{"id":476,"date":"2015-07-21T17:55:50","date_gmt":"2015-07-21T21:55:50","guid":{"rendered":"https:\/\/openstudio.pub\/teachinginadigitalagev3m\/chapter\/s-security-and-privacy\/"},"modified":"2025-05-10T07:40:43","modified_gmt":"2025-05-10T11:40:43","slug":"s-security-and-privacy","status":"publish","type":"chapter","link":"https:\/\/openstudio.pub\/teachinginadigitalagev3m\/chapter\/s-security-and-privacy\/","title":{"raw":"S: Security and privacy","rendered":"S: Security and privacy"},"content":{"raw":"37.\u00a0What student information am I obliged to keep private and secure? What are my institution's policies on this?\n\n38. What is the risk that by using a particular technology my institution's policies concerning\u00a0privacy could easily be breached? Who in my institution could advise me on this?\n\n39. What areas of teaching and learning, if any, need I keep behind closed doors, available only to students registered in my course? Which technologies will best allow me to do this?\n\n&nbsp;\n\nThese 39 questions are just suggestions. You may wish to add other questions (or ignore some of mine) depending on the context in which you will be working.","rendered":"<p>37.\u00a0What student information am I obliged to keep private and secure? What are my institution&#8217;s policies on this?<\/p>\n<p>38. What is the risk that by using a particular technology my institution&#8217;s policies concerning\u00a0privacy could easily be breached? Who in my institution could advise me on this?<\/p>\n<p>39. What areas of teaching and learning, if any, need I keep behind closed doors, available only to students registered in my course? Which technologies will best allow me to do this?<\/p>\n<p>&nbsp;<\/p>\n<p>These 39 questions are just suggestions. You may wish to add other questions (or ignore some of mine) depending on the context in which you will be working.<\/p>\n","protected":false},"author":1,"menu_order":8,"template":"","meta":{"pb_show_title":"","pb_short_title":"","pb_subtitle":"","pb_authors":[],"pb_section_license":""},"chapter-type":[],"contributor":[],"license":[],"class_list":["post-476","chapter","type-chapter","status-publish","hentry"],"part":461,"_links":{"self":[{"href":"https:\/\/openstudio.pub\/teachinginadigitalagev3m\/wp-json\/pressbooks\/v2\/chapters\/476","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/openstudio.pub\/teachinginadigitalagev3m\/wp-json\/pressbooks\/v2\/chapters"}],"about":[{"href":"https:\/\/openstudio.pub\/teachinginadigitalagev3m\/wp-json\/wp\/v2\/types\/chapter"}],"author":[{"embeddable":true,"href":"https:\/\/openstudio.pub\/teachinginadigitalagev3m\/wp-json\/wp\/v2\/users\/1"}],"version-history":[{"count":1,"href":"https:\/\/openstudio.pub\/teachinginadigitalagev3m\/wp-json\/pressbooks\/v2\/chapters\/476\/revisions"}],"predecessor-version":[{"id":477,"href":"https:\/\/openstudio.pub\/teachinginadigitalagev3m\/wp-json\/pressbooks\/v2\/chapters\/476\/revisions\/477"}],"part":[{"href":"https:\/\/openstudio.pub\/teachinginadigitalagev3m\/wp-json\/pressbooks\/v2\/parts\/461"}],"metadata":[{"href":"https:\/\/openstudio.pub\/teachinginadigitalagev3m\/wp-json\/pressbooks\/v2\/chapters\/476\/metadata\/"}],"wp:attachment":[{"href":"https:\/\/openstudio.pub\/teachinginadigitalagev3m\/wp-json\/wp\/v2\/media?parent=476"}],"wp:term":[{"taxonomy":"chapter-type","embeddable":true,"href":"https:\/\/openstudio.pub\/teachinginadigitalagev3m\/wp-json\/pressbooks\/v2\/chapter-type?post=476"},{"taxonomy":"contributor","embeddable":true,"href":"https:\/\/openstudio.pub\/teachinginadigitalagev3m\/wp-json\/wp\/v2\/contributor?post=476"},{"taxonomy":"license","embeddable":true,"href":"https:\/\/openstudio.pub\/teachinginadigitalagev3m\/wp-json\/wp\/v2\/license?post=476"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}