SlideShare a Scribd company logo
Privacy & Security Laws
What does compliance look like in education?
YOU SHOULD KNOW
You might’ve heard acronyms like CIPA, HIPAA and FERPA - but what
do they mean? They’re different types of compliance regulations that
organizations must follow to make sure that student and staff personal
data is safe and confidential.
FERPA
Compliance Law
RISKS OF NOT COMPLYING WITH
In order to protect confidential
information that is held on cloud
servers, compliance regulations
are mandatory for any internet
infrastructure that offers data
storage solutions.
BACKGROUND
Cloud data is constantly at
threat from hackers with
malicious intent as well as
from users who leak sensitive
information by error.
FERPA compliance is mandatory for federally
funded academic institutions that serve under the
U.S Department of Education.
The rules governing FERPA specifically regulate the
disclosure of student information by academic
institutions, to external parties.
By definition under FERPA, academic institutions
are not allowed to disclose information pertaining
to finances, grades, discipline, employment, and
courses of any student.
The Family Education Rights and
Privacy Act, FERPA, is an act that was
implemented in 1974 under U.S Federal
law.
Its main purpose is to ensure the
privacy of academic data for students
in learning institutions across the United
States.
FERPA Compliance
Academic institutions that are FERPA compliant are
not allowed by law, to disclose records to
students who are below 18 years. Where such is the
case, the parents are recognized as the
only legal persons who can;
I. File a complaint against an institution that is
FERPA non-compliant
II. Request for records to be changed where
academic information is misrepresented
III. Review student records
IV. Approve information disclosure for a student’s
academic records
However once a student attains the status of
‘eligibility’ at 18 years he or she reserves all the
above
rights.
FERPA Compliance
FERPA exception for academic information
disclosure is limited to instances where
student information is required;
● In legal proceedings on issuance of a
subpoena
● By other academic institutions where a
student wishes to enroll
● To persons whose interest in specific
information is purely educational
● As part of research on an academic
institution
● In the event of safety or medical
emergency
● In the event of drug abuse by an
underage student
Risks and penalties of FERPA non-
compliance
Where an academic institution is found to be
violating the laws under FERPA either intentionally
or unintentionally, consequences may include any
of the following;
A. Dismissal of an academic official who is
found responsible for information breach
B. Lawsuit from an eligible student of parent
C. Suspension from receiving federal funding
or entire loss of funding for the academic
institution
D. Fines of up to $1,000 or a jail sentence not
exceeding 6 months or both
FERPA Compliance

More Related Content

Similar to Risks of not complying with cipa & ferpa

FERPA - SCASFAA 2015
FERPA - SCASFAA 2015FERPA - SCASFAA 2015
FERPA - SCASFAA 2015
DJ Wetzel
 
FERPA tutorial
FERPA tutorial FERPA tutorial
FERPA tutorial
GallaudetRegistrar
 
Confidentiality FERPA Training
Confidentiality FERPA TrainingConfidentiality FERPA Training
Confidentiality FERPA Training
Pam Cranford
 
FERPA
FERPAFERPA
Interim ferpa-ppt-for-registrar-site-6-24-14-1
Interim ferpa-ppt-for-registrar-site-6-24-14-1Interim ferpa-ppt-for-registrar-site-6-24-14-1
Interim ferpa-ppt-for-registrar-site-6-24-14-1
UConnPub
 
F E R P A
F E  R P AF E  R P A
F E R P A
Alona Salva
 
Insurance
InsuranceInsurance
Insurance
JLS10
 
FERPA
FERPAFERPA
Hipaaferpajointguide
HipaaferpajointguideHipaaferpajointguide
Hipaaferpajointguide
judij21
 
Introduction to ferpa module 1
Introduction to ferpa   module 1Introduction to ferpa   module 1
Introduction to ferpa module 1
Barbara Solomon
 
iNACOL Leadership Webinar "Protecting Student Privacy in Blended and Online L...
iNACOL Leadership Webinar "Protecting Student Privacy in Blended and Online L...iNACOL Leadership Webinar "Protecting Student Privacy in Blended and Online L...
iNACOL Leadership Webinar "Protecting Student Privacy in Blended and Online L...
iNACOL
 
FERPA
FERPAFERPA
FERPA Tutorial for Faculty & Staff
FERPA Tutorial for Faculty & StaffFERPA Tutorial for Faculty & Staff
FERPA Tutorial for Faculty & Staff
GallaudetRegistrar
 
FERPA
FERPAFERPA
FERPA CVAD Foundations Program
FERPA CVAD Foundations ProgramFERPA CVAD Foundations Program
FERPA CVAD Foundations Program
Erin Cora Turner
 
Student privacy
Student privacyStudent privacy
Student privacy
Jack Arthur
 
Liability and student records
Liability and student recordsLiability and student records
Liability and student records
missybeavers
 
Cscu module 12 information security and legal compliance
Cscu module 12 information security and legal complianceCscu module 12 information security and legal compliance
Cscu module 12 information security and legal compliance
Alireza Ghahrood
 
FERPA & HIPAA Information Sharing In Schools
FERPA & HIPAA Information Sharing In SchoolsFERPA & HIPAA Information Sharing In Schools
FERPA & HIPAA Information Sharing In Schools
Pastor Harvey Burnett
 
Privacy and Civil Liberties
Privacy and Civil LibertiesPrivacy and Civil Liberties
Privacy and Civil Liberties
Upekha Vandebona
 

Similar to Risks of not complying with cipa & ferpa (20)

FERPA - SCASFAA 2015
FERPA - SCASFAA 2015FERPA - SCASFAA 2015
FERPA - SCASFAA 2015
 
FERPA tutorial
FERPA tutorial FERPA tutorial
FERPA tutorial
 
Confidentiality FERPA Training
Confidentiality FERPA TrainingConfidentiality FERPA Training
Confidentiality FERPA Training
 
FERPA
FERPAFERPA
FERPA
 
Interim ferpa-ppt-for-registrar-site-6-24-14-1
Interim ferpa-ppt-for-registrar-site-6-24-14-1Interim ferpa-ppt-for-registrar-site-6-24-14-1
Interim ferpa-ppt-for-registrar-site-6-24-14-1
 
F E R P A
F E  R P AF E  R P A
F E R P A
 
Insurance
InsuranceInsurance
Insurance
 
FERPA
FERPAFERPA
FERPA
 
Hipaaferpajointguide
HipaaferpajointguideHipaaferpajointguide
Hipaaferpajointguide
 
Introduction to ferpa module 1
Introduction to ferpa   module 1Introduction to ferpa   module 1
Introduction to ferpa module 1
 
iNACOL Leadership Webinar "Protecting Student Privacy in Blended and Online L...
iNACOL Leadership Webinar "Protecting Student Privacy in Blended and Online L...iNACOL Leadership Webinar "Protecting Student Privacy in Blended and Online L...
iNACOL Leadership Webinar "Protecting Student Privacy in Blended and Online L...
 
FERPA
FERPAFERPA
FERPA
 
FERPA Tutorial for Faculty & Staff
FERPA Tutorial for Faculty & StaffFERPA Tutorial for Faculty & Staff
FERPA Tutorial for Faculty & Staff
 
FERPA
FERPAFERPA
FERPA
 
FERPA CVAD Foundations Program
FERPA CVAD Foundations ProgramFERPA CVAD Foundations Program
FERPA CVAD Foundations Program
 
Student privacy
Student privacyStudent privacy
Student privacy
 
Liability and student records
Liability and student recordsLiability and student records
Liability and student records
 
Cscu module 12 information security and legal compliance
Cscu module 12 information security and legal complianceCscu module 12 information security and legal compliance
Cscu module 12 information security and legal compliance
 
FERPA & HIPAA Information Sharing In Schools
FERPA & HIPAA Information Sharing In SchoolsFERPA & HIPAA Information Sharing In Schools
FERPA & HIPAA Information Sharing In Schools
 
Privacy and Civil Liberties
Privacy and Civil LibertiesPrivacy and Civil Liberties
Privacy and Civil Liberties
 

More from SysCloud

Different Types of Phishing Attacks
Different Types of Phishing AttacksDifferent Types of Phishing Attacks
Different Types of Phishing Attacks
SysCloud
 
SysCloud Overview
SysCloud Overview SysCloud Overview
SysCloud Overview
SysCloud
 
SysCloud's June 2016 Release
SysCloud's June 2016 ReleaseSysCloud's June 2016 Release
SysCloud's June 2016 Release
SysCloud
 
Intro to sys cloud’s next generation security and compliance center
Intro to sys cloud’s next generation security and compliance centerIntro to sys cloud’s next generation security and compliance center
Intro to sys cloud’s next generation security and compliance center
SysCloud
 
How to do pci compliance in google apps
How to do pci compliance in google appsHow to do pci compliance in google apps
How to do pci compliance in google apps
SysCloud
 
How to do pci compliance in google apps presentation
How to do pci compliance in google apps presentationHow to do pci compliance in google apps presentation
How to do pci compliance in google apps presentation
SysCloud
 
Off-boarding a Google Apps users in 7 short steps
Off-boarding a Google Apps users in 7 short steps Off-boarding a Google Apps users in 7 short steps
Off-boarding a Google Apps users in 7 short steps
SysCloud
 
Top Threats Facing Organizations Cloud / SaaS Data
Top Threats Facing Organizations Cloud / SaaS DataTop Threats Facing Organizations Cloud / SaaS Data
Top Threats Facing Organizations Cloud / SaaS Data
SysCloud
 

More from SysCloud (8)

Different Types of Phishing Attacks
Different Types of Phishing AttacksDifferent Types of Phishing Attacks
Different Types of Phishing Attacks
 
SysCloud Overview
SysCloud Overview SysCloud Overview
SysCloud Overview
 
SysCloud's June 2016 Release
SysCloud's June 2016 ReleaseSysCloud's June 2016 Release
SysCloud's June 2016 Release
 
Intro to sys cloud’s next generation security and compliance center
Intro to sys cloud’s next generation security and compliance centerIntro to sys cloud’s next generation security and compliance center
Intro to sys cloud’s next generation security and compliance center
 
How to do pci compliance in google apps
How to do pci compliance in google appsHow to do pci compliance in google apps
How to do pci compliance in google apps
 
How to do pci compliance in google apps presentation
How to do pci compliance in google apps presentationHow to do pci compliance in google apps presentation
How to do pci compliance in google apps presentation
 
Off-boarding a Google Apps users in 7 short steps
Off-boarding a Google Apps users in 7 short steps Off-boarding a Google Apps users in 7 short steps
Off-boarding a Google Apps users in 7 short steps
 
Top Threats Facing Organizations Cloud / SaaS Data
Top Threats Facing Organizations Cloud / SaaS DataTop Threats Facing Organizations Cloud / SaaS Data
Top Threats Facing Organizations Cloud / SaaS Data
 

Recently uploaded

Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development ProvidersYour One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
akankshawande
 
A Comprehensive Guide to DeFi Development Services in 2024
A Comprehensive Guide to DeFi Development Services in 2024A Comprehensive Guide to DeFi Development Services in 2024
A Comprehensive Guide to DeFi Development Services in 2024
Intelisync
 
Nunit vs XUnit vs MSTest Differences Between These Unit Testing Frameworks.pdf
Nunit vs XUnit vs MSTest Differences Between These Unit Testing Frameworks.pdfNunit vs XUnit vs MSTest Differences Between These Unit Testing Frameworks.pdf
Nunit vs XUnit vs MSTest Differences Between These Unit Testing Frameworks.pdf
flufftailshop
 
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
saastr
 
Deep Dive: Getting Funded with Jason Jason Lemkin Founder & CEO @ SaaStr
Deep Dive: Getting Funded with Jason Jason Lemkin Founder & CEO @ SaaStrDeep Dive: Getting Funded with Jason Jason Lemkin Founder & CEO @ SaaStr
Deep Dive: Getting Funded with Jason Jason Lemkin Founder & CEO @ SaaStr
saastr
 
Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...
Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...
Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...
Tatiana Kojar
 
GraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracyGraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracy
Tomaz Bratanic
 
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Safe Software
 
Generating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and MilvusGenerating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and Milvus
Zilliz
 
dbms calicut university B. sc Cs 4th sem.pdf
dbms  calicut university B. sc Cs 4th sem.pdfdbms  calicut university B. sc Cs 4th sem.pdf
dbms calicut university B. sc Cs 4th sem.pdf
Shinana2
 
Programming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup SlidesProgramming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup Slides
Zilliz
 
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
saastr
 
Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)
Jakub Marek
 
Digital Marketing Trends in 2024 | Guide for Staying Ahead
Digital Marketing Trends in 2024 | Guide for Staying AheadDigital Marketing Trends in 2024 | Guide for Staying Ahead
Digital Marketing Trends in 2024 | Guide for Staying Ahead
Wask
 
System Design Case Study: Building a Scalable E-Commerce Platform - Hiike
System Design Case Study: Building a Scalable E-Commerce Platform - HiikeSystem Design Case Study: Building a Scalable E-Commerce Platform - Hiike
System Design Case Study: Building a Scalable E-Commerce Platform - Hiike
Hiike
 
June Patch Tuesday
June Patch TuesdayJune Patch Tuesday
June Patch Tuesday
Ivanti
 
Letter and Document Automation for Bonterra Impact Management (fka Social Sol...
Letter and Document Automation for Bonterra Impact Management (fka Social Sol...Letter and Document Automation for Bonterra Impact Management (fka Social Sol...
Letter and Document Automation for Bonterra Impact Management (fka Social Sol...
Jeffrey Haguewood
 
WeTestAthens: Postman's AI & Automation Techniques
WeTestAthens: Postman's AI & Automation TechniquesWeTestAthens: Postman's AI & Automation Techniques
WeTestAthens: Postman's AI & Automation Techniques
Postman
 
Skybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoptionSkybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoption
Tatiana Kojar
 
Building Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and MilvusBuilding Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and Milvus
Zilliz
 

Recently uploaded (20)

Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development ProvidersYour One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
 
A Comprehensive Guide to DeFi Development Services in 2024
A Comprehensive Guide to DeFi Development Services in 2024A Comprehensive Guide to DeFi Development Services in 2024
A Comprehensive Guide to DeFi Development Services in 2024
 
Nunit vs XUnit vs MSTest Differences Between These Unit Testing Frameworks.pdf
Nunit vs XUnit vs MSTest Differences Between These Unit Testing Frameworks.pdfNunit vs XUnit vs MSTest Differences Between These Unit Testing Frameworks.pdf
Nunit vs XUnit vs MSTest Differences Between These Unit Testing Frameworks.pdf
 
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
 
Deep Dive: Getting Funded with Jason Jason Lemkin Founder & CEO @ SaaStr
Deep Dive: Getting Funded with Jason Jason Lemkin Founder & CEO @ SaaStrDeep Dive: Getting Funded with Jason Jason Lemkin Founder & CEO @ SaaStr
Deep Dive: Getting Funded with Jason Jason Lemkin Founder & CEO @ SaaStr
 
Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...
Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...
Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...
 
GraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracyGraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracy
 
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
 
Generating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and MilvusGenerating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and Milvus
 
dbms calicut university B. sc Cs 4th sem.pdf
dbms  calicut university B. sc Cs 4th sem.pdfdbms  calicut university B. sc Cs 4th sem.pdf
dbms calicut university B. sc Cs 4th sem.pdf
 
Programming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup SlidesProgramming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup Slides
 
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
 
Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)
 
Digital Marketing Trends in 2024 | Guide for Staying Ahead
Digital Marketing Trends in 2024 | Guide for Staying AheadDigital Marketing Trends in 2024 | Guide for Staying Ahead
Digital Marketing Trends in 2024 | Guide for Staying Ahead
 
System Design Case Study: Building a Scalable E-Commerce Platform - Hiike
System Design Case Study: Building a Scalable E-Commerce Platform - HiikeSystem Design Case Study: Building a Scalable E-Commerce Platform - Hiike
System Design Case Study: Building a Scalable E-Commerce Platform - Hiike
 
June Patch Tuesday
June Patch TuesdayJune Patch Tuesday
June Patch Tuesday
 
Letter and Document Automation for Bonterra Impact Management (fka Social Sol...
Letter and Document Automation for Bonterra Impact Management (fka Social Sol...Letter and Document Automation for Bonterra Impact Management (fka Social Sol...
Letter and Document Automation for Bonterra Impact Management (fka Social Sol...
 
WeTestAthens: Postman's AI & Automation Techniques
WeTestAthens: Postman's AI & Automation TechniquesWeTestAthens: Postman's AI & Automation Techniques
WeTestAthens: Postman's AI & Automation Techniques
 
Skybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoptionSkybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoption
 
Building Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and MilvusBuilding Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and Milvus
 

Risks of not complying with cipa & ferpa

  • 1. Privacy & Security Laws What does compliance look like in education? YOU SHOULD KNOW
  • 2. You might’ve heard acronyms like CIPA, HIPAA and FERPA - but what do they mean? They’re different types of compliance regulations that organizations must follow to make sure that student and staff personal data is safe and confidential.
  • 3.
  • 4.
  • 5.
  • 6. FERPA Compliance Law RISKS OF NOT COMPLYING WITH
  • 7. In order to protect confidential information that is held on cloud servers, compliance regulations are mandatory for any internet infrastructure that offers data storage solutions. BACKGROUND Cloud data is constantly at threat from hackers with malicious intent as well as from users who leak sensitive information by error.
  • 8. FERPA compliance is mandatory for federally funded academic institutions that serve under the U.S Department of Education. The rules governing FERPA specifically regulate the disclosure of student information by academic institutions, to external parties. By definition under FERPA, academic institutions are not allowed to disclose information pertaining to finances, grades, discipline, employment, and courses of any student. The Family Education Rights and Privacy Act, FERPA, is an act that was implemented in 1974 under U.S Federal law. Its main purpose is to ensure the privacy of academic data for students in learning institutions across the United States. FERPA Compliance
  • 9. Academic institutions that are FERPA compliant are not allowed by law, to disclose records to students who are below 18 years. Where such is the case, the parents are recognized as the only legal persons who can; I. File a complaint against an institution that is FERPA non-compliant II. Request for records to be changed where academic information is misrepresented III. Review student records IV. Approve information disclosure for a student’s academic records However once a student attains the status of ‘eligibility’ at 18 years he or she reserves all the above rights. FERPA Compliance FERPA exception for academic information disclosure is limited to instances where student information is required; ● In legal proceedings on issuance of a subpoena ● By other academic institutions where a student wishes to enroll ● To persons whose interest in specific information is purely educational ● As part of research on an academic institution ● In the event of safety or medical emergency ● In the event of drug abuse by an underage student
  • 10. Risks and penalties of FERPA non- compliance Where an academic institution is found to be violating the laws under FERPA either intentionally or unintentionally, consequences may include any of the following; A. Dismissal of an academic official who is found responsible for information breach B. Lawsuit from an eligible student of parent C. Suspension from receiving federal funding or entire loss of funding for the academic institution D. Fines of up to $1,000 or a jail sentence not exceeding 6 months or both FERPA Compliance