Ethical Guidelines for the Online Researcher

Size: px
Start display at page:

Download "Ethical Guidelines for the Online Researcher"

Transcription

1 Ethical Guidelines for the Online Researcher The practice of using the internet as a tool for social science research is a comparatively new phenomenon. It is of paramount importance that the researcher wishing to embark on a study that involves accessing participants through internet sites such as blogs, bulletin boards, online communities or internet forums, understands the ethical issues that may arise from this style of research. Whilst the internet is becoming subject to legislation, a code of practice for the online researcher does not appear to exist in one clear format. Issues such as intellectual property, security of information, obtaining written consent and personal and participant safety are just some of the issues for online research. It is the purpose of this document to guide the online researcher in what has been described as netiquette ; the need to act at all times in a manner that respects and protects both the researcher and the online participants. Some key points 1. This is a guide and not an exhaustive list 2. All online research must be approved by IASREC before commencement 3. The researcher must at all times treat the online community with the same level of courtesy and respect that would be afforded to the offline community 4. The ethical standards of practice expected of researchers in the real world do not change for the online researcher. This document has in places been adapted from Bruckman A (2004) (see reference list) and assumes that you are already familiar with the basic requirements of human subjects research. We need firstly to accept that no one set of rigid rules can ever capture the subtlety of ethical situations that may arise. The following 'rules of thumb' are intended as a general guide only and not an exhaustive list. 1. You may freely quote and analyse online information without consent if: o It is officially, publicly archived. o No password is required for archive access. o No site policy prohibits it.

2 o The topic is not sensitive. For everything else not covered by 1, you typically need consent 2. Electronic consent It is acceptable to post a consent form on an internet site that has been generated by the researcher. The guidance on using chat rooms for research purposes appears to indicate that prior to the discussion taking place a posting is to be made that details the research purposes, right to withdraw, confidentiality, how to make a complaint etc. People will be asked to complete the consent form and from this they follow a link that allows access to the main chat room. In the case of accessing established online communities/blog pages for the purpose of recruiting participants for a study, a copy of the consent form, right to withdraw, how to make a complaint etc must be ed directly to the participants and returned (via ) before the study commences. It is for the researcher to develop a system of coding to allow the removal of information from the study should a participant wish to withdraw. 3. The process of requesting consent must not disrupt normal group activity e.g. when accessing chat rooms it is not acceptable to log into an active conversation and ask for permission to record the online chat, you must announce your research intentions prior to entering the general discussion and have sought permission from participants before hand. 4. When recording material that would otherwise be ephemeral, such as discussing deviant / illegal behaviours, consideration should be given to whether the act of recording potentially creates risks for subjects. 5. Be open and honest. Tell the respondents what support you are able/not able to offer. Identify any potential benefits and/or harm and make it clear what will happen to the data collected, how will it be used, who will have access to it. 6. Covert observation in chat rooms It is the decision of IASREC that covert observations of online communities is not acceptable. 7. Supply a link to the institution/researcher responsible for the research study

3 8. Before the start of a study, the researchers and IASREC must decide whether subjects' identities will be disguised, and if so to what degree. Note that pseudonyms function similarly to real names, and should be treated in the same way one treats real names Because: Levels of disguising: They are often de facto traceable to real names. People care about the reputation of their pseudonyms. In other words, they function for most purposes just like real names, and should be treated the same way. No disguise The Internet is rather like a playground for amateur artists. In many cases, people deserve credit for their creative work. Pseudonyms and real names may be used with permission of the individual. The individual's claim to copyright over the work is respected. The real author of the work is verified. (Some work may be copied or highly derivative, meaning credit belongs to the original author.) The researcher should omit details that would be harmful to the subject if revealed. Light disguise The group is named. Pseudonyms and some other identifying details (place names, organisational and institutional names, etc.) are changed. Verbatim quotes may be used, even if they could be used to identify an individual. Group members themselves may be able to guess who is being discussed. An outsider could probably figure out who is who with a little investigation.

4 Details that are harmful to individuals should be omitted. Moderate disguise A compromise position is chosen, incorporating some features of light disguise and some of complete disguise, as appropriate to the situation. Details of the specific compromise are reviewed by the researcher's ethics committee. Complete disguise The group is not named. Pseudonyms and other identifying details are changed. Verbatim quotes are not used if a search mechanism could link those quotes to the person in question. Some false details may be deliberately introduced. For example, if you are studying a support site for a chronic disease, you might change the disease in published accounts. A subject might or might not recognise themselves. No one else would recognise the subject. Someone deliberately seeking to find a subject's identity would be unable to do so. Details that would be harmful to the subject if disclosed may be revealed. Discussion These guidelines represent an interpretation of what is considered ethical practice when using the internet for research purposes. This style of research may include accessing online communities, news groups or bulletin boards. These guidelines do not address the steps one needs to take to assure that research is accurate. Use of online media introduces new risks of error, for example indiscriminate use of low-quality or erroneous information found online, errors of sampling method, etc. Taking reasonable steps to prevent error is also an ethical obligation of researchers, but is beyond the scope of this document.

5 Situated Research It's important to remember that all "Internet research" takes place in an embedded social context. To understand Internet-based phenomena, you need to understand that broader context. Consequently, most "online research" really also should have an offline component, and many ethical issues become identical to those for traditional research, such as the need to gain written consent from participants. Research Integrity Versus Ethical Obligations A frequent mistake made by many Internet researchers is, when faced with a trade off between needs of subjects and integrity of the research, to give priority to the integrity of the research. On further reflection, it should be obvious that this reasoning is faulty--the rights of subjects come first. For example, when faced with situations where getting consent from potential study participants in a computer-mediated communication forum is logistically difficult or potentially disruptive to the environment, some researchers have concluded that consent is not required. In fact, consent is still required, and substantially disrupting the environment is not acceptable. In such a situation, the investigator must fundamentally rethink the research plan or even abandon it, not lessen their ethical obligations. Many errors in research ethics stem from a researcher's sincere dedication to the quality of results. While producing quality research results is in itself an ethical imperative, it always takes a back seat to the needs of subjects. Consent from Whom? Where consent is required, you need to get consent from each individual you wish to record, quote, or study in any way. In cases where you have a vulnerable or under-age population, you need permission of the group's leader/ gatekeeper before you may solicit participation. A group leader may be an individual or an organisation. (You must remember that if you are considering using an under-age population or vulnerable group, you must have sought and been granted permission from IASREC prior to seeking permission from the site gatekeeper ). For regular groups, you do NOT need permission of the group leader to ask for voluntary participation from individuals, unless that is explicitly required by a posted site policy. "Official" Archives

6 An archive is "official" if its presence is announced in the welcome message sent to new group members, or the archive address is regularly posted to the list or noted in a group FAQ. An archive is public if it is accessible without a password. The point of this language is to try to articulate how we as researchers can determine when members of a list have a reasonable expectation that their communication is private, and when there is no such expectation. Some frequently asked questions Research on Chat rooms Q: What if the gatekeeper says no to my request, doesn't this make it difficult to do research on chat rooms? A: Yes, it does. One suggested technique is to create your own chat room just for the purposes of your study. When you create your own chat room, you can greet each person joining the channel/room with a message informing them about the study. Depending on the nature of the study, a channel logon message may be sufficient, you will also need to get informed consent from participants. Changing Risk Levels Q: My research started off as "low risk" but something unanticipated that is more controversial happened. What do I do? A: Consult your supervisor and they will guide you. You may need to abandon the study or re-think your strategies. The need may arise to go back to the ethics committee to seek new approval if the focus / risk level has changed. In some cases, you may need to with hold some information from your publications. For example, in reports on one educational environment the author created, it would shed light on important issues to comment on some children's personal problems. However, because it was impossible to disguise their identity sufficiently, this information was omitted from publications. While this does diminish the quality of the scholarship, there was really no alternative. Consent Q: The forum I want to use for my research has a posting that says I must seek consent from the forum manager before contacting / posting

7 on the site. I have ed many times asking for permission but got no reply, can I go ahead and make direct contact with forum members? A: No. If the site clearly states that permission must be sought then it is the belief of the forum members that they will not be solicited directly. If consent is not obtainable you will need to abandon this site and move to another. Intellectual ownership Q: Surely if someone has gone online and posted a comment about themselves, they cannot expect that information to be private, can they? Surely I can use that information if I wish without seeking their consent A: This continues to be a debated issue. Who owns a message once it has been placed on a message board? Private versus public? I would suggest you read Mann and Stewart (2000) chapter 3 (see reference list) to fully appreciate the complexities of this issues. Safeguarding privacy Q: If I set up my own discussion board/blog page can anyone else access these without my permission? I have heard that other search engines can gain access without my knowing, is this right? A: Yes it is possible for other providers to gain direct access to the message boards on your site. You will need to make sure you have put safeguards in place to limit this occurring. The researcher keeping safe in the online world It is important to consider your own safety when carrying out online research. Here are some key safety points Never use your home / personal address. Either use your university account for correspondence or set up an internet account that can be closed after the research has taken place. Never post personal details that are not relevant to the research study on a forum / blog / internet page. If you need participants to

8 post a consent form or questionnaire back to you, then consider using the University address or create a PO box address. Never arrange to meet a participant in person that you do not know or have not corresponded with in person (via telephone). If you do wish to carry out a face-to-face interaction with them, then you must follow the same guidelines for any other research project. You will find reference to online safety in Mann and Stewart (2000) chapter 3 (see reference list). These guidelines are not an exhaustive list. It is important that you read widely before considering online research as there are many pitfalls and complexities that need your attention before you commence. Essential reading Mann, C. and Stewart, F. (2000) Internet Communication and Qualitative Research. A Handbook for Researching Online. London. Sage Publication Please refer to the additional reading list for detailed information on using the internet for research purposes. Should you wish to discuss this document in any detail, or, would like further information on carrying out online research please feel free to contact Alison Tresidder-Spivey, Lecturer Sociology/Criminology department, Polhill Campus, Bedford. Alison.Tresidder-Spivey@beds.ac.uk

9 Using the internet as a tool for research purposes. Sources of information Brownlow, C. and O Dell L. (2002) Ethical issues for Qualitative Research in On-line Communities. Disability & Society. Vol. 17. No. 6, 2002, pp Buchanan, E, A. (eds) (2004) Readings in Virtual Research Ethics. Hershey. Information Science Publishing. - (An excellent source of information and recommended by many other writers as the book to consult if considering using the internet as a research tool) Clegg, B. (2006) Studying using the web: the student's guide to using the ultimate information resource. Oxford: Routledge. - (Section on using newsgroups and forums for academic study) Flicker, S., Haans, D. and Skinner, H. (2004) Ethical Dilemmas in Research on Internet Communities. Qualitative Health Research, vol.14 No. 1, January , Hine, C. (2005) Virtual Methods: Issues in Social Research on the Internet. Oxford. Berg - (Section on ethical considerations) Jones, S.G. (editor) (1999) Doing Internet Research. Critical Issues and Methods for Examining the Net. London. Sage. Mann, C. and Stewart, F. (2000) Internet Communication and Qualitative Research. A Handbook for Researching Online. London. Sage Publication - (An excellent source of information and recommended by many other writers as the book to consult if considering using the internet as a research tool) Nancarrow, C., Pallister, J. and Bruce, I. (2001) 'A New Research Medium, New Research Populations and Seven Deadly Sins for Internet Researchers', Qualitative Market Research, Vol. 4, No. 3, pp

10 O Dochartaigh, N. (2002) The Internet Research Handbook. A Practical Guide for Students and Researchers in the Social Sciences. London. Sage Publications. - (Has a chapter on making contact and netiquette. Details the correct way to make contact with online news groups, using bulletin boards and making contact with other researchers). Pears, R. and Shields, G. (2008) Cite them right: the essential referencing guide. Rev. ed. Newcastle upon Tyne: Pear Tree books. - (Covers how to reference web pages, blogs, wikis, social networking sites etc. and how to avoid plagiarism). Internet sources Bruckman, A. (2002) Ethical Guidelines for Research Online. Available at: Sociological Research Online. Via the University Library page Sociological Research Online : Internet [electronic resource]. Available in Ebscohost EJS. This is an invaluable source for anyone considering using the internet / internet users for their social science research. This site has many links to journal articles that have addressed the ethical issues surrounding online research practices. Key articles Chen, P and Hinton, S.M. (1999) 'Realtime Interviewing Using the World Wide Web' Sociological Research Online Vol. 4, No. 3 Coomber, R. (1997) 'Using the Internet for Survey Research' Sociological Research Online, vol. 2, no. 2, Denscombe, M. (2005) Research Ethics and the Governance of Research Projects: the Potential of Internet Home Pages. Sociological Research Online, Volume 10, Issue 3, Illingworth, N. (2001) 'The Internet Matters: Exploring the Use of the Internet as a Research Tool'. Sociological Research Online, vol. 6, no. 2,

11 Other sources that will help guide your practice MRS (2004) Code and Guidelines: Internet Research Guidelines, Market Research Society. < Professional Associations e.g. British Sociological Association. British Association of Social Workers. British Psychological Society (2007). Report of the Working Party on Conducting Research on the Internet. The data Protection Act

Making ethical decisions in an online context:

Making ethical decisions in an online context: Making ethical decisions in an online context: Reflections on using blogs to explore narratives of experience Helene Snee, University of Manchester Framing the Gap Year: Distinction, Difference and Identity

More information

MRS Guidelines for Online Research. January 2012

MRS Guidelines for Online Research. January 2012 MRS Guidelines for Online Research January 2012 MRS is the world s largest association for people and organisations that provide or use market, social and opinion research, business intelligence and customer

More information

With the increasing popularity of social media you need a Social Media Policy to protect your company.

With the increasing popularity of social media you need a Social Media Policy to protect your company. Dear Reader, With the increasing popularity of social media you need a Social Media Policy to protect your company. It can become your biggest nightmare when employees distribute information that s not

More information

Auburn University at Montgomery Policies and Procedures

Auburn University at Montgomery Policies and Procedures Auburn University at Montgomery Policies and Procedures Title: Responsible Office: Social Media Policy University Relations I. PURPOSE This policy outlines the procedures governing social media pages created

More information

POLICY. Responsible Use of Social Media

POLICY. Responsible Use of Social Media POLICY Responsible Use of Social Media Contact Officer Director of Personnel Director of Communications & Participation Senior Project Manager: Corporate Policies (Policy author) Purpose The primary aims

More information

Prepared by the Policy, Performance and Quality Assurance Unit (Adults) Tamsin White

Prepared by the Policy, Performance and Quality Assurance Unit (Adults) Tamsin White Principles of Good Research & Research Proposal Guidee Prepared by the Policy, Performance and Quality Assurance Unit (Adults) Tamsin White March 2006 Principles of Good Research All research is different

More information

Web Server & Systems Usage Policy. The WGG Associates Limited Usage Policy has been developed with the following objectives:

Web Server & Systems Usage Policy. The WGG Associates Limited Usage Policy has been developed with the following objectives: Web Server & Systems Usage Policy The WGG Associates Limited Usage Policy has been developed with the following objectives: Ensure security, reliability and privacy of WGG Associates Limited' systems and

More information

Forrestville Valley School District #221

Forrestville Valley School District #221 Forrestville Valley School District #221 Student Acknowledgment of Receipt of Administrative Procedures for Acceptable Use of the Electronic Network 2015-2016 All use of electronic networks shall be consistent

More information

Communications Council Best Practice Guide

Communications Council Best Practice Guide Communications Council Best Practice Guide Social Media Code of Conduct social media code of conduct Purpose In the past few years social media has become an important and integral part of the marketing

More information

GLA Social Media Guidelines Contents

GLA Social Media Guidelines Contents GLA Social Media Guidelines Contents Introduction... 2 The GLA s official social media channels... 2 Process... 2 Legal considerations & the Code of Conduct... 6 Pre-election periods (General elections,

More information

Chicago State University Computer Usage Policy

Chicago State University Computer Usage Policy Chicago State University Computer Usage Policy Introduction This document provides guidelines for appropriate use by students, faculty and staff of computers, and other technological facilities and services

More information

How To Use Social Media At St James Anglican School

How To Use Social Media At St James Anglican School P o l i c i e s n P r o c e d u r e s n I n f o r m a t i o n T o t a l n u m b e r o f p a g e s 2 P o l i c y C r e a t i o n D a t e : 2 4 S e p t e m b e r 2 0 1 4 P o l i c y R e v i e w D a t e :

More information

Salisbury Township School District Guidelines for Guiding Staff, Students and Parents in Use of Social Media

Salisbury Township School District Guidelines for Guiding Staff, Students and Parents in Use of Social Media What is social media? Social media is defined as any form of online publication or presence that allows end users to engage in multidirectional conversations in or around the content on the website. (Online

More information

Dr. Lucy Gibson Sociology University of Manchester

Dr. Lucy Gibson Sociology University of Manchester Dr. Lucy Gibson Sociology University of Manchester Various aliases: Email interviewing/online interviewing/e-interviewing/electronic interviewing Asynchronous computer-mediated communication (CMC) Put

More information

Facebook s Emotional Contagion: Social Media Research

Facebook s Emotional Contagion: Social Media Research Facebook s Emotional Contagion: Social Media Research Mount Allison University March 11, 2015 Gordon DuVal, SJD gduval@uottawa.ca www.gduval.com Emotional Contagion 2 3 Facebook Research In 2012, Facebook

More information

Social Media Policy for ALPFA Staff, Leaders and Volunteers

Social Media Policy for ALPFA Staff, Leaders and Volunteers Empowering Latino Leaders Social Media Policy for ALPFA Staff, Leaders and Volunteers alpfa.org Introduction: At ALPFA, our mission is to empower and develop Latino men and women as leaders of character

More information

North Carolina EFNEP Social Media Guidelines

North Carolina EFNEP Social Media Guidelines North Carolina EFNEP Social Media Guidelines This document gives guidance to the publication of and commentary on social media by employees of NC EFNEP. For the purposes of this document, social media

More information

section 15 Computers, Email, Internet, and Communications

section 15 Computers, Email, Internet, and Communications section 15 Computers, Email, Internet, and Communications 15.1 Electronic Communications Email is Not Private Email messages, including attachments, sent and received on YWCA Tulsa equipment are the property

More information

SOCIAL MEDIA POLICY FOR VOLUNTEERS TEMPLATE

SOCIAL MEDIA POLICY FOR VOLUNTEERS TEMPLATE SOCIAL MEDIA POLICY FOR VOLUNTEERS TEMPLATE SOCIAL MEDIA POLICY FOR VOLUNTEERS TEMPLATE (Insert Your Organisation Name) uses social media in its work and recognises that those who are involved in its work

More information

POLICY NO. 3.14 September 8, 2015 TITLE: INTERNET AND EMAIL USE POLICY

POLICY NO. 3.14 September 8, 2015 TITLE: INTERNET AND EMAIL USE POLICY POLICY NO. 3.14 September 8, 2015 TITLE: INTERNET AND EMAIL USE POLICY POLICY STATEMENT: Many of our employees have access to the internet as well as email capabilities. The County recognizes that these

More information

TECHNOLOGY USAGE POLICY

TECHNOLOGY USAGE POLICY TECHNOLOGY USAGE POLICY Computer Usage Policy (CUP). 2 Aims/Objectives. 2 General.. 2 Student Responsibilities 2 Monitoring 3 Access Violations... 3 Personal Devices 3 Internet Safety: Acceptable Usage

More information

SOCIAL MEDIA POLICY. Presented by: Jaffe PR. 727 Kirkwood Avenue - Atlanta, GA - 30316 404.885.9100 - www.theremsengroup.com

SOCIAL MEDIA POLICY. Presented by: Jaffe PR. 727 Kirkwood Avenue - Atlanta, GA - 30316 404.885.9100 - www.theremsengroup.com SOCIAL MEDIA POLICY Presented by: Jaffe PR 727 Kirkwood Avenue - Atlanta, GA - 30316 404.885.9100 - www.theremsengroup.com Presented By Jaffe PR Revised January 1, 2012 SOCIAL MEDIA POLICY 1 NOTE: At Jaffe

More information

SOCIAL MEDIA GUIDELINES FOR SCHOOLS

SOCIAL MEDIA GUIDELINES FOR SCHOOLS SOCIAL MEDIA GUIDELINES FOR SCHOOLS The goal of these guidelines is to provide, staff, administrators, students, parents and the school district community direction when using social media applications

More information

A. INTRODUCTION B. TIMING IS IMPORTANT

A. INTRODUCTION B. TIMING IS IMPORTANT A. INTRODUCTION A reference letter, or letter of recommendation, 1 is usually written to attest to a person s skills, character and/or achievements. It is a formal document, and should be typed on letterhead,

More information

Human Resources Policies and Procedures

Human Resources Policies and Procedures SUBJECT: Social Media and Internet Policy PURPOSE The AppleOne Group of Companies ( AppleOne ) recognizes the fast-changing landscape of the Internet which has increased the popularity of social media

More information

MRS Guidelines for Business-to-Business Research. October 2011

MRS Guidelines for Business-to-Business Research. October 2011 MRS Guidelines for Business-to-Business Research October 2011 Updated September 2014 MRS is the world s largest association for people and organisations that provide or use market, social and opinion research,

More information

Questionnaire Cornwell-Type Claims

Questionnaire Cornwell-Type Claims Sensitive: Personal once completed Questionnaire Cornwell-Type Claims Please complete all sections of this form and enter N/A in any section that is not applicable to indicate that the question has been

More information

I NTERNET T ECHNOLOGY T

I NTERNET T ECHNOLOGY T chapter 10 I NTERNET T ECHNOLOGY T his chapter addresses Internet technology as it relates to our public relations efforts. Since a website is often one of the first points of contact for members of the

More information

SOP 502L: INTERNET/SOCIAL MEDIA-BASED RESEARCH

SOP 502L: INTERNET/SOCIAL MEDIA-BASED RESEARCH University of Oklahoma Office of Human Research Participant Protection : INTERNET/SOCIAL MEDIA-BASED RESEARCH 1. POLICY Internet/social media-based research projects are reviewed by the IRB just as any

More information

Websites: Social Networks, Blogs & Usergenerated

Websites: Social Networks, Blogs & Usergenerated INFORMATION SHEET G108v04 December 2014 Websites: Social Networks, Blogs & Usergenerated Media In this information sheet we give an overview of copyright issues that apply when people operating websites,

More information

Online Communication Services - TAFE NSW Code of Expected User Behaviour

Online Communication Services - TAFE NSW Code of Expected User Behaviour Online Communication Services - TAFE NSW Code of Expected User Behaviour State of NSW, Department of Education and Training, TAFE Customer Support Copies of this document may be made for use in connection

More information

Subject: Computer Network and Internet Use Agreement Guidelines

Subject: Computer Network and Internet Use Agreement Guidelines February 4, 2013 Dear Parents/Guardian, Subject: Computer Network and Internet Use Agreement Guidelines Every student will receive a permission form that must be co-signed by parents/guardians and returned

More information

6.9 Social Media Policy

6.9 Social Media Policy Policy Statement It is the policy of the to encourage clear and effective communication with all Nova Scotians using a variety of accepted tools, including social media. Social media is helping government

More information

Gwinnett United In Drug Education, Inc. Social Media Policy. Page 1 Updated 1-11-15

Gwinnett United In Drug Education, Inc. Social Media Policy. Page 1 Updated 1-11-15 Gwinnett United In Drug Education, Inc. Social Media Policy Page 1 Updated 1-11-15 Introduction Gwinnett United in Drug Education, Inc. (GUIDE) recognizes the importance of social media to interact with

More information

How to be Secure and Get Accurate Medical Information from Internet

How to be Secure and Get Accurate Medical Information from Internet Bahrain Medical Bulletin, Vol.23, No.4, December 2001 Editorial How to be Secure and Get Accurate Medical Information from Internet Ibrahim Mansoor, MBBS* Internet has seeped into every corner of medicine.

More information

SOCIAL MEDIA POLICY. Senior Governance Officer, NHS North of England Commissioning Support Unit Reference No

SOCIAL MEDIA POLICY. Senior Governance Officer, NHS North of England Commissioning Support Unit Reference No SOCIAL MEDIA POLICY Ratified Governance & Risk Committee 08/2015 Status Final Issued August 2015 Approved By Governance and Risk Committee Consultation Governance and Risk Committee Equality Impact Assessment

More information

HUMAN RESOURCES POLICIES & PROCEDURES

HUMAN RESOURCES POLICIES & PROCEDURES HUMAN RESOURCES POLICIES & PROCEDURES Policy title Application IT systems and social networking policy All employees and students CONTENTS PAGE Introduction and scope 2 General points 2 Authorisation to

More information

CCG Social Media Policy

CCG Social Media Policy Corporate CCG Social Media Policy Version Number Date Issued Review Date 2 25/03/2015 25/03/2017 Prepared By: Consultation Process: Formally Approved: Governance Manager, North of England Commissioning

More information

How do we know what we know?

How do we know what we know? Research Methods Family in the News Can you identify some main debates (controversies) for your topic? Do you think the authors positions in these debates (i.e., their values) affect their presentation

More information

Proposed Code of Ethical Principles for Professional Valuers

Proposed Code of Ethical Principles for Professional Valuers INTERNATIONAL VALUATION STANDARDS COUNCIL Second Exposure Draft Proposed Code of Ethical Principles for Professional Valuers Comments to be received by 31 August 2011 Copyright 2011 International Valuation

More information

How To Use Your Cell Phone At Renaissance Academy Charter School

How To Use Your Cell Phone At Renaissance Academy Charter School Renaissance Academy Charter School Bring Your Own Device (BYOD) Board Policy PURPOSE The Renaissance Academy School Board values technology and seeks to increase student access and use when it will enhance

More information

SOCIAL MEDIA POLICY. Introduction

SOCIAL MEDIA POLICY. Introduction Introduction Throughout this Policy, the words Translink Company and/or the Group refer to all corporate entities under the ownership of the Northern Ireland Transport Holding Company (NITHC). This includes

More information

The ethics of using the internet to collect qualitative research data

The ethics of using the internet to collect qualitative research data Research Ethics Review (2006) Vol 2, No 3, 92 97 The Association of Research Ethics Committees 2006 Received 2 June 2006, accepted 20 July 2006 Original paper The ethics of using the internet to collect

More information

Best Practices for the Use of Social Media Summer 2011. Belmont University Athletics

Best Practices for the Use of Social Media Summer 2011. Belmont University Athletics Best Practices for the Use of Social Media Summer 2011 Belmont University Athletics Overview The rapid growth of social media technologies combined with their ease of use and pervasiveness make them attractive

More information

The SCONUL Seven Pillars of Information Literacy. Core Model For Higher Education

The SCONUL Seven Pillars of Information Literacy. Core Model For Higher Education The SCONUL Seven Pillars of Information Literacy Core Model For Higher Education SCONUL Working Group on Information Literacy April 2011 The SCONUL Seven Pillars of Information Literacy: Core Model 2 Introduction

More information

Macmillan Cancer Support Volunteering Policy

Macmillan Cancer Support Volunteering Policy Macmillan Cancer Support Volunteering Policy Introduction Thousands of volunteers dedicate time and energy to improve the lives of people affected by cancer. Macmillan was started by a volunteer and volunteers

More information

DISTRICT COUNCIL OF LOXTON WAIKERIE. Social Media Policy

DISTRICT COUNCIL OF LOXTON WAIKERIE. Social Media Policy DISTRICT COUNCIL OF LOXTON WAIKERIE Social Media Policy Policy Identification: Adoption Date: 20 April 2012 Last Review: 17 April 2015 Next Review Date: April 2017 Every 2 years Responsible Officer(s):

More information

Ethics in Internet. Joshi AG Centre for Information and Network Security University of Pune

Ethics in Internet. Joshi AG Centre for Information and Network Security University of Pune Ethics in Internet Joshi AG Centre for Information and Network Security University of Pune The World Today Communication knows no physical boundaries Interconnected globe humming with electronic transmissions

More information

Computer Forensics for Business Leaders: Building Robust Policies and Processes Transcript

Computer Forensics for Business Leaders: Building Robust Policies and Processes Transcript Computer Forensics for Business Leaders: Building Robust Policies and Processes Transcript Part 1: Why Policy Is Key Stephanie Losi: Welcome to CERT's podcast series: Security for Business Leaders. The

More information

ICC/ESOMAR INTERNATIONAL CODE ON MARKET AND SOCIAL RESEARCH

ICC/ESOMAR INTERNATIONAL CODE ON MARKET AND SOCIAL RESEARCH ICC/ESOMAR INTERNATIONAL CODE ON MARKET AND SOCIAL RESEARCH INTRODUCTION The first Code of Marketing and Social Research Practice was published by ESOMAR in 1948. This was followed by a number of codes

More information

A common sense guide to the Data Protection Act 1998 for volunteers

A common sense guide to the Data Protection Act 1998 for volunteers A common sense guide to the Data Protection Act 1998 for volunteers Why is it necessary? The Data Protection Act 1998 is a law introduced to control the way information held about individuals is handled

More information

REVIEWED BY Q&S COMMITTEE ON THE 4 TH JUNE 2015. Social Media Policy

REVIEWED BY Q&S COMMITTEE ON THE 4 TH JUNE 2015. Social Media Policy Social Media Policy SOCIAL MEDIA POLICY This Policy applies to all academy staff regardless of their employment status. It is to be read in conjunction with the E Safety and Data Security Policy. This

More information

Realities Toolkit #10. Using Blog Analysis. 1. Introduction. 2. Why use blogs? Helene Snee, Sociology, University of Manchester

Realities Toolkit #10. Using Blog Analysis. 1. Introduction. 2. Why use blogs? Helene Snee, Sociology, University of Manchester Realities Toolkit #10 Using Blog Analysis Helene Snee, Sociology, University of Manchester July 2010 1. Introduction Blogs are a relatively new form of internet communication and as a result, little has

More information

Communications Council Best Practice Guide Social Media and Online Commentary Code of Conduct

Communications Council Best Practice Guide Social Media and Online Commentary Code of Conduct Communications Council Best Practice Guide Social Media and Online Commentary Code of Conduct Revised Mar 13 2015 social media and online commentary code of conduct Purpose In the past few years social

More information

Social and Digital Media Policy

Social and Digital Media Policy Social and Digital Media Policy October 2012 Version 1.0 Statement of legislative compliance This document has been drafted to comply with the general and specific duties in the Equality Act 2010; Data

More information

Plymouth College of Art Guiding Principles on Good Conduct in Staff Research and Scholarly Activities

Plymouth College of Art Guiding Principles on Good Conduct in Staff Research and Scholarly Activities Plymouth College of Art Guiding Principles on Good Conduct in Staff Research and Scholarly Activities Introduction This document constitutes Plymouth College of Art guiding principles on good conduct in

More information

Guidance on staff use of Social Media

Guidance on staff use of Social Media Guidance on staff use of Social Media Introduction Social networking through the use of Internet-based and other electronic social media tools is integrated into everyday life. Use of Facebook, LinkedIn,

More information

APPENDIX A: SOCIAL MEDIA PRINCIPLES, POLICIES AND GUIDELINES FOR PARISHES, SCHOOLS AND PROGRAMS OF THE ARCHDIOCESE OF SEATTLE

APPENDIX A: SOCIAL MEDIA PRINCIPLES, POLICIES AND GUIDELINES FOR PARISHES, SCHOOLS AND PROGRAMS OF THE ARCHDIOCESE OF SEATTLE APPENDIX A: SOCIAL MEDIA PRINCIPLES, POLICIES AND GUIDELINES FOR PARISHES, SCHOOLS AND PROGRAMS OF THE ARCHDIOCESE OF SEATTLE In the digital world there are social networks which offer our contemporaries

More information

CARDIFF METROPOLITAN UNIVERSITY RESEARCH GOVERNANCE FRAMEWORK

CARDIFF METROPOLITAN UNIVERSITY RESEARCH GOVERNANCE FRAMEWORK The Cardiff Metropolitan University Research Governance Framework applies to all members of staff and students involved in research regardless of whether they are conducting research inside or outside

More information

Social Media Guidelines

Social Media Guidelines MARKETING AND MEDIA RELATIONS Social Media Guidelines Emporia State University Last Updated: July 09, 2011 Introduction What is Social Media? Social media consists of web-based tools used to interact with

More information

Service NSW Code of Conduct

Service NSW Code of Conduct Service NSW Code of Conduct Contents CEO Message 2 Our DNA 3 We ensure our personal and professional conduct complies with this Code of Conduct 4 We manage conflict of interest responsibly 6 We respect

More information

(For purposes of this Agreement, "You", " users", and "account holders" are used interchangeably, and where applicable).

(For purposes of this Agreement, You,  users, and account holders are used interchangeably, and where applicable). Key 2 Communications Inc. Acceptable Use Policy Please read carefully before accessing and/or using the Key 2 Communications Inc. Web site and/or before opening an account with Key 2 Communications Inc..

More information

Acceptable Use of Information Technology

Acceptable Use of Information Technology Acceptable Use of Information Technology No.: 3501 Category: Information Technology Services Approving Body: Leadership Team Executive Division: Learning and Technology Services Department Responsible:

More information

Social Media Guidelines

Social Media Guidelines Purpose for Social Media Guidelines: Guilford County Schools (GCS) realizes that part of 21st century learning is adapting to the changing methods of communication. The importance of teachers, students

More information

State University of New York at Canton Institutional Review Board. Sample Informed Consent Document

State University of New York at Canton Institutional Review Board. Sample Informed Consent Document State University of New York at Canton Institutional Review Board Sample Informed Consent Document The following sample informed consent document includes instructions to the person writing the document,

More information

GUIDELINES FOR THE USE OF SOCIAL MEDIA. January 2010

GUIDELINES FOR THE USE OF SOCIAL MEDIA. January 2010 GUIDELINES FOR THE USE OF SOCIAL MEDIA January 2010 Revised July 2010 Prepared by: The Voices Technology and Best Practice Team TABLE OF CONTENTS Overview of Document...2 General Rules to Follow...3 Social

More information

CHAPTER 13 Medical records and patient access to information

CHAPTER 13 Medical records and patient access to information CHAPTER 13 Medical records and patient access to information Robert Stevens is an Auckland barrister and a consultant in the management of personal information and privacy. Cite this as Stevens R 2013.

More information

Hallett Cove South Primary School Communications/Network Use Policy

Hallett Cove South Primary School Communications/Network Use Policy Hallett Cove South Primary School Communications/Network Use Policy The Communications/Network Use Policy ( Policy ) sets out the rights and responsibilities for computer and communications network users

More information

The SHU Social Media CoLab: developing a social media strategy through open dialogue and collaborative guidance

The SHU Social Media CoLab: developing a social media strategy through open dialogue and collaborative guidance The SHU Social Media CoLab: developing a social media strategy through open dialogue and collaborative guidance BECKINGHAM, Sue, PURVIS, Alison and RODGER, Helen Available from Sheffield Hallam University

More information

Social Media. Scope. Computer Use Employee Code of Conduct Privacy Emergency Management Plan Communications Strategy Community Engagement Strategy

Social Media. Scope. Computer Use Employee Code of Conduct Privacy Emergency Management Plan Communications Strategy Community Engagement Strategy Social Media Responsible officer: Director Community and Corporate Services Key Result Area: Governance and Decision Making Document type: Policy Reference: 10/01/0004 Approved by: Council Date approved:

More information

Code of Ethics for Professional Accountants

Code of Ethics for Professional Accountants COE Issued December 2005; revised June 2010 Effective on 30 June 2006 until 31 December 2010 Code of Ethics for Professional Accountants CODE OF ETHICS FOR PROFESSIONAL ACCOUNTANTS CONTENTS Page PREFACE...

More information

We are the regulator: Our job is to check whether hospitals, care homes and care services are meeting essential standards.

We are the regulator: Our job is to check whether hospitals, care homes and care services are meeting essential standards. Inspection Report We are the regulator: Our job is to check whether hospitals, care homes and care services are meeting essential standards. Bluebird Care (Milton Keynes) Suite 107, Interchange Business

More information

THE RICE MARKETING BOARD FOR THE STATE OF NEW SOUTH WALES RESPONSIBLE COMPUTING POLICY

THE RICE MARKETING BOARD FOR THE STATE OF NEW SOUTH WALES RESPONSIBLE COMPUTING POLICY THE RICE MARKETING BOARD FOR THE STATE OF NEW SOUTH WALES RESPONSIBLE COMPUTING POLICY Version Author Date Approved by Board 2009-1 Gillian Kirkup 24 March 2010 Page 1 of 8 THE RICE MARKETING BOARD FOR

More information

Broadband Acceptable Use Policy

Broadband Acceptable Use Policy Broadband Acceptable Use Policy Contents General... 3 Your Responsibilities... 3 Use of Email with particular regards to SPAM... 4 Bulk Email... 5 Denial of Service... 5 Administration of Policy... 6 2

More information

Table of Contents. 1. Basic Netiquette Pg. 3-4. 2. Copyright Pg. 5. 3. Plagiarism Pg. 6. 4. Privacy Pg. 6

Table of Contents. 1. Basic Netiquette Pg. 3-4. 2. Copyright Pg. 5. 3. Plagiarism Pg. 6. 4. Privacy Pg. 6 Computer Ethics 1 Table of Contents Computer ethics is a term used to describe the ethical principles and moral dilemmas that you encounter in today s computer-based society. It makes us think about the

More information

The Harvard style. Reference with confidence. (2012 Edition)

The Harvard style. Reference with confidence. (2012 Edition) Reference with confidence: The Harvard style 1 Reference with confidence The Harvard style (2012 Edition) As used in: Archaeology Biochemistry (as well as Vancouver) Biology (as well as Vancouver) Economics

More information

BLACKROCK COLLEGE E-MAIL/INTERNET USER POLICY

BLACKROCK COLLEGE E-MAIL/INTERNET USER POLICY Acceptable Use Policy Educational Purpose The computer system in Blackrock College has been established for a limited educational purpose. The term "educational purpose" includes classroom activities,

More information

Responsible Use of Technology and Information Resources

Responsible Use of Technology and Information Resources Responsible Use of Technology and Information Resources Introduction: The policies and guidelines outlined in this document apply to the entire Wagner College community: students, faculty, staff, alumni

More information

INSOLVENCY CODE OF ETHICS

INSOLVENCY CODE OF ETHICS LIST OF CONTENTS INSOLVENCY CODE OF ETHICS Paragraphs Page No. Definitions 2 PART 1 GENERAL APPLICATION OF THE CODE 1-3 Introduction 3 4 Fundamental Principles 3 5-6 Framework Approach 3 7-16 Identification

More information

MISSISSIPPI DEPARTMENT OF HEALTH COMPUTER NETWORK AND INTERNET ACCESS POLICY

MISSISSIPPI DEPARTMENT OF HEALTH COMPUTER NETWORK AND INTERNET ACCESS POLICY MEMORANDUM TO: FROM: RE: Employee Human Resources MISSISSIPPI DEPARTMENT OF HEALTH COMPUTER NETWORK AND INTERNET ACCESS POLICY Please find attached the above referenced policy that is being issued to each

More information

Model Policy for a Law Enforcement Agency s use of Social Networking

Model Policy for a Law Enforcement Agency s use of Social Networking Model Policy for a Law Enforcement Agency s use of Social Networking Disclaimer: This is a model policy was designed to provide a guide to writing a policy related to social networking use. This model

More information

ARTICLE 29 Data Protection Working Party

ARTICLE 29 Data Protection Working Party ARTICLE 29 Data Protection Working Party 11601/EN WP 90 Opinion 5/2004 on unsolicited communications for marketing purposes under Article 13 of Directive 2002/58/EC Adopted on 27 February 2004 This Working

More information

International Federation of. June 2005. Accountants. Ethics Committee. Code of Ethics for Professional. Accountants

International Federation of. June 2005. Accountants. Ethics Committee. Code of Ethics for Professional. Accountants International Federation of Accountants Ethics Committee June 2005 Code of Ethics for Professional Accountants Mission of the International Federation of Accountants (IFAC) To serve the public interest,

More information

Guidelines on Research Ethics for Projects with Children and Young People Nathalie Noret, Faculty of Health and Life Sciences

Guidelines on Research Ethics for Projects with Children and Young People Nathalie Noret, Faculty of Health and Life Sciences Guidelines on Research Ethics for Projects with Children and Young People Nathalie Noret, Faculty of Health and Life Sciences Introduction When conducting research with children and young people, the ethical

More information

Social Media Policy. Policies and Procedures. Social Media Policy

Social Media Policy. Policies and Procedures. Social Media Policy Policies and Procedures Social Media Policy 1 1. Introduction...3 2. Privacy settings and personal information.....3 3. Use of Social Media at Work.....4 4. Account Administrators and Login Details......4

More information

APPOINTING A COMPLIANCE CONSULTANCY FIRM

APPOINTING A COMPLIANCE CONSULTANCY FIRM 1. OVERVIEW The FCA has published details of the forthcoming supervisory projects for the general insurance, mortgage and financial advice sectors of the market. One project that appears on all three lists

More information

Guidelines for membership and operation of NCIRS-AIP email discussion group

Guidelines for membership and operation of NCIRS-AIP email discussion group Guidelines for membership and operation of NCIRS-AIP email discussion group NCIRS-AIP Guidelines August 2011 Management of this document This policy was discussed and reviewed by Endorsed by Next review

More information

(Internet) for students, staff and, if requested, members of the Board of Education. All computer

(Internet) for students, staff and, if requested, members of the Board of Education. All computer 4510 Computer Network (Cf. 4520) 4510 The Board authorizes the Superintendent to develop services linking computers within and between buildings in the District, and to provide access to the international

More information

Southwest Texas Telephone Company (SWTTC) Acceptable Use Policy for Asynchronous Digital Subscriber Line (ADSL)/Internet Customers

Southwest Texas Telephone Company (SWTTC) Acceptable Use Policy for Asynchronous Digital Subscriber Line (ADSL)/Internet Customers Southwest Texas Telephone Company (SWTTC) Acceptable Use Policy for Asynchronous Digital Subscriber Line (ADSL)/Internet Customers Introduction When you open your SWTTC ADSL/Internet account, you become

More information

Discuss ethical guidelines for psychologists and illustrate with research examples.

Discuss ethical guidelines for psychologists and illustrate with research examples. Discuss ethical guidelines for psychologists and illustrate with research examples. Ethics has been defined as a branch of philosophy that deals with thinking about morality, moral problems, and judgements

More information

Embedded Network Solutions Australia Pty Ltd (ENSA) INTERNET ACCEPTABLE USE POLICY

Embedded Network Solutions Australia Pty Ltd (ENSA) INTERNET ACCEPTABLE USE POLICY T: 1300 00 ENSA (3672) F: 03 9421 6109 (ENSA) INTERNET ACCEPTABLE USE POLICY 1 ABOUT THIS POLICY... 2 2 GENERAL... 2 3 ILLEGAL ACTIVITY... 2 4 SECURITY... 2 5 RISKS OF THE INTERNET... 3 6 CONTENT PUBLISHING...

More information

AS Sociology. The theoretical, practical and ethical considerations influencing the choice of topic, choice of method(s) and the conduct of research.

AS Sociology. The theoretical, practical and ethical considerations influencing the choice of topic, choice of method(s) and the conduct of research. AS Sociology Revision Sociological Methods The theoretical, practical and ethical considerations influencing the choice of topic, choice of method(s) and the conduct of research. Chris. Livesey 2006: www.sociology.org.uk

More information

Website Privacy Policy Statement. 1519 York Rd Lutherville, MD 21093. We may be reached via email at julie@juliereisler.com.

Website Privacy Policy Statement. 1519 York Rd Lutherville, MD 21093. We may be reached via email at julie@juliereisler.com. Website Privacy Policy Statement This website juliereisler.com is operated by Empowered Living, LLC and this policy applies to all websites owned, operated, controlled and otherwise made available by Company,

More information

PINELAND TELEPHONE COOPERATIVE DSL SERVICE AGREEMENT

PINELAND TELEPHONE COOPERATIVE DSL SERVICE AGREEMENT PINELAND TELEPHONE COOPERATIVE DSL SERVICE AGREEMENT Check Plan: Residential Business Installation Cost $45.00 $62.00 Check Plan: 256 Down/128 Up $24.95 $44.95 Monthly 1.544 Down/256 Up $39.95 $49.95 Monthly

More information

Malpractice Policy BMAT

Malpractice Policy BMAT Malpractice Policy 1 BMAT Malpractice Policy 1. Statement of Purpose BMAT is committed to ensuring that standards of assessment are consistent, transparent and fair, whilst maintaining standards as a priority

More information

Website Privacy Policy Statement

Website Privacy Policy Statement Website Privacy Policy Statement This website ( CRSF Website ) is operated by Cal Ripken, Sr. Foundation, Inc. ( Company ) and this policy applies to all websites owned, operated, controlled and otherwise

More information

Effective from 1 January 2009. Code of Ethics for insolvency practitioners.

Effective from 1 January 2009. Code of Ethics for insolvency practitioners. INSOLVENCY PRACTITIONERS (PART D) Effective from 1 January 2009. Code of Ethics for insolvency practitioners. On 1 January 2014 a minor change was made to paragraph 400.3 of the code. The change clarifies

More information

Social Media Charter

Social Media Charter Social Media Charter 1. Internet, social media, web 2.0 interface and on-line communication "Social media" and "web 2.0" interface are generic terms which designate different activities integrating technology,

More information

Transport for London. Code of Conduct MAYOR OF LONDON

Transport for London. Code of Conduct MAYOR OF LONDON Transport for London Code of Conduct Effective from 1 October 2008 MAYOR OF LONDON Transport for London This Code of Conduct describes TfL s ethical values and vision and sets out the behaviour that is

More information

the ombudsman and smaller businesses

the ombudsman and smaller businesses the ombudsman and smaller businesses your guide to the Financial Ombudsman Service the independent expert in settling complaints between consumers and businesses providing financial services about this

More information