E-Safety Wiki e-Responsibility / Infrastructure and Technology - strategic considerations
  • If you are citizen of an European Union member nation, you may not use this service unless you are at least 16 years old.

  • You already know Dokkio is an AI-powered assistant to organize & manage your digital files & messages. Very soon, Dokkio will support Outlook as well as One Drive. Check it out today!

View
 

Infrastructure and Technology - strategic considerations

This version was saved 13 years ago View current version     Page history
Saved by Syed Munib Hadi
on March 4, 2011 at 12:25:20 pm
 

Securing the network, and personal and sensitive data without locking down.

 

As attractive as it might seem in order to avoid risk to the reputation of the organisation, locking down the network cannot be the answer. Technology has a lot to offer learners, e-Learning; its flexibility, availability, and portability contributes to the personalisation of their learning and supports their engagement and acheivement. It also has a lot to offer providers in terms of meeting their obligations to deliver learning equitably and to exacting standards within ever more challenging financial constraints.

 

While designing an e-safety policy impetus should be given that the purpose of the strategy is not to barr people technologically from accessing content in the first place (even though that might be needed to barr certain known websites & their content & Janet Internet Filtering is one of the many solutions for such cases) but to educate the learners of how keep them safe online. As evident from UKERNA’s submission to the House of Lords Select Committee on Science and Technology Sub-Committee on Investigation into Personal Internet Safety.

 

The new Ofsted Inspection regime for FE started from Spetember 2009 is also focussing on this. More information on the Ofsted Safeguarding agenda and the safeguarding criteria can be accessed from the Excellence Gateway way website.

 

While designing e-safety policy in regards to the Technology & Infrastructure side the institutional legal obligations needs to be taken care of e.g in case of monitoring network for potential cases of cyber bullying or for monitoring behaviors there are legal ramifications. JISC Legal papers on

 

IT Law for FE and HE Senior Management (01/11/2005) , 

 

Monitoring Internet Use (12/12/2003) & 

 

Legal Risks and Liabilities for IT Services in FE and HE (01/09/2003) 

 

are worth reading. 


JISC Legal e-safety Policy Template also offers a starting point if you are looking for developing a strategy.

 

 

 

click here to go to Operations Considerations