際際滷

際際滷Share a Scribd company logo
Where do my responsibilities end?
Legal aspects of implementing a
BYOD strategy
Friday, 26 April 2013
Taunton
2
Jason Miles-Campbell
Jisc Legal Service Manager
www.jisclegal.ac.uk
info@jisclegal.ac.uk
0141 548 4939
Hello!
3
About Jisc Legal
 Role: to avoid legal issues becoming a
barrier to the use of technology in tertiary
education
 Information service: we cannot take
decisions for you when you are faced with a
risk
130426 rsc sw byod (jmc)
http://www.slideshare.net/JISCLegal/130426-rsc-sw-byod-jmc
This presentation
on 際際滷share
(or search for
slideshare jisclegal)
Have you heard of Jisc Legal before?
1. Hello again, Jason
2. Yes, fairly often
3. Yes, used occasionally
4. Vague acquaintance
5. Whats that, then?
1 2 3 4 5
20% 20%
45%
5%
10%
When it comes to legal issues...
1. Im confident
2. Ive a fair idea
3. I dabble
4. I ask others
5. I hide in the toilet
1 2 3 4 5
0%
30%
10%
40%
20%
8
Why Comply?
 Its the law
 Confidence v uncertainty
 Example
 Reputation
 Quality inspection
 But risk management
9
Legal bill for defamation accusation...
1. Theyll do it for free
2. 65p
3. 贈6.50
4. 贈6500
5. 贈6,500,000
1 2 3 4 5
0% 0%
32%
68%
0%
The Issues
Copyright (using other peoples stuff)
Data protection (respecting privacy)
e-Safety (protecting users)
e-Security (protecting the organisation)
The Difference
Not linked to place (mobile!)
Personal, invasive and pervasive
Own device
Combines access and communication
Whats the biggest issue about
mobile?
際際滷 11 of 27
1. Copyright
2. Data protection
3. e-Safety
4. e-Security
5. Haggis
1 2 3 4 5
10%
29%
0%
33%
29%
  47% of all UK adults now use their
personal smartphone, laptop or tablet
computer for work purposes. But less
than 3 in 10 who do so are provided
with guidance on how their devices
should be used in this capacity, raising
worrying concerns that people may not
understand how to look after the
personal information accessed and
stored on these devices
http://www.ico.gov.uk/news/latest_news/2013/survey-guidance-on-byod-personal-devices-
07032013.aspx
Copyright & Mobile Devices
How to be Appy
T&Cs
Personal use
Per device, per user,
multi-use
Do you have a mobile device with copyright
infringing content with you?
1. Can I call my lawyer?
2. Maybe.
3. Im looking around and see
what option others are pressing.
4. Yes.
5. Definitely not, guv. Honest. 1 2 3 4 5
5%
26%
58%
5%5%
Data Protection & BYOD
Compliance and privacy
Purposes / purpose creep
Surveillance
Marketing - PECRs
e-Safety & Mobile Devices
Enables new, pervasive
communication
Anonymity and access
Duty of care
Criminal offences
e-Security & Mobile Devices
BYOD
BYOVRD
LYOD
DP, liability,
breach of T&Cs
Think about mobile
access/delivery when
choosing learning
resources.
Ensure
data protection
awareness.
Dont let techie
enthusiasm run away.
際際滷 12 of 28
Ensure your e-safety
policies and procedures
cover BYOD.
Ensure you have e-safety policies
and procedures in the first place.
Are you confident learners know
how to report concerns?
1 2 3
52%
19%
29%
1. Yes
2. No
3. Dont know
Ensure your e-security
and acceptable use
policies are fit for
BYOD.
Keep legal risk in
perspective.
Have risk assessment
procedures in place.
際際滷 18 of 27
What should we do about risk?
1 2 3 4 5
0%
5% 5%
90%
0%
1. Ignore it
2. Eliminate it
3. Think about it
4. Take steps to
manage it
5. Run around screaming
Monitor impact and
effectiveness.
Ask for feedback,
provide support.
Are learners involved with development,
review and impact of policy?
1. Always
2. Sometimes
3. Seldom
4. Never
5. Depends whos asking
際際滷 22 of 27
1 2 3 4 5
0%
60%
5%
10%
25%
New Guidance
Next steps?
1 2 3 4 5 6
0%
19%
13%
38%
25%
6%
際際滷 23 of 27
1. Go back and say well done!
2. Start a conversation with
management
3. Re-write a few policies
4. Monitor whats in place already
5. Get further support
6. Point at the guy/gal over there
and say his problem!
Contact Jisc Legal
info@jisclegal.ac.uk
0141 548 4939
www.jisclegal.ac.uk
http://twitter.com/JiscLegal
Did you find this presentation useful?
1. Utterly fantastic
2. Brilliant
3. Pretty good
4. Good
5. Sorry, I was on Facebook...
6. Wish Id gone to the other session
際際滷 22 of 27
1 2 3 4 5
95%
0%
5%
0%0%
33
Your questions
34
Jisc Legal is hosted by the University of Strathclyde,
a charitable body, registered in Scotland,
with registration number SC015263.
This work, with the exception of logos, and any other content marked with a
separate copyright notice, is licensed under a Creative Commons Attribution 3.0
Unported Licence. Attribution should be 息 Jisc Legal  www.jisclegal.ac.uk 
used under Creative Commons Attribution 3.0 Unported Licence (with clickable
URLs where possible). The use of logos in the work is licensed for use only on
non-derivative copies. Further information at
www.jisclegal.ac.uk/CopyrightPolicy.
http://www.slideshare.net/JISCLegal/130426-rsc-sw-byod-jmc
This presentation
on 際際滷share
(or search for
slideshare jisclegal)

More Related Content

130426 rsc sw byod (jmc)

  • 1. Where do my responsibilities end? Legal aspects of implementing a BYOD strategy Friday, 26 April 2013 Taunton
  • 2. 2 Jason Miles-Campbell Jisc Legal Service Manager www.jisclegal.ac.uk info@jisclegal.ac.uk 0141 548 4939 Hello!
  • 3. 3 About Jisc Legal Role: to avoid legal issues becoming a barrier to the use of technology in tertiary education Information service: we cannot take decisions for you when you are faced with a risk
  • 6. Have you heard of Jisc Legal before? 1. Hello again, Jason 2. Yes, fairly often 3. Yes, used occasionally 4. Vague acquaintance 5. Whats that, then? 1 2 3 4 5 20% 20% 45% 5% 10%
  • 7. When it comes to legal issues... 1. Im confident 2. Ive a fair idea 3. I dabble 4. I ask others 5. I hide in the toilet 1 2 3 4 5 0% 30% 10% 40% 20%
  • 8. 8 Why Comply? Its the law Confidence v uncertainty Example Reputation Quality inspection But risk management
  • 9. 9 Legal bill for defamation accusation... 1. Theyll do it for free 2. 65p 3. 贈6.50 4. 贈6500 5. 贈6,500,000 1 2 3 4 5 0% 0% 32% 68% 0%
  • 10. The Issues Copyright (using other peoples stuff) Data protection (respecting privacy) e-Safety (protecting users) e-Security (protecting the organisation)
  • 11. The Difference Not linked to place (mobile!) Personal, invasive and pervasive Own device Combines access and communication
  • 12. Whats the biggest issue about mobile? 際際滷 11 of 27 1. Copyright 2. Data protection 3. e-Safety 4. e-Security 5. Haggis 1 2 3 4 5 10% 29% 0% 33% 29%
  • 13. 47% of all UK adults now use their personal smartphone, laptop or tablet computer for work purposes. But less than 3 in 10 who do so are provided with guidance on how their devices should be used in this capacity, raising worrying concerns that people may not understand how to look after the personal information accessed and stored on these devices http://www.ico.gov.uk/news/latest_news/2013/survey-guidance-on-byod-personal-devices- 07032013.aspx
  • 14. Copyright & Mobile Devices How to be Appy T&Cs Personal use Per device, per user, multi-use
  • 15. Do you have a mobile device with copyright infringing content with you? 1. Can I call my lawyer? 2. Maybe. 3. Im looking around and see what option others are pressing. 4. Yes. 5. Definitely not, guv. Honest. 1 2 3 4 5 5% 26% 58% 5%5%
  • 16. Data Protection & BYOD Compliance and privacy Purposes / purpose creep Surveillance Marketing - PECRs
  • 17. e-Safety & Mobile Devices Enables new, pervasive communication Anonymity and access Duty of care Criminal offences
  • 18. e-Security & Mobile Devices BYOD BYOVRD LYOD DP, liability, breach of T&Cs
  • 19. Think about mobile access/delivery when choosing learning resources.
  • 20. Ensure data protection awareness. Dont let techie enthusiasm run away. 際際滷 12 of 28
  • 21. Ensure your e-safety policies and procedures cover BYOD. Ensure you have e-safety policies and procedures in the first place.
  • 22. Are you confident learners know how to report concerns? 1 2 3 52% 19% 29% 1. Yes 2. No 3. Dont know
  • 23. Ensure your e-security and acceptable use policies are fit for BYOD.
  • 24. Keep legal risk in perspective. Have risk assessment procedures in place. 際際滷 18 of 27
  • 25. What should we do about risk? 1 2 3 4 5 0% 5% 5% 90% 0% 1. Ignore it 2. Eliminate it 3. Think about it 4. Take steps to manage it 5. Run around screaming
  • 28. Are learners involved with development, review and impact of policy? 1. Always 2. Sometimes 3. Seldom 4. Never 5. Depends whos asking 際際滷 22 of 27 1 2 3 4 5 0% 60% 5% 10% 25%
  • 30. Next steps? 1 2 3 4 5 6 0% 19% 13% 38% 25% 6% 際際滷 23 of 27 1. Go back and say well done! 2. Start a conversation with management 3. Re-write a few policies 4. Monitor whats in place already 5. Get further support 6. Point at the guy/gal over there and say his problem!
  • 31. Contact Jisc Legal info@jisclegal.ac.uk 0141 548 4939 www.jisclegal.ac.uk http://twitter.com/JiscLegal
  • 32. Did you find this presentation useful? 1. Utterly fantastic 2. Brilliant 3. Pretty good 4. Good 5. Sorry, I was on Facebook... 6. Wish Id gone to the other session 際際滷 22 of 27 1 2 3 4 5 95% 0% 5% 0%0%
  • 34. 34 Jisc Legal is hosted by the University of Strathclyde, a charitable body, registered in Scotland, with registration number SC015263. This work, with the exception of logos, and any other content marked with a separate copyright notice, is licensed under a Creative Commons Attribution 3.0 Unported Licence. Attribution should be 息 Jisc Legal www.jisclegal.ac.uk used under Creative Commons Attribution 3.0 Unported Licence (with clickable URLs where possible). The use of logos in the work is licensed for use only on non-derivative copies. Further information at www.jisclegal.ac.uk/CopyrightPolicy.

Editor's Notes

  • #6: Plug resources especially top tips and policy checklist as each only one side of A4.Also, video resources useful for Scotland, England, N Ireland, Wales.
  • #13: TurningPointContext of learning. Notice and Take Down, Acceptable Use. authorise.
  • #16: Likely to be Safeguarding officer or e-Safety OfficerMake someone ultimately responsible for e-safety, for planning, co-ordinating approach, implementation, training and response. Senior member of staff who already has child protection training and knowledge of working with other agencies.Someone approachable, set right tone, strong leadership role.
  • #20: Likely to be Safeguarding officer or e-Safety OfficerMake someone ultimately responsible for e-safety, for planning, co-ordinating approach, implementation, training and response. Senior member of staff who already has child protection training and knowledge of working with other agencies.Someone approachable, set right tone, strong leadership role.
  • #21: Represent cross section of college community, stakeholders.Consultation, variety of approach.Learner input!Depends on college.
  • #22: Online tools to help Generator, National Education Network etc (see links on our site)Assess what is working well and what needs further input. Inform all parties of the audit.Prioritise next steps.
  • #23: TurningPoint
  • #24: Set the ground rules, mitigate liability, make all users aware of limits and boundaries.All staff and students to be aware of rights and responsibilities when using ICTEasily understood by learnersClarify when and in what circumstances it will apply e.g. broad in scope, include mobile technologies, learners hardware (?)Scrutiny by Inspectorate.Link to other relevant policies, particularly AUP see JISC Legals checklist.
  • #25: Think ahead key to safeguarding.Assess risk in context e.g. off site learning, vulnerable learners, school links etc.What can we do to make it safer?Enhanced procedures for vulnerable learners etc.Consistency crucial.
  • #26: TurningPoint
  • #27: Essential step to meet your duties.Learner input.Develop positive behaviours.Monitor complaints to determine trends, underlying issues.
  • #28: Learners input.Focus group.Act on feedback given.Further support.
  • #29: TurningPoint
  • #31: TurningPoint
  • #33: TurningPoint
  • #36: Plug resources especially top tips and policy checklist as each only one side of A4.Also, video resources useful for Scotland, England, N Ireland, Wales.