The course provides an introduction to the privacy and legal issues that arise when designing and operating shared computers, networks and services.
Systems that do not respect users’ privacy are unlikely to be trusted: to avoid this, organisations need to understand when their actions may be seen as invading privacy, reduce such actions as far as possible, and have a clear justification for those that remain.
The course uses situations that occur frequently in universities and colleges to discuss how to determine when privacy may be affected, when this may be necessary, and how it can be minimised.
Attending the course should help you develop your own systems, processes and policies that respect privacy and provide reliable and trustworthy services.
- Share good practice and learn from others from within academic networking
- Targeted assignments let you apply your knowledge to your organisation
- No travel! Attend from your desk
- One year of online support following the course
- High-quality materials including case studies, checklist and examples
- Learn from subject matter experts within the Janet Network community
- Affordable prices
- All course materials, equipment and labs provided
- Online session one – understanding privacy (two hours)
- Offline assignment – privacy breach scenarios
- Offline self-study – assessing privacy and the risk of harm
- Online session two – improving privacy (two hours)
- Offline self-study – working with others
- Offline assignment – applying laws to the requests
- Online session three – next steps and review (two hours)
Each of the live sessions will start at 13:45 and you will need to complete each session and assignment to progress through the course.
The sessions will involve presentations, audio and interactive chat both as a whole class and in breakout groups.
During the sessions you will have plenty of opportunities for discussions and communication with your peers. We encourage participation and hope that you will feel able to share your experiences and examples of good practice with the group.
The session will be run in Adobe Connect. In order to access the session you will require a web browser running Adobe Flash, and a headset or headphones and a microphone.
Who should attend
Staff, and their managers, who are responsible for shared systems such as computers, networks and databases, and whose access to systems and data could affect the privacy of their users.
What we cover
- The (limited) right to privacy
- Assessing invasion of privacy
- Assessing risk of harm
- Improving privacy
- Working with others
- Other constraints
On completion of this online course, delegates will be able to:
- Suggest ways in which your role impacts on other peoples’ privacy
- Explain how the law protects privacy
- Describe the need to balance privacy with other rights
- Assess the privacy impact of a proposed action
- Describe some techniques that can be used to reduce privacy invasion
- Assess the benefits of a proposed action
- Describe some of the purposes recognised in law as justifying breach of privacy
- Assess internal requests that may affect privacy
- Carry out a simple privacy impact assessment to understand privacy issues
- Name which laws regulate the release of private information
- Apply this knowledge to assessing various external requests
- Explain the principles of handling evidence
- Explain the issues around material that is illegal to possess
- Explain some of the issues raised by employment law
- Apply knowledge to workplace scenarios
Pricing and eligibility
- Jisc institutional members - £300 + VAT1
- Other organisations - £450 + VAT
- 1 If, in addition to paying a subscription, your institution has opted to become a Jisc institutional member, then - as part of our VAT-exempt cost sharing group - you will not be charged VAT on your course fee. For more information visit our VAT-exempt cost sharing group page: https://www.jisc.ac.uk/membership/vat-exempt-cost-sharing-group
For more information, email email@example.com or phone 01235 822242.