Adding Unsupported Apps to Canvas
Bryan Gibson
Last Update 8 months ago
Understanding risks to you and others
Bradley has license agreements with third party providers that legally bind them and us to a contract, assuring certain rights and expectations (Google, Watermark, Canvas, Turnitin, Panopto, Studio, Bongo, Zoom, Navigate, Qualtrics, Microsoft, Quality Matters, Respondus, etc.).
For other systems you may choose to use in your classes, you become responsible for the terms of service and any problems that may arise. Be certain to read the Terms of Service, and know that they may change without notice. Check periodically to see if the terms are still acceptable.
You MUST forward all contracts to the University’s Office of General Counsel.
You MAY forward the terms of service to the University’s Office of General Counsel.
You MUST request a third party cyber risk audit from the Office of Information Security if Protected data will be shared with a third party.
Protect student privacy
Know what is required under FERPA (http://www.bradley.edu/registrar/ferpa/) and protect student privacy.
Students may create aliases to protect their identity.
Restrict access whenever possible. (For example, some systems allow you to restrict people outside of the class or “group” from seeing the group and its activity.)
Do not include Personally Identifiable Information (PII) within the content.
Use the principle of least privilege, restricting access to the minimum that is absolutely necessary.
When in doubt, err on the side of privacy.
Obtain student consent to use their work beyond the end of the term.
Do not provide feedback about student performance.
Inform students when they are using non-Bradley supported applications and services
Include this in the Schedule of Classes description and syllabus
The use of a non-Bradley system should not place an undue burden on students who do not agree with the terms of service. Consider the instructional gains of using the service to the students’ privacy rights.
Communicate to students the intent to use non-Bradley applications or services and summarize the issues, the conditions of use, and the risks to students in the syllabus. This allows them to consider dropping the course or requesting an alternative solution.
Understand who owns the content and what they can do with it.
Consider accessibility, support, retrieval, retention, and back up.
Protect sensitive information and research data.
The university has related policies in these areas:
Protecting student data (See Registrar’s information on FERPA at http://www.bradley.edu/registrar/ferpa/ )
Data security (See IT Data Security Policies at https://www.bradley.edu/sites/it/about/policies/data/ )
Responsible use of technology (See IT Policy on Ethical Use of Information Technology Resources at https://www.bradley.edu/campuslife/student-conduct/policies/technology/ )
Web accessibility (See Web Accessibility statement at https://www.bradley.edu/legal/accessibility/ )