The Joint Information Systems Committee
* Fifth Information Strategies Conference *
* Focus on Access and Security *
Thursday 10th February 2000
The British Library, London
In March 2000 the Data Protection Act comes into force. This will
mean that FE and HE Institutions have to be more accountable for
the way they manage personal data. Successful compliance with
the DPA means giving information issues a higher priority in many
institutions, and instigating a wider awareness of responsibility. In
parallel, new delivery methods for teaching and research are putting
copyright and Intellectual Property Rights under the spotlight. At
the same time, many educational institutions are pushing to widen
access and investigating ways in which students, staff and visitors
can remotely interact with the university.
- Data Protection Act
- Freedom of Information
- Creating a Security Culture
- Authentication
- Plagiarism
- Copyright
This conference aims to raise the questions and suggest some
approaches to the challenges of information management. There
will be keynote speakers from the Data Protection Registrar's
Office and the Freedom of Information Unit. Representatives from
information strategy pilot, exemplar and other sites will be
presenting their experiences of how a strategy can help.
- Who Should Attend?
This conference will be of interest to Heads of Information Services,
Registrars, Heads of Learning Resources, Data Protection Officers,
Heads of Computing Services, Heads of Research Units, Education
Development Managers, Quality Assurance Managers and all
members of the HE and FE community who manage information,
both administrative and scholarly.
- Venue
The conference will be held at the Conference Centre of the British
Library, London, close to St Pancras and Euston mainline stations.
- Cost
The cost of the conference is =A335 [VAT exempt]
- How to Apply
Please complete the form on the back of this leaflet, and send with
a cheque for =A335 to the Assistant Information Strategies Co-
ordinator. Places are limited, so early application is advised.
* Programme *
10:00 Registration and Refreshments
10:30 Introduction - Professor Peter Ford
10:45 Data Protection Act 1998 - Jonathan Bamford,
Assistant Data Protection Registrar
Mr Bamford has responsibility for public sector compliance with the
Data Protection Act and will outline the main implications of the
new Act for institutions of higher and further education.
11:45 Parallel Sessions
13:00 Lunch
14:00 Parallel Sessions
15:15 Freedom of Information - Emma Louise Avery
Freedom of Information Unit
Ms Avery will outline the main implications of the new Act for
institutions of higher and further education.
16:00 Closing Remarks
16:15 Refreshments and Departure
* Parallel Sessions *
Morning
1A) Creating a Security Culture - Panel Session
One of the main issues which arose from the JISC Assist Security
Workshop in October 1999 was the difficulty institutions find in
generating a security culture. Your systems may be as technically
secure as you could wish but it is the way in which people use
(and abuse) them which can still lead to difficulties. The panel will
be comprised of staff from a range of institutions which have used
their Information Strategy to aid the development of a security
culture throughout the institution. Participants at this session will
be invited to submit questions to the panel.
1B) The JISC Approach to Security - Annette Haworth
Chair, JISC Committee for Authentication and Security
The session will outline the work and progress of this new
committee, with particular reference to its work on BS7799 and the
provision of guidelines, templates and examples of best practice in
the area of security.
1C) The S3 Project - Staff/Student/System Self-Service at JMU -
John Townsend, Liverpool John Moores University
The S3 project was partially funded by the JTAP initiative and the
primary objective is to deliver a better information service to staff
and students through the adoption of a disintermediated or self-
service business model, that is, one in which all internal business
transactions will be undertaken by staff and students directly
interacting with automated systems, rather than these transactions
having to be undertaken on their behalf by intermediaries. The
presentation will describe the theoretical background to the
approach and the underlying strategic objectives that it supports
progression the project to date, technical and organisational issues
that have arisen, particularly in relation to access and security new
directions, and the ways in which lessons learned will inform the
deployment of the self-service approach in the future.
1D) Digital Preservation - Maggie Jones, Arts and Humanities Data
Service
As information is increasingly created, used and stored digitally,
the question of its continuing preservation and access in the digital
order becomes more crucial. Maggie Jones is leading a project
designed to produce guidelines on preservation management of
digital materials and this session will outline the progress of the
project and the initial findings, which will feed into the guidelines.
Afternoon
2A) The Ethics of Access - Andrew Charlesworth, University of Hull
Institutions are being encouraged to be more entrepreneurial in
their management and exploitation of resources, and indeed we
hold a wide range of resources of considerable value - anything
from staff and student records to our learning resources.
Broadening access to these resources may offer potential financial
benefits to the institution but what are the legal and ethical
implications?
2B) The Sudden Importance of Copyright - Toby Bainton, SCONUL
Electronic distribution offers new possibilities and challenges,
whether you are a scholarly reader or a scholarly publisher. And
whereas publishing used to be a capital-intensive activity, anyone
with a website is now a publisher. Copyright, once a specialist
issue in universities, is now difficult to avoid. How are we to
manage our scholarly resources in this new environment?
2C) Candle: Athens Integration Project - Andrew Cox, South Bank
University
Universities both generate and use an increasingly diverse range of
networked information: from online teaching material to
administrative records. While there is a push for open access there
is an equal need to control who accesses what and what they can
do with the information they access. In other words there is a need
for sound authentication and authorisation. Existing solutions to
access control (IP address checking and password systems) are
inadequate. Better solutions could offer many benefits such as
personalised services, off campus services, better consolidated
management information and so on. Achieving this will require that
we overcome barriers of technology and standards. But the human
and organisational barriers are very great too. In this session a
short presentation will be followed by a discussion of the issues
and possible solutions.
2D) Plagiarism Detection - Dr Rob Irving, University of Glasgow
The session will explore the practicalities and implications of the
use of plagiarism detection software. Dr Irving has developed and
used such software to check student assignments in computer
programming, and his experiences have emphasised the need for a
security culture. Whose responsibility is it to detect and deal with
plagiarism, and how should institutions respond to this growing
problem?
* Application Form *
Please reserve me a place at the Fifth Information Strategies
Conference: Focus on Access and Security, Thursday 10th
February 2000
Name .................................................. Title
..................
Position
........................................................................
My choice of parallel sessions is as follows*:
(please insert the session numbers)
Morning
1st choice ............
2nd choice ............
3rd choice ............
Afternoon
1st choice ............
2nd choice ............
3rd choice ............
* Please note that we are unable to guarantee you a place on your
preferred parallel sessions.
Institution
.....................................................................
Address
.......................................................................
........................................................................
...........
........................................................................
...........
E-mail..................................................................
.........
Tel:
........................................................................
......
Do you have any special dietary or mobility needs? YES / NO
If yes, please give details
..................................................
[ ] I enclose a cheque for =A335 made payable to "The University of
Nottingham"
[ ] I enclose an official order form. Please invoice as instructed.
Please print out and complete this form, and send with cheque or
order, to:
Amber Thomas, Assistant JISC Information Strategy Coordinator
C35 Cherry Tree Buildings
The University of Nottingham
NottinghamNG7 2RD
Tel: +44 (0) 115 846 6054
Fax:+44 (0) 115 951 4791
E-mail: [log in to unmask]
%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
|