SlideShare a Scribd company logo
1 of 44
Electronic Security Issues for
Schools
Presented by:
Joanne Rinardo
Partner
Deutsch Kerrigan
jrinardo@deutschkerrigan.com
504 593 0616
Why Data Integrity Has Become
Important to Schools
• More technology use in the education sector
• New privacy and compliance challenges
• More collection of student data
• Outside contractors
• Online courses
Protection of Pupil Rights
Amendment (PPRA)
Applies to programs of:
▫ State Educational Agency (SEA)
▫ Local Educational Agency (LEA)
▫ Or other recipient of funds under any program
funded by the U.S. Department of Education
Governs Administering to Student
• Any survey
• Analysis
• Evaluation in certain
areas
The 8 protected areas include:
• Political affiliations of the
student/parent
• Mental issues of the
student/student’s family
• Sex behavior or attitudes
• Illegal, anti-social, self-
incriminating, or demeaning
behavior
• Critical appraisals of those
who have close family
relationships to students
• Legally recognized privileged
relationships (lawyers,
physicians and ministers)
• Religious practices, affiliations,
or beliefs of the
student/student’s parents
• Income
PPRA also addresses
• Marketing surveys/areas of student privacy;
• Parental access to information; and
• Administration of certain physical examinations
to minors
Third Party Providers
• Written consent before sharing PII not always
required
What Information is Protected?
• Depends on the circumstances.
• FERPA protects student profile information
What are Exceptions to FERPA?
• Directory
Information
Exception
• School Official
Exception
Directory Information Exception
• For PII disclosed in the school’s annual notice
as Directory Information
• No other limitations on other uses of data
School Official Exception
• For TPP delivery of education services to the
student.
• Remember:
▫ For service that school would use own
employees;
▫ School maintains data used by TPP;
▫ For a legitimate education interest;
▫ Data not used for unauthorized purposes; and
▫ Consider a written contract regarding use
restrictions
FERPA does not apply to
• An online portal for watching tutorials
• Interactive exercises without logging in or using
individual accounts.
Pieces of information that provide
meaning and context to data collected,
or contextual information
Metadata examples in testing
• Date and time the student
performed the activity;
• Number of attempts they made
to answer;
• How long their mouse hovered
over the answer button; and
• Whether they changed their
answer before submitting it
Metadata Not Usually Protected
• If stripped of all their direct and in direct
identifiers
• Can be disseminated to TPPs
• School name/geographic information can be
indirect identifiers
Best Practices to Protect Data
• Know what
information is being
collected or shared,
• By whom, and
• For what purposes
Best Practices
• Develop policies evaluate and approve
proposed on-line education services.
▫ Ex. - new software must be reviewed before
implementation
• Be cautious of “free” educational services
• Free apps can introduce security vulnerabilities
into your school networks
• Be transparent with the parents use of data is
being used
Retention Requirements
• FERPA has no requirement for physical or
electronic record retention
• School districts establish their own policy and
procedures
• Common standard is 5-7 years after
student leaves
• Some schools just retain transcripts
Individuals with Disabilities
Education Act, (“IDEA”)
• Public agencies must inform parents when any PII is
no longer needed
• Parents may request it be destroyed
• Defined as the “physical destruction or removal of
personal identifiers from information so that the
information is no longer personally identifiable”
• Must inform parents before student records are
destroyed
• Must inform parents they can request destruction
once child leaves
• Parents can request that their child’s record be
amended
Title IX
• Keep compliance
information for
seven years
• Applies to
electronic data as
well
Destruction/Disposal Best Practices
• Deleting a digital
record or file is
insufficient
• Use specific
technical methods
used to dispose of
the data
Electronic Management Systems
(“EMS”)
• Allows school to have rules as to who can
access certain documents;
• Can be updated as regulations change;
• Easier to move data to long-term storage media;
and
• Provides transaction trail
Defining Custodial of Records
• Each school should have an official records
custodian,
• Even if records not under his/her personal
control
• Often Principal or Asst. Principal
• Goal - To prevent the unauthorized access to
student records.
FERPA Applies to All Records
• Not just those records kept in the student’s file
• Security cameras in school and on busses
• Electronic records
Custodian Best Practices
• Develop listing of all student data kept;
• Develop custodian log for request trail; and
• Develop records release form.
Extracted Data
• Data that originally resided in the Student
Records System
• Now also resides in a special file
Best Practices for
Extracted Data
• PII must be de-identified whenever there is
public reporting;
• Mask of data sufficiently so individual students
not identified from extracted data;
• Use only for legitimate educational purposes;
• Abide by security and information release
requirements;
• Never release updated extract data as school
data
Internal Emails May Be Educational
Records
• If E-mails are maintained by school and
• Are “directly related” to a student
• Unless falls in one of the six “carve-outs”
• E-mail to, from, or about student may be
education record
Courts have ruled inconsistently
• S.A. v. Tulane County Office
of Ed., (CA)
• President and Trustees of
Bates College v.
Congregation Beth Abraham
et al., (ME)
• Williams v. District Bd. of
Trustees of Edison
Community College, FL,
S.A. v. Tulane County Office of Ed.,
(CA)
• Only printed emails part of records under IDEA
• Others had been deleted; thus, not maintained
President and Trustees of Bates
College v. Congregation Beth
Abraham et al., (ME)
• Email about complaints, part of the student’s
records
• Even though generated outside normal
academic activities
• Court noted FERPA does not limit the definition
of “other materials.”
Williams v. District Bd. of Trustees of
Edison Community College, FL,
• Was sending students’ grades via the internet
violated FERPA
• Florida Commission on Human Relations found
no violation
• Make sure there are sufficient protections
regarding access
Release of E-Mail Addresses
• FERPA protection if not included in Directory
Information
• Proper notice of that fact has been given.
Artisita Records v. Does 1-: ,
• Students’ Media Access Control (MAC)
addresses Directory Information.
Fonovisa v. Does 1-14,
• MAC not was Directory Information, but not
education record and could be shared
Warner Bros. Records v. Does 1-14,
• FERPA allows release of e-mail addresses,
contained in the student’s records if
subpoenaed.
UMG Recordings, Inc. v. Doe,
• Name, address, telephone number, e-mail
address and MAC address is contained in
educational records
• Which triggered notification requirements of
FERPA.
• Court: information “detailing how a student uses
the Internet, when they use it, and what they do
on it” is protected under FERPA.
Louisiana Law
• La. Rev. Stat. § 17:81(Q):
• Public school must develop policies electronic
communication by an employee at a school to a
student enrolled at that school
• To protect student
• And school if violation by employee
Facebook
• Can have educational applications
• Communicate about projects;
• Make assignment interactive; and
• Create learning group
Caution
• Do not use to post grades or information that
educational record; and
• Use safeguards to keep others from accessing
the information.
Other Social Communications
• Anti-fraternization
prohibitions would
extend to on-line
communications.
• Laws banning such
communication
• Issue of
constitutional right to
free speech.
Why not to “friend”
student
• Can undercut professional
relationship;
• Opens teacher to misuse of
social media by the student;
• Can be abused by the
teacher or misinterpreted by
the student; and
• Can be seen as invasion of
privacy
Other Considerations
• Adult students v. Minor students
• Former Students v. Current Students v. Future
Students
• Privacy Settings

More Related Content

What's hot

DETERMINE THE USE OF SMARTPHONES IN THE CLASSROOM TO ENHANCE STUDENTS LEARNIN...
DETERMINE THE USE OF SMARTPHONES IN THE CLASSROOM TO ENHANCE STUDENTS LEARNIN...DETERMINE THE USE OF SMARTPHONES IN THE CLASSROOM TO ENHANCE STUDENTS LEARNIN...
DETERMINE THE USE OF SMARTPHONES IN THE CLASSROOM TO ENHANCE STUDENTS LEARNIN...ArtisMcCoy2014
 
Nidde e lea-zambia_presetnfinal_andidde
Nidde e lea-zambia_presetnfinal_andiddeNidde e lea-zambia_presetnfinal_andidde
Nidde e lea-zambia_presetnfinal_andiddeROCARE / ERNWACA
 
Students and technology 2012
Students and technology 2012Students and technology 2012
Students and technology 2012srafiq
 
Fluency with Information Technology: From rubric to Assessment
Fluency with Information Technology: From rubric to AssessmentFluency with Information Technology: From rubric to Assessment
Fluency with Information Technology: From rubric to AssessmentGail Matthews-DeNatale
 
Issues of using ICTs in higher education
Issues of using ICTs in higher educationIssues of using ICTs in higher education
Issues of using ICTs in higher educationPaul Oliver
 
Use of electronic mobile devices in teaching and learning in higher education...
Use of electronic mobile devices in teaching and learning in higher education...Use of electronic mobile devices in teaching and learning in higher education...
Use of electronic mobile devices in teaching and learning in higher education...African Virtual University
 
صياغة اسئلة البحث العلمي
صياغة اسئلة البحث العلميصياغة اسئلة البحث العلمي
صياغة اسئلة البحث العلميZuheir Khlaif
 
Group presentation show
Group presentation showGroup presentation show
Group presentation showNerakstar1
 
Group presentation show
Group presentation showGroup presentation show
Group presentation showNerakstar1
 
Covid-19 and Mauritian University Education
Covid-19 and Mauritian University Education Covid-19 and Mauritian University Education
Covid-19 and Mauritian University Education MuhammadSaadWaheed1
 
Higher Education Student Handbooks & Social media
Higher Education Student Handbooks & Social mediaHigher Education Student Handbooks & Social media
Higher Education Student Handbooks & Social mediaLaura Pasquini
 
BYOD/BYOT Implementation Plan for 8th grade Social Studies
BYOD/BYOT Implementation Plan for 8th grade Social StudiesBYOD/BYOT Implementation Plan for 8th grade Social Studies
BYOD/BYOT Implementation Plan for 8th grade Social Studiessnava75766
 
Boundaries & Guidelines - NAESP 2014 - Social Media Lounge
Boundaries & Guidelines - NAESP 2014 - Social Media LoungeBoundaries & Guidelines - NAESP 2014 - Social Media Lounge
Boundaries & Guidelines - NAESP 2014 - Social Media LoungeBernsteinUSC
 
Internet Use and Usage of Chinese Teenagers at Home: Understanding Demographi...
Internet Use and Usage of Chinese Teenagers at Home: Understanding Demographi...Internet Use and Usage of Chinese Teenagers at Home: Understanding Demographi...
Internet Use and Usage of Chinese Teenagers at Home: Understanding Demographi...CITE
 
CoRE Presentation (with Mark Fink) (13 September 2013)
CoRE Presentation (with Mark Fink) (13 September 2013)CoRE Presentation (with Mark Fink) (13 September 2013)
CoRE Presentation (with Mark Fink) (13 September 2013)Ed Nagelhout
 
Overview research project ALFREDO COREAS
Overview research project ALFREDO COREAS Overview research project ALFREDO COREAS
Overview research project ALFREDO COREAS Alexander Barahona
 

What's hot (18)

WORST ACADEMIC WRITING
WORST ACADEMIC WRITING WORST ACADEMIC WRITING
WORST ACADEMIC WRITING
 
DETERMINE THE USE OF SMARTPHONES IN THE CLASSROOM TO ENHANCE STUDENTS LEARNIN...
DETERMINE THE USE OF SMARTPHONES IN THE CLASSROOM TO ENHANCE STUDENTS LEARNIN...DETERMINE THE USE OF SMARTPHONES IN THE CLASSROOM TO ENHANCE STUDENTS LEARNIN...
DETERMINE THE USE OF SMARTPHONES IN THE CLASSROOM TO ENHANCE STUDENTS LEARNIN...
 
Nidde e lea-zambia_presetnfinal_andidde
Nidde e lea-zambia_presetnfinal_andiddeNidde e lea-zambia_presetnfinal_andidde
Nidde e lea-zambia_presetnfinal_andidde
 
Students and technology 2012
Students and technology 2012Students and technology 2012
Students and technology 2012
 
Fluency with Information Technology: From rubric to Assessment
Fluency with Information Technology: From rubric to AssessmentFluency with Information Technology: From rubric to Assessment
Fluency with Information Technology: From rubric to Assessment
 
Issues of using ICTs in higher education
Issues of using ICTs in higher educationIssues of using ICTs in higher education
Issues of using ICTs in higher education
 
Use of electronic mobile devices in teaching and learning in higher education...
Use of electronic mobile devices in teaching and learning in higher education...Use of electronic mobile devices in teaching and learning in higher education...
Use of electronic mobile devices in teaching and learning in higher education...
 
صياغة اسئلة البحث العلمي
صياغة اسئلة البحث العلميصياغة اسئلة البحث العلمي
صياغة اسئلة البحث العلمي
 
Group presentation show
Group presentation showGroup presentation show
Group presentation show
 
Group presentation show
Group presentation showGroup presentation show
Group presentation show
 
Covid-19 and Mauritian University Education
Covid-19 and Mauritian University Education Covid-19 and Mauritian University Education
Covid-19 and Mauritian University Education
 
Web accessible nfro 2017 as of 08152017
Web accessible nfro 2017 as of 08152017Web accessible nfro 2017 as of 08152017
Web accessible nfro 2017 as of 08152017
 
Higher Education Student Handbooks & Social media
Higher Education Student Handbooks & Social mediaHigher Education Student Handbooks & Social media
Higher Education Student Handbooks & Social media
 
BYOD/BYOT Implementation Plan for 8th grade Social Studies
BYOD/BYOT Implementation Plan for 8th grade Social StudiesBYOD/BYOT Implementation Plan for 8th grade Social Studies
BYOD/BYOT Implementation Plan for 8th grade Social Studies
 
Boundaries & Guidelines - NAESP 2014 - Social Media Lounge
Boundaries & Guidelines - NAESP 2014 - Social Media LoungeBoundaries & Guidelines - NAESP 2014 - Social Media Lounge
Boundaries & Guidelines - NAESP 2014 - Social Media Lounge
 
Internet Use and Usage of Chinese Teenagers at Home: Understanding Demographi...
Internet Use and Usage of Chinese Teenagers at Home: Understanding Demographi...Internet Use and Usage of Chinese Teenagers at Home: Understanding Demographi...
Internet Use and Usage of Chinese Teenagers at Home: Understanding Demographi...
 
CoRE Presentation (with Mark Fink) (13 September 2013)
CoRE Presentation (with Mark Fink) (13 September 2013)CoRE Presentation (with Mark Fink) (13 September 2013)
CoRE Presentation (with Mark Fink) (13 September 2013)
 
Overview research project ALFREDO COREAS
Overview research project ALFREDO COREAS Overview research project ALFREDO COREAS
Overview research project ALFREDO COREAS
 

Viewers also liked

The Tomorrow Lab Presents - Social Media for Business
The Tomorrow Lab Presents - Social Media for BusinessThe Tomorrow Lab Presents - Social Media for Business
The Tomorrow Lab Presents - Social Media for BusinessJessica Orr
 
ARTS Applicant Newsletter 2016
ARTS Applicant Newsletter 2016ARTS Applicant Newsletter 2016
ARTS Applicant Newsletter 2016ARTS Holding SE
 
ARTS Bewerber Newsletter Juli 2016
ARTS Bewerber Newsletter Juli 2016ARTS Bewerber Newsletter Juli 2016
ARTS Bewerber Newsletter Juli 2016ARTS Holding SE
 
Un women-annual-report-2015-2016-en
Un women-annual-report-2015-2016-enUn women-annual-report-2015-2016-en
Un women-annual-report-2015-2016-ennicole cole
 
Five ways to Well Being
Five ways to Well BeingFive ways to Well Being
Five ways to Well Beingnicole cole
 
Nooit te laat om te plannen
Nooit te laat om te plannenNooit te laat om te plannen
Nooit te laat om te plannenRenaud Renard
 
ARTS Company Presentation
ARTS Company Presentation ARTS Company Presentation
ARTS Company Presentation ARTS Holding SE
 

Viewers also liked (12)

The Tomorrow Lab Presents - Social Media for Business
The Tomorrow Lab Presents - Social Media for BusinessThe Tomorrow Lab Presents - Social Media for Business
The Tomorrow Lab Presents - Social Media for Business
 
ARTS Applicant Newsletter 2016
ARTS Applicant Newsletter 2016ARTS Applicant Newsletter 2016
ARTS Applicant Newsletter 2016
 
FRANK_GFR
FRANK_GFRFRANK_GFR
FRANK_GFR
 
ARTS Bewerber Newsletter Juli 2016
ARTS Bewerber Newsletter Juli 2016ARTS Bewerber Newsletter Juli 2016
ARTS Bewerber Newsletter Juli 2016
 
Newsletter Mai 2016
Newsletter Mai 2016Newsletter Mai 2016
Newsletter Mai 2016
 
Un women-annual-report-2015-2016-en
Un women-annual-report-2015-2016-enUn women-annual-report-2015-2016-en
Un women-annual-report-2015-2016-en
 
Newsletter May 2016
Newsletter May 2016Newsletter May 2016
Newsletter May 2016
 
Five ways to Well Being
Five ways to Well BeingFive ways to Well Being
Five ways to Well Being
 
Nooit te laat om te plannen
Nooit te laat om te plannenNooit te laat om te plannen
Nooit te laat om te plannen
 
ARTS Company Presentation
ARTS Company Presentation ARTS Company Presentation
ARTS Company Presentation
 
Tugas TI
Tugas TITugas TI
Tugas TI
 
Resume-P-O
Resume-P-OResume-P-O
Resume-P-O
 

Similar to Electronic Security Issues for Schools

NAESP Conference - July 12, 2014
NAESP Conference - July 12, 2014NAESP Conference - July 12, 2014
NAESP Conference - July 12, 2014emilyensign
 
FERPA - SCASFAA 2015
FERPA - SCASFAA 2015FERPA - SCASFAA 2015
FERPA - SCASFAA 2015DJ Wetzel
 
Confidentiality and Special Education Training by Madison County Schools
Confidentiality and Special Education Training by Madison County SchoolsConfidentiality and Special Education Training by Madison County Schools
Confidentiality and Special Education Training by Madison County SchoolsAtlantic Training, LLC.
 
Forensic Computer Techniques
Forensic Computer TechniquesForensic Computer Techniques
Forensic Computer TechniquesFrederick Lane
 
Ethics Update for School Counselors
Ethics Update for School CounselorsEthics Update for School Counselors
Ethics Update for School CounselorsJohn Gavazzi
 
Researching Data Privacy in eLearning
Researching Data Privacy in eLearningResearching Data Privacy in eLearning
Researching Data Privacy in eLearningMalinka Ivanova
 
Researching Data Privacy in eLearning
Researching Data Privacy in eLearningResearching Data Privacy in eLearning
Researching Data Privacy in eLearningGabriela Grosseck
 
Va child safety & confidentiality 2019.pptx
Va child safety & confidentiality   2019.pptxVa child safety & confidentiality   2019.pptx
Va child safety & confidentiality 2019.pptxeward018
 
Cybertraps for Educators
Cybertraps for EducatorsCybertraps for Educators
Cybertraps for EducatorsFrederick Lane
 
The Uninterrupted Scholars Act: How Recent Changes to FERPA Can Improve Educa...
The Uninterrupted Scholars Act: How Recent Changes to FERPA Can Improve Educa...The Uninterrupted Scholars Act: How Recent Changes to FERPA Can Improve Educa...
The Uninterrupted Scholars Act: How Recent Changes to FERPA Can Improve Educa...mdanielsfirstfocus
 
2014-01-17 Cybertraps for Educators and Districts
2014-01-17 Cybertraps for Educators and Districts2014-01-17 Cybertraps for Educators and Districts
2014-01-17 Cybertraps for Educators and DistrictsFrederick Lane
 
Education Privacy
Education Privacy Education Privacy
Education Privacy emilyensign
 
Demystifying Student Data Privacy
Demystifying Student Data PrivacyDemystifying Student Data Privacy
Demystifying Student Data PrivacyNaviance
 
Introduction to ferpa module 1
Introduction to ferpa   module 1Introduction to ferpa   module 1
Introduction to ferpa module 1Barbara Solomon
 
OASFAA 2008 Conference FERPA
OASFAA 2008 Conference FERPAOASFAA 2008 Conference FERPA
OASFAA 2008 Conference FERPApetemacchia
 
Student privacy and your ontario college
Student privacy and your ontario collegeStudent privacy and your ontario college
Student privacy and your ontario collegeDan Michaluk
 
Parents' forum june 2015 ppt final
Parents' forum june 2015 ppt finalParents' forum june 2015 ppt final
Parents' forum june 2015 ppt finalrwagner2342
 
Surviving a BYOD Implementation
Surviving a BYOD ImplementationSurviving a BYOD Implementation
Surviving a BYOD ImplementationDiana Benner
 

Similar to Electronic Security Issues for Schools (20)

NAESP Conference - July 12, 2014
NAESP Conference - July 12, 2014NAESP Conference - July 12, 2014
NAESP Conference - July 12, 2014
 
FERPA - SCASFAA 2015
FERPA - SCASFAA 2015FERPA - SCASFAA 2015
FERPA - SCASFAA 2015
 
Confidentiality and Special Education Training by Madison County Schools
Confidentiality and Special Education Training by Madison County SchoolsConfidentiality and Special Education Training by Madison County Schools
Confidentiality and Special Education Training by Madison County Schools
 
Forensic Computer Techniques
Forensic Computer TechniquesForensic Computer Techniques
Forensic Computer Techniques
 
Ethics Update for School Counselors
Ethics Update for School CounselorsEthics Update for School Counselors
Ethics Update for School Counselors
 
Ethics Update for School Counselors
Ethics Update for School CounselorsEthics Update for School Counselors
Ethics Update for School Counselors
 
Researching Data Privacy in eLearning
Researching Data Privacy in eLearningResearching Data Privacy in eLearning
Researching Data Privacy in eLearning
 
Researching Data Privacy in eLearning
Researching Data Privacy in eLearningResearching Data Privacy in eLearning
Researching Data Privacy in eLearning
 
Va child safety & confidentiality 2019.pptx
Va child safety & confidentiality   2019.pptxVa child safety & confidentiality   2019.pptx
Va child safety & confidentiality 2019.pptx
 
Cybertraps for Educators
Cybertraps for EducatorsCybertraps for Educators
Cybertraps for Educators
 
The Uninterrupted Scholars Act: How Recent Changes to FERPA Can Improve Educa...
The Uninterrupted Scholars Act: How Recent Changes to FERPA Can Improve Educa...The Uninterrupted Scholars Act: How Recent Changes to FERPA Can Improve Educa...
The Uninterrupted Scholars Act: How Recent Changes to FERPA Can Improve Educa...
 
Boot Camp 2015
Boot Camp 2015Boot Camp 2015
Boot Camp 2015
 
2014-01-17 Cybertraps for Educators and Districts
2014-01-17 Cybertraps for Educators and Districts2014-01-17 Cybertraps for Educators and Districts
2014-01-17 Cybertraps for Educators and Districts
 
Education Privacy
Education Privacy Education Privacy
Education Privacy
 
Demystifying Student Data Privacy
Demystifying Student Data PrivacyDemystifying Student Data Privacy
Demystifying Student Data Privacy
 
Introduction to ferpa module 1
Introduction to ferpa   module 1Introduction to ferpa   module 1
Introduction to ferpa module 1
 
OASFAA 2008 Conference FERPA
OASFAA 2008 Conference FERPAOASFAA 2008 Conference FERPA
OASFAA 2008 Conference FERPA
 
Student privacy and your ontario college
Student privacy and your ontario collegeStudent privacy and your ontario college
Student privacy and your ontario college
 
Parents' forum june 2015 ppt final
Parents' forum june 2015 ppt finalParents' forum june 2015 ppt final
Parents' forum june 2015 ppt final
 
Surviving a BYOD Implementation
Surviving a BYOD ImplementationSurviving a BYOD Implementation
Surviving a BYOD Implementation
 

Recently uploaded

Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Krashi Coaching
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionSafetyChain Software
 
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting DataJhengPantaleon
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...Marc Dusseiller Dusjagr
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxOH TEIK BIN
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Educationpboyjonauth
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdfssuser54595a
 
Painted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaPainted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaVirag Sontakke
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 
Final demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxFinal demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxAvyJaneVismanos
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Celine George
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformChameera Dedduwage
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityGeoBlogs
 
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfEnzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfSumit Tiwari
 

Recently uploaded (20)

Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory Inspection
 
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptx
 
Staff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSDStaff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSD
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Education
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
 
Painted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaPainted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of India
 
9953330565 Low Rate Call Girls In Rohini Delhi NCR
9953330565 Low Rate Call Girls In Rohini  Delhi NCR9953330565 Low Rate Call Girls In Rohini  Delhi NCR
9953330565 Low Rate Call Girls In Rohini Delhi NCR
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 
Final demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxFinal demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptx
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfEnzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
 

Electronic Security Issues for Schools

  • 1. Electronic Security Issues for Schools Presented by: Joanne Rinardo Partner Deutsch Kerrigan jrinardo@deutschkerrigan.com 504 593 0616
  • 2. Why Data Integrity Has Become Important to Schools • More technology use in the education sector • New privacy and compliance challenges • More collection of student data • Outside contractors • Online courses
  • 3. Protection of Pupil Rights Amendment (PPRA) Applies to programs of: ▫ State Educational Agency (SEA) ▫ Local Educational Agency (LEA) ▫ Or other recipient of funds under any program funded by the U.S. Department of Education
  • 4. Governs Administering to Student • Any survey • Analysis • Evaluation in certain areas
  • 5. The 8 protected areas include: • Political affiliations of the student/parent • Mental issues of the student/student’s family • Sex behavior or attitudes • Illegal, anti-social, self- incriminating, or demeaning behavior • Critical appraisals of those who have close family relationships to students • Legally recognized privileged relationships (lawyers, physicians and ministers) • Religious practices, affiliations, or beliefs of the student/student’s parents • Income
  • 6. PPRA also addresses • Marketing surveys/areas of student privacy; • Parental access to information; and • Administration of certain physical examinations to minors
  • 7. Third Party Providers • Written consent before sharing PII not always required
  • 8. What Information is Protected? • Depends on the circumstances. • FERPA protects student profile information
  • 9. What are Exceptions to FERPA? • Directory Information Exception • School Official Exception
  • 10. Directory Information Exception • For PII disclosed in the school’s annual notice as Directory Information • No other limitations on other uses of data
  • 11. School Official Exception • For TPP delivery of education services to the student. • Remember: ▫ For service that school would use own employees; ▫ School maintains data used by TPP; ▫ For a legitimate education interest; ▫ Data not used for unauthorized purposes; and ▫ Consider a written contract regarding use restrictions
  • 12. FERPA does not apply to • An online portal for watching tutorials • Interactive exercises without logging in or using individual accounts.
  • 13. Pieces of information that provide meaning and context to data collected, or contextual information
  • 14. Metadata examples in testing • Date and time the student performed the activity; • Number of attempts they made to answer; • How long their mouse hovered over the answer button; and • Whether they changed their answer before submitting it
  • 15. Metadata Not Usually Protected • If stripped of all their direct and in direct identifiers • Can be disseminated to TPPs • School name/geographic information can be indirect identifiers
  • 16. Best Practices to Protect Data • Know what information is being collected or shared, • By whom, and • For what purposes
  • 17. Best Practices • Develop policies evaluate and approve proposed on-line education services. ▫ Ex. - new software must be reviewed before implementation • Be cautious of “free” educational services • Free apps can introduce security vulnerabilities into your school networks • Be transparent with the parents use of data is being used
  • 18. Retention Requirements • FERPA has no requirement for physical or electronic record retention • School districts establish their own policy and procedures • Common standard is 5-7 years after student leaves • Some schools just retain transcripts
  • 19. Individuals with Disabilities Education Act, (“IDEA”) • Public agencies must inform parents when any PII is no longer needed • Parents may request it be destroyed • Defined as the “physical destruction or removal of personal identifiers from information so that the information is no longer personally identifiable” • Must inform parents before student records are destroyed • Must inform parents they can request destruction once child leaves • Parents can request that their child’s record be amended
  • 20. Title IX • Keep compliance information for seven years • Applies to electronic data as well
  • 21. Destruction/Disposal Best Practices • Deleting a digital record or file is insufficient • Use specific technical methods used to dispose of the data
  • 22. Electronic Management Systems (“EMS”) • Allows school to have rules as to who can access certain documents; • Can be updated as regulations change; • Easier to move data to long-term storage media; and • Provides transaction trail
  • 23. Defining Custodial of Records • Each school should have an official records custodian, • Even if records not under his/her personal control • Often Principal or Asst. Principal • Goal - To prevent the unauthorized access to student records.
  • 24. FERPA Applies to All Records • Not just those records kept in the student’s file • Security cameras in school and on busses • Electronic records
  • 25. Custodian Best Practices • Develop listing of all student data kept; • Develop custodian log for request trail; and • Develop records release form.
  • 26. Extracted Data • Data that originally resided in the Student Records System • Now also resides in a special file
  • 27. Best Practices for Extracted Data • PII must be de-identified whenever there is public reporting; • Mask of data sufficiently so individual students not identified from extracted data; • Use only for legitimate educational purposes; • Abide by security and information release requirements; • Never release updated extract data as school data
  • 28. Internal Emails May Be Educational Records • If E-mails are maintained by school and • Are “directly related” to a student • Unless falls in one of the six “carve-outs” • E-mail to, from, or about student may be education record
  • 29. Courts have ruled inconsistently • S.A. v. Tulane County Office of Ed., (CA) • President and Trustees of Bates College v. Congregation Beth Abraham et al., (ME) • Williams v. District Bd. of Trustees of Edison Community College, FL,
  • 30. S.A. v. Tulane County Office of Ed., (CA) • Only printed emails part of records under IDEA • Others had been deleted; thus, not maintained
  • 31. President and Trustees of Bates College v. Congregation Beth Abraham et al., (ME) • Email about complaints, part of the student’s records • Even though generated outside normal academic activities • Court noted FERPA does not limit the definition of “other materials.”
  • 32. Williams v. District Bd. of Trustees of Edison Community College, FL, • Was sending students’ grades via the internet violated FERPA • Florida Commission on Human Relations found no violation • Make sure there are sufficient protections regarding access
  • 33. Release of E-Mail Addresses • FERPA protection if not included in Directory Information • Proper notice of that fact has been given.
  • 34.
  • 35. Artisita Records v. Does 1-: , • Students’ Media Access Control (MAC) addresses Directory Information.
  • 36. Fonovisa v. Does 1-14, • MAC not was Directory Information, but not education record and could be shared
  • 37. Warner Bros. Records v. Does 1-14, • FERPA allows release of e-mail addresses, contained in the student’s records if subpoenaed.
  • 38. UMG Recordings, Inc. v. Doe, • Name, address, telephone number, e-mail address and MAC address is contained in educational records • Which triggered notification requirements of FERPA. • Court: information “detailing how a student uses the Internet, when they use it, and what they do on it” is protected under FERPA.
  • 39. Louisiana Law • La. Rev. Stat. § 17:81(Q): • Public school must develop policies electronic communication by an employee at a school to a student enrolled at that school • To protect student • And school if violation by employee
  • 40. Facebook • Can have educational applications • Communicate about projects; • Make assignment interactive; and • Create learning group
  • 41. Caution • Do not use to post grades or information that educational record; and • Use safeguards to keep others from accessing the information.
  • 42. Other Social Communications • Anti-fraternization prohibitions would extend to on-line communications. • Laws banning such communication • Issue of constitutional right to free speech.
  • 43. Why not to “friend” student • Can undercut professional relationship; • Opens teacher to misuse of social media by the student; • Can be abused by the teacher or misinterpreted by the student; and • Can be seen as invasion of privacy
  • 44. Other Considerations • Adult students v. Minor students • Former Students v. Current Students v. Future Students • Privacy Settings