Goal/Charge: Explore the use of third-party, "click-through" tools in the teaching and learning arena and develop general guidance and best practices for their use.
Conveners: Jenn Stringer (UCB) David Levin (UCD)
Members:
Shohreh Bozorgmehri shohreh@uci.edu (UCI)
Mary-Ellen Kreher Mary-Ellen.Kreher@ucop.edu (UCOP)
Daniel Suchy dsuchy@ucsd.edu (UCSD)
Benito Gonzalez bgonzalez2@ucmerced.edu (UCM)
David Hutches dhutches@eng.ucsd.edu (UCSD)
Mailing List:
click_etlg@lists.berkeley.edu
Google accounts:
jstringer@berkeley.edu
dslevin@ucdavis.edu
dhutches@eng.ucsd.edu
shohreh@uci.edu
henjef@gmail.com
mary-ellen.kreher@uconline.edu
3/11/14 Notes
Meeting Agendas | Notes |
---|---|
March 25, 2014 11am-12pm Dial in Number: 866-740-1260 Code: 6439923#
| |
March 11, 2014 1pm-2pm Dial in Number: 866-740-1260 Code: 6439923#
| |
September 25, 2013 - 3pm-4pm
|
Links and Documents:
Resource | Comments |
---|---|
http://copyright.universityofcalifornia.edu/ | Great copyright site that we want to use as a model for a similar site around click-through agreements. |
Vendor "Click Through" Agreements: Workgroup Report for ITLC August 9, 2013 | This document contains some general recommendations around such agreements. It also suggests policy changes/updates at the UCOP level. |
Click-Through Agreements-Privacy-Guidance.docx | This is the document that Mary-Ellen put together based on counsel advice. |
https://eee.uci.edu/help/tools/ | UCI website Third Party Tools and Cloud Computing |
http://its.ucsc.edu/google/index.html | UCSC's great site explaining the Google tools and their licensing. |
https://eee.uci.edu/help/tools/overview/ | UC Irvine's site explaining Third Party Tools & Cloud Based Computing to faculty. Outline's risk assessment, responsibilities etc. |
NASCIO_2013SocialMediaIssueBrief.pdf | National Association of State Chief Information Officers' brief on Social Media |
Silent Listeners.pdf | Silent Listeners: The Evolution of Privacy and Disclosure on Facebook Fred Stutzman, Ralph Grossy, Alessandro Acquistiz Journal of Privacy and Confidentiality (2012) 4, Number 2, p. 7-41 "These findings highlight the tension between privacy choices as expressions of individual subjective preferences, and the role of the environment in shaping those choices." |