JiscMail Logo
Email discussion lists for the UK Education and Research communities

Help for DATA-PROTECTION Archives


DATA-PROTECTION Archives

DATA-PROTECTION Archives


data-protection@JISCMAIL.AC.UK


View:

Message:

[

First

|

Previous

|

Next

|

Last

]

By Topic:

[

First

|

Previous

|

Next

|

Last

]

By Author:

[

First

|

Previous

|

Next

|

Last

]

Font:

Proportional Font

LISTSERV Archives

LISTSERV Archives

DATA-PROTECTION Home

DATA-PROTECTION Home

DATA-PROTECTION  2000

DATA-PROTECTION 2000

Options

Subscribe or Unsubscribe

Subscribe or Unsubscribe

Log In

Log In

Get Password

Get Password

Subject:

Thursday 10th February 2000

From:

[log in to unmask]

Reply-To:

[log in to unmask]

Date:

Thu, 6 Jan 2000 10:09:32 +0000

Content-Type:

text/plain

Parts/Attachments:

Parts/Attachments

text/plain (227 lines)

The Joint Information Systems Committee

* Fifth Information Strategies Conference *
* Focus on Access and Security *

Thursday 10th February 2000
The British Library, London

In March 2000 the Data Protection Act comes into force. This will
mean that FE and HE Institutions have to be more accountable for
the way they manage personal data. Successful compliance with
the DPA means giving information issues a higher priority in many
institutions, and instigating a wider awareness of responsibility. In
parallel, new delivery methods for teaching and research are putting
copyright and Intellectual Property Rights under the spotlight.  At
the same time, many educational institutions are pushing to widen
access and investigating ways in which students, staff and visitors
can remotely interact with the university. 

- Data Protection Act
- Freedom of Information
- Creating a Security Culture
- Authentication
- Plagiarism
- Copyright

This conference aims to raise the questions and suggest some
approaches to the challenges of information management. There
will be keynote speakers from the Data Protection Registrar's
Office and the Freedom of Information Unit. Representatives from
information strategy pilot, exemplar and other sites will be
presenting their experiences of how a strategy can help.

- Who Should Attend?
This conference will be of interest to Heads of Information Services,
Registrars, Heads of Learning Resources, Data Protection Officers,
Heads of Computing Services, Heads of Research Units, Education
Development Managers, Quality Assurance Managers and all
members of the HE and FE community who manage information,
both administrative and scholarly.

- Venue
The conference will be held at the Conference Centre of the British
Library, London, close to St Pancras and Euston mainline stations.

- Cost
The cost of the conference is =A335 [VAT exempt]

- How to Apply
Please complete the form on the back of this leaflet, and send with
a cheque for =A335 to the Assistant Information Strategies Co-
ordinator. Places are limited, so early application is advised. 


* Programme *

10:00	Registration and Refreshments
10:30	Introduction - Professor Peter Ford
10:45	Data Protection Act 1998 - Jonathan Bamford,
Assistant Data Protection Registrar
Mr Bamford has responsibility for public sector compliance with the
Data Protection Act and will outline the main implications of the
new Act for institutions of higher and further education.
11:45	Parallel Sessions
13:00	Lunch
14:00	Parallel Sessions
15:15	Freedom of Information - Emma Louise Avery
Freedom of Information Unit
Ms Avery will outline the main implications of the new Act for
institutions of higher and further education.
16:00	Closing Remarks
16:15   Refreshments and Departure

* Parallel Sessions *

Morning

1A) Creating a Security Culture - Panel Session
One of the main issues which arose from the JISC Assist Security
Workshop in October 1999 was the difficulty institutions find in
generating a security culture.  Your systems may be as technically
secure as you could wish but it is the way in which people use
(and abuse) them which can still lead to difficulties. The panel will
be comprised of staff from a range of institutions which have used
their Information Strategy to aid the development of a security
culture throughout the institution.  Participants at this session will
be invited to submit questions to the panel.

1B) The JISC Approach to Security - Annette Haworth
      Chair, JISC Committee for Authentication and Security
The session will outline the work and progress of this new
committee, with particular reference to its work on BS7799 and the
provision of guidelines, templates and examples of best practice in
the area of security.

1C) The S3 Project - Staff/Student/System Self-Service at JMU -
John Townsend, Liverpool John Moores University
The S3 project was partially funded by the JTAP initiative and the
primary objective is to deliver a better information service to staff
and students through the adoption of a disintermediated or self-
service business model, that is, one in which all internal business
transactions will be undertaken by staff  and students directly
interacting with automated systems, rather than these transactions
having to be undertaken on their behalf by intermediaries. The
presentation will describe the theoretical background to the
approach and the underlying strategic objectives that it supports
progression the project to date, technical and organisational issues
that have arisen, particularly in relation to access and security new
directions, and the ways in which lessons learned will inform the
deployment of the self-service approach in the future.

1D) Digital Preservation - Maggie Jones, Arts and Humanities Data
Service
As information is increasingly created, used and stored digitally,
the question of its continuing preservation and access in the digital
order becomes more crucial.  Maggie Jones is leading a project
designed to produce guidelines on preservation management of
digital materials and this session will outline the progress of the
project and the initial findings, which will feed into the guidelines.

Afternoon

2A) The Ethics of Access - Andrew Charlesworth, University of Hull
Institutions are being encouraged to be more entrepreneurial in
their management and exploitation of resources, and indeed we
hold a wide range of resources of considerable value - anything
from staff and student records to our learning resources. 
Broadening access to these resources may offer potential financial
benefits to the institution but what are the legal and ethical
implications?

2B) The Sudden Importance of Copyright - Toby Bainton, SCONUL
Electronic distribution offers new possibilities and challenges,
whether you are a scholarly reader or a scholarly publisher.  And
whereas publishing used to be a capital-intensive activity, anyone
with a website is now a publisher.  Copyright, once a specialist
issue in universities, is now difficult to avoid.  How are we to
manage our scholarly resources in this new environment?

2C) Candle: Athens Integration Project - Andrew Cox, South Bank
University
Universities both generate and use an increasingly diverse range of
networked information: from online teaching material to
administrative records. While there is a push for open access there
is an equal need to control who accesses what and what they can
do with the information they access. In other words there is a need
for sound authentication and authorisation. Existing solutions to
access control (IP address checking and password systems) are
inadequate. Better solutions could offer many benefits such as
personalised services, off campus services, better consolidated
management information and so on. Achieving this will require that
we overcome barriers of technology and standards. But the human
and organisational barriers are very great too. In this session a
short presentation will be followed by a discussion of the issues
and possible solutions.

2D) Plagiarism Detection - Dr Rob Irving, University of Glasgow
The session will explore the practicalities and implications of the
use of plagiarism detection software. Dr Irving has developed and
used such software to check student assignments in computer
programming, and his experiences have emphasised the need for a
security culture. Whose responsibility is it to detect and deal with
plagiarism, and how should institutions respond to this growing
problem?

* Application Form *

Please reserve me a place at the Fifth Information Strategies
Conference: Focus on Access and Security, Thursday 10th
February 2000

Name .................................................. Title
..................

Position
........................................................................

My choice of parallel sessions is as follows*: 
(please insert the session numbers)
Morning
1st choice ............
2nd choice ............
3rd choice ............
Afternoon
1st choice ............
2nd choice ............
3rd choice ............
* Please note that we are unable to guarantee you a place on your
preferred parallel sessions.

Institution
.....................................................................
Address
.......................................................................
........................................................................
...........
........................................................................
...........
E-mail..................................................................
.........
Tel:
........................................................................
......

Do you have any special dietary or mobility needs?    YES / NO
If yes, please give details
..................................................

[   ]  I enclose a cheque for =A335 made payable to "The University of
Nottingham"

[   ]  I enclose an official order form. Please invoice as instructed.

Please print out and complete this form, and send with cheque or
order, to:

Amber Thomas, Assistant JISC Information Strategy Coordinator
C35 Cherry Tree Buildings
The University of Nottingham
NottinghamNG7 2RD
Tel:  +44 (0) 115 846 6054
Fax:+44 (0) 115 951 4791
E-mail: [log in to unmask]


%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%

Top of Message | Previous Page | Permalink

JiscMail Tools


RSS Feeds and Sharing


Advanced Options


Archives

April 2024
March 2024
February 2024
January 2024
December 2023
November 2023
October 2023
September 2023
August 2023
July 2023
June 2023
May 2023
April 2023
March 2023
February 2023
January 2023
December 2022
November 2022
October 2022
September 2022
August 2022
July 2022
June 2022
May 2022
April 2022
March 2022
February 2022
January 2022
December 2021
November 2021
October 2021
September 2021
August 2021
July 2021
June 2021
May 2021
April 2021
March 2021
February 2021
January 2021
December 2020
November 2020
October 2020
September 2020
August 2020
July 2020
June 2020
May 2020
April 2020
March 2020
February 2020
January 2020
December 2019
November 2019
October 2019
September 2019
August 2019
July 2019
June 2019
May 2019
April 2019
March 2019
February 2019
January 2019
December 2018
November 2018
October 2018
September 2018
August 2018
July 2018
June 2018
May 2018
April 2018
March 2018
February 2018
January 2018
December 2017
November 2017
October 2017
September 2017
August 2017
July 2017
June 2017
May 2017
April 2017
March 2017
February 2017
January 2017
December 2016
November 2016
October 2016
September 2016
August 2016
July 2016
June 2016
May 2016
April 2016
March 2016
February 2016
January 2016
December 2015
November 2015
October 2015
September 2015
August 2015
July 2015
June 2015
May 2015
April 2015
March 2015
February 2015
January 2015
December 2014
November 2014
October 2014
September 2014
August 2014
July 2014
June 2014
May 2014
April 2014
March 2014
February 2014
January 2014
December 2013
November 2013
October 2013
September 2013
August 2013
July 2013
June 2013
May 2013
April 2013
March 2013
February 2013
January 2013
December 2012
November 2012
October 2012
September 2012
August 2012
July 2012
June 2012
May 2012
April 2012
March 2012
February 2012
January 2012
December 2011
November 2011
October 2011
September 2011
August 2011
July 2011
June 2011
May 2011
April 2011
March 2011
February 2011
January 2011
December 2010
November 2010
October 2010
September 2010
August 2010
July 2010
June 2010
May 2010
April 2010
March 2010
February 2010
January 2010
December 2009
November 2009
October 2009
September 2009
August 2009
July 2009
June 2009
May 2009
April 2009
March 2009
February 2009
January 2009
December 2008
November 2008
October 2008
September 2008
August 2008
July 2008
June 2008
May 2008
April 2008
March 2008
February 2008
January 2008
December 2007
November 2007
October 2007
September 2007
August 2007
July 2007
June 2007
May 2007
April 2007
March 2007
February 2007
January 2007
2006
2005
2004
2003
2002
2001
2000
1999
1998


JiscMail is a Jisc service.

View our service policies at https://www.jiscmail.ac.uk/policyandsecurity/ and Jisc's privacy policy at https://www.jisc.ac.uk/website/privacy-notice

For help and support help@jisc.ac.uk

Secured by F-Secure Anti-Virus CataList Email List Search Powered by the LISTSERV Email List Manager