SlideShare a Scribd company logo
1 of 27
Download to read offline
Lena Engel,
Attorney
Texas CTO 2015 Summer Clinic
June 17, 2015
2
 88% of teens have seen someone be mean to another
person on a social networking site.
 41% of teens have had a negative experience as a result of
using a social networking site.
 39% of teens and tweens think their online activity is
private from everyone, including parents.
 67% of teenagers say they know how to hide what they’re
doing online from their parents.
 Among 9-17 year olds, more time is spent on social
networks than on TV.
http://www.guardchild.com/social-media-statistics-2/, February 27, 2015.
3
#1 Compliance with Privacy Laws
#2 Compliance with CIPA
#3 Vendor Terms and Conditions
#4 Responding to Student Use of Social Media
On and Off Campus
#5 Responding to Employee Use of Social
Media On and Off Campus
4
 Family Educational Rights and Privacy Act (FERPA)
◦ Governs use and dissemination of student education
records and personally identifiable information
◦ Beware of Directory Information opt out and personal use
 Protection of Pupil Rights Amendment (PPRA)
◦ Provides parents certain rights regarding conduct of
surveys and collection and use of student information for
marketing purposes
◦ Requires notice and opt out
 Children’s Online Privacy Protection Act (COPPA)
◦ Governs online collection of personal information from
children under 13
◦ Requires parental consent and opt out
6
 Texas Education Code Sec. 26.009.
◦ An employee of a school district must obtain the written consent
of a child's parent before the employee may . . . make or authorize
the making of a videotape of a child or record or authorize the
recording of a child's voice
 Not required to obtain consent if the videotape or voice
recording is to be used only for:
◦ purposes of safety, including the maintenance of order and
discipline in common areas of the school or on school buses;
◦ a purpose related to a cocurricular or extracurricular activity;
◦ a purpose related to regular classroom instruction; or
◦ media coverage of the school
 Disclosure still subject to FERPA
7
 Texas Penal Code § 33.07(a)
◦ A person commits an offense if he uses the name
or persona of another person to:
 Create a web page on a commercial social networking
site or other internet website; or
 Post or send one or more messages on or through a
commercial social networking site or other internet
website, other than on or through an electronic mail
program or message board program;
 Without obtaining the other person’s consent; and
 With the intent to harm, defraud, or intimidate, or
threaten any person
◦ Penalty: 3rd degree felony
8
 Districts must certify compliance with CIPA
when applying for E-Rate funding
 Requires development and enforcement of an
Internet Safety Policy
 Applies generally to District’s use of
technology, but particularly challenging for
District-sponsored/sanctioned use of social
media
10
 Internet Safety Policy must provide for (among
other things):
◦ Monitoring the online activities of minors
◦ Implementing technology protection measures that
protect against access by adults and minors to visual
depictions that are obscene, child pornography or, with
respect to use of computers with Internet access by
minors, harmful to minors (i.e., block or filter access)
◦ Educating minors about appropriate online behavior,
including interacting with other individuals on social
networking websites and in chat rooms, cyberbullying
awareness, and response
11
 Limit use to District-issued devices)
 Encourage use of separate District/professional
accounts
 Appoint administrator to join groups (e.g., Like,
Follow), or otherwise monitor
 Work with provider to gain access/monitor
 Train employees and students on proper use
◦ Cyberbullying
◦ Appropriate content
 Inform parents about social media use and accounts
12
 Avoid requesting access to, or otherwise
attempting to control, students’ or
employees’ personal accounts
 Do not search students’ cell phones without
reasonable suspicion
 Beware of social media monitoring companies
13
 Ownership of Data
 De-identified Data vs. Metadata vs. PII
 Vendor Access, Use, and Disclosure
◦ PII – District purposes only
 Beware of Data Mining
 Access to Data for Monitoring, Records Retention,
and Open Records Requests
 Transfer or Deletion of Data Upon
Assignment/Termination
15
 Usage-Based or Fluid Costs
 Venue/Governing Law
 Exhibits Referenced by Website
◦ Terms of Use
◦ Privacy Policy
 Confidentiality of Vendor Information
 Limitation of Liability/Infringement Indemnity
16
18
• Speech that Causes a Substantial Disruption
Tinker v. Des Moines Indep. Sch. Dist., 393 U.S. 503 (1969)
• Lewd or Vulgar Expression
Bethel School District No. 403 v. Fraser, 478 U.S. 675 (1986)
• School-Sponsored Speech
Hazelwood Sch. Dist. v. Kuhlmeier, 484 U.S. 260 (1988)
• Speech Promoting Illegal Drug Use
Morse v. Frederick, 127 S. Ct. 2618 (2007)
When Can ON-Campus Speech Be
Regulated?
19
• True Threats
Morse v. Frederick, 127 S. Ct. 2618 (2007)
• Special Danger
Ponce v. Socorro Indep. Sch. Dist., 508 F.3d 765 (5th Cir. 2007)
• Speech that Causes a Substantial Disruption
Tinker v. Des Moines Indep. Sch. Dist., 393 U.S. 503 (1969)
When Can OFF-Campus Speech Be
Regulated?
. . . Maybe.
The Tinker standard appears to be the
proper test for off-campus student speech
now:
 Does it materially or substantially disrupt the
work and discipline of the public school?
BUT WAIT . . .
20
 Investigate improper off-campus speech
immediately and document any evidence of
disruption (or reasonably forecasted
disruption) to the school environment
 If it is a true threat or a Columbine-style
reference, act immediately and report to the
police
21
23
When Can Employee Speech Be
Regulated?
24
1. Is the employee speaking pursuant to
official duties?
• If so, no protection
• If not, go to Question 2
2. Is it a matter of public concern?
• If not, no protection
• If so, balance interests of the district as
an employer and the employee as a
citizen (i.e., First Amendment rights)
Pickering v. Bd. of Educ., 391 U.S. 563 (1969)
When Can Employee Speech Be
Regulated?
 Safesmartsocial.com
 Commonsensemedia.org
 Connectsafely.org
 Safekids.com
25
Lena Engel
5718 Westheimer Road, Suite 1200
Houston, Texas 77057
Telephone: 713.960.6000
lengel@rmgllp.com
Thank you for your time and attention!
THE FOREGOING PRESENTATION WAS CREATED BY
ROGERS, MORRIS & GROVER, LLP. THIS
PRESENTATION IS INTENDED TO BE USED SOLELY FOR
GENERAL INFORMATION PURPOSES AND IS NOT TO BE
REGARDED AS LEGAL ADVICE. IF SPECIFIC LEGAL
ADVICE IS SOUGHT, PLEASE CONSULT AN ATTORNEY.
Houston Office: 5718 Westheimer Road, Suite 1200, Houston, TX 77057
Telephone: 713.960.6000
Austin Office: 5920 W. William Cannon Dr., Bldg. 1, Ste. 250, Austin, TX 78749
Telephone: 512.354.1050
Website: www.rmgllp.com

More Related Content

What's hot

Eastern Keren
Eastern KerenEastern Keren
Eastern Keren
elizkeren
 
September 2014 cyber safety presentation
September 2014 cyber safety presentationSeptember 2014 cyber safety presentation
September 2014 cyber safety presentation
jaurisch
 
Chad olivard internet safety powerpoint presentation itc 525
Chad olivard internet safety powerpoint presentation itc 525Chad olivard internet safety powerpoint presentation itc 525
Chad olivard internet safety powerpoint presentation itc 525
chadolivard
 
Acceptable use policy[1]
Acceptable use policy[1]Acceptable use policy[1]
Acceptable use policy[1]
jsmarr11
 

What's hot (20)

Eastern Keren
Eastern KerenEastern Keren
Eastern Keren
 
McKinley eist 5100 cyberbullying
McKinley eist 5100 cyberbullyingMcKinley eist 5100 cyberbullying
McKinley eist 5100 cyberbullying
 
September 2014 cyber safety presentation
September 2014 cyber safety presentationSeptember 2014 cyber safety presentation
September 2014 cyber safety presentation
 
Cohoes Jan 13 Cyberbullying
Cohoes Jan 13 CyberbullyingCohoes Jan 13 Cyberbullying
Cohoes Jan 13 Cyberbullying
 
Internet Safety for Educators
Internet Safety for EducatorsInternet Safety for Educators
Internet Safety for Educators
 
How big is your digital footprint fall 2012
How big is your digital footprint fall 2012How big is your digital footprint fall 2012
How big is your digital footprint fall 2012
 
Chad olivard internet safety powerpoint presentation itc 525
Chad olivard internet safety powerpoint presentation itc 525Chad olivard internet safety powerpoint presentation itc 525
Chad olivard internet safety powerpoint presentation itc 525
 
Acceptable use policy
Acceptable use policyAcceptable use policy
Acceptable use policy
 
Using Computer Technology to Protect Individuals and Families
Using Computer Technology to Protect Individuals and FamiliesUsing Computer Technology to Protect Individuals and Families
Using Computer Technology to Protect Individuals and Families
 
Acceptable use policy[1]
Acceptable use policy[1]Acceptable use policy[1]
Acceptable use policy[1]
 
Power Point Presentation by Auwalu Adamu
Power Point Presentation by Auwalu Adamu Power Point Presentation by Auwalu Adamu
Power Point Presentation by Auwalu Adamu
 
Star Kamal 9 B
Star Kamal 9 BStar Kamal 9 B
Star Kamal 9 B
 
Your Internet Safety
Your Internet SafetyYour Internet Safety
Your Internet Safety
 
Life in the_digital_world
Life in the_digital_worldLife in the_digital_world
Life in the_digital_world
 
10-30-13 Social Media and Confidentiality Presentation
10-30-13 Social Media and Confidentiality Presentation10-30-13 Social Media and Confidentiality Presentation
10-30-13 Social Media and Confidentiality Presentation
 
Being SMART about Internet Safety
Being SMART about Internet SafetyBeing SMART about Internet Safety
Being SMART about Internet Safety
 
Digital Cheating
Digital CheatingDigital Cheating
Digital Cheating
 
Online Safety for Seniors
Online Safety for SeniorsOnline Safety for Seniors
Online Safety for Seniors
 
KidSafe - Parental Training Presentation
KidSafe  - Parental Training PresentationKidSafe  - Parental Training Presentation
KidSafe - Parental Training Presentation
 
Intro - digitalcitizens
Intro - digitalcitizensIntro - digitalcitizens
Intro - digitalcitizens
 

Similar to The Top Five Legal Pitfalls of Social Media for School Districts

Education Privacy
Education Privacy Education Privacy
Education Privacy
emilyensign
 
11.21.10 inventedstudentuseagreement
11.21.10 inventedstudentuseagreement11.21.10 inventedstudentuseagreement
11.21.10 inventedstudentuseagreement
Paula Naugle
 
parent_teacher_tutorial
parent_teacher_tutorialparent_teacher_tutorial
parent_teacher_tutorial
tutorialsruby
 
parent_teacher_tutorial
parent_teacher_tutorialparent_teacher_tutorial
parent_teacher_tutorial
tutorialsruby
 
Children Online Privacy Komal Bansal
Children Online Privacy Komal BansalChildren Online Privacy Komal Bansal
Children Online Privacy Komal Bansal
Komal Bansal
 
Social networking and student wellbeing slideshare
Social networking and student wellbeing slideshareSocial networking and student wellbeing slideshare
Social networking and student wellbeing slideshare
Loreto Normanurst
 
Cyberbully presentation
Cyberbully presentationCyberbully presentation
Cyberbully presentation
Yuming Peng
 
Cyberbully presentation
Cyberbully presentationCyberbully presentation
Cyberbully presentation
Yuming Peng
 
NAESP Conference - July 12, 2014
NAESP Conference - July 12, 2014NAESP Conference - July 12, 2014
NAESP Conference - July 12, 2014
emilyensign
 

Similar to The Top Five Legal Pitfalls of Social Media for School Districts (20)

Student Privacy Rights in the Classroom
Student Privacy Rights in the ClassroomStudent Privacy Rights in the Classroom
Student Privacy Rights in the Classroom
 
Education Privacy
Education Privacy Education Privacy
Education Privacy
 
Its the law
Its the lawIts the law
Its the law
 
Its the law
Its the lawIts the law
Its the law
 
11.21.10 inventedstudentuseagreement
11.21.10 inventedstudentuseagreement11.21.10 inventedstudentuseagreement
11.21.10 inventedstudentuseagreement
 
Internet Safety Presentation
Internet Safety PresentationInternet Safety Presentation
Internet Safety Presentation
 
Surviving a BYOD Implementation
Surviving a BYOD ImplementationSurviving a BYOD Implementation
Surviving a BYOD Implementation
 
parent_teacher_tutorial
parent_teacher_tutorialparent_teacher_tutorial
parent_teacher_tutorial
 
parent_teacher_tutorial
parent_teacher_tutorialparent_teacher_tutorial
parent_teacher_tutorial
 
Cyberbully Module
Cyberbully ModuleCyberbully Module
Cyberbully Module
 
IASA social media presentation 2012
IASA social media presentation 2012IASA social media presentation 2012
IASA social media presentation 2012
 
Children Online Privacy Komal Bansal
Children Online Privacy Komal BansalChildren Online Privacy Komal Bansal
Children Online Privacy Komal Bansal
 
Social Media for School Districts - OTA 15
Social Media for School Districts - OTA 15Social Media for School Districts - OTA 15
Social Media for School Districts - OTA 15
 
Social networking and student wellbeing slideshare
Social networking and student wellbeing slideshareSocial networking and student wellbeing slideshare
Social networking and student wellbeing slideshare
 
Ruth Hammond - Saftguarding Children in a Digital World
Ruth Hammond - Saftguarding Children in a Digital WorldRuth Hammond - Saftguarding Children in a Digital World
Ruth Hammond - Saftguarding Children in a Digital World
 
Cyberbully presentation
Cyberbully presentationCyberbully presentation
Cyberbully presentation
 
Cyberbully presentation
Cyberbully presentationCyberbully presentation
Cyberbully presentation
 
Aet 545 week 6 tutorial cyber bullying
Aet 545 week 6 tutorial cyber bullyingAet 545 week 6 tutorial cyber bullying
Aet 545 week 6 tutorial cyber bullying
 
Filters firstamendmenttla2011 final
Filters firstamendmenttla2011 finalFilters firstamendmenttla2011 final
Filters firstamendmenttla2011 final
 
NAESP Conference - July 12, 2014
NAESP Conference - July 12, 2014NAESP Conference - July 12, 2014
NAESP Conference - July 12, 2014
 

More from Diana Benner

More from Diana Benner (20)

Googlelicious Learning with Google Drawings - TCEA 2018
Googlelicious Learning with Google Drawings - TCEA 2018Googlelicious Learning with Google Drawings - TCEA 2018
Googlelicious Learning with Google Drawings - TCEA 2018
 
Super Secrets of Google - TCEA 2018
Super Secrets of Google - TCEA 2018Super Secrets of Google - TCEA 2018
Super Secrets of Google - TCEA 2018
 
Using Formative Assessment Strategies to Inform Instruction - TCEA 2018
Using Formative Assessment Strategies to Inform Instruction - TCEA 2018Using Formative Assessment Strategies to Inform Instruction - TCEA 2018
Using Formative Assessment Strategies to Inform Instruction - TCEA 2018
 
Googlicious Ways to use Google Drawing in the Classroom - Chromebook Academy 17
Googlicious Ways to use Google Drawing in the Classroom - Chromebook Academy 17Googlicious Ways to use Google Drawing in the Classroom - Chromebook Academy 17
Googlicious Ways to use Google Drawing in the Classroom - Chromebook Academy 17
 
T-TESS and the Blended Learning Environment - Tots Arlington 17
T-TESS and the Blended Learning Environment - Tots Arlington 17T-TESS and the Blended Learning Environment - Tots Arlington 17
T-TESS and the Blended Learning Environment - Tots Arlington 17
 
Googlicious Ways to use Google Drawing in the Classroom - Tots Arlington 17
Googlicious Ways to use Google Drawing in the Classroom - Tots Arlington 17Googlicious Ways to use Google Drawing in the Classroom - Tots Arlington 17
Googlicious Ways to use Google Drawing in the Classroom - Tots Arlington 17
 
Emoji-cize Learning - Tots Arlington 17
Emoji-cize Learning - Tots Arlington 17Emoji-cize Learning - Tots Arlington 17
Emoji-cize Learning - Tots Arlington 17
 
Flip Your Grid with Video-Powered Reflection - Tots Arlington 17
Flip Your Grid with Video-Powered Reflection - Tots Arlington 17Flip Your Grid with Video-Powered Reflection - Tots Arlington 17
Flip Your Grid with Video-Powered Reflection - Tots Arlington 17
 
Killer Chrome Tips and Tricks you Should Know - Tots Arlington 17
Killer Chrome Tips and Tricks you Should Know - Tots Arlington 17Killer Chrome Tips and Tricks you Should Know - Tots Arlington 17
Killer Chrome Tips and Tricks you Should Know - Tots Arlington 17
 
Boost Literacy with Digital Tools - Tots Arlington 17
Boost Literacy with Digital Tools - Tots Arlington 17Boost Literacy with Digital Tools - Tots Arlington 17
Boost Literacy with Digital Tools - Tots Arlington 17
 
Surviving a BYOD Implementation - ISTE 2017
Surviving a BYOD Implementation - ISTE 2017Surviving a BYOD Implementation - ISTE 2017
Surviving a BYOD Implementation - ISTE 2017
 
Classroom Icebreakers for Back to School Demo Slam - ISTE 17
Classroom Icebreakers for Back to School Demo Slam - ISTE 17Classroom Icebreakers for Back to School Demo Slam - ISTE 17
Classroom Icebreakers for Back to School Demo Slam - ISTE 17
 
Top Ingredients for a Blended Learning Classroom Demo Slam - ISTE 17
Top Ingredients for a Blended Learning Classroom Demo Slam - ISTE 17Top Ingredients for a Blended Learning Classroom Demo Slam - ISTE 17
Top Ingredients for a Blended Learning Classroom Demo Slam - ISTE 17
 
T-TESS and the Blended Learning Environment - Tots Galveston 17
T-TESS and the Blended Learning Environment - Tots Galveston 17T-TESS and the Blended Learning Environment - Tots Galveston 17
T-TESS and the Blended Learning Environment - Tots Galveston 17
 
Emoji-cize Learning
Emoji-cize LearningEmoji-cize Learning
Emoji-cize Learning
 
Boost Literacy with Digital Tools - Tots Galveston 17
Boost Literacy with Digital Tools - Tots Galveston 17Boost Literacy with Digital Tools - Tots Galveston 17
Boost Literacy with Digital Tools - Tots Galveston 17
 
Flip your Grid with Video-Powered Reflection - Tots Galveston 17
Flip your Grid with Video-Powered Reflection - Tots Galveston 17Flip your Grid with Video-Powered Reflection - Tots Galveston 17
Flip your Grid with Video-Powered Reflection - Tots Galveston 17
 
Killer Chrome Tips and Tricks You Should Know - Tots Galveston 17
Killer Chrome Tips and Tricks You Should Know - Tots Galveston 17Killer Chrome Tips and Tricks You Should Know - Tots Galveston 17
Killer Chrome Tips and Tricks You Should Know - Tots Galveston 17
 
Googlicious Ways to use Google Drawing in the Classroom - Tots Galveston 17
Googlicious Ways to use Google Drawing in the Classroom - Tots Galveston 17Googlicious Ways to use Google Drawing in the Classroom - Tots Galveston 17
Googlicious Ways to use Google Drawing in the Classroom - Tots Galveston 17
 
Express Yourself with Sway - Tots Galveston 17
Express Yourself with Sway - Tots Galveston 17Express Yourself with Sway - Tots Galveston 17
Express Yourself with Sway - Tots Galveston 17
 

Recently uploaded

TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Victor Rentea
 

Recently uploaded (20)

TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
 
Stronger Together: Developing an Organizational Strategy for Accessible Desig...
Stronger Together: Developing an Organizational Strategy for Accessible Desig...Stronger Together: Developing an Organizational Strategy for Accessible Desig...
Stronger Together: Developing an Organizational Strategy for Accessible Desig...
 
How to Check CNIC Information Online with Pakdata cf
How to Check CNIC Information Online with Pakdata cfHow to Check CNIC Information Online with Pakdata cf
How to Check CNIC Information Online with Pakdata cf
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontology
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
AI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by AnitarajAI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by Anitaraj
 
Quantum Leap in Next-Generation Computing
Quantum Leap in Next-Generation ComputingQuantum Leap in Next-Generation Computing
Quantum Leap in Next-Generation Computing
 
Less Is More: Utilizing Ballerina to Architect a Cloud Data Platform
Less Is More: Utilizing Ballerina to Architect a Cloud Data PlatformLess Is More: Utilizing Ballerina to Architect a Cloud Data Platform
Less Is More: Utilizing Ballerina to Architect a Cloud Data Platform
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityPlatformless Horizons for Digital Adaptability
Platformless Horizons for Digital Adaptability
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
TEST BANK For Principles of Anatomy and Physiology, 16th Edition by Gerard J....
TEST BANK For Principles of Anatomy and Physiology, 16th Edition by Gerard J....TEST BANK For Principles of Anatomy and Physiology, 16th Edition by Gerard J....
TEST BANK For Principles of Anatomy and Physiology, 16th Edition by Gerard J....
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
 
Simplifying Mobile A11y Presentation.pptx
Simplifying Mobile A11y Presentation.pptxSimplifying Mobile A11y Presentation.pptx
Simplifying Mobile A11y Presentation.pptx
 
Decarbonising Commercial Real Estate: The Role of Operational Performance
Decarbonising Commercial Real Estate: The Role of Operational PerformanceDecarbonising Commercial Real Estate: The Role of Operational Performance
Decarbonising Commercial Real Estate: The Role of Operational Performance
 
WSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering Developers
 
JohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard-hybrid-app-RailsConf2024.pptxJohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard-hybrid-app-RailsConf2024.pptx
 
WSO2 Micro Integrator for Enterprise Integration in a Decentralized, Microser...
WSO2 Micro Integrator for Enterprise Integration in a Decentralized, Microser...WSO2 Micro Integrator for Enterprise Integration in a Decentralized, Microser...
WSO2 Micro Integrator for Enterprise Integration in a Decentralized, Microser...
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
 

The Top Five Legal Pitfalls of Social Media for School Districts

  • 1. Lena Engel, Attorney Texas CTO 2015 Summer Clinic June 17, 2015
  • 2. 2
  • 3.  88% of teens have seen someone be mean to another person on a social networking site.  41% of teens have had a negative experience as a result of using a social networking site.  39% of teens and tweens think their online activity is private from everyone, including parents.  67% of teenagers say they know how to hide what they’re doing online from their parents.  Among 9-17 year olds, more time is spent on social networks than on TV. http://www.guardchild.com/social-media-statistics-2/, February 27, 2015. 3
  • 4. #1 Compliance with Privacy Laws #2 Compliance with CIPA #3 Vendor Terms and Conditions #4 Responding to Student Use of Social Media On and Off Campus #5 Responding to Employee Use of Social Media On and Off Campus 4
  • 5.
  • 6.  Family Educational Rights and Privacy Act (FERPA) ◦ Governs use and dissemination of student education records and personally identifiable information ◦ Beware of Directory Information opt out and personal use  Protection of Pupil Rights Amendment (PPRA) ◦ Provides parents certain rights regarding conduct of surveys and collection and use of student information for marketing purposes ◦ Requires notice and opt out  Children’s Online Privacy Protection Act (COPPA) ◦ Governs online collection of personal information from children under 13 ◦ Requires parental consent and opt out 6
  • 7.  Texas Education Code Sec. 26.009. ◦ An employee of a school district must obtain the written consent of a child's parent before the employee may . . . make or authorize the making of a videotape of a child or record or authorize the recording of a child's voice  Not required to obtain consent if the videotape or voice recording is to be used only for: ◦ purposes of safety, including the maintenance of order and discipline in common areas of the school or on school buses; ◦ a purpose related to a cocurricular or extracurricular activity; ◦ a purpose related to regular classroom instruction; or ◦ media coverage of the school  Disclosure still subject to FERPA 7
  • 8.  Texas Penal Code § 33.07(a) ◦ A person commits an offense if he uses the name or persona of another person to:  Create a web page on a commercial social networking site or other internet website; or  Post or send one or more messages on or through a commercial social networking site or other internet website, other than on or through an electronic mail program or message board program;  Without obtaining the other person’s consent; and  With the intent to harm, defraud, or intimidate, or threaten any person ◦ Penalty: 3rd degree felony 8
  • 9.
  • 10.  Districts must certify compliance with CIPA when applying for E-Rate funding  Requires development and enforcement of an Internet Safety Policy  Applies generally to District’s use of technology, but particularly challenging for District-sponsored/sanctioned use of social media 10
  • 11.  Internet Safety Policy must provide for (among other things): ◦ Monitoring the online activities of minors ◦ Implementing technology protection measures that protect against access by adults and minors to visual depictions that are obscene, child pornography or, with respect to use of computers with Internet access by minors, harmful to minors (i.e., block or filter access) ◦ Educating minors about appropriate online behavior, including interacting with other individuals on social networking websites and in chat rooms, cyberbullying awareness, and response 11
  • 12.  Limit use to District-issued devices)  Encourage use of separate District/professional accounts  Appoint administrator to join groups (e.g., Like, Follow), or otherwise monitor  Work with provider to gain access/monitor  Train employees and students on proper use ◦ Cyberbullying ◦ Appropriate content  Inform parents about social media use and accounts 12
  • 13.  Avoid requesting access to, or otherwise attempting to control, students’ or employees’ personal accounts  Do not search students’ cell phones without reasonable suspicion  Beware of social media monitoring companies 13
  • 14.
  • 15.  Ownership of Data  De-identified Data vs. Metadata vs. PII  Vendor Access, Use, and Disclosure ◦ PII – District purposes only  Beware of Data Mining  Access to Data for Monitoring, Records Retention, and Open Records Requests  Transfer or Deletion of Data Upon Assignment/Termination 15
  • 16.  Usage-Based or Fluid Costs  Venue/Governing Law  Exhibits Referenced by Website ◦ Terms of Use ◦ Privacy Policy  Confidentiality of Vendor Information  Limitation of Liability/Infringement Indemnity 16
  • 17.
  • 18. 18 • Speech that Causes a Substantial Disruption Tinker v. Des Moines Indep. Sch. Dist., 393 U.S. 503 (1969) • Lewd or Vulgar Expression Bethel School District No. 403 v. Fraser, 478 U.S. 675 (1986) • School-Sponsored Speech Hazelwood Sch. Dist. v. Kuhlmeier, 484 U.S. 260 (1988) • Speech Promoting Illegal Drug Use Morse v. Frederick, 127 S. Ct. 2618 (2007) When Can ON-Campus Speech Be Regulated?
  • 19. 19 • True Threats Morse v. Frederick, 127 S. Ct. 2618 (2007) • Special Danger Ponce v. Socorro Indep. Sch. Dist., 508 F.3d 765 (5th Cir. 2007) • Speech that Causes a Substantial Disruption Tinker v. Des Moines Indep. Sch. Dist., 393 U.S. 503 (1969) When Can OFF-Campus Speech Be Regulated?
  • 20. . . . Maybe. The Tinker standard appears to be the proper test for off-campus student speech now:  Does it materially or substantially disrupt the work and discipline of the public school? BUT WAIT . . . 20
  • 21.  Investigate improper off-campus speech immediately and document any evidence of disruption (or reasonably forecasted disruption) to the school environment  If it is a true threat or a Columbine-style reference, act immediately and report to the police 21
  • 22.
  • 23. 23 When Can Employee Speech Be Regulated?
  • 24. 24 1. Is the employee speaking pursuant to official duties? • If so, no protection • If not, go to Question 2 2. Is it a matter of public concern? • If not, no protection • If so, balance interests of the district as an employer and the employee as a citizen (i.e., First Amendment rights) Pickering v. Bd. of Educ., 391 U.S. 563 (1969) When Can Employee Speech Be Regulated?
  • 25.  Safesmartsocial.com  Commonsensemedia.org  Connectsafely.org  Safekids.com 25
  • 26. Lena Engel 5718 Westheimer Road, Suite 1200 Houston, Texas 77057 Telephone: 713.960.6000 lengel@rmgllp.com Thank you for your time and attention!
  • 27. THE FOREGOING PRESENTATION WAS CREATED BY ROGERS, MORRIS & GROVER, LLP. THIS PRESENTATION IS INTENDED TO BE USED SOLELY FOR GENERAL INFORMATION PURPOSES AND IS NOT TO BE REGARDED AS LEGAL ADVICE. IF SPECIFIC LEGAL ADVICE IS SOUGHT, PLEASE CONSULT AN ATTORNEY. Houston Office: 5718 Westheimer Road, Suite 1200, Houston, TX 77057 Telephone: 713.960.6000 Austin Office: 5920 W. William Cannon Dr., Bldg. 1, Ste. 250, Austin, TX 78749 Telephone: 512.354.1050 Website: www.rmgllp.com