Dear All,
We had a very similar issue here at Salford last year. A lecturer
wanted to spot students who were not using computers as these tend to be
the ones who drop out later on.
I had a few reservations: Ian below says that there is a correlation
between amount of work and results (unless you look at the BBC News item
(and comments) today about reading War and Peace) but only for certain
courses is there a direct link between use of university computer
systems and results/attendance. The course in question was a computing
course and it was Blackboard that the lecturer wanted to monitor and use
of Blackboard was compulsory for that specific course (had the course
been Music or Performing Arts I'd have probably said it wasn't feasible
to do what was asked).
Anyway we advised the lecturer to tell his students what he was planning
to do and get some form of consent and we amended our AUP to say that we
may, with consent, monitor usage for such purposes and everything seems
to have worked out well and the tutor is question is now able to make
sure that certain students are given additional pastoral care should
they need it.
Have a nice weekend
Matt
Matthew Stephenson
Acting Head of Compliance
Information Services Division
University of Salford
The Crescent
Salford M5 4WT
Tel: 0161 295 3152
Fax: 0161 295 6339
Email: [log in to unmask]
Web: www.isd.salford.ac.uk/governance
-----Original Message-----
From: This list is for those interested in Data Protection issues
[mailto:[log in to unmask]] On Behalf Of Griffiths, Ian
Sent: 02 March 2007 12:50
To: [log in to unmask]
Subject: Re: [data-protection] Access to computer log-in details
Legalites aside, I can probably tell you now that there is in fact
correlation between the amount of work students do and their results.
I wonder if there is any relationship between results and the amount of
time the staff spend rectifying the actual issue compared to time spent
chasing statistics.
Sorry. Its Friday.
Ian
-----Original Message-----
From: This list is for those interested in Data Protection issues
[mailto:[log in to unmask]] On Behalf Of Samantha Hill
Sent: 02 March 2007 11:56
To: [log in to unmask]
Subject: [data-protection] Access to computer log-in details
Dear All
I would appreciate your comments on a question that has arisen here.
A lecturer has requested the log-in records for students to a particular
computing system as he believes there will be a correlation between
recent poor exam results and the amount of times the students have
accessed this computer system. In providing the log-in records we would
be disclosing
the personal data of the students as I think the purpose is to be able
to say Student A accessed the system once for 5 minutes and got 10%
whereas
Student B accessed the system 10 times for an hour each time and got
70%.
As far as I can find out we have not told the students that we will be
doing this, nor that the findings will be discussed with the external
examiner who is bound to question the low marks, so I have problems with
disclosing the student's personal data - unless the sixth condition of
Schedule 2, that the processing is necessary for the purposes of
legitimate interests of the data controller, can be used.
I would be grateful for comments on whether this processing would be
considered a legitimate purpose and/ or others experience of a similar
situation.
Thanks very much
Samantha Hill
University of Portsmouth
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
All archives of messages are stored permanently and are
available to the world wide web community at large at
http://www.jiscmail.ac.uk/lists/data-protection.html
If you wish to leave this list please send the command
leave data-protection to [log in to unmask] All user
commands can be found at http://www.jiscmail.ac.uk/help/commandref.htm
Any queries about sending or receiving messages please send to the list
owner
[log in to unmask]
Full help Desk - please email [log in to unmask] describing your
needs
To receive these emails in HTML format send the command:
SET data-protection HTML to [log in to unmask]
(all commands go to [log in to unmask] not the list please)
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
All archives of messages are stored permanently and are
available to the world wide web community at large at
http://www.jiscmail.ac.uk/lists/data-protection.html
If you wish to leave this list please send the command
leave data-protection to [log in to unmask] All user
commands can be found at http://www.jiscmail.ac.uk/help/commandref.htm
Any queries about sending or receiving messages please send to the list
owner
[log in to unmask]
Full help Desk - please email [log in to unmask] describing your
needs
To receive these emails in HTML format send the command:
SET data-protection HTML to [log in to unmask]
(all commands go to [log in to unmask] not the list please)
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
All archives of messages are stored permanently and are
available to the world wide web community at large at
http://www.jiscmail.ac.uk/lists/data-protection.html
If you wish to leave this list please send the command
leave data-protection to [log in to unmask]
All user commands can be found at http://www.jiscmail.ac.uk/help/commandref.htm
Any queries about sending or receiving messages please send to the list owner
[log in to unmask]
Full help Desk - please email [log in to unmask] describing your needs
To receive these emails in HTML format send the command:
SET data-protection HTML to [log in to unmask]
(all commands go to [log in to unmask] not the list please)
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
|