Do Student Privacy Laws Fix Privacy Flaws?
Education Cybersecurity Weekly is a curated weekly news overview for those who are concerned about the Education industry and Education data breach. It provides brief summaries and links to articles and news across a spectrum of EdTech and cybercrime in Higher Education. Learn about student privacy laws.While technology is filling the education sector faster than a widening puddle of spilled coffee, it is time to discuss the national initiative in students’ data protection. Not so long ago, Louisiana students and IT specialists got the opportunity to receive the cybersecurity education or master their professional skills in the state’s first cybersecurity education center.
K-12 cybersecurity basics: balancing student access with student privacy laws
EdTech Magazine: Focus on K-12 on May 21, 2019
While technology is filling the education sector faster than a widening puddle of spilled coffee, it is time to discuss the national initiative in students’ data protection.
The National Cybersecurity Alliance has released guidance on how to meet the FERPA requirements, implementing new technology. First, student privacy laws must be a matter of educators’ concern, so they should understand the methods student data is collected and secured on all technological platforms.
Furthermore, in addition to the FERPA protection, many states have extended regulations on more types of students’ personal information held by the educational institution. This means schools are obliged to have a safe infrastructure to prevent different kinds of cyber threats.
Finally, when it comes to implementing a new technology solution, it is vital for K-12 organizations to estimate whether this tool will have a negative impact on the current students’ data protection.
Indian piece of education cybercrime
India Today on May 26, 2019
Sometimes, Indian fairy tales are not as kind and encouraging as the Aladdin’s story. Indeed, this case is realistic.
The Central Bureau of Investigation arrested six people for deploying remote desktop technology to breach the system security network of the BITS Pilani online examination. According to the investigating agency, a remote user was able to access the computer screens of the candidates through the software, providing an unwarranted internet connection and, as a result, answers for a test.
The Indian cybercrime team included the director of New Delhi private company, owner of Ahmedabad-based education institute, two cybersecurity specialists and the owner of Ahmedabad-based examination center. The case was registered under the IT Act for manipulating online examination conducted for selecting candidates through unfair means for pecuniary consideration.
Graduates, is your data well-protected?
EdTech Magazine: Focus on Higher Ed on May 21, 2019
Not so long ago, Louisiana students and IT specialists got the opportunity to receive the cybersecurity education or master their professional skills in the state’s first cybersecurity education center. Actually, the opening of the new “Cyber Center” is an essential step to keep on toes in the world, where information is the key to success.
Although the increasing amount of students’ data, collected by educational organizations, may be explained by good intention of institutions like helping graduates to succeed in their future job or improving the quality of education, there will always be a risk of data privacy violation and, as a result, the necessity to mitigate these privacy threats.
One of the effective security measures is identity and access management system, ensuring that only authorized individuals have access to the graduates’ data and only to the specific sets of information they need.
While the number of student privacy laws passed in 40 states since 2013 reaches 116 acts, another issue for educational organizations is creating retention policies and procedures. To avoid such problems, the University of Pittsburgh gives new graduates a checklist for securely closing down their accounts.
Bobby the Fish
Fish morning, humans.
Again and again. Every time this cat organizes fishing attacks, using such trivial baits. Does it really think I’ll fall for it like a 20 lb. “gold fish” caught on cookies? By the way, it is a happy end story what I can’t say about this monster’s plans.