SlideShare a Scribd company logo
1 of 55
Download to read offline
CLASSROOM
STUDENT PRIVACY IN & OUT OF THE
Disclaimer
Lawyers
“Students don't shed their constitutional rights
at the school house gates."
Central Legal Question We Will Explore:
!
How do schools balance students’ constitutional
rights with schools’ needs to maintain order and
a positive educational environment?
!
!
This talk is not about some abstract case studies.
This talk is about you.
What We Will Discuss:
!
Student Privacy Rights on Campus
!
Students’ Use of Social Networks
!
Student Records and Privacy
!
School Use of Third Party Online Vendors
!
Tracking Students
!
Public Relations & Privacy Issues
!
!
uncharted legal territory
Everyday Scenarios with
the Internet & Technology
Scenario #1: Asking a student for their social
network login credentials.
Not suggested!
!
Not only is the case law all over the place,
various states are debating legislative proposals
to address this issue.
!
Additionally, the Terms of Service of sites like
Facebook expressly prohibit this activity.
Scenario #2: Using private sector tracking
software to monitor students.
Ask yourself the questions:
!
Why and How are you using these monitoring
tools?
DOE & SIIA Issued Guidance
!
1) Legal Awareness: Be aware of the relevant state and federal
laws
!
2) Inventory of Services: Identify all the educational services
being used to assess the range of student information being
shared
!
3) Approval Policies: Important that staff do not bypass internal
controls when deciding to use free online services, and those
should go through the same approval process as paid services
!
4) Insert Contract Provisions: Detail policies for data use,
retention, and destruction
!
5) Transparency: Let students and parents know what is going
on
Scenario #3: Using RFID - Radio Frequency
Identification Technology
Not suggested!
!
Tracking students in this manner can be costly,
hard to manage and intrusive.
!
It can also be a public relations nightmare.
Scenario #4: Accessing Photos or Information
from a Device Such as a Cell or Smartphone.
Seminal Case on Student Privacy:
!
New Jersey v. TLO
Recent Cases:
!
G.C. v. Owensboro Public Schools (2013)
!
N.N. v. Tunkhannock Area School Dist. (2011)
!
Mendoza v. Klein Ind. Sch. Dist. (2011)
!
!
!
!
!
!
!
Scenario #5: Using Webcams or Other Means to
Take Photos of Students, Especially if the Device
Goes Off-Campus.
Relevant Case:
!
Robbins ex. rel Robbins v.
Lower Merion School District (2010)
!
!
!
!
!
!
!
!
“LMSD is enjoined from accessing or reviewing any
student-created files contained on student laptops
(including but not limited to documents, e-mails,
instant messaging records, photographs, Internet
usage logs, and Web browsing histories) for any
reason except as permitted by the policies and
regulations contemplated by paragraph 7 of this
Order or otherwise pursuant to a signed consent
form that clearly and conspicuously sets forth the
ability of LMSD to access or review such files.”
!
!
!
!
Scenario #6: Circumventing FERPA.
Example:
!
FERPA changes that allow for sharing
students' personal information with other
state officials and private entities for a broad
spectrum of activities without the consent of
parents.
!
May just be the beginning of these types of
proposals.
Scenario #7: Parent Dissemination of User
Generated Content.
Social Media Amplifies Broadcast Potential
!
Policies should be in place for parents taking
photos with smartphones and sharing on
social networks.
!
Consider the implication for children in
situations where parents may have protective
or other restraining orders.
Parent & Staff Education
!
You may think it’s common sense, but write it
down and share it with parents and staff
members.
The Fourth Amendment
When Does It Apply
Distinguishing Fourth Amendment from privacy
in the civil sense.
The Fourth Amendment could apply when you
are searching private accounts.
The First Amendment
When Does It Apply
Tinker v. Des Moines
Long-held precedent, since 1969, that students
have wide latitude to criticize to school officials
and policies.
kidz online.
yes, different rules apply.
Personally Identifiable Information (PII)
“Personally identifiable information” is information
that identifies a particular person. “Pii” includes:
!
• Full name;
• National identification number;
• IP address;
• Vehicle registration plate number;
• Driver’s license number;
• Face;
• Fingerprints;
• Handwriting;
• Credit card numbers;
• Digital identity;
• Date of birth;
• Birthplace; and
• Genetic information.
Children’s Online Privacy Protection Act
!
Requires websites to get parental consent before
collecting or sharing info for children under 13.
!
Enforced by the Federal Trade Commission.
!
Applies to commercial websites and other online
services.
!
!
!
COPPA Checklist
!
1) Know what qualifies as personal information under the statute.
!
2) Implement a standardized district-wide process for reviewing
an online or education technology service provider’s practices for
information collection, use and disclosure to ensure they are
COPPA compliant.
!
3) Know where students are accessing information.
!
4) Make sure the sites students visit have prominently displayed,
clearly stated privacy policies that meet COPPA’s requirements.
!
5) Provide parents with a notice of the websites and online services
whose collection the school has consented to on their behalf.
!
!
COPPA Checklist
!
6) Inform parents of the procedure for opting out of sharing their
child’s personal information.
!
7) Know when schools can or cannot consent on behalf of the
parents.
!
8) Ensure the method used to obtain verifiable parental consent is
FTC approved, or you can apply to the FTC for pre-approval of a
new consent mechanism.
!
9) Implement yearly trainings for school administration and
faculty covering the school or district’s COPPA responsibilities
and compliance practices.
!
10) Educate students about online safety and privacy issues.
!
Avoiding the “Oh, crap.”
General Privacy Tips
California
!
Privacy Policy Required
!
It’s just good sense for schools too.
!
Social Media Privacy Act
!
Enacted to protect students at universities and
employees from the demand of usernames and
passwords.
!
On the horizon - may be amendments to apply to
K-12 schools (exemptions for instances involving
bullying investigations)
Protecting Student Records
!
Over 8 million student privacy records have been
lost from nearly 600 security breaches since 2005.
We just scratched the surface.
?
Lawyers
Gagnier Margossian
@gamallp
consult@gamallp.com
gamallp.com
CLASSROOM
STUDENT PRIVACY IN THE

More Related Content

What's hot

Reliability_Undesirability
Reliability_UndesirabilityReliability_Undesirability
Reliability_UndesirabilityMohamed Omar
 
Eastern Keren
Eastern KerenEastern Keren
Eastern Kerenelizkeren
 
Lansing Cc 2010
Lansing Cc 2010Lansing Cc 2010
Lansing Cc 2010elizkeren
 
11.21.10 inventedstudentuseagreement
11.21.10 inventedstudentuseagreement11.21.10 inventedstudentuseagreement
11.21.10 inventedstudentuseagreementPaula Naugle
 
Social Networking and Chilton
Social Networking and ChiltonSocial Networking and Chilton
Social Networking and Chiltonelizkeren
 
Filters firstamendmenttla2011 final
Filters firstamendmenttla2011 finalFilters firstamendmenttla2011 final
Filters firstamendmenttla2011 finalLea Bailey
 
CIPA Children's Internet Protection Act
CIPA Children's Internet Protection ActCIPA Children's Internet Protection Act
CIPA Children's Internet Protection Actgibb0
 
Charter cellphones
Charter cellphones Charter cellphones
Charter cellphones elizkeren
 
CIPA Overview
CIPA OverviewCIPA Overview
CIPA Overviewedtecher
 
Traverse kolb 2010
Traverse kolb 2010Traverse kolb 2010
Traverse kolb 2010elizkeren
 
Module 1 b edu 650
Module 1 b edu 650Module 1 b edu 650
Module 1 b edu 650kareneckroth
 

What's hot (20)

Reliability_Undesirability
Reliability_UndesirabilityReliability_Undesirability
Reliability_Undesirability
 
Eastern Keren
Eastern KerenEastern Keren
Eastern Keren
 
Lansing Cc 2010
Lansing Cc 2010Lansing Cc 2010
Lansing Cc 2010
 
11.21.10 inventedstudentuseagreement
11.21.10 inventedstudentuseagreement11.21.10 inventedstudentuseagreement
11.21.10 inventedstudentuseagreement
 
Manistee
ManisteeManistee
Manistee
 
Its the law
Its the lawIts the law
Its the law
 
Social Networking and Chilton
Social Networking and ChiltonSocial Networking and Chilton
Social Networking and Chilton
 
Filters firstamendmenttla2011 final
Filters firstamendmenttla2011 finalFilters firstamendmenttla2011 final
Filters firstamendmenttla2011 final
 
Southfield
SouthfieldSouthfield
Southfield
 
CIPA Children's Internet Protection Act
CIPA Children's Internet Protection ActCIPA Children's Internet Protection Act
CIPA Children's Internet Protection Act
 
Life in the_digital_world
Life in the_digital_worldLife in the_digital_world
Life in the_digital_world
 
Charter cellphones
Charter cellphones Charter cellphones
Charter cellphones
 
Thurston
ThurstonThurston
Thurston
 
CIPA Overview
CIPA OverviewCIPA Overview
CIPA Overview
 
4
44
4
 
Cell byot
Cell byotCell byot
Cell byot
 
Comm Law paper
Comm Law paperComm Law paper
Comm Law paper
 
Traverse kolb 2010
Traverse kolb 2010Traverse kolb 2010
Traverse kolb 2010
 
Texas
TexasTexas
Texas
 
Module 1 b edu 650
Module 1 b edu 650Module 1 b edu 650
Module 1 b edu 650
 

Viewers also liked

Demystifying Student Data Privacy Q&A
Demystifying Student Data Privacy Q&ADemystifying Student Data Privacy Q&A
Demystifying Student Data Privacy Q&ANaviance
 
Sxs wedu 2017 application presentation computer science
Sxs wedu 2017 application presentation   computer scienceSxs wedu 2017 application presentation   computer science
Sxs wedu 2017 application presentation computer scienceAmelia Vance, Esq.
 
Demystifying Student Data Privacy
Demystifying Student Data PrivacyDemystifying Student Data Privacy
Demystifying Student Data PrivacyNaviance
 
Sxsw boot camp_building_student_privacy_program
Sxsw boot camp_building_student_privacy_programSxsw boot camp_building_student_privacy_program
Sxsw boot camp_building_student_privacy_programTeddy Hartman
 
Measuring Grit While Protecting Student Privacy - SXSWedu 2017 Application
Measuring Grit While Protecting Student Privacy - SXSWedu 2017 ApplicationMeasuring Grit While Protecting Student Privacy - SXSWedu 2017 Application
Measuring Grit While Protecting Student Privacy - SXSWedu 2017 ApplicationAmelia Vance, Esq.
 
Student Data Privacy: What Teachers and Administrators Need to KNow
Student Data Privacy: What Teachers and Administrators Need to KNowStudent Data Privacy: What Teachers and Administrators Need to KNow
Student Data Privacy: What Teachers and Administrators Need to KNowEmily Ensign
 
Student data privacy manifesto
Student data privacy manifestoStudent data privacy manifesto
Student data privacy manifestoCaitlin Sharp
 
Education Privacy Presentation
Education Privacy Presentation Education Privacy Presentation
Education Privacy Presentation emilyensign
 
Student Privacy - Teaching's New Moral Dilema
Student Privacy - Teaching's New Moral DilemaStudent Privacy - Teaching's New Moral Dilema
Student Privacy - Teaching's New Moral DilemaDavid Kinane
 
Privacy and Data Protection - principles for design of a new part of an ISO s...
Privacy and Data Protection - principles for design of a new part of an ISO s...Privacy and Data Protection - principles for design of a new part of an ISO s...
Privacy and Data Protection - principles for design of a new part of an ISO s...Tore Hoel
 
AngeLA: Putting the teacher in control of student privacy in the online class...
AngeLA: Putting the teacher in control of student privacy in the online class...AngeLA: Putting the teacher in control of student privacy in the online class...
AngeLA: Putting the teacher in control of student privacy in the online class...Andrii Vozniuk
 
Guide to Prospective European Union - United States Privacy Shield Program
Guide to Prospective European Union - United States Privacy Shield ProgramGuide to Prospective European Union - United States Privacy Shield Program
Guide to Prospective European Union - United States Privacy Shield ProgramChristina Gagnier
 
iNACOL Leadership Webinar "Protecting Student Privacy in Blended and Online L...
iNACOL Leadership Webinar "Protecting Student Privacy in Blended and Online L...iNACOL Leadership Webinar "Protecting Student Privacy in Blended and Online L...
iNACOL Leadership Webinar "Protecting Student Privacy in Blended and Online L...iNACOL
 
Student privacy self-management: Implications for learning analytics
Student privacy self-management: Implications for learning analyticsStudent privacy self-management: Implications for learning analytics
Student privacy self-management: Implications for learning analyticsUniversity of South Africa (Unisa)
 
GAMABrief: When Education Meets Big Data
GAMABrief: When Education Meets Big DataGAMABrief: When Education Meets Big Data
GAMABrief: When Education Meets Big DataChristina Gagnier
 
2015 CIC: #EdTech Forum - Data Privacy Standards
2015 CIC: #EdTech Forum - Data Privacy Standards2015 CIC: #EdTech Forum - Data Privacy Standards
2015 CIC: #EdTech Forum - Data Privacy StandardsAAP PreK-12 Learning Group
 

Viewers also liked (20)

Demystifying Student Data Privacy Q&A
Demystifying Student Data Privacy Q&ADemystifying Student Data Privacy Q&A
Demystifying Student Data Privacy Q&A
 
Sxs wedu 2017 application presentation computer science
Sxs wedu 2017 application presentation   computer scienceSxs wedu 2017 application presentation   computer science
Sxs wedu 2017 application presentation computer science
 
Demystifying Student Data Privacy
Demystifying Student Data PrivacyDemystifying Student Data Privacy
Demystifying Student Data Privacy
 
Sxsw boot camp_building_student_privacy_program
Sxsw boot camp_building_student_privacy_programSxsw boot camp_building_student_privacy_program
Sxsw boot camp_building_student_privacy_program
 
Measuring Grit While Protecting Student Privacy - SXSWedu 2017 Application
Measuring Grit While Protecting Student Privacy - SXSWedu 2017 ApplicationMeasuring Grit While Protecting Student Privacy - SXSWedu 2017 Application
Measuring Grit While Protecting Student Privacy - SXSWedu 2017 Application
 
Student Data Privacy: What Teachers and Administrators Need to KNow
Student Data Privacy: What Teachers and Administrators Need to KNowStudent Data Privacy: What Teachers and Administrators Need to KNow
Student Data Privacy: What Teachers and Administrators Need to KNow
 
Student data privacy manifesto
Student data privacy manifestoStudent data privacy manifesto
Student data privacy manifesto
 
Privacy_SXSWEDU
Privacy_SXSWEDUPrivacy_SXSWEDU
Privacy_SXSWEDU
 
Education Privacy Presentation
Education Privacy Presentation Education Privacy Presentation
Education Privacy Presentation
 
Student Privacy - Teaching's New Moral Dilema
Student Privacy - Teaching's New Moral DilemaStudent Privacy - Teaching's New Moral Dilema
Student Privacy - Teaching's New Moral Dilema
 
OnCUE Magazine - Spring 2016
OnCUE Magazine - Spring 2016OnCUE Magazine - Spring 2016
OnCUE Magazine - Spring 2016
 
NASBE SXSWedu Application
NASBE SXSWedu ApplicationNASBE SXSWedu Application
NASBE SXSWedu Application
 
Privacy and Data Protection - principles for design of a new part of an ISO s...
Privacy and Data Protection - principles for design of a new part of an ISO s...Privacy and Data Protection - principles for design of a new part of an ISO s...
Privacy and Data Protection - principles for design of a new part of an ISO s...
 
AngeLA: Putting the teacher in control of student privacy in the online class...
AngeLA: Putting the teacher in control of student privacy in the online class...AngeLA: Putting the teacher in control of student privacy in the online class...
AngeLA: Putting the teacher in control of student privacy in the online class...
 
Guide to Prospective European Union - United States Privacy Shield Program
Guide to Prospective European Union - United States Privacy Shield ProgramGuide to Prospective European Union - United States Privacy Shield Program
Guide to Prospective European Union - United States Privacy Shield Program
 
iNACOL Leadership Webinar "Protecting Student Privacy in Blended and Online L...
iNACOL Leadership Webinar "Protecting Student Privacy in Blended and Online L...iNACOL Leadership Webinar "Protecting Student Privacy in Blended and Online L...
iNACOL Leadership Webinar "Protecting Student Privacy in Blended and Online L...
 
Student privacy self-management: Implications for learning analytics
Student privacy self-management: Implications for learning analyticsStudent privacy self-management: Implications for learning analytics
Student privacy self-management: Implications for learning analytics
 
GAMABrief: When Education Meets Big Data
GAMABrief: When Education Meets Big DataGAMABrief: When Education Meets Big Data
GAMABrief: When Education Meets Big Data
 
2015 CIC: #EdTech Forum - Data Privacy Standards
2015 CIC: #EdTech Forum - Data Privacy Standards2015 CIC: #EdTech Forum - Data Privacy Standards
2015 CIC: #EdTech Forum - Data Privacy Standards
 
Privacy and Student Data: What to Consider
Privacy and Student Data: What to ConsiderPrivacy and Student Data: What to Consider
Privacy and Student Data: What to Consider
 

Similar to Student Privacy Rights: In and Out of the Classroom

In Class Learning Activity
In Class Learning ActivityIn Class Learning Activity
In Class Learning Activityguest09fcd1
 
Education Privacy
Education Privacy Education Privacy
Education Privacy emilyensign
 
Cyberbully Module
Cyberbully ModuleCyberbully Module
Cyberbully Modulelpj101
 
Internet Safety Presentation
Internet Safety PresentationInternet Safety Presentation
Internet Safety Presentationtdsparks3
 
Cyber_Safety_K-12_Fact_Sheet_508C.pdf
Cyber_Safety_K-12_Fact_Sheet_508C.pdfCyber_Safety_K-12_Fact_Sheet_508C.pdf
Cyber_Safety_K-12_Fact_Sheet_508C.pdfMi Ra Lavandelo
 
Tec207 -final presentation
Tec207 -final presentationTec207 -final presentation
Tec207 -final presentationSarah Sell
 
Understanding "Cyber" Bullying: California Law & Proactive Steps for School D...
Understanding "Cyber" Bullying: California Law & Proactive Steps for School D...Understanding "Cyber" Bullying: California Law & Proactive Steps for School D...
Understanding "Cyber" Bullying: California Law & Proactive Steps for School D...Christina Gagnier
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullyingmribera87
 
reSearch with teacher commentIMG_0418.JPGreSearch with teac.docx
reSearch with teacher commentIMG_0418.JPGreSearch with teac.docxreSearch with teacher commentIMG_0418.JPGreSearch with teac.docx
reSearch with teacher commentIMG_0418.JPGreSearch with teac.docxronak56
 
Internet privacy ethics and online security
Internet privacy ethics and online securityInternet privacy ethics and online security
Internet privacy ethics and online securityPaul Berryman
 
Parenting the MySpace Generation
Parenting the MySpace GenerationParenting the MySpace Generation
Parenting the MySpace Generationdlevin
 
Safe Surfing 4Paras/Clerical Feb 07
Safe Surfing 4Paras/Clerical Feb 07Safe Surfing 4Paras/Clerical Feb 07
Safe Surfing 4Paras/Clerical Feb 07E Robertson
 
Its the law
Its the lawIts the law
Its the lawnsharoff
 
Madison Opening
Madison OpeningMadison Opening
Madison Openingelizkeren
 

Similar to Student Privacy Rights: In and Out of the Classroom (20)

In Class Learning Activity
In Class Learning ActivityIn Class Learning Activity
In Class Learning Activity
 
Education Privacy
Education Privacy Education Privacy
Education Privacy
 
Legalissues
LegalissuesLegalissues
Legalissues
 
Lesson 3 ethical issues
Lesson 3   ethical issuesLesson 3   ethical issues
Lesson 3 ethical issues
 
Cyberbully Module
Cyberbully ModuleCyberbully Module
Cyberbully Module
 
Internet Safety Presentation
Internet Safety PresentationInternet Safety Presentation
Internet Safety Presentation
 
Cyber_Safety_K-12_Fact_Sheet_508C.pdf
Cyber_Safety_K-12_Fact_Sheet_508C.pdfCyber_Safety_K-12_Fact_Sheet_508C.pdf
Cyber_Safety_K-12_Fact_Sheet_508C.pdf
 
Chapter 6
Chapter 6Chapter 6
Chapter 6
 
Chapter6
Chapter6Chapter6
Chapter6
 
Tec207 -final presentation
Tec207 -final presentationTec207 -final presentation
Tec207 -final presentation
 
Understanding "Cyber" Bullying: California Law & Proactive Steps for School D...
Understanding "Cyber" Bullying: California Law & Proactive Steps for School D...Understanding "Cyber" Bullying: California Law & Proactive Steps for School D...
Understanding "Cyber" Bullying: California Law & Proactive Steps for School D...
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
case study.pptx
case study.pptxcase study.pptx
case study.pptx
 
reSearch with teacher commentIMG_0418.JPGreSearch with teac.docx
reSearch with teacher commentIMG_0418.JPGreSearch with teac.docxreSearch with teacher commentIMG_0418.JPGreSearch with teac.docx
reSearch with teacher commentIMG_0418.JPGreSearch with teac.docx
 
Internet privacy ethics and online security
Internet privacy ethics and online securityInternet privacy ethics and online security
Internet privacy ethics and online security
 
Proposal-Example-4.doc
Proposal-Example-4.docProposal-Example-4.doc
Proposal-Example-4.doc
 
Parenting the MySpace Generation
Parenting the MySpace GenerationParenting the MySpace Generation
Parenting the MySpace Generation
 
Safe Surfing 4Paras/Clerical Feb 07
Safe Surfing 4Paras/Clerical Feb 07Safe Surfing 4Paras/Clerical Feb 07
Safe Surfing 4Paras/Clerical Feb 07
 
Its the law
Its the lawIts the law
Its the law
 
Madison Opening
Madison OpeningMadison Opening
Madison Opening
 

More from Christina Gagnier

European Union General Data Protection Regulation (GDPR) Checklist
European Union General Data Protection Regulation (GDPR) ChecklistEuropean Union General Data Protection Regulation (GDPR) Checklist
European Union General Data Protection Regulation (GDPR) ChecklistChristina Gagnier
 
EU Privacy Shield Self Certification
EU Privacy Shield Self Certification EU Privacy Shield Self Certification
EU Privacy Shield Self Certification Christina Gagnier
 
The United Kingdom Raises Red Flag on Initial Coin Offerings
The United Kingdom Raises Red Flag on Initial Coin OfferingsThe United Kingdom Raises Red Flag on Initial Coin Offerings
The United Kingdom Raises Red Flag on Initial Coin OfferingsChristina Gagnier
 
Regulatory Regime for Cryptocurrencies in Gibraltar
Regulatory Regime for Cryptocurrencies in GibraltarRegulatory Regime for Cryptocurrencies in Gibraltar
Regulatory Regime for Cryptocurrencies in GibraltarChristina Gagnier
 
China Bans Initial Coin Offerings, "Illegal Public Financing"
China Bans Initial Coin Offerings, "Illegal Public Financing"China Bans Initial Coin Offerings, "Illegal Public Financing"
China Bans Initial Coin Offerings, "Illegal Public Financing"Christina Gagnier
 
Initial Coin Offerings (ICOs) and Cryptocurrencies in Canada
Initial Coin Offerings (ICOs) and Cryptocurrencies in CanadaInitial Coin Offerings (ICOs) and Cryptocurrencies in Canada
Initial Coin Offerings (ICOs) and Cryptocurrencies in CanadaChristina Gagnier
 
Conducting an Initial Coin Offering: Costs and Considerations
Conducting an Initial Coin Offering: Costs and ConsiderationsConducting an Initial Coin Offering: Costs and Considerations
Conducting an Initial Coin Offering: Costs and ConsiderationsChristina Gagnier
 
SEC Update: Virtual Organizations and the SEC - July 2017
SEC Update: Virtual Organizations and the SEC - July 2017SEC Update: Virtual Organizations and the SEC - July 2017
SEC Update: Virtual Organizations and the SEC - July 2017Christina Gagnier
 
European Union Privacy Law - General Data Protection Regulation Checklist
European Union Privacy Law - General Data Protection Regulation ChecklistEuropean Union Privacy Law - General Data Protection Regulation Checklist
European Union Privacy Law - General Data Protection Regulation ChecklistChristina Gagnier
 
Revenge Pornography: Legal and Policy Issues - Computers, Data & Privacy Prot...
Revenge Pornography: Legal and Policy Issues - Computers, Data & Privacy Prot...Revenge Pornography: Legal and Policy Issues - Computers, Data & Privacy Prot...
Revenge Pornography: Legal and Policy Issues - Computers, Data & Privacy Prot...Christina Gagnier
 
Gender Issues: Creating a Safe Environment for All Students
Gender Issues: Creating a Safe Environment for All StudentsGender Issues: Creating a Safe Environment for All Students
Gender Issues: Creating a Safe Environment for All StudentsChristina Gagnier
 
ABC's of Privacy and Security
ABC's of Privacy and SecurityABC's of Privacy and Security
ABC's of Privacy and SecurityChristina Gagnier
 
Starting a Business: The Legal Details
Starting a Business: The Legal DetailsStarting a Business: The Legal Details
Starting a Business: The Legal DetailsChristina Gagnier
 
GAMABrief: What Every School Needs to Know About Copyright Law
GAMABrief: What Every School Needs to Know About Copyright LawGAMABrief: What Every School Needs to Know About Copyright Law
GAMABrief: What Every School Needs to Know About Copyright LawChristina Gagnier
 
GAMAByte: The Legal Ramifications of Going 3D (Printing, That is)
GAMAByte: The Legal Ramifications of Going 3D (Printing, That is)GAMAByte: The Legal Ramifications of Going 3D (Printing, That is)
GAMAByte: The Legal Ramifications of Going 3D (Printing, That is)Christina Gagnier
 
GAMABrief: Preparing for the Capital Gains Tax Hike
GAMABrief: Preparing for the Capital Gains Tax HikeGAMABrief: Preparing for the Capital Gains Tax Hike
GAMABrief: Preparing for the Capital Gains Tax HikeChristina Gagnier
 
Privacy Identity Innovation 2013: Ignite Talk Slides - Content. Conduct. Cont...
Privacy Identity Innovation 2013: Ignite Talk Slides - Content. Conduct. Cont...Privacy Identity Innovation 2013: Ignite Talk Slides - Content. Conduct. Cont...
Privacy Identity Innovation 2013: Ignite Talk Slides - Content. Conduct. Cont...Christina Gagnier
 
Revenge Porn: Posting Images Without Consent
Revenge Porn: Posting Images Without ConsentRevenge Porn: Posting Images Without Consent
Revenge Porn: Posting Images Without ConsentChristina Gagnier
 
Seth's Law (AB 9) - Understanding "Cyber" Bullying
Seth's Law (AB 9) - Understanding "Cyber" BullyingSeth's Law (AB 9) - Understanding "Cyber" Bullying
Seth's Law (AB 9) - Understanding "Cyber" BullyingChristina Gagnier
 
Employees, Employers & Social Media
Employees, Employers & Social MediaEmployees, Employers & Social Media
Employees, Employers & Social MediaChristina Gagnier
 

More from Christina Gagnier (20)

European Union General Data Protection Regulation (GDPR) Checklist
European Union General Data Protection Regulation (GDPR) ChecklistEuropean Union General Data Protection Regulation (GDPR) Checklist
European Union General Data Protection Regulation (GDPR) Checklist
 
EU Privacy Shield Self Certification
EU Privacy Shield Self Certification EU Privacy Shield Self Certification
EU Privacy Shield Self Certification
 
The United Kingdom Raises Red Flag on Initial Coin Offerings
The United Kingdom Raises Red Flag on Initial Coin OfferingsThe United Kingdom Raises Red Flag on Initial Coin Offerings
The United Kingdom Raises Red Flag on Initial Coin Offerings
 
Regulatory Regime for Cryptocurrencies in Gibraltar
Regulatory Regime for Cryptocurrencies in GibraltarRegulatory Regime for Cryptocurrencies in Gibraltar
Regulatory Regime for Cryptocurrencies in Gibraltar
 
China Bans Initial Coin Offerings, "Illegal Public Financing"
China Bans Initial Coin Offerings, "Illegal Public Financing"China Bans Initial Coin Offerings, "Illegal Public Financing"
China Bans Initial Coin Offerings, "Illegal Public Financing"
 
Initial Coin Offerings (ICOs) and Cryptocurrencies in Canada
Initial Coin Offerings (ICOs) and Cryptocurrencies in CanadaInitial Coin Offerings (ICOs) and Cryptocurrencies in Canada
Initial Coin Offerings (ICOs) and Cryptocurrencies in Canada
 
Conducting an Initial Coin Offering: Costs and Considerations
Conducting an Initial Coin Offering: Costs and ConsiderationsConducting an Initial Coin Offering: Costs and Considerations
Conducting an Initial Coin Offering: Costs and Considerations
 
SEC Update: Virtual Organizations and the SEC - July 2017
SEC Update: Virtual Organizations and the SEC - July 2017SEC Update: Virtual Organizations and the SEC - July 2017
SEC Update: Virtual Organizations and the SEC - July 2017
 
European Union Privacy Law - General Data Protection Regulation Checklist
European Union Privacy Law - General Data Protection Regulation ChecklistEuropean Union Privacy Law - General Data Protection Regulation Checklist
European Union Privacy Law - General Data Protection Regulation Checklist
 
Revenge Pornography: Legal and Policy Issues - Computers, Data & Privacy Prot...
Revenge Pornography: Legal and Policy Issues - Computers, Data & Privacy Prot...Revenge Pornography: Legal and Policy Issues - Computers, Data & Privacy Prot...
Revenge Pornography: Legal and Policy Issues - Computers, Data & Privacy Prot...
 
Gender Issues: Creating a Safe Environment for All Students
Gender Issues: Creating a Safe Environment for All StudentsGender Issues: Creating a Safe Environment for All Students
Gender Issues: Creating a Safe Environment for All Students
 
ABC's of Privacy and Security
ABC's of Privacy and SecurityABC's of Privacy and Security
ABC's of Privacy and Security
 
Starting a Business: The Legal Details
Starting a Business: The Legal DetailsStarting a Business: The Legal Details
Starting a Business: The Legal Details
 
GAMABrief: What Every School Needs to Know About Copyright Law
GAMABrief: What Every School Needs to Know About Copyright LawGAMABrief: What Every School Needs to Know About Copyright Law
GAMABrief: What Every School Needs to Know About Copyright Law
 
GAMAByte: The Legal Ramifications of Going 3D (Printing, That is)
GAMAByte: The Legal Ramifications of Going 3D (Printing, That is)GAMAByte: The Legal Ramifications of Going 3D (Printing, That is)
GAMAByte: The Legal Ramifications of Going 3D (Printing, That is)
 
GAMABrief: Preparing for the Capital Gains Tax Hike
GAMABrief: Preparing for the Capital Gains Tax HikeGAMABrief: Preparing for the Capital Gains Tax Hike
GAMABrief: Preparing for the Capital Gains Tax Hike
 
Privacy Identity Innovation 2013: Ignite Talk Slides - Content. Conduct. Cont...
Privacy Identity Innovation 2013: Ignite Talk Slides - Content. Conduct. Cont...Privacy Identity Innovation 2013: Ignite Talk Slides - Content. Conduct. Cont...
Privacy Identity Innovation 2013: Ignite Talk Slides - Content. Conduct. Cont...
 
Revenge Porn: Posting Images Without Consent
Revenge Porn: Posting Images Without ConsentRevenge Porn: Posting Images Without Consent
Revenge Porn: Posting Images Without Consent
 
Seth's Law (AB 9) - Understanding "Cyber" Bullying
Seth's Law (AB 9) - Understanding "Cyber" BullyingSeth's Law (AB 9) - Understanding "Cyber" Bullying
Seth's Law (AB 9) - Understanding "Cyber" Bullying
 
Employees, Employers & Social Media
Employees, Employers & Social MediaEmployees, Employers & Social Media
Employees, Employers & Social Media
 

Recently uploaded

如何办理(USF文凭证书)美国旧金山大学毕业证学位证书
如何办理(USF文凭证书)美国旧金山大学毕业证学位证书如何办理(USF文凭证书)美国旧金山大学毕业证学位证书
如何办理(USF文凭证书)美国旧金山大学毕业证学位证书Fs Las
 
如何办理伦敦南岸大学毕业证(本硕)LSBU学位证书
如何办理伦敦南岸大学毕业证(本硕)LSBU学位证书如何办理伦敦南岸大学毕业证(本硕)LSBU学位证书
如何办理伦敦南岸大学毕业证(本硕)LSBU学位证书FS LS
 
An Introduction guidance of the European Union Law 2020_EU Seminar 4.pptx
An Introduction guidance of the European Union Law 2020_EU Seminar 4.pptxAn Introduction guidance of the European Union Law 2020_EU Seminar 4.pptx
An Introduction guidance of the European Union Law 2020_EU Seminar 4.pptxKUHANARASARATNAM1
 
Trial Tilak t 1897,1909, and 1916 sedition
Trial Tilak t 1897,1909, and 1916 seditionTrial Tilak t 1897,1909, and 1916 sedition
Trial Tilak t 1897,1909, and 1916 seditionNilamPadekar1
 
如何办理(UCD毕业证书)加州大学戴维斯分校毕业证学位证书
如何办理(UCD毕业证书)加州大学戴维斯分校毕业证学位证书如何办理(UCD毕业证书)加州大学戴维斯分校毕业证学位证书
如何办理(UCD毕业证书)加州大学戴维斯分校毕业证学位证书SD DS
 
如何办理新加坡南洋理工大学毕业证(本硕)NTU学位证书
如何办理新加坡南洋理工大学毕业证(本硕)NTU学位证书如何办理新加坡南洋理工大学毕业证(本硕)NTU学位证书
如何办理新加坡南洋理工大学毕业证(本硕)NTU学位证书Fir L
 
国外大学毕业证《奥克兰大学毕业证办理成绩单GPA修改》
国外大学毕业证《奥克兰大学毕业证办理成绩单GPA修改》国外大学毕业证《奥克兰大学毕业证办理成绩单GPA修改》
国外大学毕业证《奥克兰大学毕业证办理成绩单GPA修改》o8wvnojp
 
An Analysis of the Essential Commodities Act, 1955
An Analysis of the Essential Commodities Act, 1955An Analysis of the Essential Commodities Act, 1955
An Analysis of the Essential Commodities Act, 1955Abheet Mangleek
 
POLICE ACT, 1861 the details about police system.pptx
POLICE ACT, 1861 the details about police system.pptxPOLICE ACT, 1861 the details about police system.pptx
POLICE ACT, 1861 the details about police system.pptxAbhishekchatterjee248859
 
FINALTRUEENFORCEMENT OF BARANGAY SETTLEMENT.ppt
FINALTRUEENFORCEMENT OF BARANGAY SETTLEMENT.pptFINALTRUEENFORCEMENT OF BARANGAY SETTLEMENT.ppt
FINALTRUEENFORCEMENT OF BARANGAY SETTLEMENT.pptjudeplata
 
Constitutional Values & Fundamental Principles of the ConstitutionPPT.pptx
Constitutional Values & Fundamental Principles of the ConstitutionPPT.pptxConstitutional Values & Fundamental Principles of the ConstitutionPPT.pptx
Constitutional Values & Fundamental Principles of the ConstitutionPPT.pptxsrikarna235
 
Rights of under-trial Prisoners in India
Rights of under-trial Prisoners in IndiaRights of under-trial Prisoners in India
Rights of under-trial Prisoners in IndiaAbheet Mangleek
 
昆士兰科技大学毕业证学位证成绩单-补办步骤澳洲毕业证书
昆士兰科技大学毕业证学位证成绩单-补办步骤澳洲毕业证书昆士兰科技大学毕业证学位证成绩单-补办步骤澳洲毕业证书
昆士兰科技大学毕业证学位证成绩单-补办步骤澳洲毕业证书1k98h0e1
 
如何办理(Curtin毕业证书)科廷科技大学毕业证学位证书
如何办理(Curtin毕业证书)科廷科技大学毕业证学位证书如何办理(Curtin毕业证书)科廷科技大学毕业证学位证书
如何办理(Curtin毕业证书)科廷科技大学毕业证学位证书SD DS
 
Arbitration, mediation and conciliation in India
Arbitration, mediation and conciliation in IndiaArbitration, mediation and conciliation in India
Arbitration, mediation and conciliation in IndiaNafiaNazim
 
如何办理密德萨斯大学毕业证(本硕)Middlesex学位证书
如何办理密德萨斯大学毕业证(本硕)Middlesex学位证书如何办理密德萨斯大学毕业证(本硕)Middlesex学位证书
如何办理密德萨斯大学毕业证(本硕)Middlesex学位证书FS LS
 
如何办理(MSU文凭证书)密歇根州立大学毕业证学位证书
 如何办理(MSU文凭证书)密歇根州立大学毕业证学位证书 如何办理(MSU文凭证书)密歇根州立大学毕业证学位证书
如何办理(MSU文凭证书)密歇根州立大学毕业证学位证书Sir Lt
 
如何办理提赛德大学毕业证(本硕)Teesside学位证书
如何办理提赛德大学毕业证(本硕)Teesside学位证书如何办理提赛德大学毕业证(本硕)Teesside学位证书
如何办理提赛德大学毕业证(本硕)Teesside学位证书Fir L
 
Vanderburgh County Sheriff says he will Not Raid Delta 8 Shops
Vanderburgh County Sheriff says he will Not Raid Delta 8 ShopsVanderburgh County Sheriff says he will Not Raid Delta 8 Shops
Vanderburgh County Sheriff says he will Not Raid Delta 8 ShopsAbdul-Hakim Shabazz
 
Model Call Girl in Haqiqat Nagar Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Haqiqat Nagar Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Haqiqat Nagar Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Haqiqat Nagar Delhi reach out to us at 🔝8264348440🔝soniya singh
 

Recently uploaded (20)

如何办理(USF文凭证书)美国旧金山大学毕业证学位证书
如何办理(USF文凭证书)美国旧金山大学毕业证学位证书如何办理(USF文凭证书)美国旧金山大学毕业证学位证书
如何办理(USF文凭证书)美国旧金山大学毕业证学位证书
 
如何办理伦敦南岸大学毕业证(本硕)LSBU学位证书
如何办理伦敦南岸大学毕业证(本硕)LSBU学位证书如何办理伦敦南岸大学毕业证(本硕)LSBU学位证书
如何办理伦敦南岸大学毕业证(本硕)LSBU学位证书
 
An Introduction guidance of the European Union Law 2020_EU Seminar 4.pptx
An Introduction guidance of the European Union Law 2020_EU Seminar 4.pptxAn Introduction guidance of the European Union Law 2020_EU Seminar 4.pptx
An Introduction guidance of the European Union Law 2020_EU Seminar 4.pptx
 
Trial Tilak t 1897,1909, and 1916 sedition
Trial Tilak t 1897,1909, and 1916 seditionTrial Tilak t 1897,1909, and 1916 sedition
Trial Tilak t 1897,1909, and 1916 sedition
 
如何办理(UCD毕业证书)加州大学戴维斯分校毕业证学位证书
如何办理(UCD毕业证书)加州大学戴维斯分校毕业证学位证书如何办理(UCD毕业证书)加州大学戴维斯分校毕业证学位证书
如何办理(UCD毕业证书)加州大学戴维斯分校毕业证学位证书
 
如何办理新加坡南洋理工大学毕业证(本硕)NTU学位证书
如何办理新加坡南洋理工大学毕业证(本硕)NTU学位证书如何办理新加坡南洋理工大学毕业证(本硕)NTU学位证书
如何办理新加坡南洋理工大学毕业证(本硕)NTU学位证书
 
国外大学毕业证《奥克兰大学毕业证办理成绩单GPA修改》
国外大学毕业证《奥克兰大学毕业证办理成绩单GPA修改》国外大学毕业证《奥克兰大学毕业证办理成绩单GPA修改》
国外大学毕业证《奥克兰大学毕业证办理成绩单GPA修改》
 
An Analysis of the Essential Commodities Act, 1955
An Analysis of the Essential Commodities Act, 1955An Analysis of the Essential Commodities Act, 1955
An Analysis of the Essential Commodities Act, 1955
 
POLICE ACT, 1861 the details about police system.pptx
POLICE ACT, 1861 the details about police system.pptxPOLICE ACT, 1861 the details about police system.pptx
POLICE ACT, 1861 the details about police system.pptx
 
FINALTRUEENFORCEMENT OF BARANGAY SETTLEMENT.ppt
FINALTRUEENFORCEMENT OF BARANGAY SETTLEMENT.pptFINALTRUEENFORCEMENT OF BARANGAY SETTLEMENT.ppt
FINALTRUEENFORCEMENT OF BARANGAY SETTLEMENT.ppt
 
Constitutional Values & Fundamental Principles of the ConstitutionPPT.pptx
Constitutional Values & Fundamental Principles of the ConstitutionPPT.pptxConstitutional Values & Fundamental Principles of the ConstitutionPPT.pptx
Constitutional Values & Fundamental Principles of the ConstitutionPPT.pptx
 
Rights of under-trial Prisoners in India
Rights of under-trial Prisoners in IndiaRights of under-trial Prisoners in India
Rights of under-trial Prisoners in India
 
昆士兰科技大学毕业证学位证成绩单-补办步骤澳洲毕业证书
昆士兰科技大学毕业证学位证成绩单-补办步骤澳洲毕业证书昆士兰科技大学毕业证学位证成绩单-补办步骤澳洲毕业证书
昆士兰科技大学毕业证学位证成绩单-补办步骤澳洲毕业证书
 
如何办理(Curtin毕业证书)科廷科技大学毕业证学位证书
如何办理(Curtin毕业证书)科廷科技大学毕业证学位证书如何办理(Curtin毕业证书)科廷科技大学毕业证学位证书
如何办理(Curtin毕业证书)科廷科技大学毕业证学位证书
 
Arbitration, mediation and conciliation in India
Arbitration, mediation and conciliation in IndiaArbitration, mediation and conciliation in India
Arbitration, mediation and conciliation in India
 
如何办理密德萨斯大学毕业证(本硕)Middlesex学位证书
如何办理密德萨斯大学毕业证(本硕)Middlesex学位证书如何办理密德萨斯大学毕业证(本硕)Middlesex学位证书
如何办理密德萨斯大学毕业证(本硕)Middlesex学位证书
 
如何办理(MSU文凭证书)密歇根州立大学毕业证学位证书
 如何办理(MSU文凭证书)密歇根州立大学毕业证学位证书 如何办理(MSU文凭证书)密歇根州立大学毕业证学位证书
如何办理(MSU文凭证书)密歇根州立大学毕业证学位证书
 
如何办理提赛德大学毕业证(本硕)Teesside学位证书
如何办理提赛德大学毕业证(本硕)Teesside学位证书如何办理提赛德大学毕业证(本硕)Teesside学位证书
如何办理提赛德大学毕业证(本硕)Teesside学位证书
 
Vanderburgh County Sheriff says he will Not Raid Delta 8 Shops
Vanderburgh County Sheriff says he will Not Raid Delta 8 ShopsVanderburgh County Sheriff says he will Not Raid Delta 8 Shops
Vanderburgh County Sheriff says he will Not Raid Delta 8 Shops
 
Model Call Girl in Haqiqat Nagar Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Haqiqat Nagar Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Haqiqat Nagar Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Haqiqat Nagar Delhi reach out to us at 🔝8264348440🔝
 

Student Privacy Rights: In and Out of the Classroom

  • 3.
  • 4. “Students don't shed their constitutional rights at the school house gates."
  • 5.
  • 6.
  • 7. Central Legal Question We Will Explore: ! How do schools balance students’ constitutional rights with schools’ needs to maintain order and a positive educational environment? ! !
  • 8. This talk is not about some abstract case studies. This talk is about you.
  • 9. What We Will Discuss: ! Student Privacy Rights on Campus ! Students’ Use of Social Networks ! Student Records and Privacy ! School Use of Third Party Online Vendors ! Tracking Students ! Public Relations & Privacy Issues ! !
  • 10. uncharted legal territory Everyday Scenarios with the Internet & Technology
  • 11. Scenario #1: Asking a student for their social network login credentials.
  • 12. Not suggested! ! Not only is the case law all over the place, various states are debating legislative proposals to address this issue. ! Additionally, the Terms of Service of sites like Facebook expressly prohibit this activity.
  • 13. Scenario #2: Using private sector tracking software to monitor students.
  • 14.
  • 15.
  • 16. Ask yourself the questions: ! Why and How are you using these monitoring tools?
  • 17.
  • 18. DOE & SIIA Issued Guidance ! 1) Legal Awareness: Be aware of the relevant state and federal laws ! 2) Inventory of Services: Identify all the educational services being used to assess the range of student information being shared ! 3) Approval Policies: Important that staff do not bypass internal controls when deciding to use free online services, and those should go through the same approval process as paid services ! 4) Insert Contract Provisions: Detail policies for data use, retention, and destruction ! 5) Transparency: Let students and parents know what is going on
  • 19. Scenario #3: Using RFID - Radio Frequency Identification Technology
  • 20.
  • 21. Not suggested! ! Tracking students in this manner can be costly, hard to manage and intrusive. ! It can also be a public relations nightmare.
  • 22. Scenario #4: Accessing Photos or Information from a Device Such as a Cell or Smartphone.
  • 23.
  • 24. Seminal Case on Student Privacy: ! New Jersey v. TLO
  • 25. Recent Cases: ! G.C. v. Owensboro Public Schools (2013) ! N.N. v. Tunkhannock Area School Dist. (2011) ! Mendoza v. Klein Ind. Sch. Dist. (2011) ! ! ! ! ! ! !
  • 26. Scenario #5: Using Webcams or Other Means to Take Photos of Students, Especially if the Device Goes Off-Campus.
  • 27. Relevant Case: ! Robbins ex. rel Robbins v. Lower Merion School District (2010) ! ! ! ! ! ! !
  • 28. ! “LMSD is enjoined from accessing or reviewing any student-created files contained on student laptops (including but not limited to documents, e-mails, instant messaging records, photographs, Internet usage logs, and Web browsing histories) for any reason except as permitted by the policies and regulations contemplated by paragraph 7 of this Order or otherwise pursuant to a signed consent form that clearly and conspicuously sets forth the ability of LMSD to access or review such files.” ! ! ! !
  • 30. Example: ! FERPA changes that allow for sharing students' personal information with other state officials and private entities for a broad spectrum of activities without the consent of parents. ! May just be the beginning of these types of proposals.
  • 31.
  • 32. Scenario #7: Parent Dissemination of User Generated Content.
  • 33. Social Media Amplifies Broadcast Potential ! Policies should be in place for parents taking photos with smartphones and sharing on social networks. ! Consider the implication for children in situations where parents may have protective or other restraining orders.
  • 34. Parent & Staff Education ! You may think it’s common sense, but write it down and share it with parents and staff members.
  • 35. The Fourth Amendment When Does It Apply
  • 36. Distinguishing Fourth Amendment from privacy in the civil sense.
  • 37. The Fourth Amendment could apply when you are searching private accounts.
  • 38. The First Amendment When Does It Apply
  • 39. Tinker v. Des Moines
  • 40. Long-held precedent, since 1969, that students have wide latitude to criticize to school officials and policies.
  • 43. “Personally identifiable information” is information that identifies a particular person. “Pii” includes: ! • Full name; • National identification number; • IP address; • Vehicle registration plate number; • Driver’s license number; • Face; • Fingerprints; • Handwriting; • Credit card numbers; • Digital identity; • Date of birth; • Birthplace; and • Genetic information.
  • 44. Children’s Online Privacy Protection Act ! Requires websites to get parental consent before collecting or sharing info for children under 13. ! Enforced by the Federal Trade Commission. ! Applies to commercial websites and other online services. ! ! !
  • 45. COPPA Checklist ! 1) Know what qualifies as personal information under the statute. ! 2) Implement a standardized district-wide process for reviewing an online or education technology service provider’s practices for information collection, use and disclosure to ensure they are COPPA compliant. ! 3) Know where students are accessing information. ! 4) Make sure the sites students visit have prominently displayed, clearly stated privacy policies that meet COPPA’s requirements. ! 5) Provide parents with a notice of the websites and online services whose collection the school has consented to on their behalf. ! !
  • 46. COPPA Checklist ! 6) Inform parents of the procedure for opting out of sharing their child’s personal information. ! 7) Know when schools can or cannot consent on behalf of the parents. ! 8) Ensure the method used to obtain verifiable parental consent is FTC approved, or you can apply to the FTC for pre-approval of a new consent mechanism. ! 9) Implement yearly trainings for school administration and faculty covering the school or district’s COPPA responsibilities and compliance practices. ! 10) Educate students about online safety and privacy issues. !
  • 47. Avoiding the “Oh, crap.” General Privacy Tips
  • 48. California ! Privacy Policy Required ! It’s just good sense for schools too. !
  • 49. Social Media Privacy Act ! Enacted to protect students at universities and employees from the demand of usernames and passwords. ! On the horizon - may be amendments to apply to K-12 schools (exemptions for instances involving bullying investigations)
  • 50. Protecting Student Records ! Over 8 million student privacy records have been lost from nearly 600 security breaches since 2005.
  • 51.
  • 52. We just scratched the surface.
  • 53. ?