SlideShare uma empresa Scribd logo
1 de 21
Don’t Make a Legal Assof Assessment
Hi! ,[object Object]
jason.miles-campbell@jisclegal.ac.uk
 0141 548 4939
 www.jisclegal.ac.uk,[object Object]
JISC Legal ,[object Object]
Guidance
Helpdesk
Newsletter,[object Object]
 Data Protection & e-Assessment Make purpose clear Use only forstated purpose
 Data Protection & e-Assessment Ensure appropriate security Ensure releasewith consent
 Law and e-Assessment 2. What If I want to use other people’s materials as part of the assessment?
 Copyright & e-Assessment S.32(3) –good news! Limitations
 Law and e-Assessment 3. What happens if the technology doesn’t workor goes wrong?
Liability & e-Assessment General duty of care to avoid loss or damage What if? Risk? © Christophe Verdier CC BY-NC-ND www.flickr.com/photos/cverdier/4155331984/
 Law and e-Assessment 4. What happens if a student ‘hacks’ or cheats in a technology-based assessment?
 e-Security & e-Assessment Invoke your policies Acceptable Use Policy Student Discipline Policy
 e-Security & e-Assessment Computer Misuse Act 1990 – unauthorised access Fraud and deceptionoffences
 Law and e-Assessment 5. What should I do if I havea student with a disability who has difficulty takingthe assessment?
 Accessibility & e-Assessment Disability equality duty Reasonable adjustments Competencestandards
 Law and e-Assessment 6. What if the studentobjects to taking the technology-basedassessment?

Mais conteúdo relacionado

Destaque

120822 mobile learning (uhi)
120822 mobile learning (uhi)120822 mobile learning (uhi)
120822 mobile learning (uhi)JISC Legal
 
110916 oer and creative commons
110916 oer and creative commons110916 oer and creative commons
110916 oer and creative commonsJISC Legal
 
JISC Legal: Overview Legal Issues and BCE
JISC Legal: Overview Legal Issues and BCEJISC Legal: Overview Legal Issues and BCE
JISC Legal: Overview Legal Issues and BCEJISC Legal
 
Jisc Legal Copyright in Learning Environment
Jisc Legal Copyright in Learning EnvironmentJisc Legal Copyright in Learning Environment
Jisc Legal Copyright in Learning EnvironmentJISC Legal
 
Top Ten Copyright Tips for Librarians
Top Ten Copyright Tips for LibrariansTop Ten Copyright Tips for Librarians
Top Ten Copyright Tips for LibrariansJISC Legal
 

Destaque (6)

Instructivo encuesta observatorio_laboral
Instructivo encuesta observatorio_laboralInstructivo encuesta observatorio_laboral
Instructivo encuesta observatorio_laboral
 
120822 mobile learning (uhi)
120822 mobile learning (uhi)120822 mobile learning (uhi)
120822 mobile learning (uhi)
 
110916 oer and creative commons
110916 oer and creative commons110916 oer and creative commons
110916 oer and creative commons
 
JISC Legal: Overview Legal Issues and BCE
JISC Legal: Overview Legal Issues and BCEJISC Legal: Overview Legal Issues and BCE
JISC Legal: Overview Legal Issues and BCE
 
Jisc Legal Copyright in Learning Environment
Jisc Legal Copyright in Learning EnvironmentJisc Legal Copyright in Learning Environment
Jisc Legal Copyright in Learning Environment
 
Top Ten Copyright Tips for Librarians
Top Ten Copyright Tips for LibrariansTop Ten Copyright Tips for Librarians
Top Ten Copyright Tips for Librarians
 

Semelhante a Don't Make a Legal Assof Assessment

Protecting Accounting Firms and their Clients - Eric Vanderburg - JurInnov
Protecting Accounting Firms and their Clients - Eric Vanderburg - JurInnovProtecting Accounting Firms and their Clients - Eric Vanderburg - JurInnov
Protecting Accounting Firms and their Clients - Eric Vanderburg - JurInnovEric Vanderburg
 
Aceds 2015 Cyberseucity and the Legal Profession - NYC - April 7, 2015
Aceds 2015 Cyberseucity and the Legal Profession - NYC - April 7, 2015Aceds 2015 Cyberseucity and the Legal Profession - NYC - April 7, 2015
Aceds 2015 Cyberseucity and the Legal Profession - NYC - April 7, 2015Joe Bartolo
 
The Unpleasant Truths of Modern Business Cybersecurity
The Unpleasant Truths of Modern Business CybersecurityThe Unpleasant Truths of Modern Business Cybersecurity
The Unpleasant Truths of Modern Business CybersecurityGlobal Knowledge Training
 
Cyber Security_Training Presentation.pptx
Cyber Security_Training Presentation.pptxCyber Security_Training Presentation.pptx
Cyber Security_Training Presentation.pptxmusicalworld14
 
The Art & Science of Simple Security
The Art & Science of Simple SecurityThe Art & Science of Simple Security
The Art & Science of Simple SecurityRavila White
 
Protecting Law Firms and their Clients: The Role of the Virtual Chief Securit...
Protecting Law Firms and their Clients: The Role of the Virtual Chief Securit...Protecting Law Firms and their Clients: The Role of the Virtual Chief Securit...
Protecting Law Firms and their Clients: The Role of the Virtual Chief Securit...Eric Vanderburg
 
130426 rsc sw byod (jmc)
130426 rsc sw byod (jmc)130426 rsc sw byod (jmc)
130426 rsc sw byod (jmc)JISC Legal
 
Network Security - What Every Business Needs to Know
Network Security - What Every Business Needs to KnowNetwork Security - What Every Business Needs to Know
Network Security - What Every Business Needs to Knowmapletronics
 
Law Firm Security: How to Protect Your Client Data and Stay Compliant
Law Firm Security: How to Protect Your Client Data and Stay CompliantLaw Firm Security: How to Protect Your Client Data and Stay Compliant
Law Firm Security: How to Protect Your Client Data and Stay CompliantClio - Cloud-Based Legal Technology
 
Cyber security guide
Cyber security guideCyber security guide
Cyber security guideMark Bennett
 
Webinar 2 IT Security
Webinar 2   IT SecurityWebinar 2   IT Security
Webinar 2 IT Securitypcapicik
 
Privacy Implications of Biometric Data - Kevin Nevias
Privacy Implications of Biometric Data - Kevin NeviasPrivacy Implications of Biometric Data - Kevin Nevias
Privacy Implications of Biometric Data - Kevin NeviasKevin Nevias
 
Common and Concerning Risks In IT
Common and Concerning Risks In ITCommon and Concerning Risks In IT
Common and Concerning Risks In ITpbhugenberg3
 
Ester Horowitz - M2Power Inc - Identify Theft and Growing Businesses
Ester Horowitz - M2Power Inc - Identify Theft and Growing BusinessesEster Horowitz - M2Power Inc - Identify Theft and Growing Businesses
Ester Horowitz - M2Power Inc - Identify Theft and Growing BusinessesRamon Ray
 
Protecting Your Business from a Cyber Attack
Protecting Your Business from a Cyber AttackProtecting Your Business from a Cyber Attack
Protecting Your Business from a Cyber AttackBen Jones
 
Cybersecurity Seminar March 2015
Cybersecurity Seminar March 2015Cybersecurity Seminar March 2015
Cybersecurity Seminar March 2015Lawley Insurance
 

Semelhante a Don't Make a Legal Assof Assessment (20)

Protecting Accounting Firms and their Clients - Eric Vanderburg - JurInnov
Protecting Accounting Firms and their Clients - Eric Vanderburg - JurInnovProtecting Accounting Firms and their Clients - Eric Vanderburg - JurInnov
Protecting Accounting Firms and their Clients - Eric Vanderburg - JurInnov
 
Infosec lecture-final
Infosec lecture-finalInfosec lecture-final
Infosec lecture-final
 
Aceds 2015 Cyberseucity and the Legal Profession - NYC - April 7, 2015
Aceds 2015 Cyberseucity and the Legal Profession - NYC - April 7, 2015Aceds 2015 Cyberseucity and the Legal Profession - NYC - April 7, 2015
Aceds 2015 Cyberseucity and the Legal Profession - NYC - April 7, 2015
 
The Unpleasant Truths of Modern Business Cybersecurity
The Unpleasant Truths of Modern Business CybersecurityThe Unpleasant Truths of Modern Business Cybersecurity
The Unpleasant Truths of Modern Business Cybersecurity
 
BEA Presentation
BEA PresentationBEA Presentation
BEA Presentation
 
Cyber Security_Training Presentation.pptx
Cyber Security_Training Presentation.pptxCyber Security_Training Presentation.pptx
Cyber Security_Training Presentation.pptx
 
The Art & Science of Simple Security
The Art & Science of Simple SecurityThe Art & Science of Simple Security
The Art & Science of Simple Security
 
Protecting Law Firms and their Clients: The Role of the Virtual Chief Securit...
Protecting Law Firms and their Clients: The Role of the Virtual Chief Securit...Protecting Law Firms and their Clients: The Role of the Virtual Chief Securit...
Protecting Law Firms and their Clients: The Role of the Virtual Chief Securit...
 
130426 rsc sw byod (jmc)
130426 rsc sw byod (jmc)130426 rsc sw byod (jmc)
130426 rsc sw byod (jmc)
 
Network Security - What Every Business Needs to Know
Network Security - What Every Business Needs to KnowNetwork Security - What Every Business Needs to Know
Network Security - What Every Business Needs to Know
 
Cybersecurity Roadmap Development for Executives
Cybersecurity Roadmap Development for ExecutivesCybersecurity Roadmap Development for Executives
Cybersecurity Roadmap Development for Executives
 
Law Firm Security: How to Protect Your Client Data and Stay Compliant
Law Firm Security: How to Protect Your Client Data and Stay CompliantLaw Firm Security: How to Protect Your Client Data and Stay Compliant
Law Firm Security: How to Protect Your Client Data and Stay Compliant
 
What every executive needs to know about information technology security
What every executive needs to know about information technology securityWhat every executive needs to know about information technology security
What every executive needs to know about information technology security
 
Cyber security guide
Cyber security guideCyber security guide
Cyber security guide
 
Webinar 2 IT Security
Webinar 2   IT SecurityWebinar 2   IT Security
Webinar 2 IT Security
 
Privacy Implications of Biometric Data - Kevin Nevias
Privacy Implications of Biometric Data - Kevin NeviasPrivacy Implications of Biometric Data - Kevin Nevias
Privacy Implications of Biometric Data - Kevin Nevias
 
Common and Concerning Risks In IT
Common and Concerning Risks In ITCommon and Concerning Risks In IT
Common and Concerning Risks In IT
 
Ester Horowitz - M2Power Inc - Identify Theft and Growing Businesses
Ester Horowitz - M2Power Inc - Identify Theft and Growing BusinessesEster Horowitz - M2Power Inc - Identify Theft and Growing Businesses
Ester Horowitz - M2Power Inc - Identify Theft and Growing Businesses
 
Protecting Your Business from a Cyber Attack
Protecting Your Business from a Cyber AttackProtecting Your Business from a Cyber Attack
Protecting Your Business from a Cyber Attack
 
Cybersecurity Seminar March 2015
Cybersecurity Seminar March 2015Cybersecurity Seminar March 2015
Cybersecurity Seminar March 2015
 

Mais de JISC Legal

IPR and Creative Commons for Interactive Learning Resources for Skills
IPR and Creative Commons for Interactive Learning Resources for SkillsIPR and Creative Commons for Interactive Learning Resources for Skills
IPR and Creative Commons for Interactive Learning Resources for SkillsJISC Legal
 
Core Training in Copyright Law
Core Training in Copyright LawCore Training in Copyright Law
Core Training in Copyright LawJISC Legal
 
NWLP - a quick introduction to using other people’s stuff
NWLP - a quick introduction to using other people’s stuffNWLP - a quick introduction to using other people’s stuff
NWLP - a quick introduction to using other people’s stuffJISC Legal
 
NWLP - The Brave New World - the changing face of copyright
NWLP - The Brave New World - the changing face of copyrightNWLP - The Brave New World - the changing face of copyright
NWLP - The Brave New World - the changing face of copyrightJISC Legal
 
Legal Aspects of Openness
Legal Aspects of OpennessLegal Aspects of Openness
Legal Aspects of OpennessJISC Legal
 
Mobile Tech and the Law
Mobile Tech and the LawMobile Tech and the Law
Mobile Tech and the LawJISC Legal
 
JISC Legal National Stem Programme OER & Creative Commons Workshop Bath
JISC Legal National Stem Programme OER & Creative Commons Workshop BathJISC Legal National Stem Programme OER & Creative Commons Workshop Bath
JISC Legal National Stem Programme OER & Creative Commons Workshop BathJISC Legal
 
JISC Legal National Stem Programme OER & Creative Commons Workshop York
JISC Legal National Stem Programme OER & Creative Commons Workshop YorkJISC Legal National Stem Programme OER & Creative Commons Workshop York
JISC Legal National Stem Programme OER & Creative Commons Workshop YorkJISC Legal
 
Top Ten Legal Issues for IWMW 2011
Top Ten Legal Issues for IWMW 2011Top Ten Legal Issues for IWMW 2011
Top Ten Legal Issues for IWMW 2011JISC Legal
 
Copyright and e-Learning for GTAs
Copyright and e-Learning for GTAsCopyright and e-Learning for GTAs
Copyright and e-Learning for GTAsJISC Legal
 
OER IPR Support
OER IPR SupportOER IPR Support
OER IPR SupportJISC Legal
 
JISC Legal OER Showcase
JISC Legal OER ShowcaseJISC Legal OER Showcase
JISC Legal OER ShowcaseJISC Legal
 
Using Other People’s Stuff Online – Copyright Without Tears
Using Other People’s Stuff Online – Copyright Without TearsUsing Other People’s Stuff Online – Copyright Without Tears
Using Other People’s Stuff Online – Copyright Without TearsJISC Legal
 
Legal aspects of web 2.0 and social networking JISC Legal
Legal aspects of web 2.0 and social networking JISC LegalLegal aspects of web 2.0 and social networking JISC Legal
Legal aspects of web 2.0 and social networking JISC LegalJISC Legal
 
OER, IPR and the Law JISC Legal
OER, IPR and the Law JISC LegalOER, IPR and the Law JISC Legal
OER, IPR and the Law JISC LegalJISC Legal
 
JISC Legal Copyright Ten Tips
JISC Legal Copyright Ten TipsJISC Legal Copyright Ten Tips
JISC Legal Copyright Ten TipsJISC Legal
 
JISC Legal e-Safety Presentation
JISC Legal e-Safety PresentationJISC Legal e-Safety Presentation
JISC Legal e-Safety PresentationJISC Legal
 

Mais de JISC Legal (17)

IPR and Creative Commons for Interactive Learning Resources for Skills
IPR and Creative Commons for Interactive Learning Resources for SkillsIPR and Creative Commons for Interactive Learning Resources for Skills
IPR and Creative Commons for Interactive Learning Resources for Skills
 
Core Training in Copyright Law
Core Training in Copyright LawCore Training in Copyright Law
Core Training in Copyright Law
 
NWLP - a quick introduction to using other people’s stuff
NWLP - a quick introduction to using other people’s stuffNWLP - a quick introduction to using other people’s stuff
NWLP - a quick introduction to using other people’s stuff
 
NWLP - The Brave New World - the changing face of copyright
NWLP - The Brave New World - the changing face of copyrightNWLP - The Brave New World - the changing face of copyright
NWLP - The Brave New World - the changing face of copyright
 
Legal Aspects of Openness
Legal Aspects of OpennessLegal Aspects of Openness
Legal Aspects of Openness
 
Mobile Tech and the Law
Mobile Tech and the LawMobile Tech and the Law
Mobile Tech and the Law
 
JISC Legal National Stem Programme OER & Creative Commons Workshop Bath
JISC Legal National Stem Programme OER & Creative Commons Workshop BathJISC Legal National Stem Programme OER & Creative Commons Workshop Bath
JISC Legal National Stem Programme OER & Creative Commons Workshop Bath
 
JISC Legal National Stem Programme OER & Creative Commons Workshop York
JISC Legal National Stem Programme OER & Creative Commons Workshop YorkJISC Legal National Stem Programme OER & Creative Commons Workshop York
JISC Legal National Stem Programme OER & Creative Commons Workshop York
 
Top Ten Legal Issues for IWMW 2011
Top Ten Legal Issues for IWMW 2011Top Ten Legal Issues for IWMW 2011
Top Ten Legal Issues for IWMW 2011
 
Copyright and e-Learning for GTAs
Copyright and e-Learning for GTAsCopyright and e-Learning for GTAs
Copyright and e-Learning for GTAs
 
OER IPR Support
OER IPR SupportOER IPR Support
OER IPR Support
 
JISC Legal OER Showcase
JISC Legal OER ShowcaseJISC Legal OER Showcase
JISC Legal OER Showcase
 
Using Other People’s Stuff Online – Copyright Without Tears
Using Other People’s Stuff Online – Copyright Without TearsUsing Other People’s Stuff Online – Copyright Without Tears
Using Other People’s Stuff Online – Copyright Without Tears
 
Legal aspects of web 2.0 and social networking JISC Legal
Legal aspects of web 2.0 and social networking JISC LegalLegal aspects of web 2.0 and social networking JISC Legal
Legal aspects of web 2.0 and social networking JISC Legal
 
OER, IPR and the Law JISC Legal
OER, IPR and the Law JISC LegalOER, IPR and the Law JISC Legal
OER, IPR and the Law JISC Legal
 
JISC Legal Copyright Ten Tips
JISC Legal Copyright Ten TipsJISC Legal Copyright Ten Tips
JISC Legal Copyright Ten Tips
 
JISC Legal e-Safety Presentation
JISC Legal e-Safety PresentationJISC Legal e-Safety Presentation
JISC Legal e-Safety Presentation
 

Último

SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Educationpboyjonauth
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdfQucHHunhnh
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionSafetyChain Software
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactPECB
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdfssuser54595a
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpinRaunakKeshri1
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfJayanti Pande
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxGaneshChakor2
 
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...RKavithamani
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesFatimaKhan178732
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationnomboosow
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxmanuelaromero2013
 

Último (20)

Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Education
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory Inspection
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpin
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptx
 
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
 
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and Actinides
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communication
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptx
 

Don't Make a Legal Assof Assessment

  • 1. Don’t Make a Legal Assof Assessment
  • 2.
  • 5.
  • 6.
  • 9.
  • 10. Data Protection & e-Assessment Make purpose clear Use only forstated purpose
  • 11. Data Protection & e-Assessment Ensure appropriate security Ensure releasewith consent
  • 12. Law and e-Assessment 2. What If I want to use other people’s materials as part of the assessment?
  • 13. Copyright & e-Assessment S.32(3) –good news! Limitations
  • 14. Law and e-Assessment 3. What happens if the technology doesn’t workor goes wrong?
  • 15. Liability & e-Assessment General duty of care to avoid loss or damage What if? Risk? © Christophe Verdier CC BY-NC-ND www.flickr.com/photos/cverdier/4155331984/
  • 16. Law and e-Assessment 4. What happens if a student ‘hacks’ or cheats in a technology-based assessment?
  • 17. e-Security & e-Assessment Invoke your policies Acceptable Use Policy Student Discipline Policy
  • 18. e-Security & e-Assessment Computer Misuse Act 1990 – unauthorised access Fraud and deceptionoffences
  • 19. Law and e-Assessment 5. What should I do if I havea student with a disability who has difficulty takingthe assessment?
  • 20. Accessibility & e-Assessment Disability equality duty Reasonable adjustments Competencestandards
  • 21. Law and e-Assessment 6. What if the studentobjects to taking the technology-basedassessment?
  • 22. Opting Out & e-Assessment No right to object Contractual rights Right to stopauto processing
  • 23. Law and e-Assessment 7. Where can I get further information?
  • 24. Law and e-Assessment JISC Legal JISC infoNet JISC Regional Support Centre JISC Advance Information Commissioner’s Office