SlideShare a Scribd company logo
1 of 27
Mobile Learning and the Law
Are you remotely interested?
    Inverness, Wednesday, 22 August 2012
Hello!
Jason Miles-Campbell
JISC Legal Service Manager

www.jisclegal.ac.uk
info@jisclegal.ac.uk
0141 548 4939


                             2
About JISC Legal
• Role: to avoid legal issues becoming a
  barrier to the use of technology in tertiary
  education
• Information service: we cannot take
  decisions for you when you are faced with a
  risk


                        3
Have you heard of JISC Legal before?

                                                45%
1. Hello again, Jason
2. Yes, fairly often
3. Yes, used
                         20%   20%
   occasionally
                                     10%
4. Vague acquaintance                      5%

5. What’s that, then?
                         1     2      3     4     5
When it comes to legal issues...
                                           40%
1. I’m confident
2. I’ve a fair idea            30%



3. I dabble                          20%


4. I ask others                                  10%

5. I hide in the toilet
                          0%

                          1    2      3     4      5
Why Comply?
•   It’s the law
•   Confidence v uncertainty
•   Example
•   Reputation
•   Quality inspection
•   But risk management

                    7
Legal bill for defamation accusation...
                                             68%
1.   They’ll do it for free
2.   30p
3.   £3
                                                   32%

4.   £3000
5.   £3,000,000
                              0%   0%   0%

                              1    2    3     4      5
The Issues

Data protection (respecting privacy)
Copyright (using other people’s stuff)
e-Safety (protecting users)
e-Security (protecting the organisation)
The Difference

Not linked to place (mobile!)
Personal, invasive and pervasive
Own device
Combines access and communication
What’s the biggest issue about
                      mobile?
  1.    Copyright                             33%

                                  29%   29%

  2.    Data protection
  3.    e-Safety
  4.    e-Security          10%



  5.    Haggis                                      0%

                            1     2      3     4     5



Slide 11 of 27
Think about mobile
access/delivery when
  choosing learning
     resources.
Do you have a mobile device with
 copyright infringing content with you?
1. Can I call my lawyer?                                58%

2. Maybe.
3. I’m looking around and see
   what option others are pressing.     26%

4. Yes.
5. Definitely not, guv. Honest.    5%         5%   5%


                                    1   2     3     4     5
Ensure
                  data protection
                    awareness.
                    Don’t let techie
                 enthusiasm run away.
Slide 12 of 28
Ensure your e-safety
 policies and procedures
      cover mobile.
Ensure you have e-safety policies
 and procedures in the first place.
Are you confident learners know
     how to report concerns?
                     52%
1. Yes
2. No                      29%

3. Don’t know                    19%




                     1      2      3
Ensure your e-security
  and acceptable use
   policies are fit for
      mobile use.
Keep legal risk in
                   perspective.
                  Have risk assessment
                  procedures in place.

Slide 18 of 27
What should we do about risk?
1. Ignore it                             90%


2. Eliminate it
3. Think about it
4. Take steps to
   manage it
5. Run around screaming   0%
                               5%
                                    0%
                                               5%


                          1    2    3     4     5
Monitor impact and
  effectiveness.
Ask for feedback,
 provide support.
Are learners involved with development,
          review and impact of policy?

  1. Always
  2. Sometimes
  3. Seldom
  4. Never
  5. Depends who’s asking
Slide 22 of 27
Next steps?
 1. Go back and say well done!                              38%


 2. Start a conversation with
    management                                        25%


 3. Re-write a few policies                19%


 4. Monitor what’s in place already                               13%

 5. Get further support                          6%

 6. Point at the guy over there and   0%

    say ‘his problem!’                1    2     3     4     5      6


Slide 23 of 27
Contact JISC Legal

info@jisclegal.ac.uk
0141 548 4939
www.jisclegal.ac.uk
http://twitter.com/JISCLegal
Your questions




                 25
JISC Legal is hosted by the University of Strathclyde,
         a charitable body, registered in Scotland,
           with registration number SC015263.

  This work, with the exception of logos, and any other content marked with a
separate copyright notice, is licensed under a Creative Commons Attribution 3.0
Unported Licence. Attribution should be “© JISC Legal – www.jisclegal.ac.uk –
used under Creative Commons Attribution 3.0 Unported Licence” (with clickable
URLs where possible). The use of logos in the work is licensed for use only on
                  non-derivative copies. Further information at
                      www.jisclegal.ac.uk/CopyrightPolicy.




                                      26
120822 mobile learning (uhi)

More Related Content

Viewers also liked

Jisc Legal Copyright in Learning Environment
Jisc Legal Copyright in Learning EnvironmentJisc Legal Copyright in Learning Environment
Jisc Legal Copyright in Learning EnvironmentJISC Legal
 
JISC Legal: Overview Legal Issues and BCE
JISC Legal: Overview Legal Issues and BCEJISC Legal: Overview Legal Issues and BCE
JISC Legal: Overview Legal Issues and BCEJISC Legal
 
100903 e assessment (dundee)
100903 e assessment (dundee)100903 e assessment (dundee)
100903 e assessment (dundee)JISC Legal
 
110916 oer and creative commons
110916 oer and creative commons110916 oer and creative commons
110916 oer and creative commonsJISC Legal
 
Top Ten Copyright Tips for Librarians
Top Ten Copyright Tips for LibrariansTop Ten Copyright Tips for Librarians
Top Ten Copyright Tips for LibrariansJISC Legal
 

Viewers also liked (6)

Jisc Legal Copyright in Learning Environment
Jisc Legal Copyright in Learning EnvironmentJisc Legal Copyright in Learning Environment
Jisc Legal Copyright in Learning Environment
 
JISC Legal: Overview Legal Issues and BCE
JISC Legal: Overview Legal Issues and BCEJISC Legal: Overview Legal Issues and BCE
JISC Legal: Overview Legal Issues and BCE
 
100903 e assessment (dundee)
100903 e assessment (dundee)100903 e assessment (dundee)
100903 e assessment (dundee)
 
Instructivo encuesta observatorio_laboral
Instructivo encuesta observatorio_laboralInstructivo encuesta observatorio_laboral
Instructivo encuesta observatorio_laboral
 
110916 oer and creative commons
110916 oer and creative commons110916 oer and creative commons
110916 oer and creative commons
 
Top Ten Copyright Tips for Librarians
Top Ten Copyright Tips for LibrariansTop Ten Copyright Tips for Librarians
Top Ten Copyright Tips for Librarians
 

Similar to 120822 mobile learning (uhi)

Mobile Tech and the Law
Mobile Tech and the LawMobile Tech and the Law
Mobile Tech and the LawJISC Legal
 
130426 rsc sw byod (jmc)
130426 rsc sw byod (jmc)130426 rsc sw byod (jmc)
130426 rsc sw byod (jmc)JISC Legal
 
BYOD and the Law (May I Text You That Writ?)
BYOD and the Law (May I Text You That Writ?)BYOD and the Law (May I Text You That Writ?)
BYOD and the Law (May I Text You That Writ?)JISC Legal
 
Legal Aspects of Openness
Legal Aspects of OpennessLegal Aspects of Openness
Legal Aspects of OpennessJISC Legal
 
Think you’re secure? You May Be Surprised
Think you’re secure? You May Be SurprisedThink you’re secure? You May Be Surprised
Think you’re secure? You May Be SurprisedChief Optimist
 
Security and risk in a mobile world
Security and risk in a mobile worldSecurity and risk in a mobile world
Security and risk in a mobile worldBrian Katz
 
Bcc risk advisory irisscon 2013 - vulnerability management by the numbers a...
Bcc risk advisory   irisscon 2013 - vulnerability management by the numbers a...Bcc risk advisory   irisscon 2013 - vulnerability management by the numbers a...
Bcc risk advisory irisscon 2013 - vulnerability management by the numbers a...Eoin Keary
 
How Boards Can Learn to Stop Avoiding & Start Loving Cyber Risk!
How Boards Can Learn to Stop Avoiding & Start Loving Cyber Risk!How Boards Can Learn to Stop Avoiding & Start Loving Cyber Risk!
How Boards Can Learn to Stop Avoiding & Start Loving Cyber Risk!Dottie Schindlinger
 
IT Consumerization – iPad’ing the Enterprise or BYO Malware?
IT Consumerization – iPad’ing the Enterprise or BYO Malware?IT Consumerization – iPad’ing the Enterprise or BYO Malware?
IT Consumerization – iPad’ing the Enterprise or BYO Malware?Barry Caplin
 
Continuing Education Conferance
Continuing Education ConferanceContinuing Education Conferance
Continuing Education ConferanceTommy Riggins
 
Bad Advice, Unintended Consequences, and Broken Paradigms: Think & Act Di...
Bad Advice, Unintended Consequences, and Broken Paradigms: Think & Act Di...Bad Advice, Unintended Consequences, and Broken Paradigms: Think & Act Di...
Bad Advice, Unintended Consequences, and Broken Paradigms: Think & Act Di...Steve Werby
 
Star Kamal 9 B
Star Kamal 9 BStar Kamal 9 B
Star Kamal 9 Bjboulanger
 
Mis tue sponsored breakfast trus te
Mis tue sponsored breakfast   trus teMis tue sponsored breakfast   trus te
Mis tue sponsored breakfast trus teMediaPost
 
ethicsincyberspace2-130423152958-phpapp02.pdf
ethicsincyberspace2-130423152958-phpapp02.pdfethicsincyberspace2-130423152958-phpapp02.pdf
ethicsincyberspace2-130423152958-phpapp02.pdfSheejamolMathew
 
Ethics in cyber space
Ethics in cyber spaceEthics in cyber space
Ethics in cyber spacenitss007
 
Social Media Security Risk Slide Share Version
Social Media Security Risk Slide Share VersionSocial Media Security Risk Slide Share Version
Social Media Security Risk Slide Share Versionfamudal
 
Digital Safety, Data Privacy, and Online Netiquette
Digital Safety, Data Privacy, and Online NetiquetteDigital Safety, Data Privacy, and Online Netiquette
Digital Safety, Data Privacy, and Online NetiquetteGab Billones
 
Outpost24 webinar - Bridging your cyber hygiene gap to prevent enterprise hac...
Outpost24 webinar - Bridging your cyber hygiene gap to prevent enterprise hac...Outpost24 webinar - Bridging your cyber hygiene gap to prevent enterprise hac...
Outpost24 webinar - Bridging your cyber hygiene gap to prevent enterprise hac...Outpost24
 

Similar to 120822 mobile learning (uhi) (20)

Mobile Tech and the Law
Mobile Tech and the LawMobile Tech and the Law
Mobile Tech and the Law
 
130426 rsc sw byod (jmc)
130426 rsc sw byod (jmc)130426 rsc sw byod (jmc)
130426 rsc sw byod (jmc)
 
BYOD and the Law (May I Text You That Writ?)
BYOD and the Law (May I Text You That Writ?)BYOD and the Law (May I Text You That Writ?)
BYOD and the Law (May I Text You That Writ?)
 
Legal Aspects of Openness
Legal Aspects of OpennessLegal Aspects of Openness
Legal Aspects of Openness
 
Think you’re secure? You May Be Surprised
Think you’re secure? You May Be SurprisedThink you’re secure? You May Be Surprised
Think you’re secure? You May Be Surprised
 
Security and risk in a mobile world
Security and risk in a mobile worldSecurity and risk in a mobile world
Security and risk in a mobile world
 
Bcc risk advisory irisscon 2013 - vulnerability management by the numbers a...
Bcc risk advisory   irisscon 2013 - vulnerability management by the numbers a...Bcc risk advisory   irisscon 2013 - vulnerability management by the numbers a...
Bcc risk advisory irisscon 2013 - vulnerability management by the numbers a...
 
How Boards Can Learn to Stop Avoiding & Start Loving Cyber Risk!
How Boards Can Learn to Stop Avoiding & Start Loving Cyber Risk!How Boards Can Learn to Stop Avoiding & Start Loving Cyber Risk!
How Boards Can Learn to Stop Avoiding & Start Loving Cyber Risk!
 
IT Consumerization – iPad’ing the Enterprise or BYO Malware?
IT Consumerization – iPad’ing the Enterprise or BYO Malware?IT Consumerization – iPad’ing the Enterprise or BYO Malware?
IT Consumerization – iPad’ing the Enterprise or BYO Malware?
 
Continuing Education Conferance
Continuing Education ConferanceContinuing Education Conferance
Continuing Education Conferance
 
Bad Advice, Unintended Consequences, and Broken Paradigms: Think & Act Di...
Bad Advice, Unintended Consequences, and Broken Paradigms: Think & Act Di...Bad Advice, Unintended Consequences, and Broken Paradigms: Think & Act Di...
Bad Advice, Unintended Consequences, and Broken Paradigms: Think & Act Di...
 
Star Kamal 9 B
Star Kamal 9 BStar Kamal 9 B
Star Kamal 9 B
 
Mis tue sponsored breakfast trus te
Mis tue sponsored breakfast   trus teMis tue sponsored breakfast   trus te
Mis tue sponsored breakfast trus te
 
ethicsincyberspace2-130423152958-phpapp02.pdf
ethicsincyberspace2-130423152958-phpapp02.pdfethicsincyberspace2-130423152958-phpapp02.pdf
ethicsincyberspace2-130423152958-phpapp02.pdf
 
Ethics in cyber space
Ethics in cyber spaceEthics in cyber space
Ethics in cyber space
 
Social Media Security Risk Slide Share Version
Social Media Security Risk Slide Share VersionSocial Media Security Risk Slide Share Version
Social Media Security Risk Slide Share Version
 
Digital Safety, Data Privacy, and Online Netiquette
Digital Safety, Data Privacy, and Online NetiquetteDigital Safety, Data Privacy, and Online Netiquette
Digital Safety, Data Privacy, and Online Netiquette
 
Outpost24 webinar - Bridging your cyber hygiene gap to prevent enterprise hac...
Outpost24 webinar - Bridging your cyber hygiene gap to prevent enterprise hac...Outpost24 webinar - Bridging your cyber hygiene gap to prevent enterprise hac...
Outpost24 webinar - Bridging your cyber hygiene gap to prevent enterprise hac...
 
(Webinar Slides) How to Ethically Use Technology in Your Practice
(Webinar Slides) How to Ethically Use Technology in Your Practice(Webinar Slides) How to Ethically Use Technology in Your Practice
(Webinar Slides) How to Ethically Use Technology in Your Practice
 
Key Points on The Law Relating To CCTV
Key Points on The Law Relating To CCTVKey Points on The Law Relating To CCTV
Key Points on The Law Relating To CCTV
 

More from JISC Legal

IPR and Creative Commons for Interactive Learning Resources for Skills
IPR and Creative Commons for Interactive Learning Resources for SkillsIPR and Creative Commons for Interactive Learning Resources for Skills
IPR and Creative Commons for Interactive Learning Resources for SkillsJISC Legal
 
Core Training in Copyright Law
Core Training in Copyright LawCore Training in Copyright Law
Core Training in Copyright LawJISC Legal
 
NWLP - a quick introduction to using other people’s stuff
NWLP - a quick introduction to using other people’s stuffNWLP - a quick introduction to using other people’s stuff
NWLP - a quick introduction to using other people’s stuffJISC Legal
 
NWLP - The Brave New World - the changing face of copyright
NWLP - The Brave New World - the changing face of copyrightNWLP - The Brave New World - the changing face of copyright
NWLP - The Brave New World - the changing face of copyrightJISC Legal
 
121205 e assessment (rsc y&h, jmc)
121205 e assessment (rsc y&h, jmc)121205 e assessment (rsc y&h, jmc)
121205 e assessment (rsc y&h, jmc)JISC Legal
 
JISC Legal National Stem Programme OER & Creative Commons Workshop Bath
JISC Legal National Stem Programme OER & Creative Commons Workshop BathJISC Legal National Stem Programme OER & Creative Commons Workshop Bath
JISC Legal National Stem Programme OER & Creative Commons Workshop BathJISC Legal
 
JISC Legal National Stem Programme OER & Creative Commons Workshop York
JISC Legal National Stem Programme OER & Creative Commons Workshop YorkJISC Legal National Stem Programme OER & Creative Commons Workshop York
JISC Legal National Stem Programme OER & Creative Commons Workshop YorkJISC Legal
 
Top Ten Legal Issues for IWMW 2011
Top Ten Legal Issues for IWMW 2011Top Ten Legal Issues for IWMW 2011
Top Ten Legal Issues for IWMW 2011JISC Legal
 
Copyright and e-Learning for GTAs
Copyright and e-Learning for GTAsCopyright and e-Learning for GTAs
Copyright and e-Learning for GTAsJISC Legal
 
OER IPR Support
OER IPR SupportOER IPR Support
OER IPR SupportJISC Legal
 
JISC Legal OER Showcase
JISC Legal OER ShowcaseJISC Legal OER Showcase
JISC Legal OER ShowcaseJISC Legal
 
Using Other People’s Stuff Online – Copyright Without Tears
Using Other People’s Stuff Online – Copyright Without TearsUsing Other People’s Stuff Online – Copyright Without Tears
Using Other People’s Stuff Online – Copyright Without TearsJISC Legal
 
JISC Legal Law and e-Assessment
JISC Legal Law and e-AssessmentJISC Legal Law and e-Assessment
JISC Legal Law and e-AssessmentJISC Legal
 
Legal aspects of web 2.0 and social networking JISC Legal
Legal aspects of web 2.0 and social networking JISC LegalLegal aspects of web 2.0 and social networking JISC Legal
Legal aspects of web 2.0 and social networking JISC LegalJISC Legal
 
OER, IPR and the Law JISC Legal
OER, IPR and the Law JISC LegalOER, IPR and the Law JISC Legal
OER, IPR and the Law JISC LegalJISC Legal
 
JISC Legal Copyright Ten Tips
JISC Legal Copyright Ten TipsJISC Legal Copyright Ten Tips
JISC Legal Copyright Ten TipsJISC Legal
 
JISC Legal e-Safety Presentation
JISC Legal e-Safety PresentationJISC Legal e-Safety Presentation
JISC Legal e-Safety PresentationJISC Legal
 

More from JISC Legal (17)

IPR and Creative Commons for Interactive Learning Resources for Skills
IPR and Creative Commons for Interactive Learning Resources for SkillsIPR and Creative Commons for Interactive Learning Resources for Skills
IPR and Creative Commons for Interactive Learning Resources for Skills
 
Core Training in Copyright Law
Core Training in Copyright LawCore Training in Copyright Law
Core Training in Copyright Law
 
NWLP - a quick introduction to using other people’s stuff
NWLP - a quick introduction to using other people’s stuffNWLP - a quick introduction to using other people’s stuff
NWLP - a quick introduction to using other people’s stuff
 
NWLP - The Brave New World - the changing face of copyright
NWLP - The Brave New World - the changing face of copyrightNWLP - The Brave New World - the changing face of copyright
NWLP - The Brave New World - the changing face of copyright
 
121205 e assessment (rsc y&h, jmc)
121205 e assessment (rsc y&h, jmc)121205 e assessment (rsc y&h, jmc)
121205 e assessment (rsc y&h, jmc)
 
JISC Legal National Stem Programme OER & Creative Commons Workshop Bath
JISC Legal National Stem Programme OER & Creative Commons Workshop BathJISC Legal National Stem Programme OER & Creative Commons Workshop Bath
JISC Legal National Stem Programme OER & Creative Commons Workshop Bath
 
JISC Legal National Stem Programme OER & Creative Commons Workshop York
JISC Legal National Stem Programme OER & Creative Commons Workshop YorkJISC Legal National Stem Programme OER & Creative Commons Workshop York
JISC Legal National Stem Programme OER & Creative Commons Workshop York
 
Top Ten Legal Issues for IWMW 2011
Top Ten Legal Issues for IWMW 2011Top Ten Legal Issues for IWMW 2011
Top Ten Legal Issues for IWMW 2011
 
Copyright and e-Learning for GTAs
Copyright and e-Learning for GTAsCopyright and e-Learning for GTAs
Copyright and e-Learning for GTAs
 
OER IPR Support
OER IPR SupportOER IPR Support
OER IPR Support
 
JISC Legal OER Showcase
JISC Legal OER ShowcaseJISC Legal OER Showcase
JISC Legal OER Showcase
 
Using Other People’s Stuff Online – Copyright Without Tears
Using Other People’s Stuff Online – Copyright Without TearsUsing Other People’s Stuff Online – Copyright Without Tears
Using Other People’s Stuff Online – Copyright Without Tears
 
JISC Legal Law and e-Assessment
JISC Legal Law and e-AssessmentJISC Legal Law and e-Assessment
JISC Legal Law and e-Assessment
 
Legal aspects of web 2.0 and social networking JISC Legal
Legal aspects of web 2.0 and social networking JISC LegalLegal aspects of web 2.0 and social networking JISC Legal
Legal aspects of web 2.0 and social networking JISC Legal
 
OER, IPR and the Law JISC Legal
OER, IPR and the Law JISC LegalOER, IPR and the Law JISC Legal
OER, IPR and the Law JISC Legal
 
JISC Legal Copyright Ten Tips
JISC Legal Copyright Ten TipsJISC Legal Copyright Ten Tips
JISC Legal Copyright Ten Tips
 
JISC Legal e-Safety Presentation
JISC Legal e-Safety PresentationJISC Legal e-Safety Presentation
JISC Legal e-Safety Presentation
 

Recently uploaded

Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfInclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfTechSoup
 
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...Postal Advocate Inc.
 
4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptx4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptxmary850239
 
What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPCeline George
 
Transaction Management in Database Management System
Transaction Management in Database Management SystemTransaction Management in Database Management System
Transaction Management in Database Management SystemChristalin Nelson
 
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfGrade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfJemuel Francisco
 
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxINTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxHumphrey A Beña
 
Choosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for ParentsChoosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for Parentsnavabharathschool99
 
Integumentary System SMP B. Pharm Sem I.ppt
Integumentary System SMP B. Pharm Sem I.pptIntegumentary System SMP B. Pharm Sem I.ppt
Integumentary System SMP B. Pharm Sem I.pptshraddhaparab530
 
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...JhezDiaz1
 
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...Nguyen Thanh Tu Collection
 
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSGRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSJoshuaGantuangco2
 
Food processing presentation for bsc agriculture hons
Food processing presentation for bsc agriculture honsFood processing presentation for bsc agriculture hons
Food processing presentation for bsc agriculture honsManeerUddin
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for BeginnersSabitha Banu
 
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Celine George
 
Global Lehigh Strategic Initiatives (without descriptions)
Global Lehigh Strategic Initiatives (without descriptions)Global Lehigh Strategic Initiatives (without descriptions)
Global Lehigh Strategic Initiatives (without descriptions)cama23
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatYousafMalik24
 

Recently uploaded (20)

Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfInclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
 
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
 
4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptx4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptx
 
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptxFINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
 
What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERP
 
Transaction Management in Database Management System
Transaction Management in Database Management SystemTransaction Management in Database Management System
Transaction Management in Database Management System
 
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfGrade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
 
YOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptx
YOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptxYOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptx
YOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptx
 
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxINTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
 
Choosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for ParentsChoosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for Parents
 
Integumentary System SMP B. Pharm Sem I.ppt
Integumentary System SMP B. Pharm Sem I.pptIntegumentary System SMP B. Pharm Sem I.ppt
Integumentary System SMP B. Pharm Sem I.ppt
 
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
 
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
 
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSGRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
 
Food processing presentation for bsc agriculture hons
Food processing presentation for bsc agriculture honsFood processing presentation for bsc agriculture hons
Food processing presentation for bsc agriculture hons
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for Beginners
 
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
 
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptxLEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
 
Global Lehigh Strategic Initiatives (without descriptions)
Global Lehigh Strategic Initiatives (without descriptions)Global Lehigh Strategic Initiatives (without descriptions)
Global Lehigh Strategic Initiatives (without descriptions)
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice great
 

120822 mobile learning (uhi)

  • 1. Mobile Learning and the Law Are you remotely interested? Inverness, Wednesday, 22 August 2012
  • 2. Hello! Jason Miles-Campbell JISC Legal Service Manager www.jisclegal.ac.uk info@jisclegal.ac.uk 0141 548 4939 2
  • 3. About JISC Legal • Role: to avoid legal issues becoming a barrier to the use of technology in tertiary education • Information service: we cannot take decisions for you when you are faced with a risk 3
  • 4.
  • 5. Have you heard of JISC Legal before? 45% 1. Hello again, Jason 2. Yes, fairly often 3. Yes, used 20% 20% occasionally 10% 4. Vague acquaintance 5% 5. What’s that, then? 1 2 3 4 5
  • 6. When it comes to legal issues... 40% 1. I’m confident 2. I’ve a fair idea 30% 3. I dabble 20% 4. I ask others 10% 5. I hide in the toilet 0% 1 2 3 4 5
  • 7. Why Comply? • It’s the law • Confidence v uncertainty • Example • Reputation • Quality inspection • But risk management 7
  • 8. Legal bill for defamation accusation... 68% 1. They’ll do it for free 2. 30p 3. £3 32% 4. £3000 5. £3,000,000 0% 0% 0% 1 2 3 4 5
  • 9. The Issues Data protection (respecting privacy) Copyright (using other people’s stuff) e-Safety (protecting users) e-Security (protecting the organisation)
  • 10. The Difference Not linked to place (mobile!) Personal, invasive and pervasive Own device Combines access and communication
  • 11. What’s the biggest issue about mobile? 1. Copyright 33% 29% 29% 2. Data protection 3. e-Safety 4. e-Security 10% 5. Haggis 0% 1 2 3 4 5 Slide 11 of 27
  • 12. Think about mobile access/delivery when choosing learning resources.
  • 13. Do you have a mobile device with copyright infringing content with you? 1. Can I call my lawyer? 58% 2. Maybe. 3. I’m looking around and see what option others are pressing. 26% 4. Yes. 5. Definitely not, guv. Honest. 5% 5% 5% 1 2 3 4 5
  • 14. Ensure data protection awareness. Don’t let techie enthusiasm run away. Slide 12 of 28
  • 15. Ensure your e-safety policies and procedures cover mobile. Ensure you have e-safety policies and procedures in the first place.
  • 16. Are you confident learners know how to report concerns? 52% 1. Yes 2. No 29% 3. Don’t know 19% 1 2 3
  • 17. Ensure your e-security and acceptable use policies are fit for mobile use.
  • 18. Keep legal risk in perspective. Have risk assessment procedures in place. Slide 18 of 27
  • 19. What should we do about risk? 1. Ignore it 90% 2. Eliminate it 3. Think about it 4. Take steps to manage it 5. Run around screaming 0% 5% 0% 5% 1 2 3 4 5
  • 20. Monitor impact and effectiveness.
  • 21. Ask for feedback, provide support.
  • 22. Are learners involved with development, review and impact of policy? 1. Always 2. Sometimes 3. Seldom 4. Never 5. Depends who’s asking Slide 22 of 27
  • 23. Next steps? 1. Go back and say well done! 38% 2. Start a conversation with management 25% 3. Re-write a few policies 19% 4. Monitor what’s in place already 13% 5. Get further support 6% 6. Point at the guy over there and 0% say ‘his problem!’ 1 2 3 4 5 6 Slide 23 of 27
  • 24. Contact JISC Legal info@jisclegal.ac.uk 0141 548 4939 www.jisclegal.ac.uk http://twitter.com/JISCLegal
  • 26. JISC Legal is hosted by the University of Strathclyde, a charitable body, registered in Scotland, with registration number SC015263. This work, with the exception of logos, and any other content marked with a separate copyright notice, is licensed under a Creative Commons Attribution 3.0 Unported Licence. Attribution should be “© JISC Legal – www.jisclegal.ac.uk – used under Creative Commons Attribution 3.0 Unported Licence” (with clickable URLs where possible). The use of logos in the work is licensed for use only on non-derivative copies. Further information at www.jisclegal.ac.uk/CopyrightPolicy. 26

Editor's Notes

  1. Plug resources – especially top tips and policy checklist as each only one side of A4.Also, video resources useful for Scotland, England, N Ireland, Wales.
  2. TurningPointContext of learning. Notice and Take Down, Acceptable Use. “authorise”.
  3. Likely to be Safeguarding officer or e-Safety OfficerMake someone ultimately responsible for e-safety, for planning, co-ordinating approach, implementation, training and response. Senior member of staff who already has child protection training and knowledge of working with other agencies.Someone approachable, set right tone, strong leadership role.
  4. Represent cross section of college community, stakeholders.Consultation, variety of approach.Learner input!Depends on college.
  5. Online tools to help – Generator, National Education Network etc (see links on our site)Assess what is working well and what needs further input. Inform all parties of the audit.Prioritise next steps.
  6. TurningPoint
  7. Set the ground rules, mitigate liability, make all users aware of limits and boundaries.All staff and students to be aware of rights and responsibilities when using ICTEasily understood by learnersClarify when and in what circumstances it will apply e.g. broad in scope, include mobile technologies, learners hardware (?)Scrutiny by Inspectorate.Link to other relevant policies, particularly AUP – see JISC Legal’s checklist.
  8. Think ahead – key to safeguarding.Assess risk in context e.g. off site learning, vulnerable learners, school links etc.What can we do to make it safer?Enhanced procedures for vulnerable learners etc.Consistency crucial.
  9. TurningPoint
  10. Essential step to meet your duties.Learner input.Develop positive behaviours.Monitor complaints to determine trends, underlying issues.
  11. Learners input.Focus group.Act on feedback given.Further support.
  12. TurningPoint
  13. TurningPoint