This document summarizes a presentation by Jason Miles-Campbell from Jisc Legal about legal responsibilities and implementing a bring your own device (BYOD) strategy. The presentation addresses key legal issues around copyright, data protection, e-safety, and e-security relating to mobile devices. It emphasizes ensuring policies are updated for BYOD, managing legal risks, and monitoring the impact of mobile device usage. Audience members provided input through polling questions during the presentation.
1 of 35
Download to read offline
More Related Content
130426 rsc sw byod (jmc)
1. Where do my responsibilities end?
Legal aspects of implementing a
BYOD strategy
Friday, 26 April 2013
Taunton
3. 3
About Jisc Legal
Role: to avoid legal issues becoming a
barrier to the use of technology in tertiary
education
Information service: we cannot take
decisions for you when you are faced with a
risk
6. Have you heard of Jisc Legal before?
1. Hello again, Jason
2. Yes, fairly often
3. Yes, used occasionally
4. Vague acquaintance
5. Whats that, then?
1 2 3 4 5
20% 20%
45%
5%
10%
7. When it comes to legal issues...
1. Im confident
2. Ive a fair idea
3. I dabble
4. I ask others
5. I hide in the toilet
1 2 3 4 5
0%
30%
10%
40%
20%
8. 8
Why Comply?
Its the law
Confidence v uncertainty
Example
Reputation
Quality inspection
But risk management
9. 9
Legal bill for defamation accusation...
1. Theyll do it for free
2. 65p
3. 贈6.50
4. 贈6500
5. 贈6,500,000
1 2 3 4 5
0% 0%
32%
68%
0%
10. The Issues
Copyright (using other peoples stuff)
Data protection (respecting privacy)
e-Safety (protecting users)
e-Security (protecting the organisation)
11. The Difference
Not linked to place (mobile!)
Personal, invasive and pervasive
Own device
Combines access and communication
12. Whats the biggest issue about
mobile?
際際滷 11 of 27
1. Copyright
2. Data protection
3. e-Safety
4. e-Security
5. Haggis
1 2 3 4 5
10%
29%
0%
33%
29%
13. 47% of all UK adults now use their
personal smartphone, laptop or tablet
computer for work purposes. But less
than 3 in 10 who do so are provided
with guidance on how their devices
should be used in this capacity, raising
worrying concerns that people may not
understand how to look after the
personal information accessed and
stored on these devices
http://www.ico.gov.uk/news/latest_news/2013/survey-guidance-on-byod-personal-devices-
07032013.aspx
14. Copyright & Mobile Devices
How to be Appy
T&Cs
Personal use
Per device, per user,
multi-use
15. Do you have a mobile device with copyright
infringing content with you?
1. Can I call my lawyer?
2. Maybe.
3. Im looking around and see
what option others are pressing.
4. Yes.
5. Definitely not, guv. Honest. 1 2 3 4 5
5%
26%
58%
5%5%
16. Data Protection & BYOD
Compliance and privacy
Purposes / purpose creep
Surveillance
Marketing - PECRs
17. e-Safety & Mobile Devices
Enables new, pervasive
communication
Anonymity and access
Duty of care
Criminal offences
24. Keep legal risk in
perspective.
Have risk assessment
procedures in place.
際際滷 18 of 27
25. What should we do about risk?
1 2 3 4 5
0%
5% 5%
90%
0%
1. Ignore it
2. Eliminate it
3. Think about it
4. Take steps to
manage it
5. Run around screaming
30. Next steps?
1 2 3 4 5 6
0%
19%
13%
38%
25%
6%
際際滷 23 of 27
1. Go back and say well done!
2. Start a conversation with
management
3. Re-write a few policies
4. Monitor whats in place already
5. Get further support
6. Point at the guy/gal over there
and say his problem!
32. Did you find this presentation useful?
1. Utterly fantastic
2. Brilliant
3. Pretty good
4. Good
5. Sorry, I was on Facebook...
6. Wish Id gone to the other session
際際滷 22 of 27
1 2 3 4 5
95%
0%
5%
0%0%
34. 34
Jisc Legal is hosted by the University of Strathclyde,
a charitable body, registered in Scotland,
with registration number SC015263.
This work, with the exception of logos, and any other content marked with a
separate copyright notice, is licensed under a Creative Commons Attribution 3.0
Unported Licence. Attribution should be 息 Jisc Legal www.jisclegal.ac.uk
used under Creative Commons Attribution 3.0 Unported Licence (with clickable
URLs where possible). The use of logos in the work is licensed for use only on
non-derivative copies. Further information at
www.jisclegal.ac.uk/CopyrightPolicy.
#6: Plug resources especially top tips and policy checklist as each only one side of A4.Also, video resources useful for Scotland, England, N Ireland, Wales.
#13: TurningPointContext of learning. Notice and Take Down, Acceptable Use. authorise.
#16: Likely to be Safeguarding officer or e-Safety OfficerMake someone ultimately responsible for e-safety, for planning, co-ordinating approach, implementation, training and response. Senior member of staff who already has child protection training and knowledge of working with other agencies.Someone approachable, set right tone, strong leadership role.
#20: Likely to be Safeguarding officer or e-Safety OfficerMake someone ultimately responsible for e-safety, for planning, co-ordinating approach, implementation, training and response. Senior member of staff who already has child protection training and knowledge of working with other agencies.Someone approachable, set right tone, strong leadership role.
#21: Represent cross section of college community, stakeholders.Consultation, variety of approach.Learner input!Depends on college.
#22: Online tools to help Generator, National Education Network etc (see links on our site)Assess what is working well and what needs further input. Inform all parties of the audit.Prioritise next steps.
#24: Set the ground rules, mitigate liability, make all users aware of limits and boundaries.All staff and students to be aware of rights and responsibilities when using ICTEasily understood by learnersClarify when and in what circumstances it will apply e.g. broad in scope, include mobile technologies, learners hardware (?)Scrutiny by Inspectorate.Link to other relevant policies, particularly AUP see JISC Legals checklist.
#25: Think ahead key to safeguarding.Assess risk in context e.g. off site learning, vulnerable learners, school links etc.What can we do to make it safer?Enhanced procedures for vulnerable learners etc.Consistency crucial.
#36: Plug resources especially top tips and policy checklist as each only one side of A4.Also, video resources useful for Scotland, England, N Ireland, Wales.