{"id":7421,"date":"2019-03-19T09:15:31","date_gmt":"2019-03-19T09:15:31","guid":{"rendered":"http:\/\/blogs.northampton.ac.uk\/learntech\/?p=7421"},"modified":"2019-03-19T16:31:37","modified_gmt":"2019-03-19T16:31:37","slug":"gdpr-tutors","status":"publish","type":"post","link":"https:\/\/blogs.northampton.ac.uk\/learntech\/2019\/03\/19\/gdpr-tutors\/","title":{"rendered":"GDPR &#8211; Considerations for tutors."},"content":{"rendered":"<div id=\"attachment_7423\" style=\"width: 605px\" class=\"wp-caption alignnone\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-7423\" class=\"wp-image-7423 size-large\" src=\"http:\/\/blogs.northampton.ac.uk\/learntech\/wp-content\/uploads\/sites\/7\/2019\/02\/gdpr-3518254_1920-1024x684.jpg\" alt=\"GDPR - General Data Protection Regulation\" width=\"595\" height=\"397\" srcset=\"https:\/\/blogs.northampton.ac.uk\/learntech\/wp-content\/uploads\/sites\/7\/2019\/02\/gdpr-3518254_1920-1024x684.jpg 1024w, https:\/\/blogs.northampton.ac.uk\/learntech\/wp-content\/uploads\/sites\/7\/2019\/02\/gdpr-3518254_1920-300x200.jpg 300w, https:\/\/blogs.northampton.ac.uk\/learntech\/wp-content\/uploads\/sites\/7\/2019\/02\/gdpr-3518254_1920-768x513.jpg 768w, https:\/\/blogs.northampton.ac.uk\/learntech\/wp-content\/uploads\/sites\/7\/2019\/02\/gdpr-3518254_1920.jpg 1920w\" sizes=\"auto, (max-width: 595px) 100vw, 595px\" \/><p id=\"caption-attachment-7423\" class=\"wp-caption-text\">GDPR &#8211; General Data Protection Regulation &#8211; Image from Pixabay (No attribution required)<\/p><\/div>\n<p>&nbsp;<\/p>\n<p>The introduction of EU GDPR legislation in 2016 and it\u2019s enforcement in May 2018\u00a0means that everyone who manages personal data is now responsible\u00a0for ensuring that it is secure and that data is safeguarded using the highest privacy settings appropriate so that data is not publicly available without\u00a0a lawfulness of processing criteria identified as required by GDPR Article 6.\u00a0 Although our VLE &#8211; NILE, is a secure network for students this law still applies and can guide us in how we best go about our day to day duties.<\/p>\n<p>&nbsp;<\/p>\n<p><strong>Device security.<\/strong><\/p>\n<p>When saving data it is best to either use the cloud storage &#8216;OneDrive&#8217; or your network drives as locally saved data can be easily hacked should you lose your device.\u00a0Article 9 of GDPR expects greater degrees of security for sensitive personal data (known as \u2018special category data\u2019) and so any personal information of this sort should also be password protected.<\/p>\n<p>If you are unable to work online and are working on documents which contain student data such as <a href=\"https:\/\/support.office.com\/en-gb\/article\/protect-an-excel-file-7359d4ae-7213-4ac2-b058-f75e9311b599\" target=\"_blank\" rel=\"noopener\">Excel, then you should password protect these<\/a>.\u00a0 \u2013 sensitive personal data should not be worked on offline and snapshots of University databases should never be used to process personal data offline.<\/p>\n<p>When users login to NILE it is usually automated due to &#8216;single sign-on&#8217; or your password may be held in the browser cache so anyone with access to your computer will be able to login to NILE to view student data. Therefore we strongly advise you do not allow any other users access to your machine, or leave it unattended. When not in use you\u00a0should always lock the screen (Windows Key + L&#8217;\u00a0 \/ Mac &#8216;Control + Shift + Power&#8217;).<\/p>\n<p>If you lose either your work device or a mobile\u00a0device which is linked to data such as your email, you should report\u00a0this as a data breach to IT immediately via the <a href=\"https:\/\/www.northampton.ac.uk\/help\" target=\"_blank\" rel=\"noopener\">UoN Service Desk.\u00a0<\/a>so they can secure your account, and the University Data Records Manager Phil Oakman,\u00a0<a href=\"mailto:Phil.Oakman@northampton.ac.uk\">Phil.Oakman@northampton.ac.uk<\/a><\/p>\n<p>&nbsp;<\/p>\n<p><strong>Personal data breach.<\/strong><\/p>\n<p>If you become aware of a <a href=\"https:\/\/ico.org.uk\/for-organisations\/guide-to-data-protection\/guide-to-the-general-data-protection-regulation-gdpr\/personal-data-breaches\/\" target=\"_blank\" rel=\"noopener\">data breach<\/a> you should inform the University Data Records Manager Phil Oakman,\u00a0<a href=\"mailto:Phil.Oakman@northampton.ac.uk\">Phil.Oakman@northampton.ac.uk<\/a><\/p>\n<p>Personal data breaches include:<\/p>\n<ul>\n<li>Access by an unauthorised third party,<\/li>\n<li>Deliberate or accidental action (or inaction) by a controller or processor,<\/li>\n<li>Sending personal data to an incorrect recipient,<\/li>\n<li>Alteration of personal data without permission,<\/li>\n<li>Loss of availability of personal data.<\/li>\n<li>Loss of personal data<\/li>\n<li>Personal data stolen<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<p><strong>Secure passwords.<\/strong><\/p>\n<p>Basic passwords can be cracked very easily. This <a href=\"https:\/\/tech.co\/password-managers\/how-secure-is-my-password\" target=\"_blank\" rel=\"noopener\">Tech.co article lists some good and bad examples of password<\/a><\/p>\n<p>We suggest you don&#8217;t use your work password for any other sites, as this leaves our NILE and IT systems open to hacking, also don&#8217;t write your password down anywhere or send it on an email.<\/p>\n<p>If you use your smartphone for work, then it is best to choose a longer passcode.\u00a0 A device called\u00a0<a href=\"https:\/\/www.alphr.com\/technology\/1009055\/graykey-box-unlock-iphone\" target=\"_blank\" rel=\"noopener\">&#8216;GrayKey&#8217;\u00a0software<\/a>\u00a0is used by government agencies to access iPhones, and can crack a 4 digit security code in a few hours, and a 6 digit code in a few days, but an 8 digit code would take much longer to crack. It is highly likely that hackers use similar software to crack passwords on both IoS and Android, so it is best to increase the number of digits beyond 6.<\/p>\n<p>If you suspect your password is not secure change it here:\u00a0<a href=\"https:\/\/www.northampton.ac.uk\/user\" target=\"_blank\" rel=\"noopener\">https:\/\/www.northampton.ac.uk\/user<\/a><\/p>\n<p>&nbsp;<\/p>\n<p><strong>Sending data via Email.<\/strong><\/p>\n<p>Sending student data by emails is problematic for a couple of reasons; firstly data can be intercepted by email servers, and secondly, it is easy to send an email to the wrong person.<\/p>\n<p>Do not include personal data and especially sensitive personal data in the body of an email.<\/p>\n<p>To make these more secure you should password protect any files containing student data &#8211; such as grades exported from NILE, that you are sending, and send the password in a separate email within an attachment. (not titled &#8216;password&#8217;)<\/p>\n<p>&nbsp;<\/p>\n<p><strong>Releasing grades.<\/strong><\/p>\n<p>When revealing grades to students, only use the functionality within our VLE &#8211; NILE, as this ensures that this private data is only seen by the student to who it applies.<\/p>\n<p>Staff should not use Announcements or Content areas to release grades or use group names or student numbers to anonymise them &#8211; as these are pseudo-anonymous and in breach of GDPR.<\/p>\n<p>&nbsp;<\/p>\n<p><b>Group grades &amp; feedback.<\/b><\/p>\n<p>Any information posted into the &#8216;Feedback to Learner&#8217; area in of a Blackboard Group assignment is released to all students in a group, therefore you should not include any grades in this area as this would be in breach of GDPR.<\/p>\n<p>&nbsp;<\/p>\n<p><strong>Identifying students by name.<\/strong><\/p>\n<p><span style=\"color: #000000\">Using student names to set up groups or perform tasks necessary for facilitating teaching and learning is a &#8216;Legitimate interest&#8217; of data.\u00a0<\/span><span style=\"color: #000000\">However, staff should be aware that adding additional information such as student numbers, telephone number, address, or age, would be a potential security risk to the students NILE and University account.<\/span><\/p>\n<p>&nbsp;<\/p>\n<p><strong>Collecting data in collaborative activities.<\/strong><\/p>\n<p>Tools such as blogs, discussion boards and Padlets are often used for online collaborative activities (such as ice-breakers) in which students\u2019 may be asked to share information about themselves. Data such as ethnicity, and sex is recorded in self-portraits and videos, or students may include information such as their home town, or sexual orientation in the written form.<\/p>\n<p>Be particularly cautious of asking students to provide details which are commonly used for (banking) security questions such as; home town, name of pet, mother&#8217;s maiden name, favourite book and favourite holiday destination.<\/p>\n<p>You may wish to consider whether the activity is a &#8216;legitimate interest&#8217; of data as it is linked to the learning of the course, or whether you could redesign the activity to achieve the same learning outcomes without the need for students to provide personal data.<\/p>\n<p>If it is necessary, you may wish to\u00a0flag up to your students the issues of sharing personal data in a shared digital space. or ask their consent to be 100% GDPR compliant.<\/p>\n<p>&nbsp;<\/p>\n<p><strong>Video recordings and virtual classrooms.<\/strong><\/p>\n<p>In the virtual classroom platform Collaborate Ultra, students attending can share their webcams or microphones and post questions in the chat box, this becomes a GDPR issue when sessions are recorded, as all of these are held in recordings.<\/p>\n<p>We recommend that staff either inform the students of the recording prior to the session &#8211; including details of where the recording will be made available and to whom. Or make the chat anonymous and remove the ability for students to share their camera and microphone in the session settings.<\/p>\n<p>As it is possible to start and stop the recording during the session staff may choose to anonymise the chat and restrict access to the webcam and microphone during the recorded &#8216;instructional&#8217; aspects of the session, then stop recording and make these available for when students are actively participating.<\/p>\n<p>&nbsp;<\/p>\n<p><strong>Use of Social Media Platforms.<\/strong><\/p>\n<p>The University\u2019s policy on the use of social media in teaching and learning is that students should not be disadvantaged if they do not wish to sign up to these social media platforms.<\/p>\n<p>The reason for this is that these providers are not licensed by the University and we can not expect our students to sign up to third-party terms and conditions.\u00a0Therefore staff should only adopt social media tools to share content if all students can view the content without signing up for an\u00a0account, examples of these are Twitter and Instagram.<\/p>\n<p>For the same reason, staff should not ask students to use social media platforms (such as Facebook or WhatsApp) for class communications. There are already tools in the group settings within the VLE to do this such as discussion boards, blogs, email or Collaborate (groups)<\/p>\n<p>If the use of Social Media is a learning outcome for a module, the course leader will need to make all potential students aware of this prior to enrolling on the course\u00a0through a declaration on the course information page within the university website.<\/p>\n<p>The use of social media is also relevant to GDPR, because social media platforms contain personal data which is not available in the VLE NILE and students are sharing data with third parties.<\/p>\n<p>&nbsp;<\/p>\n<p><strong>Third Party Tools\u00a0<\/strong><\/p>\n<p>There are many very useful online tools such as Socrative, Kahoot and Prezi which are commonly used for teaching and learning but are not supported by Learning Technology. In a similar way to the University&#8217;s policy on social media accounts, the University policy says that students should not be disadvantaged if they do not wish to sign up to third-party tools. Therefore staff should either only use tools allow students to participate without setting up a new account, or provide a supported alternative option which does not prejudice the student.<\/p>\n<p>This is relevant to GDPR because students are sharing data with third party providers.<\/p>\n<p>&nbsp;<\/p>\n<p><strong>Supported tools and licensed third-party publishers.<\/strong><\/p>\n<p>Tool and content providers within NILE have all provided GDPR policies to ensure they meet current legislation and confirm that our student data is secure. This includes a number of\u00a0third-party content providers.<\/p>\n<p>Please note, subjects which require students sign up to new accounts with third-party providers, should post a declaration on the course information page on the university website prior to enrolment to make students aware of this.<\/p>\n<p>&nbsp;<\/p>\n<p><strong>Sharing student data in research.<\/strong><\/p>\n<p>Before you start any research project you need to consider the implications of the data that you will be collecting, including how you will be obtaining this, how it will be stored, and how it will be preserved.\u00a0 A good data management plan will take you through these steps and will assist you in successfully obtaining research ethics approval.\u00a0 You can use <a href=\"https:\/\/dmponline.dcc.ac.uk\/\">https:\/\/dmponline.dcc.ac.uk\/<\/a> using your university login details to create a data management plan.\u00a0 Further resources can be found on the <a href=\"https:\/\/www.yammer.com\/northampton.ac.uk\/#\/threads\/inGroup?type=in_group&amp;feedId=12576881\" target=\"_blank\" rel=\"noopener\">research support yammer group<\/a>.<\/p>\n<p>Anonymisation or Pseudonymisation &#8211; GPDR<\/p>\n<p>Two distinct techniques that permit data controllers and processors to use de-identified data. The difference between the two techniques rests on whether the data can be re-identified.<\/p>\n<p>Recital 26 of the GDPR defines anonymised data as \u201cdata rendered anonymous in such a way that the data subject is not or no longer identifiable.\u201d Emphasises that anonymised data must be stripped of any identifiable information, making it impossible to derive insights on a discreet individual, even by the party that is responsible for the anonymisation.\u00a0When done properly, anonymisation places the processing and storage of personal data outside the scope of the GDPR.<\/p>\n<p>GDPR defines pseudonymisation as \u201cthe processing of personal data in such a way that the data can no longer be attributed to a specific data subject without the use of additional information.\u201d<\/p>\n<p>By holding the de-identified data separately from the \u201cadditional information.\u201d GDPR permits data handlers to use personal data more liberally without fear of infringing the rights of data subjects. This is because the data only becomes identifiable when both elements are held together.<\/p>\n<p>By rendering data pseudonymous, researchers can benefit from new, relaxed standards under GDPR. For example, Article 6(4)(e) permits the processing of pseudonymised data for uses beyond the purpose for which the data was originally collected.<\/p>\n<p>Recommended Software: ARX &#8211; <a href=\"http:\/\/arx.deidentifier.org\/\">http:\/\/arx.deidentifier.org\/<\/a> (open source)<\/p>\n<p>&nbsp;<\/p>\n<p>Post Contributors:<\/p>\n<p>Richard Byles &#8211; Learning Technologist.<br \/>\nPhil Oakman &#8211; Data Records Manager.<br \/>\nDawn Hibbert &#8211;\u00a0Head of Research Support<\/p>\n","protected":false},"excerpt":{"rendered":"<p>&nbsp;<\/p>\n<p>The introduction of EU GDPR legislation in 2016 and it\u2019s enforcement in May 2018\u00a0means that everyone who manages personal data is now responsible\u00a0for ensuring that it is secure and that data is safeguarded using the highest privacy settings appropriate so that data is not publicly available without\u00a0a lawfulness of processing criteria identified as required [&#8230;]<\/p>\n","protected":false},"author":24,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","_links_to":"","_links_to_target":""},"categories":[12],"tags":[228],"class_list":["post-7421","post","type-post","status-publish","format-standard","hentry","category-learntech-news","tag-gdpr"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.8 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>GDPR - Considerations for tutors. - Learning Technology Blog<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/blogs.northampton.ac.uk\/learntech\/2019\/03\/19\/gdpr-tutors\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"GDPR - Considerations for tutors. - Learning Technology Blog\" \/>\n<meta property=\"og:description\" content=\"&nbsp; The introduction of EU GDPR legislation in 2016 and it\u2019s enforcement in May 2018\u00a0means that everyone who manages personal data is now responsible\u00a0for ensuring that it is secure and that data is safeguarded using the highest privacy settings appropriate so that data is not publicly available without\u00a0a lawfulness of processing criteria identified as required [...]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/blogs.northampton.ac.uk\/learntech\/2019\/03\/19\/gdpr-tutors\/\" \/>\n<meta property=\"og:site_name\" content=\"Learning Technology Blog\" \/>\n<meta property=\"article:published_time\" content=\"2019-03-19T09:15:31+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2019-03-19T16:31:37+00:00\" \/>\n<meta property=\"og:image\" content=\"http:\/\/blogs.northampton.ac.uk\/learntech\/wp-content\/uploads\/sites\/7\/2019\/02\/gdpr-3518254_1920-1024x684.jpg\" \/>\n<meta name=\"author\" content=\"rjbyles\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"rjbyles\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"10 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/blogs.northampton.ac.uk\/learntech\/2019\/03\/19\/gdpr-tutors\/\",\"url\":\"https:\/\/blogs.northampton.ac.uk\/learntech\/2019\/03\/19\/gdpr-tutors\/\",\"name\":\"GDPR - Considerations for tutors. - Learning Technology Blog\",\"isPartOf\":{\"@id\":\"https:\/\/blogs.northampton.ac.uk\/learntech\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/blogs.northampton.ac.uk\/learntech\/2019\/03\/19\/gdpr-tutors\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/blogs.northampton.ac.uk\/learntech\/2019\/03\/19\/gdpr-tutors\/#primaryimage\"},\"thumbnailUrl\":\"http:\/\/blogs.northampton.ac.uk\/learntech\/wp-content\/uploads\/sites\/7\/2019\/02\/gdpr-3518254_1920-1024x684.jpg\",\"datePublished\":\"2019-03-19T09:15:31+00:00\",\"dateModified\":\"2019-03-19T16:31:37+00:00\",\"author\":{\"@id\":\"https:\/\/blogs.northampton.ac.uk\/learntech\/#\/schema\/person\/47abf3d5818f67695266cc6a949e2339\"},\"breadcrumb\":{\"@id\":\"https:\/\/blogs.northampton.ac.uk\/learntech\/2019\/03\/19\/gdpr-tutors\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/blogs.northampton.ac.uk\/learntech\/2019\/03\/19\/gdpr-tutors\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/blogs.northampton.ac.uk\/learntech\/2019\/03\/19\/gdpr-tutors\/#primaryimage\",\"url\":\"https:\/\/blogs.northampton.ac.uk\/learntech\/wp-content\/uploads\/sites\/7\/2019\/02\/gdpr-3518254_1920.jpg\",\"contentUrl\":\"https:\/\/blogs.northampton.ac.uk\/learntech\/wp-content\/uploads\/sites\/7\/2019\/02\/gdpr-3518254_1920.jpg\",\"width\":1920,\"height\":1282,\"caption\":\"GDPR - General Data Protection Regulation\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/blogs.northampton.ac.uk\/learntech\/2019\/03\/19\/gdpr-tutors\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/blogs.northampton.ac.uk\/learntech\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"GDPR &#8211; Considerations for tutors.\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/blogs.northampton.ac.uk\/learntech\/#website\",\"url\":\"https:\/\/blogs.northampton.ac.uk\/learntech\/\",\"name\":\"Learning Technology Blog\",\"description\":\"News and Updates from the Learning Technology Team\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/blogs.northampton.ac.uk\/learntech\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/blogs.northampton.ac.uk\/learntech\/#\/schema\/person\/47abf3d5818f67695266cc6a949e2339\",\"name\":\"rjbyles\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/blogs.northampton.ac.uk\/learntech\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/552034fd9b2539034365d0a8c39defe68a91ed1f148b32d1965a3c4a16a795e6?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/552034fd9b2539034365d0a8c39defe68a91ed1f148b32d1965a3c4a16a795e6?s=96&d=mm&r=g\",\"caption\":\"rjbyles\"},\"url\":\"https:\/\/blogs.northampton.ac.uk\/learntech\/author\/rjbyles\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"GDPR - Considerations for tutors. - Learning Technology Blog","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/blogs.northampton.ac.uk\/learntech\/2019\/03\/19\/gdpr-tutors\/","og_locale":"en_US","og_type":"article","og_title":"GDPR - Considerations for tutors. - Learning Technology Blog","og_description":"&nbsp; The introduction of EU GDPR legislation in 2016 and it\u2019s enforcement in May 2018\u00a0means that everyone who manages personal data is now responsible\u00a0for ensuring that it is secure and that data is safeguarded using the highest privacy settings appropriate so that data is not publicly available without\u00a0a lawfulness of processing criteria identified as required [...]","og_url":"https:\/\/blogs.northampton.ac.uk\/learntech\/2019\/03\/19\/gdpr-tutors\/","og_site_name":"Learning Technology Blog","article_published_time":"2019-03-19T09:15:31+00:00","article_modified_time":"2019-03-19T16:31:37+00:00","og_image":[{"url":"http:\/\/blogs.northampton.ac.uk\/learntech\/wp-content\/uploads\/sites\/7\/2019\/02\/gdpr-3518254_1920-1024x684.jpg","type":"","width":"","height":""}],"author":"rjbyles","twitter_card":"summary_large_image","twitter_misc":{"Written by":"rjbyles","Est. reading time":"10 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/blogs.northampton.ac.uk\/learntech\/2019\/03\/19\/gdpr-tutors\/","url":"https:\/\/blogs.northampton.ac.uk\/learntech\/2019\/03\/19\/gdpr-tutors\/","name":"GDPR - Considerations for tutors. - Learning Technology Blog","isPartOf":{"@id":"https:\/\/blogs.northampton.ac.uk\/learntech\/#website"},"primaryImageOfPage":{"@id":"https:\/\/blogs.northampton.ac.uk\/learntech\/2019\/03\/19\/gdpr-tutors\/#primaryimage"},"image":{"@id":"https:\/\/blogs.northampton.ac.uk\/learntech\/2019\/03\/19\/gdpr-tutors\/#primaryimage"},"thumbnailUrl":"http:\/\/blogs.northampton.ac.uk\/learntech\/wp-content\/uploads\/sites\/7\/2019\/02\/gdpr-3518254_1920-1024x684.jpg","datePublished":"2019-03-19T09:15:31+00:00","dateModified":"2019-03-19T16:31:37+00:00","author":{"@id":"https:\/\/blogs.northampton.ac.uk\/learntech\/#\/schema\/person\/47abf3d5818f67695266cc6a949e2339"},"breadcrumb":{"@id":"https:\/\/blogs.northampton.ac.uk\/learntech\/2019\/03\/19\/gdpr-tutors\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/blogs.northampton.ac.uk\/learntech\/2019\/03\/19\/gdpr-tutors\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/blogs.northampton.ac.uk\/learntech\/2019\/03\/19\/gdpr-tutors\/#primaryimage","url":"https:\/\/blogs.northampton.ac.uk\/learntech\/wp-content\/uploads\/sites\/7\/2019\/02\/gdpr-3518254_1920.jpg","contentUrl":"https:\/\/blogs.northampton.ac.uk\/learntech\/wp-content\/uploads\/sites\/7\/2019\/02\/gdpr-3518254_1920.jpg","width":1920,"height":1282,"caption":"GDPR - General Data Protection Regulation"},{"@type":"BreadcrumbList","@id":"https:\/\/blogs.northampton.ac.uk\/learntech\/2019\/03\/19\/gdpr-tutors\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/blogs.northampton.ac.uk\/learntech\/"},{"@type":"ListItem","position":2,"name":"GDPR &#8211; Considerations for tutors."}]},{"@type":"WebSite","@id":"https:\/\/blogs.northampton.ac.uk\/learntech\/#website","url":"https:\/\/blogs.northampton.ac.uk\/learntech\/","name":"Learning Technology Blog","description":"News and Updates from the Learning Technology Team","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/blogs.northampton.ac.uk\/learntech\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/blogs.northampton.ac.uk\/learntech\/#\/schema\/person\/47abf3d5818f67695266cc6a949e2339","name":"rjbyles","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/blogs.northampton.ac.uk\/learntech\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/552034fd9b2539034365d0a8c39defe68a91ed1f148b32d1965a3c4a16a795e6?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/552034fd9b2539034365d0a8c39defe68a91ed1f148b32d1965a3c4a16a795e6?s=96&d=mm&r=g","caption":"rjbyles"},"url":"https:\/\/blogs.northampton.ac.uk\/learntech\/author\/rjbyles\/"}]}},"post_mailing_queue_ids":[],"_links":{"self":[{"href":"https:\/\/blogs.northampton.ac.uk\/learntech\/wp-json\/wp\/v2\/posts\/7421","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blogs.northampton.ac.uk\/learntech\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blogs.northampton.ac.uk\/learntech\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blogs.northampton.ac.uk\/learntech\/wp-json\/wp\/v2\/users\/24"}],"replies":[{"embeddable":true,"href":"https:\/\/blogs.northampton.ac.uk\/learntech\/wp-json\/wp\/v2\/comments?post=7421"}],"version-history":[{"count":0,"href":"https:\/\/blogs.northampton.ac.uk\/learntech\/wp-json\/wp\/v2\/posts\/7421\/revisions"}],"wp:attachment":[{"href":"https:\/\/blogs.northampton.ac.uk\/learntech\/wp-json\/wp\/v2\/media?parent=7421"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blogs.northampton.ac.uk\/learntech\/wp-json\/wp\/v2\/categories?post=7421"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blogs.northampton.ac.uk\/learntech\/wp-json\/wp\/v2\/tags?post=7421"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}