementing and Auditing General Data Protection Regulation
Jim Kaplan CIA CFE
 
Cch social media risk audit control october 29, 2013
Cch social media risk audit control october 29, 2013Cch social media risk audit control october 29, 2013
Cch social media risk audit control october 29, 2013
Jim Kaplan CIA CFE
 

Similar to What about GDPR? (20)

Digital Credentials Enabling Mobility and Verification of Educational Achieve...
Digital Credentials Enabling Mobility and Verification of Educational Achieve...Digital Credentials Enabling Mobility and Verification of Educational Achieve...
Digital Credentials Enabling Mobility and Verification of Educational Achieve...
 
TEduChain: A Platform for Crowdsourcing Tertiary Education Fund using Blockch...
TEduChain: A Platform for Crowdsourcing Tertiary Education Fund using Blockch...TEduChain: A Platform for Crowdsourcing Tertiary Education Fund using Blockch...
TEduChain: A Platform for Crowdsourcing Tertiary Education Fund using Blockch...
 
Access Lab 2020: Saying ‘no’ the publisher’s personal data gathering – our ex...
Access Lab 2020: Saying ‘no’ the publisher’s personal data gathering – our ex...Access Lab 2020: Saying ‘no’ the publisher’s personal data gathering – our ex...
Access Lab 2020: Saying ‘no’ the publisher’s personal data gathering – our ex...
 
Cyber security privacy-and-blockchain-perspective-14 nov2018-v01-public
Cyber security privacy-and-blockchain-perspective-14 nov2018-v01-publicCyber security privacy-and-blockchain-perspective-14 nov2018-v01-public
Cyber security privacy-and-blockchain-perspective-14 nov2018-v01-public
 
Neo revised
Neo revisedNeo revised
Neo revised
 
Smoothwall and Ampliphae - Networkshop46
Smoothwall and Ampliphae - Networkshop46Smoothwall and Ampliphae - Networkshop46
Smoothwall and Ampliphae - Networkshop46
 
Uhmlg2011
Uhmlg2011Uhmlg2011
Uhmlg2011
 
Rules, regulations and recommendations on social media in HE
Rules, regulations and recommendations on social media in HERules, regulations and recommendations on social media in HE
Rules, regulations and recommendations on social media in HE
 
Academic Integrity and Identity In Online Learning
Academic Integrity and Identity In Online LearningAcademic Integrity and Identity In Online Learning
Academic Integrity and Identity In Online Learning
 
GUL Network Infrastructure
GUL Network InfrastructureGUL Network Infrastructure
GUL Network Infrastructure
 
National Volunteering Forum: May18
National Volunteering Forum: May18National Volunteering Forum: May18
National Volunteering Forum: May18
 
Privacy and Data Security | Data Collection | Social Media
Privacy and Data Security | Data Collection | Social MediaPrivacy and Data Security | Data Collection | Social Media
Privacy and Data Security | Data Collection | Social Media
 
SEC440: Incident Response Plan
SEC440: Incident Response PlanSEC440: Incident Response Plan
SEC440: Incident Response Plan
 
Social networking risks
Social networking risksSocial networking risks
Social networking risks
 
Develop a logic model for the formative evaluation of a new progra
Develop a logic model for the formative evaluation of a new prograDevelop a logic model for the formative evaluation of a new progra
Develop a logic model for the formative evaluation of a new progra
 
Emerging Trends in Information Security and Privacy
Emerging Trends in Information Security and PrivacyEmerging Trends in Information Security and Privacy
Emerging Trends in Information Security and Privacy
 
IRJET- Secure Social Network using Text Mining
IRJET- Secure Social Network using Text MiningIRJET- Secure Social Network using Text Mining
IRJET- Secure Social Network using Text Mining
 
B9_21_子供のプライバシー対策に必要なもの Speakers' slide deck for Privacy By Design Conference...
B9_21_子供のプライバシー対策に必要なもの Speakers' slide deck for Privacy By Design Conference...B9_21_子供のプライバシー対策に必要なもの Speakers' slide deck for Privacy By Design Conference...
B9_21_子供のプライバシー対策に必要なもの Speakers' slide deck for Privacy By Design Conference...
 
Implementing and Auditing General Data Protection Regulation
Implementing and Auditing General Data Protection Regulation Implementing and Auditing General Data Protection Regulation
Implementing and Auditing General Data Protection Regulation
 
Cch social media risk audit control october 29, 2013
Cch social media risk audit control october 29, 2013Cch social media risk audit control october 29, 2013
Cch social media risk audit control october 29, 2013
 

More from Martin Hawksey

Twitter in Education: Interactively exploring the conversation with TAGS and ...
Twitter in Education: Interactively exploring the conversation with TAGS and ...Twitter in Education: Interactively exploring the conversation with TAGS and ...
Twitter in Education: Interactively exploring the conversation with TAGS and ...
Martin Hawksey
 
TEL Quality and Innovation: What can be learned from the history of computer ...
TEL Quality and Innovation: What can be learned from the history of computer ...TEL Quality and Innovation: What can be learned from the history of computer ...
TEL Quality and Innovation: What can be learned from the history of computer ...
Martin Hawksey
 
Making the complex less complicated: An introduction to social network analysis
Making the complex less complicated: An introduction to social network analysisMaking the complex less complicated: An introduction to social network analysis
Making the complex less complicated: An introduction to social network analysis
Martin Hawksey
 
Measuring Social Media Impact: Google Analytics and Twitter
Measuring Social Media Impact: Google Analytics and TwitterMeasuring Social Media Impact: Google Analytics and Twitter
Measuring Social Media Impact: Google Analytics and Twitter
Martin Hawksey
 
Google Apps Script the Authentic{ated} Mobile Playground
Google Apps Script the Authentic{ated} Mobile PlaygroundGoogle Apps Script the Authentic{ated} Mobile Playground
Google Apps Script the Authentic{ated} Mobile Playground
Martin Hawksey
 
Using CiviCRM in Google Drive with the new CiviService Google Script Library
Using CiviCRM in Google Drive with the new CiviService Google Script LibraryUsing CiviCRM in Google Drive with the new CiviService Google Script Library
Using CiviCRM in Google Drive with the new CiviService Google Script Library
Martin Hawksey
 
Google Analytics Workout (#IWMW16)
Google Analytics Workout (#IWMW16)Google Analytics Workout (#IWMW16)
Google Analytics Workout (#IWMW16)
Martin Hawksey
 
Extracting and analyzing discussion data with google sheets and google analytics
Extracting and analyzing discussion data with google sheets and google analyticsExtracting and analyzing discussion data with google sheets and google analytics
Extracting and analyzing discussion data with google sheets and google analytics
Martin Hawksey
 
Using WordPress as a badge platform #openbadgesHE
Using WordPress as a badge platform #openbadgesHEUsing WordPress as a badge platform #openbadgesHE
Using WordPress as a badge platform #openbadgesHE
Martin Hawksey
 
Looking at creativity and culture in computer science to inspire better educa...
Looking at creativity and culture in computer science to inspire better educa...Looking at creativity and culture in computer science to inspire better educa...
Looking at creativity and culture in computer science to inspire better educa...
Martin Hawksey
 
Google Apps Script: The authentic{ated} playground [2015 Ed.]
Google Apps Script: The authentic{ated} playground [2015 Ed.]Google Apps Script: The authentic{ated} playground [2015 Ed.]
Google Apps Script: The authentic{ated} playground [2015 Ed.]
Martin Hawksey
 
Creating personal tutoring environments with Google Apps Script
Creating personal tutoring environments with Google Apps ScriptCreating personal tutoring environments with Google Apps Script
Creating personal tutoring environments with Google Apps Script
Martin Hawksey
 
Learning analytics gaining good actionable insight
Learning analytics   gaining good actionable insightLearning analytics   gaining good actionable insight
Learning analytics gaining good actionable insight
Martin Hawksey
 
Custom reporting from CiviCRM with Google Sheets
Custom reporting from CiviCRM with Google SheetsCustom reporting from CiviCRM with Google Sheets
Custom reporting from CiviCRM with Google Sheets
Martin Hawksey
 
Learning analytics: Threats and opportunities
Learning analytics: Threats and opportunitiesLearning analytics: Threats and opportunities
Learning analytics: Threats and opportunities
Martin Hawksey
 
Google Apps Script: The Authentic{ated} Playground
Google Apps Script: The Authentic{ated} PlaygroundGoogle Apps Script: The Authentic{ated} Playground
Google Apps Script: The Authentic{ated} Playground
Martin Hawksey
 
Breaking the Cell #WebExpo
Breaking the Cell #WebExpo  Breaking the Cell #WebExpo
Breaking the Cell #WebExpo
Martin Hawksey
 
Open Badges in Open Education – Do They Count? #eas14
Open Badges in Open Education – Do They Count? #eas14Open Badges in Open Education – Do They Count? #eas14
Open Badges in Open Education – Do They Count? #eas14
Martin Hawksey
 
ocTEL and Open Badges #altc
ocTEL and Open Badges #altcocTEL and Open Badges #altc
ocTEL and Open Badges #altc
Martin Hawksey
 
IWMW14: Hyper-connectED (ocTEL, Open Badges and the Personal Knowledge Graph)
IWMW14: Hyper-connectED (ocTEL, Open Badges and the Personal Knowledge Graph)IWMW14: Hyper-connectED (ocTEL, Open Badges and the Personal Knowledge Graph)
IWMW14: Hyper-connectED (ocTEL, Open Badges and the Personal Knowledge Graph)
Martin Hawksey
 

More from Martin Hawksey (20)

Twitter in Education: Interactively exploring the conversation with TAGS and ...
Twitter in Education: Interactively exploring the conversation with TAGS and ...Twitter in Education: Interactively exploring the conversation with TAGS and ...
Twitter in Education: Interactively exploring the conversation with TAGS and ...
 
TEL Quality and Innovation: What can be learned from the history of computer ...
TEL Quality and Innovation: What can be learned from the history of computer ...TEL Quality and Innovation: What can be learned from the history of computer ...
TEL Quality and Innovation: What can be learned from the history of computer ...
 
Making the complex less complicated: An introduction to social network analysis
Making the complex less complicated: An introduction to social network analysisMaking the complex less complicated: An introduction to social network analysis
Making the complex less complicated: An introduction to social network analysis
 
Measuring Social Media Impact: Google Analytics and Twitter
Measuring Social Media Impact: Google Analytics and TwitterMeasuring Social Media Impact: Google Analytics and Twitter
Measuring Social Media Impact: Google Analytics and Twitter
 
Google Apps Script the Authentic{ated} Mobile Playground
Google Apps Script the Authentic{ated} Mobile PlaygroundGoogle Apps Script the Authentic{ated} Mobile Playground
Google Apps Script the Authentic{ated} Mobile Playground
 
Using CiviCRM in Google Drive with the new CiviService Google Script Library
Using CiviCRM in Google Drive with the new CiviService Google Script LibraryUsing CiviCRM in Google Drive with the new CiviService Google Script Library
Using CiviCRM in Google Drive with the new CiviService Google Script Library
 
Google Analytics Workout (#IWMW16)
Google Analytics Workout (#IWMW16)Google Analytics Workout (#IWMW16)
Google Analytics Workout (#IWMW16)
 
Extracting and analyzing discussion data with google sheets and google analytics
Extracting and analyzing discussion data with google sheets and google analyticsExtracting and analyzing discussion data with google sheets and google analytics
Extracting and analyzing discussion data with google sheets and google analytics
 
Using WordPress as a badge platform #openbadgesHE
Using WordPress as a badge platform #openbadgesHEUsing WordPress as a badge platform #openbadgesHE
Using WordPress as a badge platform #openbadgesHE
 
Looking at creativity and culture in computer science to inspire better educa...
Looking at creativity and culture in computer science to inspire better educa...Looking at creativity and culture in computer science to inspire better educa...
Looking at creativity and culture in computer science to inspire better educa...
 
Google Apps Script: The authentic{ated} playground [2015 Ed.]
Google Apps Script: The authentic{ated} playground [2015 Ed.]Google Apps Script: The authentic{ated} playground [2015 Ed.]
Google Apps Script: The authentic{ated} playground [2015 Ed.]
 
Creating personal tutoring environments with Google Apps Script
Creating personal tutoring environments with Google Apps ScriptCreating personal tutoring environments with Google Apps Script
Creating personal tutoring environments with Google Apps Script
 
Learning analytics gaining good actionable insight
Learning analytics   gaining good actionable insightLearning analytics   gaining good actionable insight
Learning analytics gaining good actionable insight
 
Custom reporting from CiviCRM with Google Sheets
Custom reporting from CiviCRM with Google SheetsCustom reporting from CiviCRM with Google Sheets
Custom reporting from CiviCRM with Google Sheets
 
Learning analytics: Threats and opportunities
Learning analytics: Threats and opportunitiesLearning analytics: Threats and opportunities
Learning analytics: Threats and opportunities
 
Google Apps Script: The Authentic{ated} Playground
Google Apps Script: The Authentic{ated} PlaygroundGoogle Apps Script: The Authentic{ated} Playground
Google Apps Script: The Authentic{ated} Playground
 
Breaking the Cell #WebExpo
Breaking the Cell #WebExpo  Breaking the Cell #WebExpo
Breaking the Cell #WebExpo
 
Open Badges in Open Education – Do They Count? #eas14
Open Badges in Open Education – Do They Count? #eas14Open Badges in Open Education – Do They Count? #eas14
Open Badges in Open Education – Do They Count? #eas14
 
ocTEL and Open Badges #altc
ocTEL and Open Badges #altcocTEL and Open Badges #altc
ocTEL and Open Badges #altc
 
IWMW14: Hyper-connectED (ocTEL, Open Badges and the Personal Knowledge Graph)
IWMW14: Hyper-connectED (ocTEL, Open Badges and the Personal Knowledge Graph)IWMW14: Hyper-connectED (ocTEL, Open Badges and the Personal Knowledge Graph)
IWMW14: Hyper-connectED (ocTEL, Open Badges and the Personal Knowledge Graph)
 

Recently uploaded

Francesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptxFrancesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptx
EduSkills OECD
 
Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
Thiyagu K
 
Supporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptxSupporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptx
Jisc
 
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdfUnit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Thiyagu K
 
Synthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptxSynthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptx
Pavel ( NSTU)
 
2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...
Sandy Millin
 
The geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideasThe geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideas
GeoBlogs
 
Instructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptxInstructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptx
Jheel Barad
 
Polish students' mobility in the Czech Republic
Polish students' mobility in the Czech RepublicPolish students' mobility in the Czech Republic
Polish students' mobility in the Czech Republic
Anna Sz.
 
The basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptxThe basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptx
heathfieldcps1
 
Additional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdfAdditional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdf
joachimlavalley1
 
Language Across the Curriculm LAC B.Ed.
Language Across the  Curriculm LAC B.Ed.Language Across the  Curriculm LAC B.Ed.
Language Across the Curriculm LAC B.Ed.
Atul Kumar Singh
 
How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17
Celine George
 
Home assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdfHome assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdf
Tamralipta Mahavidyalaya
 
Chapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptxChapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptx
Mohd Adib Abd Muin, Senior Lecturer at Universiti Utara Malaysia
 
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup   New Member Orientation and Q&A (May 2024).pdfWelcome to TechSoup   New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
TechSoup
 
Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.
Ashokrao Mane college of Pharmacy Peth-Vadgaon
 
CACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdfCACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdf
camakaiclarkmusic
 
special B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdfspecial B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdf
Special education needs
 
Embracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic ImperativeEmbracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic Imperative
Peter Windle
 

Recently uploaded (20)

Francesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptxFrancesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptx
 
Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
 
Supporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptxSupporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptx
 
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdfUnit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdf
 
Synthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptxSynthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptx
 
2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...
 
The geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideasThe geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideas
 
Instructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptxInstructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptx
 
Polish students' mobility in the Czech Republic
Polish students' mobility in the Czech RepublicPolish students' mobility in the Czech Republic
Polish students' mobility in the Czech Republic
 
The basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptxThe basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptx
 
Additional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdfAdditional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdf
 
Language Across the Curriculm LAC B.Ed.
Language Across the  Curriculm LAC B.Ed.Language Across the  Curriculm LAC B.Ed.
Language Across the Curriculm LAC B.Ed.
 
How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17
 
Home assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdfHome assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdf
 
Chapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptxChapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptx
 
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup   New Member Orientation and Q&A (May 2024).pdfWelcome to TechSoup   New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
 
Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.
 
CACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdfCACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdf
 
special B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdfspecial B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdf
 
Embracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic ImperativeEmbracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic Imperative
 

What about GDPR?

  • 1. #altc What about GDPR? Martin Hawksey @mhawksey Please feel free to share photos of slides. Various copyright licences are used in this presentation for both content and images. If an image on a slide has no CC attribution assume it is a copyrighted source. This presentation is shared as CC-BY mhawksey. Presented at: ELESIG Scotland, University of Dundee 26 November 2018 Slides go.alt.ac.uk/elesig-gdpr
  • 2. “ alt.ac.uk Join and interact via zeetings.com You can follow slides and take part in polls by going to: zeetings.com/mhawksey Accessing this talk via zeetings.com is optional. Slides also available from go.alt.ac.uk/elesig-gdpr
  • 4. Image: CC-BY-NC Chris Jones https://flic.kr/p/bupUcB
  • 5. Nota Lawyer Disclaimer: I’m not a lawyer, or data protection expert and I’m only sharing my interpretation of information I’ve gathered for your consideration and does not constitute as legal advice.
  • 6. alt.ac.uk How familiar are you with GDPR? A. First time I’ve heard about GDPR B. Aware of GDPR C. Know a bit about GDPR and key principles D. Know a lot about GDPR and key principles
  • 7. alt.ac.uk What level of support have you had? A. No support at all B. Self-directed study C. Taken mandatory training provided by my institution D. Been provided guidance by my Data Protection Officer and/or support staff
  • 8. alt.ac.uk Overview ♢ Introduction ♢ GDPR ○ Definitions ○ Lawful basis ○ Accountability ♢ Working with GDPR
  • 9. Data is the new nuclear Data isn’t the new oil — it’s the new nuclear power James Bridle Image Copyright: Leonardo Santamaria 9/46
  • 10. Image: CC-BY Selfdestination https://flic.kr/p/gGZYKK The General Data Protection Regulation (GDPR) (EU) 2016/679 is a regulation in EU law on data protection and privacy for all individuals within the European Union. It also addresses the export of personal data outside the EU. - Wikipedia
  • 11. GDPR compliance isn’t just required by EU based organisations. Any ‘enterprise’ processing ‘personal data’ from EU citizens needs to be GDPR compliant or they can face “penalties of up to 4% of worldwide turnover or €20 million, whichever is higher”. Image: CC-BY MoneyBlogNewz https://flic.kr/p/9eXnSq Non compliance penalties
  • 12. 12/4 6 Brexit? Image: CC-BY Duncan Hull https://flic.kr/p/UzBs6j
  • 13. Personal data Photo by h heyerlein on Unsplash
  • 14. Personal data means any information relating to an identified or identifiable natural person (‘data subject’); an identifiable natural person is one who can be identified, directly or indirectly - Article 4(1) Personal Data 14/46
  • 15. Personal data that has been pseudonymised – eg key-coded – can fall within the scope of the GDPR depending on how difficult it is to attribute the pseudonym to a particular individual. – UK ICO Key Definitions Personal Data 15/46
  • 16. 16 Image: CC-BY-SA Dennis van Zuijlekom https://flic.kr/p/ApBi1X Image: CC-BY-NC-ND Matthijs https://flic.kr/p/89w39B Access Erasure
  • 17. Controller Photo by Matthew Henry on Unsplash
  • 18. Data Controller - A controller determines the purposes and means of processing personal data. (e.g. your institution) Data Processor - A processor is responsible for processing personal data on behalf of a controller. (e.g. any 3rd party your institution contracts that can access personal data) Data Controller/Processor 18/46
  • 19. Processing Image: CC-BY mhawksey https://flic.kr/p/qbMRze
  • 20. 'processing' means any operation or set of operations which is performed on personal data or on sets of personal data, whether or not by automated means, such as collection, recording, organisation, structuring, storage, adaptation or alteration, retrieval, consultation, use, disclosure by transmission, dissemination or otherwise making available, alignment or combination, restriction, erasure or destruction; -Article 4(2) Processing 20/46
  • 21. ● Lawfulness, fairness and transparency ● Purpose limitation ● Data minimisation ● Accuracy ● Storage limitation ● Integrity and confidentiality (security) ● Accountability GDPR Key Principles 21/46
  • 22. 22 Image: CC-BY-NC-ND Maia Weinstock https://flic.kr/p/r7yWg2 Lawfulness
  • 23. 1. Consent 2. Contract 3. Legal obligation 4. Vital interests 5. Public task 6. Legitimate interests Lawful basis 23/46
  • 24. 24 Photo by Ho Hyou on Unsplash Samples
  • 25. Photo by Gift Habeshaw on Unsplash Consent
  • 26. Copyright 2018 © Moodle Pty Ltd - CC SA - support@moodle.com Digital age of consent ● Age and location check to identify minors (part of recent point release) ● Default age of digital consent is 16 years old ● Can specify countries with other age requirements ● If the user is considered a minor they will be asked to contact the site admin
  • 27. Copyright 2018 © Moodle Pty Ltd - CC SA - support@moodle.com Policy Plugin ● If the user is above the age of consent they will be shown the policy pages ● Ability to set policies for: ○ Site ○ Privacy ○ 3rd parties ● Policies are shown one at time
  • 28. Copyright 2018 © Moodle Pty Ltd - CC SA - support@moodle.com Policy Plugin ● The Consent page lists a summary of each policy ● The user is asked to specifically agree to each policy ● When the user agrees to the policies they will be taken to the standard user registration form
  • 29. Copyright 2018 © Moodle Pty Ltd - CC SA - support@moodle.com Policy Plugin ● Overview of user consents for the site admin or privacy officer ● Ability to filter to a specific policy to determine who consented at what time ● Ability to manually consent on behalf of users
  • 30. Photo by Cytonn Photography on Unsplash Contract
  • 32. Image: CC-BY-SA Tim Evanson https://flic.kr/p/bpBg2y Legitimate Interests
  • 34. “ alt.ac.uk ● Lawful basis: We’re using legitimate interests of the University in providing the service to its staff and students as the lawful basis for processing personal data within the Media Hopper Replay service. The Data protection Officer and lawyers were very clear that this is the appropriate basis (and that the consent lawful basis would actually not be appropriate for a number of reasons, including ensuring consent is freely given, given the power imbalance between the University and either a member of staff or a student, and some of the implications for implementing any withdrawal of consent once a recording has been made.
  • 35. Photo by Michael D Beckwith on Unsplash Accountability
  • 36. The processor shall not engage another processor without prior specific or general written authorisation of the controller - Article 28(2) Processor 36/46
  • 37. 37
  • 38. The following examples are provided by Salman Usman (Academic E-learning Developer) Kingston University London. You are welcome to re-use/re-purpose these but you will need to check with your Data Protection Officer or equivalent first.
  • 39. The personal data Padlet holds is staff account details for Padlet and students placing their name or university ID in their Padlet posts for the lecturer to identify them. In order to make the use of Padlet mandatory for students and avoid the need for students to sign a consent form, staff should undertake the following measures: ● Staff should not use their KU email account and password when creating an account with Padlet ● Password-protect the Padlet staff are using with their students ● In their Padlet posts students should only include arbitrary identifiers that are only known to the lecturer. Staff need to store the mapping between student name/ university ID and their identifier securely on university network drive. Provided by: Salman Usman,Kingston University London
  • 40. The personal data PeerWise holds is staff account details for PeerWise and student identifier, username, password and email address. In order to make the use of PeerWise mandatory for students and avoid the need for students to sign a consent form, staff should undertake the following measures: ● Although it is a requirement to provide KU email address, staff should not use their KU email password when creating an account with PeerWise ● Student identifiers provided to PeerWise should not be their name, university ID or anything else that can identify them. Instead, provide an arbitrary identifier for each student and store the mapping of students’ university ID and their arbitrary PeerWise identifiers securely on university network drive. ● Ask students that when setting up accounts, not to choose a username that identifies them, not to use university password for their PeerWise account password, and not to provide their email address (which is optional anyway). Provided by: Salman Usman,Kingston University London
  • 41. The personal data that TEAMMATES holds is staff account details for TEAMMATES, student KU email, feedback that students give to their peers and receive from their lecturers and peers. In order to minimise risks associated with using this tool, staff should undertake the following measures: ● The use of TEAMMATES should not be mandatory as it is not possible to use it without providing students’ personal data. ● Staff and other members of teaching team should be made aware that the tool is not supported by the university and that there may be risks associated with handling of personal data. To this end, students need to sign a consent form. Those students who wish to opt out should be provided an alternative method to participate and it should not disadvantage those that choose this method. ● Ensure that peer feedback is given anonymously to all group members (by choosing appropriate settings) ● Staff should not use their KU email address and password when creating Google account to use with TEAMMATES ● Delete all data after end of academic term Provided by: Salman Usman,Kingston University London
  • 42. Photo by Clem Onojeghuo on Unsplash
  • 43. alt.ac.ukPhoto by rawpixel on Unsplash No data processing agreement... ● Supported alternatives ● Make optional ● Obscure identity ● Limit functionality
  • 45. Thank you Salman Usman and ALT-MEMBERS Slides go.alt.ac.uk/elesig-gdpr @A_L_T/@mhawksey
  • 46. Association for Learning Technology Registered charity number: 1160039 www.alt.ac.uk @A_L_T