It looks like you're using Internet Explorer 11 or older. This website works best with modern browsers such as the latest versions of Chrome, Firefox, Safari, and Edge. If you continue with this browser, you may see unexpected results.
Brief reminder of previous conversation (6/17/19 All Selector Meeting) and the resulting commitments made by A&A, DLS, and SCCS
Review New Documentation of Access Models (20 min, Adam)
Adam Shire has created new documentation describing the access models, and he will walk us through this document and answer questions.
Principles and Roles for Access Model Decisions (40 min total)
Group Process Introduction (5 min, Ellen or Kim)
We will divide into three groups, where each group will discuss three use cases to aid in generating principles for approaching access model decisions, and making suggestions about roles for decision making, including selector’s role.
One person should take notes on a laptop; this is instead of writing things on the glass boards or using flip chart paper, both of which would need to be transcribed.
Three Use Cases (each group considers and discusses all three cases)
Request to set up streaming access which would require a password shared via a Touchstone landing screen
Whether to set up access for a product that raises concerns about user data privacy
Whether to devote staff resources to build a totally new model or new variant with significant work involved
Questions for the Groups to Consider:
Who plays what role(s) in the decision making process? Who contributes what in the process? In particular, selectors should consider what the selector role should be; acquisitions should consider what their role should be; DLS should consider what their role should be.
What principles do you see emerging from the use cases that should be used to inform our decisions? Below are some principles drafted previously; use/edit them as they are helpful.
Draft Principles to work from:
Meeting community needs whenever possible
Following MIT policies, practices, and standards
Protecting user data privacy
Appropriately deploying staff and monetary resources
Embracing reasonable experimentation, and assessing experiments
Groups Report Back (10-15 min total, 3-5 min per group)
Kim will facilitate; Cindy Rosenthal will take notes