This document is a presentation on GDPR given at the University of Dundee. It provides an overview of key GDPR concepts such as personal data, processing, lawful bases for processing including consent, and the principles of accountability. It discusses how GDPR compliance applies even when personal data from EU citizens is processed outside the EU. Examples are given of how services like Padlet, Peerwise and Teammates can be used in education in a GDPR-compliant way. The presentation emphasizes obtaining consent, anonymizing or obscuring personal data, and having alternatives for students who do not wish to provide personal data.
Norfolk Chamber delivered a morning conference based around the European General Data Protection Regulation (GDPR), which will come into force on May 25 2018. Delegates heared from a variety of GDPR expert speakers from legal, marketing, IT and Data Protection perspectives.
MWLUG - 2017
Tim Clark & Stephanie Heit
Tim & Steph explain the basics of GDPR and give some recommendations about what you can do to be ready.
Data sources are in the final slides.
For more information about how BCC can help you get your Domino data ready for GDPR please contact us here.
http://bcchub.com/bcc-domino-protect/
GDPR is coming for you whether you’re ready or not. Companies must show compliance by May 25, 2018. Take a look at the presentation to learn more about the new law that is going to change the way data is handled across the world. Read about the how it affects you and the steps you can take to make sure you’re GDPR ready!
About Extentia Information Technology:
Extentia is a global technology and services firm that helps clients transform and realize their digital strategies. With a focus on enterprise mobility, cloud computing, and user experiences, Extentia strives to accomplish and surpass your business goals. Our team is differentiated by an emphasis on excellent design skills that we bring to every project. Extentia’s work environment and culture inspire team members to be innovative and creative, and to provide clients with an exceptional partnership experience.
www.extentia.com
Data transfers to countries outside the EU/EEA under the GDPRIT Governance Ltd
These slides will cover:
-A brief overview of the Regulation and its impact
-The rights of data subjects and rights related to automated decision making and profiling.
-The international transfer of data and appropriate safeguards.
-The derogations from general prohibition of data transfers outside the European Union.
-The requirements that govern one-off and infrequent transfers of personal data.
-The role of the supervisory authority in international transfers.
This Presentation explains what GDPR is and the impact it'll have for Companies who process data of EU Citizens.
This Guide explains the principles of GDPR, Consent, User Rights and also explains how to implement GDPR in your organization.
Originally appeared at
http://backlinkme.net/definitive-guide-for-general-data-protection-regulation-gdpr-compliance/
General Data Protection Regulations (GDPR): Do you understand it and are you ...Cvent
Whether you’re an event or hospitality professional in a small, medium or large organization, the General Data Protection Regulation (GDPR) is going to affect you. Get prepared with Cvent and Debrah Harding of Market Research Society before the 25th May deadline. GDPR is a new EU regulation, designed for the digital age. GDPR will strengthen an individual's rights and increase business accountability for data privacy and holding personal information. Organizations found breaching the regulations can face fines of up to 20 million Euros or up to 4% of annual global turnover. At Cvent we are already on track to becoming GDPR compliant and we want to advise our industry partners on how to become compliant too.
Full GDPR toolkit: https://quality.eqms.co.uk/gdpr-general-data-protection-regulation-eu-toolkit
This free online training presentation provides you with information about how to comply with the General Data Protection Regulation, managing breaches, engaging employees, key requirements and more.
Norfolk Chamber delivered a morning conference based around the European General Data Protection Regulation (GDPR), which will come into force on May 25 2018. Delegates heared from a variety of GDPR expert speakers from legal, marketing, IT and Data Protection perspectives.
MWLUG - 2017
Tim Clark & Stephanie Heit
Tim & Steph explain the basics of GDPR and give some recommendations about what you can do to be ready.
Data sources are in the final slides.
For more information about how BCC can help you get your Domino data ready for GDPR please contact us here.
http://bcchub.com/bcc-domino-protect/
GDPR is coming for you whether you’re ready or not. Companies must show compliance by May 25, 2018. Take a look at the presentation to learn more about the new law that is going to change the way data is handled across the world. Read about the how it affects you and the steps you can take to make sure you’re GDPR ready!
About Extentia Information Technology:
Extentia is a global technology and services firm that helps clients transform and realize their digital strategies. With a focus on enterprise mobility, cloud computing, and user experiences, Extentia strives to accomplish and surpass your business goals. Our team is differentiated by an emphasis on excellent design skills that we bring to every project. Extentia’s work environment and culture inspire team members to be innovative and creative, and to provide clients with an exceptional partnership experience.
www.extentia.com
Data transfers to countries outside the EU/EEA under the GDPRIT Governance Ltd
These slides will cover:
-A brief overview of the Regulation and its impact
-The rights of data subjects and rights related to automated decision making and profiling.
-The international transfer of data and appropriate safeguards.
-The derogations from general prohibition of data transfers outside the European Union.
-The requirements that govern one-off and infrequent transfers of personal data.
-The role of the supervisory authority in international transfers.
This Presentation explains what GDPR is and the impact it'll have for Companies who process data of EU Citizens.
This Guide explains the principles of GDPR, Consent, User Rights and also explains how to implement GDPR in your organization.
Originally appeared at
http://backlinkme.net/definitive-guide-for-general-data-protection-regulation-gdpr-compliance/
General Data Protection Regulations (GDPR): Do you understand it and are you ...Cvent
Whether you’re an event or hospitality professional in a small, medium or large organization, the General Data Protection Regulation (GDPR) is going to affect you. Get prepared with Cvent and Debrah Harding of Market Research Society before the 25th May deadline. GDPR is a new EU regulation, designed for the digital age. GDPR will strengthen an individual's rights and increase business accountability for data privacy and holding personal information. Organizations found breaching the regulations can face fines of up to 20 million Euros or up to 4% of annual global turnover. At Cvent we are already on track to becoming GDPR compliant and we want to advise our industry partners on how to become compliant too.
Full GDPR toolkit: https://quality.eqms.co.uk/gdpr-general-data-protection-regulation-eu-toolkit
This free online training presentation provides you with information about how to comply with the General Data Protection Regulation, managing breaches, engaging employees, key requirements and more.
This is a slightly modified version of a presentation that I gave to fellow lawyers last week. It explains what GDPR is, the policy of data protection and the evolution of data protection legislation from the OECD Guidelines and Council of Europe Convention to the GDPR. It explores the regulation focusing on the data protection principles and, in particular, the lawfulness requirement and the validity of consent. The presentation mentions the Law enforcement data protection directive, the Data Protection Bill and the arrangements post Brexit. Finally, it considers the preparations recommended by the Information Commissioner for small busiesses
ControlCase discusses the following: - What is GDPR? - How will it impact me? - How can I become compliant? - What is the timeline? - What are consequences if not met?
How GDPR works : companies will be expected to be
fully compliant from 25 May 2018. The regulation
is intended to establish one single set of data
protection rules across Europe
With GDPR coming into effect, we can see a lot of changes in the privacy policies of companies doing business online. The presentation is a description of GDPR and its implications in India and worldwide. The main aim of the presentation is to identify the key issues of data privacy and the rights available to the consumer who's data is to be shared.
Legal obligations and responsibilities of data processors and controllers und...IT Governance Ltd
This webinar covers:
-The definitions of ‘data controller’ and ‘data processor’ under the GDPR.
-The responsibilities and obligations of controllers and processors.
-The data breach reporting responsibilities of controllers and processors.
-The liability of, and penalties that may be imposed on, data processors and controllers.
-The appointment of joint controllers and subcontracting processors
The webinar can be found here https://www.youtube.com/watch?v=cyUPGGD3iVg&t=8s
These slides explore the reforms to the UK General Data Protection Regulation (GDPR) proposed by the UK Government in Data: A New Direction. It is argued that they are both significant and unbalanced against the data subject but (aside potentially from the e-privacy rules) not generally radical. The great bulk of the proposed substantive changes to data protection could plausibly be justified under the derogation clauses available to EU Member States within the GDPR itself. Reforms to the integrity duties of controllers and others are more far-reaching. Nevertheless, their broad structure remains compatible with even the revised version of the Council of Europe framework, Data Protection Convention 108+, which both the EU and UK remain strongly committed to. Finally, the proposals to shift ICO supervision de jure away from a priority focus on individual data subject rights and complaints are difficult to square even with Convention 108+. Nevertheless, de facto the ICO far from acts as a legal champion for the data subject today. Indeed, despite receiving over 36,000 complaints from individuals during 2020-21, it issued just three fines under the GDPR (all concerning data security breaches) and just one injunctive enforcement notice.
Etat des lieux et enjeux liés au RGPD (Règlement Général de la Protection des Données) aussi appelé GDPR (General Data Protection Regulation) en anglais.
Approche concrètes des enjeux pour les entreprises sur la mise en conformité avant le 25 mai 2018.
With the new General Data Protection Regulation (GDPR) set to launch in May of 2018, many are wondering how it will change the way they do business. In this presentation, we explore how to ensure compliance of the new regulation.
Want more on GDPR compliance? Join us for this FREE virtual event: http://info.aiim.org/data-privacy-data-protection-gdpr
Presented at: 2nd Annual Gulf Cooperation Council e-Participation & e-Governance Forum – Organised by: Abu Dhabi University Knowledge Group and UAE Telecommunications Regulatory Authority.
9 – 11 September 2013 | Dusit Thani Hotel | Abu Dhabi | UAE.
TEduChain: A Platform for Crowdsourcing Tertiary Education Fund using Blockch...eraser Juan José Calderón
TEduChain: A Platform for Crowdsourcing Tertiary Education Fund using Blockchain Technology. Mahmood A. Rashid, Divnesh Prasad, Sarvesh Chand, Krishneel Deo, Kunal Singh, Mansour Assaf
This is a slightly modified version of a presentation that I gave to fellow lawyers last week. It explains what GDPR is, the policy of data protection and the evolution of data protection legislation from the OECD Guidelines and Council of Europe Convention to the GDPR. It explores the regulation focusing on the data protection principles and, in particular, the lawfulness requirement and the validity of consent. The presentation mentions the Law enforcement data protection directive, the Data Protection Bill and the arrangements post Brexit. Finally, it considers the preparations recommended by the Information Commissioner for small busiesses
ControlCase discusses the following: - What is GDPR? - How will it impact me? - How can I become compliant? - What is the timeline? - What are consequences if not met?
How GDPR works : companies will be expected to be
fully compliant from 25 May 2018. The regulation
is intended to establish one single set of data
protection rules across Europe
With GDPR coming into effect, we can see a lot of changes in the privacy policies of companies doing business online. The presentation is a description of GDPR and its implications in India and worldwide. The main aim of the presentation is to identify the key issues of data privacy and the rights available to the consumer who's data is to be shared.
Legal obligations and responsibilities of data processors and controllers und...IT Governance Ltd
This webinar covers:
-The definitions of ‘data controller’ and ‘data processor’ under the GDPR.
-The responsibilities and obligations of controllers and processors.
-The data breach reporting responsibilities of controllers and processors.
-The liability of, and penalties that may be imposed on, data processors and controllers.
-The appointment of joint controllers and subcontracting processors
The webinar can be found here https://www.youtube.com/watch?v=cyUPGGD3iVg&t=8s
These slides explore the reforms to the UK General Data Protection Regulation (GDPR) proposed by the UK Government in Data: A New Direction. It is argued that they are both significant and unbalanced against the data subject but (aside potentially from the e-privacy rules) not generally radical. The great bulk of the proposed substantive changes to data protection could plausibly be justified under the derogation clauses available to EU Member States within the GDPR itself. Reforms to the integrity duties of controllers and others are more far-reaching. Nevertheless, their broad structure remains compatible with even the revised version of the Council of Europe framework, Data Protection Convention 108+, which both the EU and UK remain strongly committed to. Finally, the proposals to shift ICO supervision de jure away from a priority focus on individual data subject rights and complaints are difficult to square even with Convention 108+. Nevertheless, de facto the ICO far from acts as a legal champion for the data subject today. Indeed, despite receiving over 36,000 complaints from individuals during 2020-21, it issued just three fines under the GDPR (all concerning data security breaches) and just one injunctive enforcement notice.
Etat des lieux et enjeux liés au RGPD (Règlement Général de la Protection des Données) aussi appelé GDPR (General Data Protection Regulation) en anglais.
Approche concrètes des enjeux pour les entreprises sur la mise en conformité avant le 25 mai 2018.
With the new General Data Protection Regulation (GDPR) set to launch in May of 2018, many are wondering how it will change the way they do business. In this presentation, we explore how to ensure compliance of the new regulation.
Want more on GDPR compliance? Join us for this FREE virtual event: http://info.aiim.org/data-privacy-data-protection-gdpr
Presented at: 2nd Annual Gulf Cooperation Council e-Participation & e-Governance Forum – Organised by: Abu Dhabi University Knowledge Group and UAE Telecommunications Regulatory Authority.
9 – 11 September 2013 | Dusit Thani Hotel | Abu Dhabi | UAE.
TEduChain: A Platform for Crowdsourcing Tertiary Education Fund using Blockch...eraser Juan José Calderón
TEduChain: A Platform for Crowdsourcing Tertiary Education Fund using Blockchain Technology. Mahmood A. Rashid, Divnesh Prasad, Sarvesh Chand, Krishneel Deo, Kunal Singh, Mansour Assaf
Access Lab 2020: Saying ‘no’ the publisher’s personal data gathering – our ex...OpenAthens
Access Lab 2020: Saying ‘no’ the publisher’s personal data gathering – our experiences
Sally Hoadley, Jerome Farrell, Hannah Wise, University of Surrey
Cyber security privacy-and-blockchain-perspective-14 nov2018-v01-publicSecunoid Systems Inc
Privacy Overview
What is private data
Privacy requirements by jurisdiction
PIPEDA-Canada
GDPR-Europe
Blockchains and Privacy
Data storage
Privacy crypto currencies
Presentations from Smoothwall and Ampliphae at Networkshop46.
Managing Prevent duty through effective web content management - by Tom Newton, product manager, Smoothwall.
The hidden risks of SaaS and cloud applications and how to take back control - by Nigel Oakley, director of business development, Ampliphae.
Rules and regulations concerning social media and data protection and recommendations for teachers - A Danish perspective and guidelines from the Council of Europe
Academic Integrity and Identity In Online LearningJason Rhode
slides from presentation by Acxiom titled, "Academic Integrity and Identity in Online Learning" at the March 2010 Midwest Blackboard User's Group (SLATE) Meeting at Lewis University, March 17, 2010
Privacy and Data Security | Data Collection | Social Mediadevbhargav1
In the digital age, where social media platforms have become integral to businesses' marketing strategies, collecting and utilizing customer data is the norm. This data provides valuable insights for targeting and personalizing content, improving customer experiences, and making informed business decisions. However, the collection and use of customer data on social media come with significant privacy and data security considerations. In this comprehensive guide, we'll explore the intricacies of managing customer data on social media while safeguarding privacy and data security.
Develop a logic model for the formative evaluation of a new prograLinaCovington707
Develop a logic model for the formative evaluation of a new program that you want to develop at your agency. As you analyze your program, begin by describing basic assumptions and then add the following program components. Your narrative section will focus on your analysis of the problematic condition which demands intervention, and underlying assumptions about the sequences (if... then relationship). A typical logic model template would have the following components
1. Resources/Inputs include the human, financial, organizational, and community resources a program has available to direct toward the work. Sometimes this component is referred to as
2. Activities are what the program does with the resources. Activities are the processes, tools, events, technology, and actions that are an intentional part of the program implementation. These interventions are used to bring about the intended program changes or results.
3. Outputs are the direct products of program activities and may include types, levels and targets of services to be delivered by the program.
4. Outcomes (Intermediate) are the specific changes in program participants’ behavior, knowledge, skills, status and level of functioning.
5. Impact/Long-term Outcome is the fundamental intended or unintended change occurring in organizations, communities or systems as a result of program activities.
Logic Model Template
CSSW 586 Research Methods II
Program: logic model
Situation:
Inputs
Outputs
Outcomes-Impact
Activities
Participants
Short
Medium
Long-term
Assumptions
External Factors
Inputs
Outputs
Activities Participation
Outcomes – Impact
Short Term Medium
Term
Long Term
Accident-Related E-Scooter Trauma Logic Model
What we invest:
* Partnerships (i.e. CDC, health
departments & DOT )
* Trauma center staff
* Volunteers
* Materials (i.e. pamphlets)
* Time
* Funding (i.e.
What we do:
* Conduct training
w/ partners
* Networking
* Delivery of
educational material
to at-risk population
* Town hall meetings
* Ads/Billboards
Who we reach:
* People who use
alternative
transportation
between the ages of
15-35
Attitude
changes:
* Increased
awareness about e-
scooter injuries
Behavior
changes:
* Helmet policy
* Expansion of
bike lanes
* Reduction in the
number of
operational
permits available
to each company
Status
changes:
• Reduction in
accident-related
e-scooter traumas
Assumptions:
1. Most e-scooter injuries involve a motor vehicle.
2. First-time riders are more likely to be involved in accident related e-scooter trauma.
3. E-scooter injuries typically occur at night.
External factors:
1. The Atlanta City Council may reject law / policy proposals.
2. Confidentiality laws may limit participant accessibility.
1
Keisha Williams
CSSW 586 Research II: Evaluation of Practice
Logic Model Narrative
Dr. Kim
October 7, 2019
Program: Accident-Related E-Scooter Trauma Logic Model
Situation: Currently, ...
Emerging Trends in Information Security and Privacylgcdcpas
Malware infiltrations, spear phishing, data breaches these are scary words with even scarier implications. These threats are hitting the interconnected technology world fast and hard and can no longer be ignored.
Are you doing everything you can to avoid having your data compromised and becoming the next security breach horror story?
To help you answer that question, join the security experts at LGC+D for the Emerging Trends in Information Privacy and Security seminar on Wednesday, August 6th. They will be joined by a dream team panel of IT, legal and insurance experts that deal with these threats every day, and have the experience and knowledge to help you make the right security decisions.
B9_21_子供のプライバシー対策に必要なもの Speakers' slide deck for Privacy By Design Conference...Keiko Tanaka
Speakers' slide deck for Privacy By Design Conference 2023, session on Protecting Privacy of Children Through Data Governance.
Privacy by Design Conference 2023とは
プライバシーに関わる、文化、法律、テクノロジー、ビジネス、オペレーションなどのさまざまな立場の方が、多様な視点で対話を行うためのカンファレンスです。
15:20 ~ 16:20 「子供のプライバシー対策に必要なもの」
MyData Global Board Member 2020 & 2021 Dixon Siu
京都情報大学院大学 助教 田中恵子
EDDS創始者、ロンドン・スクール・オブ・エコノミクス客員研究員 ヴェリスラーバ・ヒルマン 氏
一般社団法人Privacy by Design Lab 代表理事 栗原宏平
Implementing and Auditing General Data Protection Regulation Jim Kaplan CIA CFE
Implementing and Auditing GDPR Series (1 of 10)
Protecting personal data has been an important issue for many years. The EU GDPR extends the data rights of individuals, and requires organizations to develop clear policies and procedures to protect personal data, and adopt appropriate technical and organizational measures. UK organizations have had to comply with the Regulation since 25 May 2018, or potentially face fines of up to 4% of annual turnover or €20 million – whichever is greater.
Learning Outcomes:
This 10 webinar series is intended to elicit a clear understanding of the core elements of the GDPR, with the ability to gain a deeper understanding by asking the trainer questions during the training.
It covers how each aspect of the Regulation can be translated into implementation actions in your organization and the auditor’s role.
Webinar 1 of 10
• Bands of penalties and range of awards for breaches
• Lawfulness of processing and consent
• The six data protection principles
Risk Audit & Control in a Social Media World
Hosted by:Accounting TodayOctober 29, 2013
This is a presentation that was broadcast to more than 400 accounting professionals. The recording is available from Accounting Today.
If you would like to help with our survey and share your views go to: https://www.surveymonkey.com/s/FQWN5Z3
Twitter in Education: Interactively exploring the conversation with TAGS and ...Martin Hawksey
There has been much research in the use of social media to support learning and teaching. In many instances it is argued that it enables a decentralization of learning moving towards a distributed model which has many benefits including supporting a stronger foundation for lifelong learning.
Twitter is one service that has been widely used within this context. The introduction of hashtags as a mechanism to allow communities to form and contribute to a topic is now a well established model within both formal and informal education as well as in society in general. The use of Twitter in this way removes boundaries extending the opportunities for co-learning, in particular, discussions can become less siloed, every contribution to a hashtag community is potentially another opportunity for someone else to join the conversation. The thinning of the walls in this way is not without it implications and the vulnerability of being a learner should never be underestimated. Another consideration is that Twitter has been adopted as a tool to support learning in this way rather than being designed for this purpose. As a result exploring and finding understanding within hashtag communities can be problematic and with many open learning contexts individuals can end up feeling lost.
This conversation will explore approaches to help learners and educators gain more insight and a feeling of place within hashtag communities. As part of this we will look at TAGS and TAGSExplorer tools (https://tags.hawksey.info) which have been developed with educators and learners in mind to help support the collection, analysis and exploration of Twitter hashtag communities. These free tools provide a means to collect data from Twitter searches and analysis the results either in Google Sheets, where the data is collected, or visualized in the companion TAGSExplorer web interface. As part of this conversation we will touch upon the limitation of data collection from Twitter and issues around data protection and privacy. We will also provide some examples of where TAGS/TAGSExplorer has been used within an educational context.
TEL Quality and Innovation: What can be learned from the history of computer ...Martin Hawksey
As TEL becomes more professionalised we consider what lessons can be learned from another discipline which has gone through a similar transition. Through the lense of the development of computer science this presentation will look at key moments in this area which might be used to inform or influence how we approach TEL quality and innovation. As part of this we will highlight the approaches adopted by early pioneers like Alan Kay whose attributed to defining the conceptual basics of laptop and tablet computers as part of his work in the 1970s on the Dynabook. Kay (2014) argues when creating future concepts the present inevitably takes all of our focus making anything we do incremental rather than inspirational. Kay’s suggests that by ignoring the present this opens us to the opportunity to take greater inspiration from the past allowing us to dream of a future not constrained by the present.
We also consider some of the cultures which have their origins in computer science including the ‘hacker’ subculture. Whilst the term ‘hacker’ has taken on a more sinister definition, referring to those subverting computer security, the original hacker communities founded by Richard Greenblatt and Bill Gosper in the 1960s were focused on the “intellectual challenge of creatively overcoming and circumventing limitations of systems to achieve novel and clever outcomes” - Wikipedia https://en.wikipedia.org/wiki/Hacker_culture
Finally, we highlight a talk by Bret Victor on the future of programming we look at the reasons a number of innovations in computer science happened in the 50s/60s and the problems this creates for the next generation of programmers if they perceive the fundamentals are correct and continue to develop along these principles.
Making the complex less complicated: An introduction to social network analysisMartin Hawksey
Presented at ILTA EdTech 2017, Sligo, Ireland
Supporting posthttps://mashe.hawksey.info/?p=17538
Patterns are left behind. Whether it be replies to a discussion forums, interactions on social media or ingredients in cocktails links can be made and the data used for actionable insight. Network science is one approach that takes these seemingly complex connections and through the use of mathematical methods make it easier to understand. Network science is a well established discipline and it’s origins can be traced to 1736 and the work of Leonhard Euler. The area of social network analysis is a more recent development established in work by Moreno and Jennings in the 1930s. Accessibility to affordable computing in the 1990s combined with data from early social networks like IRC has led to an explosion of interest in social network analysis. This has continued with the emergence of social networking sites like Facebook and Twitter combined with accessibility to the underlying data. The use of network science and social network analysis within educational contexts has seen similar growth. The emergence of ‘Learning Analytics’ as a field of study has highlighted how data can be used to enhance learning and teaching. With social network analysis we can take seemingly complex relationships and making them less complicated. Common applications of network analysis in this area include: identification of isolated students within group activities; identification of people or concepts which are ‘network bridges’; clustering of categorisation of topics; plus numerous other applications.
This presentation is designed to be an introduction into network analysis allowing delegates the opportunity to understand the underlying structure of the graph as well as some of the tools that can be used to construct them. The session will begin with an introduction to key network analysis terms and go on to introduce some of the tools and techniques for social network analysis, specifically looking at how data can be collected and analysed from Twitter using tools like TAGS and NodeXL.
Measuring Social Media Impact: Google Analytics and TwitterMartin Hawksey
Slides for a talk given at the University of Oxford OxEngage series exploring how social media interactions on Twitter can be analysed using Google Sheets and Google Analytics
Google Apps Script the Authentic{ated} Mobile PlaygroundMartin Hawksey
Presentation given at the Edinburgh Mobile Dev Meetup on 15 Feb 2017 highlighting some features of Google Apps Script which may be of interest to mobile developers. A video recording of the session is available at https://youtu.be/N9WUVzLmaJo?t=39m54s
Using CiviCRM in Google Drive with the new CiviService Google Script LibraryMartin Hawksey
This talk highlights how you can easily interact with your CiviCRM via the API interface with a new Google Apps Script library. Google Apps Script is a free programming environment in Google Drive that allows you to easily integrate with Google Docs, Forms, Sheets, other Google products and third party services. Using Apps Script gives you the flexibility and power of tools like Google Sheets to push, extract or analyse data and integrate this with your CiviCRM installation via the CiviCRM API. Example uses could include using shared Google Sheets to record information which is pushed into your CiviCRM, initiating cases from Gmail triggers and more.
he master class is designed to help users get more out of their Google Analytics setup and reporting. The session will be an opportunity to workout where you are at with you Google Analytics setup and usage. As part of this there will be an opportunity for:
* An overview of Google Analytics and tracking principles
* Learning about Google Tag Manager which can be used to remove some of the headache around setting up GA event tracking
* Automated Google Analytics reporting using Google Sheets/Google Sites
* Emerging GA uses you might not have considered before
Extracting and analyzing discussion data with google sheets and google analyticsMartin Hawksey
Online discussions can be a rich source of data for researchers in the humanities and social sciences. In this workshop, participants will learn how to use Google Sheets to push online discussion board data into Google Analytics, where it can be analysed. The session will also demonstrate how to use TAGS, the widely-used script for archiving Twitter data. Participants can bring their own laptops if they wish; there will also be desktop PCs for use.
Please note: if you’re not staff or student at the University of Edinburgh, you will need to obtain a temporary login from the registration desk in advance.
Using WordPress as a badge platform #openbadgesHEMartin Hawksey
The Association for Learning Technology has been experimenting with the open source blogging platform WordPress as an Open Badges issuing platform. As part of this presentation we include details of our journey from digital to open badges. As part of this we highlight some of the benefits of using WordPress and the free BadgeOS plugin as well as issues encountered integrating with Mozilla Backpack. As well as the technical aspect we will look at how badges were used in the Open Course for Technology Enhanced Learning (ocTEL). As part of this badges were awarded on a weekly basis for a range of tasks from simply ‘checking-in’ to completing predefined learning activities. Given the range of criteria this presentation explores the general question ‘do open badges count?’. The presentation concludes by looking at current developments which are informing how the Association might use Open Badges in the future. As part of this we will touch upon the potential other benefits of badges including situational awareness for learners and the wider community.
Tweeted slides are available from https://goo.gl/dkjI3L
Looking at creativity and culture in computer science to inspire better educa...Martin Hawksey
For talk notes see https://mashe.hawksey.info/2016/01/looking-at-creativity-and-culture-in-computer-science-to-inspire-better-education/
Academic practice continues to evolve to reflect the needs and opportunities of various stakeholders including the learner, employers and the institution. Some would argue that university education isn't changing fast enough given the pace of change within society and technology. We will explore strategies for developing an agile approach to academic practice, looking at how education can be 'hacked' to creatively overcome the limitations of the system. ... We conclude taking a wider view exploring emerging peadagogies and technologies and how these might be used too to make education better.
Google Apps Script: The authentic{ated} playground [2015 Ed.]Martin Hawksey
This is the 2015 edition of my Google Apps Script: The authentic{ated} playground talk most recently given to GDG Berlin (Dec. 2015).
With a pre-authenticated cloud-based ecosystem Google Apps Script makes it possible to integrate into other Google services with a couple of lines of code. This turns Google Drive into a rich playground for a wide range of solutions from custom reporting using Google Sheets as a data interface; quick hacks to get the job done; custom interfaces for Docs, Sheets and Forms; to full blown application deployment to web and mobile. In this talk the main features and affordances of Google Apps Script are highlighted, this will be followed by a deep dive into a demonstration into how Google Apps Script makes it easy to combine Google Analytics with other data sources such as Twitter and do many more playful things.
Learning analytics gaining good actionable insightMartin Hawksey
Presented as part of the University of Sussex's TEL Seminar Series
There is greater awareness of the use of data to make improvements in the world around us including learning and teaching. From improvements in business processes to recommendations to what to buy on Amazon all are driven by data. Data by itself does not make a better learner experience and only analytics, the process of making an actionable insight, can help identify gains. As an emerging area 'Learning Analytics' is abound with new opportunities but at the same time these opportunities also raise new ethical and operational concerns. In this presentation we introduce some basic learning analytics concepts, identifying tools and workflows staff may wish to consider. As part of this we also consider the dangers of analytics identifying areas which may lead to learner demotivation or misconception and the questions we should all be asking ourselves to make sure we are always gaining *good* actionable insight.
http://www.sussex.ac.uk/tel/workshops/seminar/martin-hawksey
Learning analytics: Threats and opportunitiesMartin Hawksey
Slides used at ALT's White Rose Learning Technologist's SIG to introduce threats and opportunities for using Learning Analytics. Links related to this presentation are at http://bit.ly/LAWhiteRose
Talk given at Using Google Apps Script and Sheets for social network data mining and analysis
Examples used in this presentation bundled at http://bit.ly/breaking-cell
There is growing interest in the use of data to provide actionable insight. This interest goes beyond the professional analysts and just as fields such as mathematics and astronomy have benefited from the enthusiastic amateur so does data science. Social networks are a rich playground of data and whilst many provide access to their data via APIs but access via this route can be daunting. You can of course turn to 'analytics as a service' sites which will take your credentials and provide you with some answers, but often this can be what they want to tell you and not what you want to hear. A solution is the spreadsheet. Spreadsheets provide an interface for data exploration for those with basic skills. With Google Sheets the opportunities increase exponentially, not just in terms of collaboration, but also with the power of Google Apps Script. Apps Script provides easy integration into other Google products and services, such as Google Analytics, as well as third party APIs like Twitter. In this presentation we show how Google Sheets can become a rich playground where data from different services can be collected and analysed.
Open Badges in Open Education – Do They Count? #eas14Martin Hawksey
Slides for presentation at e-Assessment Scotland 2014 (#eas14) highlighting the work around open badges as a mechanism for supporting the creation of personal knowledge graphs.
Slides used for presentation at ALT's Annual Conference 2014 on experiences of using open badges in the Open Course in Technology Enhanced Learning (ocTEL)
Francesca Gottschalk - How can education support child empowerment.pptxEduSkills OECD
Francesca Gottschalk from the OECD’s Centre for Educational Research and Innovation presents at the Ask an Expert Webinar: How can education support child empowerment?
Unit 8 - Information and Communication Technology (Paper I).pdfThiyagu K
This slides describes the basic concepts of ICT, basics of Email, Emerging Technology and Digital Initiatives in Education. This presentations aligns with the UGC Paper I syllabus.
Synthetic Fiber Construction in lab .pptxPavel ( NSTU)
Synthetic fiber production is a fascinating and complex field that blends chemistry, engineering, and environmental science. By understanding these aspects, students can gain a comprehensive view of synthetic fiber production, its impact on society and the environment, and the potential for future innovations. Synthetic fibers play a crucial role in modern society, impacting various aspects of daily life, industry, and the environment. ynthetic fibers are integral to modern life, offering a range of benefits from cost-effectiveness and versatility to innovative applications and performance characteristics. While they pose environmental challenges, ongoing research and development aim to create more sustainable and eco-friendly alternatives. Understanding the importance of synthetic fibers helps in appreciating their role in the economy, industry, and daily life, while also emphasizing the need for sustainable practices and innovation.
2024.06.01 Introducing a competency framework for languag learning materials ...Sandy Millin
http://sandymillin.wordpress.com/iateflwebinar2024
Published classroom materials form the basis of syllabuses, drive teacher professional development, and have a potentially huge influence on learners, teachers and education systems. All teachers also create their own materials, whether a few sentences on a blackboard, a highly-structured fully-realised online course, or anything in between. Despite this, the knowledge and skills needed to create effective language learning materials are rarely part of teacher training, and are mostly learnt by trial and error.
Knowledge and skills frameworks, generally called competency frameworks, for ELT teachers, trainers and managers have existed for a few years now. However, until I created one for my MA dissertation, there wasn’t one drawing together what we need to know and do to be able to effectively produce language learning materials.
This webinar will introduce you to my framework, highlighting the key competencies I identified from my research. It will also show how anybody involved in language teaching (any language, not just English!), teacher training, managing schools or developing language learning materials can benefit from using the framework.
Instructions for Submissions thorugh G- Classroom.pptxJheel Barad
This presentation provides a briefing on how to upload submissions and documents in Google Classroom. It was prepared as part of an orientation for new Sainik School in-service teacher trainees. As a training officer, my goal is to ensure that you are comfortable and proficient with this essential tool for managing assignments and fostering student engagement.
How to Make a Field invisible in Odoo 17Celine George
It is possible to hide or invisible some fields in odoo. Commonly using “invisible” attribute in the field definition to invisible the fields. This slide will show how to make a field invisible in odoo 17.
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdfTechSoup
In this webinar you will learn how your organization can access TechSoup's wide variety of product discount and donation programs. From hardware to software, we'll give you a tour of the tools available to help your nonprofit with productivity, collaboration, financial management, donor tracking, security, and more.
Biological screening of herbal drugs: Introduction and Need for
Phyto-Pharmacological Screening, New Strategies for evaluating
Natural Products, In vitro evaluation techniques for Antioxidants, Antimicrobial and Anticancer drugs. In vivo evaluation techniques
for Anti-inflammatory, Antiulcer, Anticancer, Wound healing, Antidiabetic, Hepatoprotective, Cardio protective, Diuretics and
Antifertility, Toxicity studies as per OECD guidelines
Macroeconomics- Movie Location
This will be used as part of your Personal Professional Portfolio once graded.
Objective:
Prepare a presentation or a paper using research, basic comparative analysis, data organization and application of economic information. You will make an informed assessment of an economic climate outside of the United States to accomplish an entertainment industry objective.
Embracing GenAI - A Strategic ImperativePeter Windle
Artificial Intelligence (AI) technologies such as Generative AI, Image Generators and Large Language Models have had a dramatic impact on teaching, learning and assessment over the past 18 months. The most immediate threat AI posed was to Academic Integrity with Higher Education Institutes (HEIs) focusing their efforts on combating the use of GenAI in assessment. Guidelines were developed for staff and students, policies put in place too. Innovative educators have forged paths in the use of Generative AI for teaching, learning and assessments leading to pockets of transformation springing up across HEIs, often with little or no top-down guidance, support or direction.
This Gasta posits a strategic approach to integrating AI into HEIs to prepare staff, students and the curriculum for an evolving world and workplace. We will highlight the advantages of working with these technologies beyond the realm of teaching, learning and assessment by considering prompt engineering skills, industry impact, curriculum changes, and the need for staff upskilling. In contrast, not engaging strategically with Generative AI poses risks, including falling behind peers, missed opportunities and failing to ensure our graduates remain employable. The rapid evolution of AI technologies necessitates a proactive and strategic approach if we are to remain relevant.
1. #altc
What about GDPR?
Martin Hawksey
@mhawksey
Please feel free to share photos of slides. Various copyright licences are used in this presentation for both content and images. If an image on
a slide has no CC attribution assume it is a copyrighted source. This presentation is shared as CC-BY mhawksey.
Presented at: ELESIG Scotland,
University of Dundee
26 November 2018
Slides go.alt.ac.uk/elesig-gdpr
2. “
alt.ac.uk
Join and interact via zeetings.com
You can follow slides and take part in polls by
going to:
zeetings.com/mhawksey
Accessing this talk via zeetings.com is optional.
Slides also available from go.alt.ac.uk/elesig-gdpr
5. Nota Lawyer
Disclaimer: I’m not a lawyer, or data
protection expert and I’m only sharing
my interpretation of information I’ve
gathered for your consideration and
does not constitute as legal advice.
6. alt.ac.uk
How familiar are you with GDPR?
A. First time I’ve heard about GDPR
B. Aware of GDPR
C. Know a bit about GDPR and key
principles
D. Know a lot about GDPR and key
principles
7. alt.ac.uk
What level of support have you had?
A. No support at all
B. Self-directed study
C. Taken mandatory training provided by
my institution
D. Been provided guidance by my Data
Protection Officer and/or support staff
9. Data is the new nuclear
Data isn’t the new oil —
it’s the new nuclear power
James Bridle Image Copyright: Leonardo Santamaria
9/46
10. Image: CC-BY Selfdestination
https://flic.kr/p/gGZYKK
The General Data Protection
Regulation (GDPR) (EU) 2016/679
is a regulation in EU law on data
protection and privacy for all
individuals within the European
Union. It also addresses the
export of personal data outside
the EU. - Wikipedia
11. GDPR compliance isn’t just
required by EU based
organisations. Any ‘enterprise’
processing ‘personal data’ from
EU citizens needs to be GDPR
compliant or they can face
“penalties of up to 4% of
worldwide turnover or €20
million, whichever is higher”.
Image: CC-BY MoneyBlogNewz
https://flic.kr/p/9eXnSq
Non compliance penalties
14. Personal data means any
information relating to an
identified or identifiable natural
person (‘data subject’); an
identifiable natural person is
one who can be identified,
directly or indirectly - Article 4(1)
Personal Data
14/46
15. Personal data that has been
pseudonymised – eg key-coded –
can fall within the scope of the
GDPR depending on how difficult
it is to attribute the pseudonym
to a particular individual. – UK
ICO Key Definitions
Personal Data
15/46
16. 16
Image: CC-BY-SA Dennis van Zuijlekom
https://flic.kr/p/ApBi1X
Image: CC-BY-NC-ND Matthijs
https://flic.kr/p/89w39B
Access Erasure
18. Data Controller - A controller
determines the purposes and
means of processing personal
data. (e.g. your institution)
Data Processor - A processor is
responsible for processing
personal data on behalf of a
controller. (e.g. any 3rd party
your institution contracts that
can access personal data)
Data Controller/Processor
18/46
20. 'processing' means any operation or set of
operations which is performed on personal data or
on sets of personal data, whether or not by
automated means, such as collection, recording,
organisation, structuring, storage, adaptation or
alteration, retrieval, consultation, use,
disclosure by transmission, dissemination or
otherwise making available, alignment or
combination, restriction, erasure or destruction;
-Article 4(2)
Processing
20/46
21. ● Lawfulness, fairness and transparency
● Purpose limitation
● Data minimisation
● Accuracy
● Storage limitation
● Integrity and confidentiality (security)
● Accountability
GDPR Key Principles
21/46
34. “
alt.ac.uk
● Lawful basis: We’re using legitimate interests of the University in providing the service to its
staff and students as the lawful basis for processing personal data within the Media Hopper
Replay service. The Data protection Officer and lawyers were very clear that this is the
appropriate basis (and that the consent lawful basis would actually not be appropriate for a
number of reasons, including ensuring consent is freely given, given the power imbalance
between the University and either a member of staff or a student, and some of the implications
for implementing any withdrawal of consent once a recording has been made.
36. The processor shall not engage
another processor without prior
specific or general written
authorisation of the controller -
Article 28(2)
Processor
36/46
38. The following examples are provided by
Salman Usman (Academic E-learning
Developer) Kingston University London. You
are welcome to re-use/re-purpose these but
you will need to check with your Data
Protection Officer or equivalent first.
39. The personal data Padlet holds is staff account details for Padlet
and students placing their name or university ID in their Padlet
posts for the lecturer to identify them. In order to make the use
of Padlet mandatory for students and avoid the need for
students to sign a consent form, staff should undertake the
following measures:
● Staff should not use their KU email account and password
when creating an account with Padlet
● Password-protect the Padlet staff are using with their
students
● In their Padlet posts students should only include arbitrary
identifiers that are only known to the lecturer. Staff need to
store the mapping between student name/ university ID and
their identifier securely on university network drive.
Provided by: Salman Usman,Kingston University London
40. The personal data PeerWise holds is staff account details for
PeerWise and student identifier, username, password and email
address. In order to make the use of PeerWise mandatory for
students and avoid the need for students to sign a consent form,
staff should undertake the following measures:
● Although it is a requirement to provide KU email address, staff
should not use their KU email password when creating an
account with PeerWise
● Student identifiers provided to PeerWise should not be their
name, university ID or anything else that can identify them.
Instead, provide an arbitrary identifier for each student and
store the mapping of students’ university ID and their arbitrary
PeerWise identifiers securely on university network drive.
● Ask students that when setting up accounts, not to choose a
username that identifies them, not to use university password
for their PeerWise account password, and not to provide their
email address (which is optional anyway).
Provided by: Salman Usman,Kingston University London
41. The personal data that TEAMMATES holds is staff account details for
TEAMMATES, student KU email, feedback that students give to their peers and
receive from their lecturers and peers. In order to minimise risks associated
with using this tool, staff should undertake the following measures:
● The use of TEAMMATES should not be mandatory as it is not possible to
use it without providing students’ personal data.
● Staff and other members of teaching team should be made aware that
the tool is not supported by the university and that there may be risks
associated with handling of personal data. To this end, students need to
sign a consent form. Those students who wish to opt out should be
provided an alternative method to participate and it should not
disadvantage those that choose this method.
● Ensure that peer feedback is given anonymously to all group members (by
choosing appropriate settings)
● Staff should not use their KU email address and password when creating
Google account to use with TEAMMATES
● Delete all data after end of academic term
Provided by: Salman Usman,Kingston University London
43. alt.ac.ukPhoto by rawpixel on Unsplash
No data processing agreement...
● Supported alternatives
● Make optional
● Obscure identity
● Limit functionality