SlideShare una empresa de Scribd logo
1 de 25
BYOD
Where does institutional liability end ?

26 June 2013
RSC Eastern Technical managers Forum
Hello!
Betty Willder
info@jisclegal.ac.uk
0141 548 4939
www.jisclegal.ac.uk

http://twitter.com/JISCLegal
About Jisc Legal
• Role: to avoid legal issues becoming a
barrier to the use of technology in tertiary
education

• Information service: we cannot take
decisions for you when you are faced with a
risk
“ … 47% of all UK adults now use their
personal smartphone, laptop or tablet
computer for work purposes. But less than 3
in 10 who do so are provided with guidance
on how their devices should be used in this
capacity, raising worrying concerns that
people may not understand how to look after
the personal information accessed and
stored on these devices…”
http://www.ico.gov.uk/news/latest_news/2013/survey-guidance-on-byod-personal-devices07032013.aspx
The Issues
Copyright (using other people’s stuff)

Data protection (respecting privacy)
e-Safety (protecting users)
e-Security (protecting the organisation)
The Difference
Not linked to place (mobile!)

Personal, invasive and pervasive
Own device
Combines access and communication
What’s the biggest issue about
mobile?

1.
2.
3.
4.
5.

Copyright
Data protection
e-Safety
e-Security
Haggis

0%

0%

0%

1.

2.

3.

0%

0%

4.

5.
Copyright & Mobile Devices
be ‘appy’ with your apps
T&Cs
‘Personal use’
Per device, per user,
multi-use
Do you have a mobile device with
copyright infringing content with you?
1. Can I call my lawyer?
2. Maybe.
3. I’m looking around to see
what option others are
pressing.
4. Yes.
5. Definitely not, guv. Honest.

0%
1

0%

0%

2

3

0%

0%

4

5
Data Protection & BYOD
Compliance and privacy

Purposes / purpose creep
Surveillance
Marketing - PECRs
“ … 47% of all UK adults now use their
personal smartphone, laptop or tablet
computer for work purposes. But less
than 3 in 10 who do so are provided
with guidance on how their devices
should be used in this capacity, raising
worrying concerns that people may not
understand how to look after the
personal information accessed and
stored on these devices…”
http://www.ico.gov.uk/news/latest_news/2013/survey-guidance-on-byod-personal-devices07032013.aspx
e-Safety & Mobile Devices
Enables new, pervasive
communication
Anonymity and access
Duty of care
Criminal offences
e-Security & Mobile Devices
BYOD
BYOVRD
LYOD
DP, liability,
breach of T&Cs
The college/employer legal
obligations
• Statutory obligations to comply with
various pieces of law
• Common law obligation of duty of care
Statutory Obligations
• Difficult to meet them if systems are not
technically up to date using latest standards
etc
• Data protection probably most risky area
• Help available on BYOD – ICO guidance
So where does college liability end?
1. It extends to all permitted
mobiles
2. Only to staff mobiles not
students’
3. Not our mobiles – not our
responsibility
4. It depends
5. In tears

0%
1

0%

0%

2

3

0%

0%

4

5
The employee legal obligations
• The employee ‘is’ the college
• Any personal liability?
• College needs to rely on its
employment contracts, behavioural
policies and disciplinary policies
• BYOD is about people, not devices
The student’s legal obligations
•
•

•
•

The student ‘is not’ the college but…
…accesses college licensed
materials, college personal data, e
safety, e-security
College needs to rely on its student
contract, behavioural policies and
disciplinary policies
Common law obligation of duty of care
The JISC Legal BYOD Toolkit –
what’s in it?
BYOD Toolkit (1 May 2013)
Jisc Legal has published a BYOD toolkit in response to the rise in learners and employees using their personal computing devices (typically
smart phones and tablets) in the work and learning environment.
The toolkit includes a variety of resources:

1.

Your Staff, Mobile Devices, Law and Liability

To some extent bring your own device (BYOD) is already happening in your institution. Staff are already using their mobile devices to access
their work emails, papers and documents from off campus. This paper focuses on the legal issues surrounding staff bringing their own devices.

2.

Your Students, Mobile Devices, Law and Liability

Students will increasingly expect that all information and services currently available from a university or college desktop will be available to them
via their mobile device. At the same time, institutions will want to ensure that systems and information are secure, and users adhere to policies on
access to systems. This paper focuses on the legal issues surrounding student mobile use.

3.

Risk, Liability and Mobile Devices

This paper provides a quick reference for managers as to the main legal risks which need to be assessed against your institution’s risk strategy
before opening your institution’s ICT system to mobile access by staff and students using their own devices.

4.

Bring Your Own Device Policy Template for Further Education

The BYOD Policy template is intended as a guide to help providers write an effective policy that states what their institution's approach is to the
use of personally owned devices by staff and learners.
New Guidance
FAQ: Can we seize and forensically analyse
a staff or student’s device in the case of
suspected misuse?
1. Yes our policy says we can
2. No- only the police can do this
under warrant
3. Maybe if the circumstances
are serious enough
4. I’m looking around to see
what option others are
pressing.

0%
1

0%
2

0%
3

0%
4
Policies
• BYOD
• DP AUP/student behaviour
• Staff procedures – dp, copyright,
safeguarding, e-safety…
• Disciplinary policies
• Publicise and enforce!
Enforcing your policies
• If want to rely on them, need to have
them in place!
• Need to be fair – consultation?
• Consistently enforced
• Very challenging in BYOD
• Use technology
Any Questions ?
http://jiscleg.al/BYODToolkit

Más contenido relacionado

La actualidad más candente

University Personal Devices (BYOD) Policy
University Personal Devices (BYOD) PolicyUniversity Personal Devices (BYOD) Policy
University Personal Devices (BYOD) Policykeyashaj
 
Usage of ict in daily life
Usage of ict in daily lifeUsage of ict in daily life
Usage of ict in daily lifeTina Lokman
 
Communities online policy 190813
Communities online policy 190813Communities online policy 190813
Communities online policy 190813jennifer_lawrence
 
Enable Ireland - Integrating apps in third level practice
Enable Ireland -  Integrating apps in third level practice Enable Ireland -  Integrating apps in third level practice
Enable Ireland - Integrating apps in third level practice Trevor Boland
 
Importance of Information Technology in Today’s World!
Importance of Information Technology in Today’s World! Importance of Information Technology in Today’s World!
Importance of Information Technology in Today’s World! MITAcademy1
 
Bringing your-own-device usage policy for abc university collage employees
Bringing your-own-device usage policy for abc university collage employeesBringing your-own-device usage policy for abc university collage employees
Bringing your-own-device usage policy for abc university collage employeesKushmi Anuththara
 
Information Technology Accessibility and Training of the Blind/VI Student
Information Technology Accessibility and Training of the Blind/VI StudentInformation Technology Accessibility and Training of the Blind/VI Student
Information Technology Accessibility and Training of the Blind/VI StudentArnoldBail
 
Trends in shaping Engineering Education in India - MIT AOE
Trends in shaping Engineering Education in India  - MIT AOETrends in shaping Engineering Education in India  - MIT AOE
Trends in shaping Engineering Education in India - MIT AOEMITAcademy1
 
E-banking: Transcending Generations
E-banking: Transcending GenerationsE-banking: Transcending Generations
E-banking: Transcending GenerationsJayar Caraballo
 
Legal and Ethical Issues
Legal and Ethical IssuesLegal and Ethical Issues
Legal and Ethical Issuestuttitat
 
Text me the answer fetc 2013
Text me the answer  fetc 2013Text me the answer  fetc 2013
Text me the answer fetc 2013Carlos Fernandez
 
Global Tech Jam: I3 Intelligent IoT Integrator.
Global Tech Jam: I3 Intelligent IoT Integrator.Global Tech Jam: I3 Intelligent IoT Integrator.
Global Tech Jam: I3 Intelligent IoT Integrator.inside-BigData.com
 
Global Tech Jam: I3 Intelligent IoT Integrator
Global Tech Jam: I3 Intelligent IoT IntegratorGlobal Tech Jam: I3 Intelligent IoT Integrator
Global Tech Jam: I3 Intelligent IoT Integratorinside-BigData.com
 
Information Security Management in University Campus Using Cognitive Security
Information Security Management in University Campus Using Cognitive SecurityInformation Security Management in University Campus Using Cognitive Security
Information Security Management in University Campus Using Cognitive SecurityCSCJournals
 
Sherelle stubbs digital elements
Sherelle stubbs digital elementsSherelle stubbs digital elements
Sherelle stubbs digital elementssherelle74
 

La actualidad más candente (20)

University Personal Devices (BYOD) Policy
University Personal Devices (BYOD) PolicyUniversity Personal Devices (BYOD) Policy
University Personal Devices (BYOD) Policy
 
Usage of ict in daily life
Usage of ict in daily lifeUsage of ict in daily life
Usage of ict in daily life
 
CS-LRC-0114
CS-LRC-0114CS-LRC-0114
CS-LRC-0114
 
Case study 7
Case study 7Case study 7
Case study 7
 
Communities online policy 190813
Communities online policy 190813Communities online policy 190813
Communities online policy 190813
 
Enable Ireland - Integrating apps in third level practice
Enable Ireland -  Integrating apps in third level practice Enable Ireland -  Integrating apps in third level practice
Enable Ireland - Integrating apps in third level practice
 
Importance of Information Technology in Today’s World!
Importance of Information Technology in Today’s World! Importance of Information Technology in Today’s World!
Importance of Information Technology in Today’s World!
 
Bringing your-own-device usage policy for abc university collage employees
Bringing your-own-device usage policy for abc university collage employeesBringing your-own-device usage policy for abc university collage employees
Bringing your-own-device usage policy for abc university collage employees
 
Information Technology Accessibility and Training of the Blind/VI Student
Information Technology Accessibility and Training of the Blind/VI StudentInformation Technology Accessibility and Training of the Blind/VI Student
Information Technology Accessibility and Training of the Blind/VI Student
 
Trends in shaping Engineering Education in India - MIT AOE
Trends in shaping Engineering Education in India  - MIT AOETrends in shaping Engineering Education in India  - MIT AOE
Trends in shaping Engineering Education in India - MIT AOE
 
E-banking: Transcending Generations
E-banking: Transcending GenerationsE-banking: Transcending Generations
E-banking: Transcending Generations
 
Legal and Ethical Issues
Legal and Ethical IssuesLegal and Ethical Issues
Legal and Ethical Issues
 
Text me the answer fetc 2013
Text me the answer  fetc 2013Text me the answer  fetc 2013
Text me the answer fetc 2013
 
Global Tech Jam: I3 Intelligent IoT Integrator.
Global Tech Jam: I3 Intelligent IoT Integrator.Global Tech Jam: I3 Intelligent IoT Integrator.
Global Tech Jam: I3 Intelligent IoT Integrator.
 
Global Tech Jam: I3 Intelligent IoT Integrator
Global Tech Jam: I3 Intelligent IoT IntegratorGlobal Tech Jam: I3 Intelligent IoT Integrator
Global Tech Jam: I3 Intelligent IoT Integrator
 
E Safety For Governors
E Safety For GovernorsE Safety For Governors
E Safety For Governors
 
Information Security Management in University Campus Using Cognitive Security
Information Security Management in University Campus Using Cognitive SecurityInformation Security Management in University Campus Using Cognitive Security
Information Security Management in University Campus Using Cognitive Security
 
Ethical Implications of IT
Ethical Implications of ITEthical Implications of IT
Ethical Implications of IT
 
Avit infrastructure guide
Avit infrastructure guideAvit infrastructure guide
Avit infrastructure guide
 
Sherelle stubbs digital elements
Sherelle stubbs digital elementsSherelle stubbs digital elements
Sherelle stubbs digital elements
 

Destacado

Lets SAASify that Desktop Application
Lets SAASify that Desktop ApplicationLets SAASify that Desktop Application
Lets SAASify that Desktop ApplicationIndicThreads
 
MedicinMan September 2012
MedicinMan  September 2012MedicinMan  September 2012
MedicinMan September 2012Anup Soans
 
Running your Java EE 6 applications in the Cloud
Running your Java EE 6 applications in the CloudRunning your Java EE 6 applications in the Cloud
Running your Java EE 6 applications in the CloudIndicThreads
 
E learning forum oct 2013 - Introduction & News Update
E learning forum oct 2013 - Introduction & News UpdateE learning forum oct 2013 - Introduction & News Update
E learning forum oct 2013 - Introduction & News UpdateJISC RSC Eastern
 
Jisc RSC Eastern Learning Resources Managers forum 14/03/14 - Mobile users an...
Jisc RSC Eastern Learning Resources Managers forum 14/03/14 - Mobile users an...Jisc RSC Eastern Learning Resources Managers forum 14/03/14 - Mobile users an...
Jisc RSC Eastern Learning Resources Managers forum 14/03/14 - Mobile users an...JISC RSC Eastern
 
Indic threads pune12-polyglot & functional programming on jvm
Indic threads pune12-polyglot & functional programming on jvmIndic threads pune12-polyglot & functional programming on jvm
Indic threads pune12-polyglot & functional programming on jvmIndicThreads
 

Destacado (7)

Lets SAASify that Desktop Application
Lets SAASify that Desktop ApplicationLets SAASify that Desktop Application
Lets SAASify that Desktop Application
 
MedicinMan September 2012
MedicinMan  September 2012MedicinMan  September 2012
MedicinMan September 2012
 
Running your Java EE 6 applications in the Cloud
Running your Java EE 6 applications in the CloudRunning your Java EE 6 applications in the Cloud
Running your Java EE 6 applications in the Cloud
 
Rsc eastern 2010
Rsc eastern 2010Rsc eastern 2010
Rsc eastern 2010
 
E learning forum oct 2013 - Introduction & News Update
E learning forum oct 2013 - Introduction & News UpdateE learning forum oct 2013 - Introduction & News Update
E learning forum oct 2013 - Introduction & News Update
 
Jisc RSC Eastern Learning Resources Managers forum 14/03/14 - Mobile users an...
Jisc RSC Eastern Learning Resources Managers forum 14/03/14 - Mobile users an...Jisc RSC Eastern Learning Resources Managers forum 14/03/14 - Mobile users an...
Jisc RSC Eastern Learning Resources Managers forum 14/03/14 - Mobile users an...
 
Indic threads pune12-polyglot & functional programming on jvm
Indic threads pune12-polyglot & functional programming on jvmIndic threads pune12-polyglot & functional programming on jvm
Indic threads pune12-polyglot & functional programming on jvm
 

Similar a Jisc RSC Eastern Technical Managers forum June 2013 'BYOD Tech Managers forum'

Internet privacy ethics and online security
Internet privacy ethics and online securityInternet privacy ethics and online security
Internet privacy ethics and online securityPaul Berryman
 
DWEL - Module 5 final.pptx
DWEL - Module 5 final.pptxDWEL - Module 5 final.pptx
DWEL - Module 5 final.pptxcaniceconsulting
 
Point2Protect - keeping children safe
Point2Protect - keeping children safePoint2Protect - keeping children safe
Point2Protect - keeping children safePoint2Protect
 
IET India Advisory: Safeguarding children from cyber threats in times of a pa...
IET India Advisory: Safeguarding children from cyber threats in times of a pa...IET India Advisory: Safeguarding children from cyber threats in times of a pa...
IET India Advisory: Safeguarding children from cyber threats in times of a pa...IET India
 
Star Kamal 9 B
Star Kamal 9 BStar Kamal 9 B
Star Kamal 9 Bjboulanger
 
GUL Network Infrastructure
GUL Network InfrastructureGUL Network Infrastructure
GUL Network InfrastructureMuhammad Zeeshan
 
Cyber_Safety_K-12_Fact_Sheet_508C.pdf
Cyber_Safety_K-12_Fact_Sheet_508C.pdfCyber_Safety_K-12_Fact_Sheet_508C.pdf
Cyber_Safety_K-12_Fact_Sheet_508C.pdfMi Ra Lavandelo
 
Why Education Sector Needs To Prioritize Cybersecurity? 7 Helpful Importance ...
Why Education Sector Needs To Prioritize Cybersecurity? 7 Helpful Importance ...Why Education Sector Needs To Prioritize Cybersecurity? 7 Helpful Importance ...
Why Education Sector Needs To Prioritize Cybersecurity? 7 Helpful Importance ...Future Education Magazine
 
Digital citizenship @ your school
Digital citizenship @ your schoolDigital citizenship @ your school
Digital citizenship @ your schoolJune Wall
 
Surviving a BYOD Implementation
Surviving a BYOD ImplementationSurviving a BYOD Implementation
Surviving a BYOD ImplementationDiana Benner
 
chapter 6 Ethics and Professionalism of ET.pptx
chapter 6   Ethics and Professionalism of ET.pptxchapter 6   Ethics and Professionalism of ET.pptx
chapter 6 Ethics and Professionalism of ET.pptxAmanuelZewdie4
 
Naughty or nice 2007 version
Naughty or nice 2007 versionNaughty or nice 2007 version
Naughty or nice 2007 versionJohan Koren
 
Student privacy and_technology_2020
Student privacy and_technology_2020Student privacy and_technology_2020
Student privacy and_technology_2020kmuench
 
Naughty or nice 2003 version
Naughty or nice 2003 versionNaughty or nice 2003 version
Naughty or nice 2003 versionJohan Koren
 

Similar a Jisc RSC Eastern Technical Managers forum June 2013 'BYOD Tech Managers forum' (20)

Internet privacy ethics and online security
Internet privacy ethics and online securityInternet privacy ethics and online security
Internet privacy ethics and online security
 
DWEL - Module 5 final.pptx
DWEL - Module 5 final.pptxDWEL - Module 5 final.pptx
DWEL - Module 5 final.pptx
 
eSafety policy
eSafety policyeSafety policy
eSafety policy
 
Point2Protect - keeping children safe
Point2Protect - keeping children safePoint2Protect - keeping children safe
Point2Protect - keeping children safe
 
IET India Advisory: Safeguarding children from cyber threats in times of a pa...
IET India Advisory: Safeguarding children from cyber threats in times of a pa...IET India Advisory: Safeguarding children from cyber threats in times of a pa...
IET India Advisory: Safeguarding children from cyber threats in times of a pa...
 
Star Kamal 9 B
Star Kamal 9 BStar Kamal 9 B
Star Kamal 9 B
 
E safety for governors & carers
E safety for governors & carersE safety for governors & carers
E safety for governors & carers
 
SAFETY ISSUES NOTES.docx
SAFETY ISSUES NOTES.docxSAFETY ISSUES NOTES.docx
SAFETY ISSUES NOTES.docx
 
GUL Network Infrastructure
GUL Network InfrastructureGUL Network Infrastructure
GUL Network Infrastructure
 
Digital Citizenship
Digital CitizenshipDigital Citizenship
Digital Citizenship
 
Ict maria h
Ict maria hIct maria h
Ict maria h
 
Cyber_Safety_K-12_Fact_Sheet_508C.pdf
Cyber_Safety_K-12_Fact_Sheet_508C.pdfCyber_Safety_K-12_Fact_Sheet_508C.pdf
Cyber_Safety_K-12_Fact_Sheet_508C.pdf
 
Why Education Sector Needs To Prioritize Cybersecurity? 7 Helpful Importance ...
Why Education Sector Needs To Prioritize Cybersecurity? 7 Helpful Importance ...Why Education Sector Needs To Prioritize Cybersecurity? 7 Helpful Importance ...
Why Education Sector Needs To Prioritize Cybersecurity? 7 Helpful Importance ...
 
Digital citizenship @ your school
Digital citizenship @ your schoolDigital citizenship @ your school
Digital citizenship @ your school
 
Surviving a BYOD Implementation
Surviving a BYOD ImplementationSurviving a BYOD Implementation
Surviving a BYOD Implementation
 
chapter 6 Ethics and Professionalism of ET.pptx
chapter 6   Ethics and Professionalism of ET.pptxchapter 6   Ethics and Professionalism of ET.pptx
chapter 6 Ethics and Professionalism of ET.pptx
 
digital citizenship poe
digital citizenship poedigital citizenship poe
digital citizenship poe
 
Naughty or nice 2007 version
Naughty or nice 2007 versionNaughty or nice 2007 version
Naughty or nice 2007 version
 
Student privacy and_technology_2020
Student privacy and_technology_2020Student privacy and_technology_2020
Student privacy and_technology_2020
 
Naughty or nice 2003 version
Naughty or nice 2003 versionNaughty or nice 2003 version
Naughty or nice 2003 version
 

Más de JISC RSC Eastern

Jisc RSC Eastern Technical Managers forum 'Janet' presentation
Jisc RSC Eastern Technical Managers forum 'Janet' presentationJisc RSC Eastern Technical Managers forum 'Janet' presentation
Jisc RSC Eastern Technical Managers forum 'Janet' presentationJISC RSC Eastern
 
Jisc RSC Eastern Digital Literacies event 30.04.14 "Introduction to Digital L...
Jisc RSC Eastern Digital Literacies event 30.04.14 "Introduction to Digital L...Jisc RSC Eastern Digital Literacies event 30.04.14 "Introduction to Digital L...
Jisc RSC Eastern Digital Literacies event 30.04.14 "Introduction to Digital L...JISC RSC Eastern
 
Jisc RSC Eastern VLE forum 28/03/14 'Flippin' Mobiles - How do they effect on...
Jisc RSC Eastern VLE forum 28/03/14 'Flippin' Mobiles - How do they effect on...Jisc RSC Eastern VLE forum 28/03/14 'Flippin' Mobiles - How do they effect on...
Jisc RSC Eastern VLE forum 28/03/14 'Flippin' Mobiles - How do they effect on...JISC RSC Eastern
 
Learning Resources Managers forum 14/03/14 - LRC and e-Learning Primary Proje...
Learning Resources Managers forum 14/03/14 - LRC and e-Learning Primary Proje...Learning Resources Managers forum 14/03/14 - LRC and e-Learning Primary Proje...
Learning Resources Managers forum 14/03/14 - LRC and e-Learning Primary Proje...JISC RSC Eastern
 
Jisc RSC Eastern Microsoft Briefing - Ridgian BI Jisc RSC Eastern 19th march ...
Jisc RSC Eastern Microsoft Briefing - Ridgian BI Jisc RSC Eastern 19th march ...Jisc RSC Eastern Microsoft Briefing - Ridgian BI Jisc RSC Eastern 19th march ...
Jisc RSC Eastern Microsoft Briefing - Ridgian BI Jisc RSC Eastern 19th march ...JISC RSC Eastern
 
Jisc RSC Eastern forum 14th March 2014 Destiny Wireless Presentation
Jisc RSC Eastern forum 14th March 2014 Destiny Wireless PresentationJisc RSC Eastern forum 14th March 2014 Destiny Wireless Presentation
Jisc RSC Eastern forum 14th March 2014 Destiny Wireless PresentationJISC RSC Eastern
 
Jisc RSC Eastern e-Learning forum 14th March 2014 Eastern update
Jisc RSC Eastern e-Learning forum 14th March 2014 Eastern update Jisc RSC Eastern e-Learning forum 14th March 2014 Eastern update
Jisc RSC Eastern e-Learning forum 14th March 2014 Eastern update JISC RSC Eastern
 
Jisc RSC Eastern LRMF 14th March 2014 - RSC Eastern Update
Jisc RSC Eastern LRMF 14th March 2014 - RSC Eastern UpdateJisc RSC Eastern LRMF 14th March 2014 - RSC Eastern Update
Jisc RSC Eastern LRMF 14th March 2014 - RSC Eastern UpdateJISC RSC Eastern
 
Jisc RSC Eastern LRMF Mobile users and handhelds
Jisc RSC Eastern LRMF Mobile users and handheldsJisc RSC Eastern LRMF Mobile users and handhelds
Jisc RSC Eastern LRMF Mobile users and handheldsJISC RSC Eastern
 
Jisc RSC Eastern / Microsoft Briefing Tablets in Education - Tablet Academy
Jisc RSC Eastern / Microsoft Briefing Tablets in Education - Tablet AcademyJisc RSC Eastern / Microsoft Briefing Tablets in Education - Tablet Academy
Jisc RSC Eastern / Microsoft Briefing Tablets in Education - Tablet AcademyJISC RSC Eastern
 
Jisc RSC Eastern / Microsoft Briefing 19.03.14 How to achieve a successful CR...
Jisc RSC Eastern / Microsoft Briefing 19.03.14 How to achieve a successful CR...Jisc RSC Eastern / Microsoft Briefing 19.03.14 How to achieve a successful CR...
Jisc RSC Eastern / Microsoft Briefing 19.03.14 How to achieve a successful CR...JISC RSC Eastern
 
Rsc Eastern / Microsoft Briefing 19th March 2014 Freedom Communications
Rsc Eastern / Microsoft Briefing 19th March 2014 Freedom CommunicationsRsc Eastern / Microsoft Briefing 19th March 2014 Freedom Communications
Rsc Eastern / Microsoft Briefing 19th March 2014 Freedom CommunicationsJISC RSC Eastern
 
Jisc RSC Eastern Technical Managers Forum 5th February 2014 Oaklands College ...
Jisc RSC Eastern Technical Managers Forum 5th February 2014 Oaklands College ...Jisc RSC Eastern Technical Managers Forum 5th February 2014 Oaklands College ...
Jisc RSC Eastern Technical Managers Forum 5th February 2014 Oaklands College ...JISC RSC Eastern
 
Jisc RSC Eastern Learning Resources Managers forum Nov 2013 RSC Eastern update
Jisc RSC Eastern Learning Resources Managers forum Nov 2013 RSC Eastern updateJisc RSC Eastern Learning Resources Managers forum Nov 2013 RSC Eastern update
Jisc RSC Eastern Learning Resources Managers forum Nov 2013 RSC Eastern updateJISC RSC Eastern
 
Jisc RSC Eastern e-Fair 2012 Jisc TechDis
Jisc RSC Eastern e-Fair 2012 Jisc TechDisJisc RSC Eastern e-Fair 2012 Jisc TechDis
Jisc RSC Eastern e-Fair 2012 Jisc TechDisJISC RSC Eastern
 
Jisc RSC Eastern eFair 2012 'Free enabling technologies'
Jisc RSC Eastern eFair 2012 'Free enabling technologies'Jisc RSC Eastern eFair 2012 'Free enabling technologies'
Jisc RSC Eastern eFair 2012 'Free enabling technologies'JISC RSC Eastern
 
Jisc RSC Eastern eFair July 2013 'A leg to stand on... (Jisc Techdis, inclusi...
Jisc RSC Eastern eFair July 2013 'A leg to stand on... (Jisc Techdis, inclusi...Jisc RSC Eastern eFair July 2013 'A leg to stand on... (Jisc Techdis, inclusi...
Jisc RSC Eastern eFair July 2013 'A leg to stand on... (Jisc Techdis, inclusi...JISC RSC Eastern
 

Más de JISC RSC Eastern (20)

Jisc RSC Eastern Technical Managers forum 'Janet' presentation
Jisc RSC Eastern Technical Managers forum 'Janet' presentationJisc RSC Eastern Technical Managers forum 'Janet' presentation
Jisc RSC Eastern Technical Managers forum 'Janet' presentation
 
Jisc RSC Eastern Digital Literacies event 30.04.14 "Introduction to Digital L...
Jisc RSC Eastern Digital Literacies event 30.04.14 "Introduction to Digital L...Jisc RSC Eastern Digital Literacies event 30.04.14 "Introduction to Digital L...
Jisc RSC Eastern Digital Literacies event 30.04.14 "Introduction to Digital L...
 
Jisc RSC Eastern VLE forum 28/03/14 'Flippin' Mobiles - How do they effect on...
Jisc RSC Eastern VLE forum 28/03/14 'Flippin' Mobiles - How do they effect on...Jisc RSC Eastern VLE forum 28/03/14 'Flippin' Mobiles - How do they effect on...
Jisc RSC Eastern VLE forum 28/03/14 'Flippin' Mobiles - How do they effect on...
 
Learning Resources Managers forum 14/03/14 - LRC and e-Learning Primary Proje...
Learning Resources Managers forum 14/03/14 - LRC and e-Learning Primary Proje...Learning Resources Managers forum 14/03/14 - LRC and e-Learning Primary Proje...
Learning Resources Managers forum 14/03/14 - LRC and e-Learning Primary Proje...
 
Jisc RSC Eastern Microsoft Briefing - Ridgian BI Jisc RSC Eastern 19th march ...
Jisc RSC Eastern Microsoft Briefing - Ridgian BI Jisc RSC Eastern 19th march ...Jisc RSC Eastern Microsoft Briefing - Ridgian BI Jisc RSC Eastern 19th march ...
Jisc RSC Eastern Microsoft Briefing - Ridgian BI Jisc RSC Eastern 19th march ...
 
Jisc RSC Eastern forum 14th March 2014 Destiny Wireless Presentation
Jisc RSC Eastern forum 14th March 2014 Destiny Wireless PresentationJisc RSC Eastern forum 14th March 2014 Destiny Wireless Presentation
Jisc RSC Eastern forum 14th March 2014 Destiny Wireless Presentation
 
Jisc RSC Eastern e-Learning forum 14th March 2014 Eastern update
Jisc RSC Eastern e-Learning forum 14th March 2014 Eastern update Jisc RSC Eastern e-Learning forum 14th March 2014 Eastern update
Jisc RSC Eastern e-Learning forum 14th March 2014 Eastern update
 
Jisc RSC Eastern LRMF 14th March 2014 - RSC Eastern Update
Jisc RSC Eastern LRMF 14th March 2014 - RSC Eastern UpdateJisc RSC Eastern LRMF 14th March 2014 - RSC Eastern Update
Jisc RSC Eastern LRMF 14th March 2014 - RSC Eastern Update
 
Jisc RSC Eastern LRMF Mobile users and handhelds
Jisc RSC Eastern LRMF Mobile users and handheldsJisc RSC Eastern LRMF Mobile users and handhelds
Jisc RSC Eastern LRMF Mobile users and handhelds
 
Jisc RSC Eastern / Microsoft Briefing Tablets in Education - Tablet Academy
Jisc RSC Eastern / Microsoft Briefing Tablets in Education - Tablet AcademyJisc RSC Eastern / Microsoft Briefing Tablets in Education - Tablet Academy
Jisc RSC Eastern / Microsoft Briefing Tablets in Education - Tablet Academy
 
Jisc RSC Eastern / Microsoft Briefing 19.03.14 How to achieve a successful CR...
Jisc RSC Eastern / Microsoft Briefing 19.03.14 How to achieve a successful CR...Jisc RSC Eastern / Microsoft Briefing 19.03.14 How to achieve a successful CR...
Jisc RSC Eastern / Microsoft Briefing 19.03.14 How to achieve a successful CR...
 
Rsc Eastern / Microsoft Briefing 19th March 2014 Freedom Communications
Rsc Eastern / Microsoft Briefing 19th March 2014 Freedom CommunicationsRsc Eastern / Microsoft Briefing 19th March 2014 Freedom Communications
Rsc Eastern / Microsoft Briefing 19th March 2014 Freedom Communications
 
Jisc RSC Eastern Technical Managers Forum 5th February 2014 Oaklands College ...
Jisc RSC Eastern Technical Managers Forum 5th February 2014 Oaklands College ...Jisc RSC Eastern Technical Managers Forum 5th February 2014 Oaklands College ...
Jisc RSC Eastern Technical Managers Forum 5th February 2014 Oaklands College ...
 
Rsc update feb 2014
Rsc update feb 2014Rsc update feb 2014
Rsc update feb 2014
 
Janet feb2014
Janet feb2014Janet feb2014
Janet feb2014
 
Service level agreements
Service level agreementsService level agreements
Service level agreements
 
Jisc RSC Eastern Learning Resources Managers forum Nov 2013 RSC Eastern update
Jisc RSC Eastern Learning Resources Managers forum Nov 2013 RSC Eastern updateJisc RSC Eastern Learning Resources Managers forum Nov 2013 RSC Eastern update
Jisc RSC Eastern Learning Resources Managers forum Nov 2013 RSC Eastern update
 
Jisc RSC Eastern e-Fair 2012 Jisc TechDis
Jisc RSC Eastern e-Fair 2012 Jisc TechDisJisc RSC Eastern e-Fair 2012 Jisc TechDis
Jisc RSC Eastern e-Fair 2012 Jisc TechDis
 
Jisc RSC Eastern eFair 2012 'Free enabling technologies'
Jisc RSC Eastern eFair 2012 'Free enabling technologies'Jisc RSC Eastern eFair 2012 'Free enabling technologies'
Jisc RSC Eastern eFair 2012 'Free enabling technologies'
 
Jisc RSC Eastern eFair July 2013 'A leg to stand on... (Jisc Techdis, inclusi...
Jisc RSC Eastern eFair July 2013 'A leg to stand on... (Jisc Techdis, inclusi...Jisc RSC Eastern eFair July 2013 'A leg to stand on... (Jisc Techdis, inclusi...
Jisc RSC Eastern eFair July 2013 'A leg to stand on... (Jisc Techdis, inclusi...
 

Último

Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embeddingZilliz
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxBkGupta21
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningLars Bell
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersRaghuram Pandurangan
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Manik S Magar
 
What is Artificial Intelligence?????????
What is Artificial Intelligence?????????What is Artificial Intelligence?????????
What is Artificial Intelligence?????????blackmambaettijean
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsNathaniel Shimoni
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 

Último (20)

Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embedding
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptx
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information Developers
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
 
What is Artificial Intelligence?????????
What is Artificial Intelligence?????????What is Artificial Intelligence?????????
What is Artificial Intelligence?????????
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directions
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 

Jisc RSC Eastern Technical Managers forum June 2013 'BYOD Tech Managers forum'

  • 1. BYOD Where does institutional liability end ? 26 June 2013 RSC Eastern Technical managers Forum
  • 2. Hello! Betty Willder info@jisclegal.ac.uk 0141 548 4939 www.jisclegal.ac.uk http://twitter.com/JISCLegal
  • 3. About Jisc Legal • Role: to avoid legal issues becoming a barrier to the use of technology in tertiary education • Information service: we cannot take decisions for you when you are faced with a risk
  • 4. “ … 47% of all UK adults now use their personal smartphone, laptop or tablet computer for work purposes. But less than 3 in 10 who do so are provided with guidance on how their devices should be used in this capacity, raising worrying concerns that people may not understand how to look after the personal information accessed and stored on these devices…” http://www.ico.gov.uk/news/latest_news/2013/survey-guidance-on-byod-personal-devices07032013.aspx
  • 5. The Issues Copyright (using other people’s stuff) Data protection (respecting privacy) e-Safety (protecting users) e-Security (protecting the organisation)
  • 6. The Difference Not linked to place (mobile!) Personal, invasive and pervasive Own device Combines access and communication
  • 7. What’s the biggest issue about mobile? 1. 2. 3. 4. 5. Copyright Data protection e-Safety e-Security Haggis 0% 0% 0% 1. 2. 3. 0% 0% 4. 5.
  • 8. Copyright & Mobile Devices be ‘appy’ with your apps T&Cs ‘Personal use’ Per device, per user, multi-use
  • 9. Do you have a mobile device with copyright infringing content with you? 1. Can I call my lawyer? 2. Maybe. 3. I’m looking around to see what option others are pressing. 4. Yes. 5. Definitely not, guv. Honest. 0% 1 0% 0% 2 3 0% 0% 4 5
  • 10. Data Protection & BYOD Compliance and privacy Purposes / purpose creep Surveillance Marketing - PECRs
  • 11. “ … 47% of all UK adults now use their personal smartphone, laptop or tablet computer for work purposes. But less than 3 in 10 who do so are provided with guidance on how their devices should be used in this capacity, raising worrying concerns that people may not understand how to look after the personal information accessed and stored on these devices…” http://www.ico.gov.uk/news/latest_news/2013/survey-guidance-on-byod-personal-devices07032013.aspx
  • 12. e-Safety & Mobile Devices Enables new, pervasive communication Anonymity and access Duty of care Criminal offences
  • 13. e-Security & Mobile Devices BYOD BYOVRD LYOD DP, liability, breach of T&Cs
  • 14. The college/employer legal obligations • Statutory obligations to comply with various pieces of law • Common law obligation of duty of care
  • 15. Statutory Obligations • Difficult to meet them if systems are not technically up to date using latest standards etc • Data protection probably most risky area • Help available on BYOD – ICO guidance
  • 16. So where does college liability end? 1. It extends to all permitted mobiles 2. Only to staff mobiles not students’ 3. Not our mobiles – not our responsibility 4. It depends 5. In tears 0% 1 0% 0% 2 3 0% 0% 4 5
  • 17. The employee legal obligations • The employee ‘is’ the college • Any personal liability? • College needs to rely on its employment contracts, behavioural policies and disciplinary policies • BYOD is about people, not devices
  • 18. The student’s legal obligations • • • • The student ‘is not’ the college but… …accesses college licensed materials, college personal data, e safety, e-security College needs to rely on its student contract, behavioural policies and disciplinary policies Common law obligation of duty of care
  • 19. The JISC Legal BYOD Toolkit – what’s in it?
  • 20. BYOD Toolkit (1 May 2013) Jisc Legal has published a BYOD toolkit in response to the rise in learners and employees using their personal computing devices (typically smart phones and tablets) in the work and learning environment. The toolkit includes a variety of resources: 1. Your Staff, Mobile Devices, Law and Liability To some extent bring your own device (BYOD) is already happening in your institution. Staff are already using their mobile devices to access their work emails, papers and documents from off campus. This paper focuses on the legal issues surrounding staff bringing their own devices. 2. Your Students, Mobile Devices, Law and Liability Students will increasingly expect that all information and services currently available from a university or college desktop will be available to them via their mobile device. At the same time, institutions will want to ensure that systems and information are secure, and users adhere to policies on access to systems. This paper focuses on the legal issues surrounding student mobile use. 3. Risk, Liability and Mobile Devices This paper provides a quick reference for managers as to the main legal risks which need to be assessed against your institution’s risk strategy before opening your institution’s ICT system to mobile access by staff and students using their own devices. 4. Bring Your Own Device Policy Template for Further Education The BYOD Policy template is intended as a guide to help providers write an effective policy that states what their institution's approach is to the use of personally owned devices by staff and learners.
  • 22. FAQ: Can we seize and forensically analyse a staff or student’s device in the case of suspected misuse? 1. Yes our policy says we can 2. No- only the police can do this under warrant 3. Maybe if the circumstances are serious enough 4. I’m looking around to see what option others are pressing. 0% 1 0% 2 0% 3 0% 4
  • 23. Policies • BYOD • DP AUP/student behaviour • Staff procedures – dp, copyright, safeguarding, e-safety… • Disciplinary policies • Publicise and enforce!
  • 24. Enforcing your policies • If want to rely on them, need to have them in place! • Need to be fair – consultation? • Consistently enforced • Very challenging in BYOD • Use technology