Security, Privacy, Copyright, and Other Institutional Policy Implications of Online Learning Rodney J. Petersen, J.D. Policy Analyst & Security Task Force.

Slides:



Advertisements
Similar presentations
Rockingham County Public Schools Technology Acceptable Use Policy
Advertisements

Darton College Information Systems Use Policies. Introduction Dartons Information Systems are critical resources. The Information Systems Use Policies.
Evolution of Data Use and Stewardship Recent University-wide Data Stewardship Enhancements Integrated System Data Stewardship Shirley C. Payne, CISSP,
Internet Safety and Standard Operating Procedures School Board Meeting-February 14, 2012.
Security Education and Awareness Workshop January 15-16, 2004 Baltimore, MD.
Today’s Schools face:  Numerous State and Federal Regulations  Reduced Technology Funding  More Stringent Guidelines for Technology Use.
ICS 417: The ethics of ICT 4.2 The Ethics of Information and Communication Technologies (ICT) in Business by Simon Rogerson IMIS Journal May 1998.
Security, Privacy, and the Protection of Personally Identifiable Information Rodney J. Petersen Policy Analyst, EDUCAUSE EDUCAUSE/Internet2 Security.
Greg Lamb. Introduction It is clear that we as consumers and entrepreneurs cannot expect complete privacy when discussing business matters. However… There.
A Model for IT Policy Development Marilu Goodyear & Beth Forrest Warner University of Kansas Educause 2001October 29, 2001.
Security, Privacy, and Ethics Online Computer Crimes.
Ethics and Information in the Digital Age Rafael Capurro University of Applied Sciences, Germany LIDA 2001, Dubrovnik, Croatia, May, 2001.
Insights on the Legal Landscape for Data Privacy in Higher Education Rodney Petersen, J.D. Government Relations Officer and Security Task Force Coordinator.
Data Management Awareness January 23, University of Michigan Administrative Information Services Data Management Awareness Unit Liaisons January.
Business Plug-In B7 Ethics.
1 McGraw-Hill/Irwin Copyright © 2004, The McGraw-Hill Companies, Inc. All rights reserved. Ethical Challenges Ethics Principles of right and wrong that.
American Library Association (ALA) Standard 5: The information literates student understands many of the economic, legal and social issues surrounding.
Higher Education Cybersecurity Strategy, Programs, and Initiatives Rodney Petersen Policy Analyst & Security Task Force Coordinator EDUCAUSE.
UNESCO ICTLIP Module 1. Lesson 71 Introduction to Information and Communication Technologies Lesson 7. What are the trends and issues in ICT development.
© 2003, EDUCAUSE Information Privacy: Public Policy and Institutional Policies Rodney J. Petersen Policy Analyst, EDUCAUSE EDUCAUSE/Internet2 Security.
Security Issues on Campus: Government Initiatives Rodney J. Petersen University of Maryland Educause/Internet2 Security Task Force Copyright Rodney J.
Information Security Governance in Higher Education Policy2004 The EDUCAUSE Policy Conference Gordon Wishon EDUCAUSE/Internet 2 Security Task Force This.
ETHICS, POLICY & SECURITY ISSUES 1CIIT---ETHICS,POLICY AND SECURITY ISSUES.
© 2003, EDUCAUSE/Internet2 Computer and Network Security Task Force Computer Access, Privacy and Security: Legal Obligations and Liabilities Rodney J.
Accessibility, Integrity, & Confidentiality: Security Challenges for E-Business Rodney J. Petersen University of Maryland & Educause/Internet2 Security.
Privacy and Security Risks in Higher Education
A First Course in Information Security
Cyberethics, Cybersafety, and Cybersecurity (C3): Implications for the Classroom Teacher (Part 1) University of Maryland Educational Technology Policy,
RESPONSIBLE USE POLICY. UNCW Information Security Awareness Program RESPONSIBLE USE OF EDPE PURPOSE.
Copyright © Allyn & Bacon 2008 Using Technology in the Classroom Gary G. Bitter & Jane M. Legacy Chapter Five This multimedia product and its contents.
Eric J. Pritchard One Liberty Place, 46 th Floor 1650 Market Street Philadelphia, Pennsylvania (215)
Copyright Management for Scholarship Julia Blixrud, Association of Research Libraries/SPARC Rodney Petersen, EDUCAUSE John Vaughn, Association of American.
Other Laws (Primarily for E-Government) COEN 351.
Toward An Ethical World... Responsible Internet Citizenship: Safety, Security, & Scholarship Rodney J. Petersen Policy Analyst and Security Task Force.
ZIMBABWE UNIVERSITY LIBRARIES CONSORTIUM (ZULC) OPEN ACCESS AND CREATING A KNOWLEDGE SOCIETY CONFERENCE 24 – 26 April 2006 Crowne Plaza Monomotapa, Zimbabwe.
Computing Essentials 2014 Privacy, Security and Ethics © 2014 by McGraw-Hill Education. This proprietary material solely for authorized instructor use.
Privacy, Confidentiality, Security, and Integrity of Electronic Data
1 GOVERNANCE in COMMUNITY ORGANISATIONS Community Solutions- NESB Community Safety Development and Coordination Project Auspiced by Illawarra Forum Inc.
ARE YOU BEING SAFE? What you need to know about technology safety Shenea Haynes Digital Citizenship Project ED 505.
DIGITAL CITIZENSHIP SHIRLEY MOSLEY ED THEMES OF DIGITAL CITIZENSHIP DIGITAL ACCESS (full electronic participation) DIGITAL COMMERCE (electronic.
Policy and IT Security Awareness Amy Ginther Policy Develoment Coordinator University of Maryland Information Technology Security Workshop April 2, 2004.
ETHICS, POLICY & SECURITY ISSUES
history, hardware, software, safety, and computer ethics
CAN I GET IN TROUBLE USING A... COMPUTER? Or do computers solve all of life’s problems?
While You’re Waiting… Go here for the presentation and resources:
Copyright © 2009 by The McGraw-Hill Companies, Inc. All Rights Reserved. McGraw-Hill Chapter 6 The Privacy and Security of Electronic Health Information.
Cyberethics, Cybersafety, and Cybersecurity (C3): Implications for the Classroom Teacher Amy Ginther Project NEThics Director; Policy Develoment Coordinator.
AUP, Netiquette, Copyright & Fair Use Wilkes University – Internet Literacy for Educators Cathy W. Dowd Spring 2009.
Information Privacy: Public Policy and Institutional Policies Wendy Wigen Policy Analyst, EDUCAUSE Copyright Wendy Wigen, This work is the intellectual.
Just Say Know, Internet Safety for Educators CPD Linda Sweeting: Prince George’s County Public Schools Technology.
University and IT Policies: Match or Mis-match? Marilu Goodyear, Vice Provost for Information Services and CIO Jenny Mehmedovic, Coordinator of IT Policy.
The Impact of Evolving IT Security Concerns On Cornell Information Technology Policy.
October 21, 2008 Jennifer Q.; Loriane M., Michelle E., Charles H. Internet Safety.
Information Security General Awareness Training Module 1 – Introduction For The UF HSC Workforce.
IT Security Policies and Campus Networks The dilemma of translating good security policies to practical campus networking Sara McAneney IT Security Officer.
Digital Citizenship Project Created By: Celeste Jackson ED 505-Dr. Martha Hocutt.
The Ethics of Electronic Marketing. “ Marketers must accept responsibility for the consequences of their activities and make every effort to ensure that.
Internet Research Law and Ethics. Consider the Law Legal and ethical issues help us broaden considerably our study of Internet research. Even relatively.
Strategic Agenda We want to be connected to the internet……… We may even want to host our own web site……… We must have a secure network! What are the.
Chapter 4: Laws, Regulations, and Compliance
Montgomery College Acceptable Use Policy (AUP). 2 This Acceptable Use Policy (AUP) PowerPoint presentation was developed by the Office of the Information.
A properly constructed virus can disrupt productivity causing billions of dollars in damage A virus is a small piece of software that piggybacks on real.
Best Cyber Security Practices for Counties An introduction to cybersecurity framework.
Data Access & New Banner Admin UI Professional Development Session May 11, am Presented by: Management Information Center.
Acceptable Use Policy (Draft)
Internet Research Law and Ethics.
The Issues with Technology in education
Student User Agreement and Policy 2022
Standard 6: Educational Leaders understand the social, legal, and ethical issues related to technology and model responsible decision-making related to.
Presentation transcript:

Security, Privacy, Copyright, and Other Institutional Policy Implications of Online Learning Rodney J. Petersen, J.D. Policy Analyst & Security Task Force Coordinator EDUCAUSE

Agenda Introduction 3 Dimensions of Policy Assumptions Policy Development Process Framework for IT Policy Development Policy Issues for Online Learning Cybersecurity Privacy Copyright Other Discussion

3 Dimensions of Policy Public Policy Federal or State Laws, Regulations, Executive Orders, and Judicial Opinions Organizational Policy Statements of Organizational Philosophy or Strategic Direction Operational Policies Institutional Policies, Procedures, and Guidelines

Assumptions A faculty member’s role is to follow policies, communicate policies to students, and enforce policies as necessary (awareness) Instructional designers, IT support staff, and librarians are good gatekeepers to support legal and ethical academic practices (training) Existing policies and procedures may adequately cover online environments; however, existing policies and procedures may need to be updated or new policies developed

Policy Development Process Policy Development Process with Best Practices process.umn.edu/ACUPA/projects/PolicyDeve lopment.pdf Association of College and University Policy Administrators (ACUPA) process.umn.edu/acupa/

IT Policies Framework Law Constitution, laws, & regulations Values academic freedom shared governance privacy diversity Ethics netiquette Morality pornography & indecency

Acceptable Use Relevance: Legal, Ethical, and Responsible Use Types of Issues: Obscenity, fraud, misappropriation of identity, personal use, safeguarding personal information, protecting accounts, observance of copyright and other laws, harassment, threats, and unauthorized access. Resources: University of Virginia Video EDUCAUSE/Cornell Institute for Computer Policy and Law James Madison University R.U.N.S.A.F.E.

Cybersecurity Relevance: Goals of Cybersecurity Availability Confidentiality Integrity Types of Issues: Protect Your PC (software updates, anti-virus software, and personal firewall) Safe Online Behavior (spyware, phishing, viruses, etc.) Resources: EDUCAUSE/Internet2 Computer & Network Security Task Force National Cyber Security Alliance Federal Trade Commission Information Security Site

Privacy Relevance: Values of Privacy and Confidentiality To the extent possible in the electronic environment, users’ privacy should be preserved. Fair information practices should govern the collection and disclosure of personal information. Types of Issues: Student Education Records Directory Information and Personal Information Monitoring and Surveillance Resources: EDUCAUSE/Cornell Institute for Computer Policy and Law Electronic Privacy Information Center Federal Trade Commission Identity Theft Site

Copyright Relevance: Copyright Management for Scholarship The creation and dissemination of knowledge is a central purpose of academic organizations. A key concern is the intellectual property rights, including copyright, associated with course materials. Types of Issues: Ownership of Student and Faculty Works Use of Copyrighted Works Licensed Software and Online Content Resources: CopyOwn: A Resource on Copyright Ownership Checklist for Fair Use The TEACH Toolkit

Other Policy Issues Academic Dishonest/Electronic Plagiarism Access for Persons with Disabilities Attendance and Class Participation Computer Ownership/Minimum Requirements Notetaking Services Software & Licensed Content Use Videotaping of Courses