[Re-purposing an unused introduction to my full paper - "See no... Hear no... Track no..: Ethics and the Intelligent Campus" - that was published in the Journal of Information Rights, Policy and Practice this week]
Earlier this week I did a presentation to a group from Dutch Universities on the ethics work that Jisc has done alongside its studies, pilots and services on the use of data.
An interesting query arrived about when to advertise role-based, rather than individual, e-mail addresses. Do role-based ones feel too impersonal, for example, because senders don't know who they are dealing with?
At Jisc's Learning Analytics Network meeting last month I presented an updated version of my suggested legal model for Learning Analytics.
More than a decade ago the e-Privacy Directive mentioned "location data" in the context of telecommunications services. At the time that was almost entirely about mobile phone locations - data processed by just a handful of network providers - but nowadays many more organisations are able to gather location data about wifi-enabled devices in range of their access points.
[UPDATE: the full paper describing this approach has now been published in the Journal of Learning Analytics]
[based on Doug Clow’s liveblog of the talk I did at the LAEP workshop in Amsterdam]
[roughly what I said in a presentation yesterday to the Northern Universities’ Consortium]
I’ve been a full or part-time student for more than thirty years. It's interesting to reflect on how my student record has changed over that time.
Last week the European Commission published their proposed new Data Protection legislation. This will now be discussed and probably amended by the European Parliament and Council of Ministers before it becomes law, a process that most commentators expect to take at least two years. There's a lot in the proposal so this post will just cover the general themes.
At the FIRST conference this week I presented ideas on how effective incident response protects privacy. Indeed, since most common malware infects end user devices and hides itself, an external response team may be the only way the owner can learn that their private information is being read and copied by others. The information sources used by incident responders – logfiles, network flows, etc.
During a recent conversation about learning analytics it occurred to me that it might be helpful to analyse how universities use student data in terms of the different justifications provided by UK and European Data Protection Law.