mobile tech and the law
DESCRIPTION
Delivered as part of the UHI Virtual Realities 2 Online Conference, 18 January 2013TRANSCRIPT
![Page 1: Mobile Tech and the Law](https://reader036.vdocument.in/reader036/viewer/2022070304/54c29b864a79592f158b459a/html5/thumbnails/1.jpg)
Mobile Learning and the LawVirtual Realities 2
Friday, 18 January 2013
![Page 3: Mobile Tech and the Law](https://reader036.vdocument.in/reader036/viewer/2022070304/54c29b864a79592f158b459a/html5/thumbnails/3.jpg)
3
About Jisc Legal
• Role: to avoid legal issues becoming a barrier to the use of technology in tertiary education
• Information service: we cannot take decisions for you when you are faced with a risk
![Page 4: Mobile Tech and the Law](https://reader036.vdocument.in/reader036/viewer/2022070304/54c29b864a79592f158b459a/html5/thumbnails/4.jpg)
![Page 5: Mobile Tech and the Law](https://reader036.vdocument.in/reader036/viewer/2022070304/54c29b864a79592f158b459a/html5/thumbnails/5.jpg)
Have you heard of Jisc Legal before?
1. Hello again, Jason2. Yes, fairly often3. Yes, used occasionally4. Vague acquaintance5. What’s that, then?
1 2 3 4 5
20% 20%
45%
5%
10%
![Page 6: Mobile Tech and the Law](https://reader036.vdocument.in/reader036/viewer/2022070304/54c29b864a79592f158b459a/html5/thumbnails/6.jpg)
When it comes to legal issues...
1. I’m confident2. I’ve a fair idea3. I dabble4. I ask others5. I hide in the toilet
1 2 3 4 5
0%
30%
10%
40%
20%
![Page 7: Mobile Tech and the Law](https://reader036.vdocument.in/reader036/viewer/2022070304/54c29b864a79592f158b459a/html5/thumbnails/7.jpg)
7
Why Comply?
• It’s the law• Confidence v uncertainty• Example• Reputation• Quality inspection• But risk management
![Page 8: Mobile Tech and the Law](https://reader036.vdocument.in/reader036/viewer/2022070304/54c29b864a79592f158b459a/html5/thumbnails/8.jpg)
8
Legal bill for defamation accusation...
1. They’ll do it for free2. 65p3. £6.504. £65005. £6,500,000
1 2 3 4 5
0% 0%
32%
68%
0%
![Page 9: Mobile Tech and the Law](https://reader036.vdocument.in/reader036/viewer/2022070304/54c29b864a79592f158b459a/html5/thumbnails/9.jpg)
The Issues
Copyright (using other people’s stuff)
Data protection (respecting privacy)
e-Safety (protecting users)
e-Security (protecting the organisation)
![Page 10: Mobile Tech and the Law](https://reader036.vdocument.in/reader036/viewer/2022070304/54c29b864a79592f158b459a/html5/thumbnails/10.jpg)
The Difference
Not linked to place (mobile!)
Personal, invasive and pervasive
Own device
Combines access and communication
![Page 11: Mobile Tech and the Law](https://reader036.vdocument.in/reader036/viewer/2022070304/54c29b864a79592f158b459a/html5/thumbnails/11.jpg)
What’s the biggest issue about mobile?
Slide 11 of 27
1. Copyright2. Data protection3. e-Safety4. e-Security5. Haggis
1 2 3 4 5
10%
29%
0%
33%
29%
![Page 12: Mobile Tech and the Law](https://reader036.vdocument.in/reader036/viewer/2022070304/54c29b864a79592f158b459a/html5/thumbnails/12.jpg)
Copyright & Mobile Devices
How to be ‘AppyT&Cs‘Personal use’Per device, per user,multi-use
![Page 13: Mobile Tech and the Law](https://reader036.vdocument.in/reader036/viewer/2022070304/54c29b864a79592f158b459a/html5/thumbnails/13.jpg)
Do you have a mobile device with copyright infringing content with you?
1. Can I call my lawyer?2. Maybe.3. I’m looking around and see
what option others are pressing.4. Yes.5. Definitely not, guv. Honest.
1 2 3 4 5
5%
26%
58%
5%5%
![Page 14: Mobile Tech and the Law](https://reader036.vdocument.in/reader036/viewer/2022070304/54c29b864a79592f158b459a/html5/thumbnails/14.jpg)
Data Protection & Mobile Devices
Compliance and privacy
Purposes / purpose creep
Surveillance
Marketing - PECRs
![Page 15: Mobile Tech and the Law](https://reader036.vdocument.in/reader036/viewer/2022070304/54c29b864a79592f158b459a/html5/thumbnails/15.jpg)
e-Safety & Mobile Devices
Enables new, pervasive communicationAnonymity and accessDuty of careCriminal offences
![Page 16: Mobile Tech and the Law](https://reader036.vdocument.in/reader036/viewer/2022070304/54c29b864a79592f158b459a/html5/thumbnails/16.jpg)
e-Security & Mobile Devices
BYODBYOVRDLYODDP, liability,breach of T&Cs
![Page 17: Mobile Tech and the Law](https://reader036.vdocument.in/reader036/viewer/2022070304/54c29b864a79592f158b459a/html5/thumbnails/17.jpg)
Think about mobile access/delivery when
choosing learning resources.
Top Tip 1
![Page 18: Mobile Tech and the Law](https://reader036.vdocument.in/reader036/viewer/2022070304/54c29b864a79592f158b459a/html5/thumbnails/18.jpg)
Ensuredata protection
awareness.
Don’t let techie enthusiasm run away.
Top Tip 2
Slide 12 of 28
![Page 19: Mobile Tech and the Law](https://reader036.vdocument.in/reader036/viewer/2022070304/54c29b864a79592f158b459a/html5/thumbnails/19.jpg)
Ensure your e-safety policies and procedures
cover mobile.Ensure you have e-safety policies
and procedures in the first place.
Top Tip 3
![Page 20: Mobile Tech and the Law](https://reader036.vdocument.in/reader036/viewer/2022070304/54c29b864a79592f158b459a/html5/thumbnails/20.jpg)
Are you confident learners know how to report concerns?
1 2 3
52%
19%
29%
1. Yes2. No3. Don’t know
![Page 21: Mobile Tech and the Law](https://reader036.vdocument.in/reader036/viewer/2022070304/54c29b864a79592f158b459a/html5/thumbnails/21.jpg)
Ensure your e-security and
acceptable use policies are fit for
mobile use.
Top Tip 4
![Page 22: Mobile Tech and the Law](https://reader036.vdocument.in/reader036/viewer/2022070304/54c29b864a79592f158b459a/html5/thumbnails/22.jpg)
Keep legal risk in perspective.
Have risk assessment procedures in place.
Top Tip 5
Slide 18 of 27
![Page 23: Mobile Tech and the Law](https://reader036.vdocument.in/reader036/viewer/2022070304/54c29b864a79592f158b459a/html5/thumbnails/23.jpg)
What should we do about risk?
1 2 3 4 5
0%5% 5%
90%
0%
1. Ignore it2. Eliminate it3. Think about it4. Take steps to
manage it5. Run around screaming
![Page 24: Mobile Tech and the Law](https://reader036.vdocument.in/reader036/viewer/2022070304/54c29b864a79592f158b459a/html5/thumbnails/24.jpg)
Monitor impact and effectiveness.
Top Tip 6
![Page 25: Mobile Tech and the Law](https://reader036.vdocument.in/reader036/viewer/2022070304/54c29b864a79592f158b459a/html5/thumbnails/25.jpg)
Ask for feedback, provide support.
Top Tip 7
![Page 26: Mobile Tech and the Law](https://reader036.vdocument.in/reader036/viewer/2022070304/54c29b864a79592f158b459a/html5/thumbnails/26.jpg)
Are learners involved with development, review and impact of policy?
1. Always
2. Sometimes
3. Seldom
4. Never
5. Depends who’s askingSlide 22 of 27
1 2 3 4 5
0%
60%
5%
10%
25%
![Page 27: Mobile Tech and the Law](https://reader036.vdocument.in/reader036/viewer/2022070304/54c29b864a79592f158b459a/html5/thumbnails/27.jpg)
Next steps?
1 2 3 4 5 6
0%
19%
13%
38%
25%
6%
Slide 23 of 27
1. Go back and say well done!2. Start a conversation with
management3. Re-write a few policies4. Monitor what’s in place already5. Get further support6. Point at the guy over there and
say ‘his problem!’
![Page 29: Mobile Tech and the Law](https://reader036.vdocument.in/reader036/viewer/2022070304/54c29b864a79592f158b459a/html5/thumbnails/29.jpg)
Did you find this presentation useful?
1. Utterly fantastic
2. Brilliant
3. Pretty good
4. Good
5. Sorry, I was on Facebook...
Slide 22 of 27
1 2 3 4 5
95%
0%5%
0%0%
![Page 30: Mobile Tech and the Law](https://reader036.vdocument.in/reader036/viewer/2022070304/54c29b864a79592f158b459a/html5/thumbnails/30.jpg)
30?Your questions
![Page 31: Mobile Tech and the Law](https://reader036.vdocument.in/reader036/viewer/2022070304/54c29b864a79592f158b459a/html5/thumbnails/31.jpg)
31
Jisc Legal is hosted by the University of Strathclyde, a charitable body, registered in Scotland,
with registration number SC015263.
This work, with the exception of logos, and any other content marked with a separate copyright notice, is licensed under a Creative Commons Attribution 3.0 Unported Licence. Attribution should be “© Jisc Legal – www.jisclegal.ac.uk – used under Creative Commons Attribution 3.0 Unported Licence” (with clickable URLs where possible). The use of logos in the work is licensed for use only on
non-derivative copies. Further information at www.jisclegal.ac.uk/CopyrightPolicy.
![Page 32: Mobile Tech and the Law](https://reader036.vdocument.in/reader036/viewer/2022070304/54c29b864a79592f158b459a/html5/thumbnails/32.jpg)