Print

Print


Of course it would be the same for students! 

 

Why would it be any different. Would not the rights and freedoms impacted by
putting this technology to work on staff devices be the same rights and
freedoms of the students?

 

I think there is an issue of proportionality and the covert surveillance
nature of the activity strikes me as unethical, regardless of any
legalities. Even if students are informed, what would be the legal basis for
implementing this technology. I can't see it passing a LIA, consent would
not be appropriate.

 

There is also the issue of who reviews what information and when and what is
done with that information under which circumstances.

 

 

Simon Howarth.

 

 

From: This list is for those interested in Data Protection issues
<[log in to unmask]> On Behalf Of Kat Kuzmin
Sent: 16 August 2019 09:28
To: [log in to unmask]
Subject: [data-protection] Key Logging

 

Hi all,

 

The use of keylogging software  on student machines to provide evidence with
issues such as cyberbullying, using proxy sites,  inappropriate use of the
Internet is being used only when suspicion arises. However, discussions are
taken place to roll this software out across all college-owned devices
(including employees). The keylogging issue has been raised after a rollout
of a "Run,Hide,Tell." alert on all college-owned devices. 

 

The Working Party stated that logging employees' keystrokes or mouse
movements or capturing screenshots in remote working scenarios is highly
unlikely to be justified based on legitimate interest of the employer and
such monitoring technologies are typically disproportionate. Would this not
be the same for students? 

 

Any views would be appreciated! 

 

 

Kat Kuzmin

Data Analyst /Data Protection Officer

Havant & South Downs College (HSDC)

 

**This message may contain privileged and confidential information. It is
intended solely for the person to whom it is addressed. It is strictly
forbidden to share any part of this message with any third party, without a
written consent of the sender. If you are not the intended recipient, please
notify the sender and delete the message immediately. The text in this
e-mail and any attachments should not be published, altered ,copied,
disclosed ,transmitted or tampered with in any way, unless expressly
authorised by the sender. Any views expressed in this message are those of
the individual sender and do not necessarily reflect the views of
<http://www.hsdc.ac.uk> Havant & South Downs College. The college has made
reasonable effort in ensuring that the message is error and virus-free.
Unfortunately, full security of the email cannot be ensured as, despite our
efforts, the data included in emails could be infected, intercepted, or
corrupted. Therefore, the recipient should check the email for threats with
proper software, as the sender does not accept liability for any damage
inflicted by viewing the content of this email.** 

  _____  

All archives of messages are stored permanently and are available to the
world wide web community at large at
<http://www.jiscmail.ac.uk/lists/data-protection.html>
http://www.jiscmail.ac.uk/lists/data-protection.html

Selected commands (the command has been filled in below in the body of the
email if you are receiving emails in HTML format):

*	Leaving this list: send leave data-protection to
<mailto:[log in to unmask]&BODY=LEAVE%20data-protection>
[log in to unmask]
*	Suspending emails from all JISCMail lists: send SET * NOMAIL to
<mailto:[log in to unmask]&BODY=SET%20*%20NOMAIL>
[log in to unmask]
*	To receive emails from this list in text format: send SET
data-protection NOHTML to
<mailto:[log in to unmask]&BODY=SET%20data-protection%20NOHTML>
[log in to unmask]
*	To receive emails from this list in HTML format: send SET
data-protection HTML to
<mailto:[log in to unmask]&BODY=SET%20data-protection%20HTML>
[log in to unmask]

All user commands can be found at
<https://www.jiscmail.ac.uk/help/subscribers/subscribercommands.html>
https://www.jiscmail.ac.uk/help/subscribers/subscribercommands.html and are
sent in the body of an otherwise blank email to
<mailto:[log in to unmask]> [log in to unmask]

Any queries about sending or receiving messages please send to the list
owner  <mailto:[log in to unmask]>
[log in to unmask]

(Please send all commands to  <mailto:[log in to unmask]>
[log in to unmask] not the list or the moderators, and all requests for
technical help to  <mailto:[log in to unmask]> [log in to unmask],
the general office helpline)

  _____  


^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
     All archives of messages are stored permanently and are
      available to the world wide web community at large at
      http://www.jiscmail.ac.uk/lists/data-protection.html
     If you wish to leave this list please send the command
       leave data-protection to [log in to unmask]
All user commands can be found at https://www.jiscmail.ac.uk/help/subscribers/subscribercommands.html
 Any queries about sending or receiving messages please send to the list owner
              [log in to unmask]
  Full help Desk - please email [log in to unmask] describing your needs
        To receive these emails in HTML format send the command:
         SET data-protection HTML to [log in to unmask]
   (all commands go to [log in to unmask] not the list please)
    ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^