The first textbook vendor highlighted in this post is McGraw Hill – MH Connect:
McGraw Hill – MH Connect
BCIT’s Guidelines for Use of McGraw Hill’s Web-based Teaching and Learning Tools
This guide will help you, the BCIT instructor, when choosing a McGraw Hill textbook. It will help you make decisions as to which MH Connect tools you want to use in your course. Each tool has been assessed by BCIT as to its level of potential risk to the users (instructors and students) privacy. The tools are recommended for use based on their level of risk.
You are encouraged to feely use these tools without any additional steps.
While there are potential privacy risks associated with the use of these tools, the risk can be mitigated by following the BCIT Privacy Management Process for Third Party Web Sites.
Due to legal and BCIT policy requirements, these tools are not recommended for use.
NOTE: Not all tools will be available for all MH textbooks. Please contact your MH Sales Rep. if you are unsure about which tools MH has associated with the textbook you are considering.
|Tool or Feature||No RiskFreely use this tool||Some RiskManage the Risk to use this tool||High RiskDo Not Use this tool||Details|
|Quizzes||XRisk to students (2)||Recommendation: Use Blackboard Collaborate to capture your presentations and D2L to store, distribute and archive them.|
|Lecture Capture||XRisk to instructor (1)||Recommendation: Use MH online testing for self-tests only. All formal assessment must reside under the control of BCIT at all times. D2L can facilitate web-based testing.|
|Assignment Dropbox||X Risk to students (2)||Recommendation: Use D2L’s Dropbox for all assignment functions.|
(1) Risk to instructors
• This is not as much a risk of your private identifying information being disclosed as much as it is a risk of what you say – your opinions, thoughts and ideas.
• The risk is associated with the content of your presentation and the fact that it will be resident on a US computer and, therefore, susceptible to the US Patriot Act.
• While they are stored on different servers, through the log-in information stored by MH, an association can be made between your identifying information and your presentation
(2) Risk to students
• Risks take two forms:
o Risk of identifying information being disclosed
o Risk of works, opinions, ideas, thoughts being disclosed (similar to the risk to instructors)
• BCIT is legally bound to protect both of the above types of data
BCIT Privacy Management Process for Third Party Web Sites
Insert document link
This document and associated procedures has been developed in collaboration with post-secondary institutions, BC Campus and Privacy Offers across BC. It is a tool focused on enabling BC’s post-secondary instructors to use third party web/cloud based sites in a manner that mitigates the risk to the privacy of our students. By following this guide, you will be mitigating the risk and working within the law.
1. Risk Assessment – It is also a legal requirement that a Privacy Risk Assessment be completed on all software.
2. Awareness – This step is about education as it communicates the risk factors to the students.
3. Opt-out option – Should individual students not be willing to assume any risk that may be associate with a piece of software you are suggesting for use, they must be provided with an alternative.
4. Legal Release – Should individual students be willing to assume any risk that may be associate with a piece of software you are suggesting for use, they must sign a letter of acceptance.