Privacy Primer for Educators Melissa Dark Center for Education and Research in Information Assurance and Security (CERIAS) Purdue University

Slides:



Advertisements
Similar presentations
Leon County Schools Teacher Website Guidelines
Advertisements

Providing protection from potential security threats that exist for any internet-connected computer is termed e- security. It is important to be able to.
FERPA - Sharing Student Information
Protect Our Students Protect Ourselves
Cyber Stalking Cyber Stalking Phishing Hacker 1. Never reveal your home address !!! This rule is especially important for women who are business professionals.
FERPA for Students What Every MSU Student Should Know Prepared by the Office of the Registrar.
Today’s Schools face:  Numerous State and Federal Regulations  Reduced Technology Funding  More Stringent Guidelines for Technology Use.
FERPA What You Need to Know as a Wayne State Student Prepared by the Office of the Registrar.
IS3350 Security Issues in Legal Context
Christian Vargas. Also known as Data Privacy or Data Protection Is the relationship between collection and spreading or exposing data and information.
Introducing K12Planet.com What is K12Planet.com? Who can access it? Is it secure? What do I need to use it? Can I control the information I see?
Chapter 9: Privacy, Crime, and Security
ICAICT202A - Work and communicate effectively in an IT environment
THE WONDERFUL HISTORY OF COMPUTERS FROM THE BEGINNING HARDWARE, SOFTWARE,SAFTEY, AND COMPUTER ETHICS.
Privacy and Encryption The threat of privacy due to the sale of sensitive personal information on the internet Definition of anonymity and how it is abused.
“Internet” and “Operator” (COPPA Statute) InternetOperator Collectively the myriad of computer and telecommunications facilities, including equipment.
Information Security Boot Camp: Survival Techniques for Teaching Teachers and Students Information Security Basics Melissa Dark K-12 Outreach Coordinator.
Mattson Middle School One to One Laptop Program September 26, 2012.
FERPA Family Educational Rights and Privacy Act and Rebecca Macon Registrar University of Georgia Presentation for GASFAA October.
C4- Social, Legal, and Ethical Issues in the Digital Firm
Basics, Encryption, Passwords, and SPAM Presenter: Melissa Dark CERIAS, Purdue University.
Computer Programming I
ESCCO Data Security Training David Dixon September 2014.
Internet Security for Small & Medium Business Week 6
KET ENCYCLOMEDIA STUDENT ACCOUNT CHANGES
Identity Theft  IDENTITY THEFT occurs when someone wrongfully acquires and uses a consumer’s personal identification, credit, or account information.
Component 4: Introduction to Information and Computer Science Unit 2: Internet and the World Wide Web 1 Component 4/Unit 2Health IT Workforce Curriculum.
How Hospitals Protect Your Health Information. Your Health Information Privacy Rights You can ask to see or get a copy of your medical record and other.
ENCRYPTION Team 2.0 Pamela Dornan, Thomas Malone, David Kotar, Nayan Thakker, and Eddie Gallon.
Technology in the Bellingham School District. Bellingham School District Network §Connectivity §Communication §Research Practice Responsible Use.
Chapter 8 Browsing and Searching the Web. Browsing and Searching the Web FAQs: – What’s a Web page? – What’s a URL? – How does a browser work? – How do.
FERPA: What you Need to Know The Family Educational Rights and Privacy Act & SEI.
Phishing scams Phishing is the fraudulent practice of sending s purporting to be from reputable companies in order to induce individuals to reveal.
ETHICAL ISSUES SURROUND ELECTRONIC COMMUNICATIONS Unit 3.
What are the rules? Information technology is available to every student, faculty and staff member in support of the essential mission of the University.
Family Educational Rights and Privacy Act (FERPA) UNION COLLEGE.
KYLE GEORGE JULY 3 RD 2014 EDU-384. DO NOT SHARE ANY PERSONAL INFORMATION ONLINE: NAME, ADDRESS, CITY, STATE OR PHONE NUMBER SOCIAL SECURTIY NUMBER ANY.
Security, Social and Legal Issues Regarding Software and Internet.
CYBERLAW Cyberlaw Meets Family Law: The Children’s Online Privacy Protection Act of 1998 (COPPA) Class of Nov. 11, 2002 Professor Susanna Fischer.
Privacy and Educators Developed by Rurik Rory-Nakerud Graduate School of Education Portland State University Updated July, 2014.
Special Education 101 Elementary Dept. Chair 1/27/2009 Confidentiality.
October 21, 2008 Jennifer Q.; Loriane M., Michelle E., Charles H. Internet Safety.
Promoting safe and healthy ways of using the internet in the classroom Ms. Sherman.
ONE® Pages Training Presentation North York General Hospital.
 Make a list of things you did today. From the time you got up until now.  Who you talked to? How you communicated?  What you did before you came to.
Ethical and Legal Issues Information Systems 337 Prof. Harry Plantinga.
DATA ACCURACY- one of the issues of computer ethics. Providing inaccurate data input results in erroneous information & decision making. Information on.
LESSON 5-2 Protecting Your Computer Lesson Contents Protecting Your Computer Best Practices for Securing Online and Network Transactions Measures for Securing.
1 Law, Ethical Impacts, and Internet Security. 2 Legal Issues vs. Ethical Issues Ethics — the branch of philosophy that deals with what is considered.
Introduction: Introduction: As technology advances, we have cheaper and easier ways to stay connected to the world around us. We are able to order almost.
An Overview of Legislation and Board Policy. Federal Legislation (CIPA, COPPA) WCPSS Board of Education ◦ Policy 2313, 3013, and 4013 Federally Mandated.
Security and Privacy. What is Information Security?  Refers to the protection of Data, Programs, and Information stored on disks, networks, hard drives,
Issues for Computer Users, Electronic Devices, Computer and Safety.
Top Ten Ways to Protect Privacy Online -Abdul M. Look for privacy policies on Web Sites  Web sites can collect a lot of information about your visit.
Data Breach ALICAP, the District Insurance Provider, is Now Offering Data Breach Coverage as Part of Our Blanket Coverage Package 1.
POLICIES & PROCEDURES FOR HANDLING CONFIDENTIAL INFORMATION NOVEMBER 5 TH 2015.
Properly Safeguarding Personally Identifiable Information (PII) Ticket Program Manager (TPM) Social Security’s Ticket to Work Program.
Acceptable Use Policy (Draft)
Security, Social and Legal Issues Regarding Software and Internet
Information Security.
Legal and Ethical Issues in E-Commerce
KET ENCYCLOMEDIA STUDENT ACCOUNT CHANGES
Teaching Internet Safety
Component 4: Introduction to Information and Computer Science Unit 2: Internet and the World Wide Web Lecture 4 This material was developed by Oregon.
ONE® Pages Training Presentation
How to manage the Electronic Signature Process
Computer Programming I
Prepared by the Office of the Registrar
To the ETS – Accounts Setup and Preferences Online Training Course
Family Educational Rights and Privacy Act of 1974
Presentation transcript:

Privacy Primer for Educators Melissa Dark Center for Education and Research in Information Assurance and Security (CERIAS) Purdue University

What is Privacy? The ability to control the degree to which people and institutions impinge upon one’s life. Hildreth & Hoyt, 1981 The right claimed by an individual to control the disclosure of personal information about themselves. Adams, 2000

Describe your privacy expectations of your: –Bank –Doctor –Government Officials –Clergy Do we expect this same level of professionalism from our schools?

–Junk Mail –Phone Calls From Telemarketers –Online Surveys – SPAM –Grocery Savings Cards –Security Cameras –Cell Phone Tampering –Phone Logs –Workplace Surveillance What is the common factor that unites these items?

Is privacy really that important? In 1993, MacWorld launched an investigation surrounding the ability of unauthorized users to obtain information from celebrities. This information was all obtained in a legal and ethical manner.

For $112 per celebrity....they found: Through online solicitation and searches, the editors were able to obtain the following information on individuals: birth date home address home phone social security number neighbors address/phone drivers record (including physical characteristics) marriage record voter registration information biographical information tax liens campaign contributions vehicles owned real estate owned commercial loans/debts civil court filings corporate ties (CQ Researcher, 1993).

Collection of Children’s Information 1999 Survey: 16 million children ---14% of US citizens under the age of 18 regularly use the Internet. (1999) Study conducted by Cai and Gantz (2000) indicated that the majority of Web sites targeted at children collect personal information from their under-age users. Children also readily provide personal data in return for a “great prize” (Carlson, 2000)

Why is Privacy Important for Teachers? Federal law mandates that teachers protect the information they gather and record regarding their students (National Center for Education Statistics, 1998). –FERPA –COPPA –Supreme Court Decisions Failure to do so could result in personal and professional liability.

Privacy Practices—Common Law 1.Information should not be conveyed to other teachers/administrators unless the motive is to enhance performance. 2.Pupil information should be transmitted only upon request. 3.Records should be released only if there is a statutory requirement or the pupil/parents request the release.

Privacy Legislation for Educators Family Educational Rights and Privacy Act, 1974 (FERPA): Requires that educators demonstrate “due diligence” in protecting student data, information, records, and other sensitive information. Teachers can be personally held liable for failing to maintain the integrity of such data.

FERPA... Parents/guardians have a right to inspect all records. Record of access maintained regarding individuals examining the files. Appeals to contents are permitted. Records must be kept confidential—no release unless there is permission. Birth date, address, ss#, grades, test results, discipline records, attendance, health records, pictures, etc.

Unique Challenge of and Electronic Documents Teachers must demonstrate “due diligence” in protecting ALL records. Vulnerabilities: Open Network Connections Poor Password Selection/Protocol Lack of Encryption “naked”

Encryption (Enciphering sensitive information) Encoding information Secret Code Ring Cryptoquip Pig Latin *Most* common applications offer password protection. Confidential (not critical)---USE ENCRYPTION!!!! NEVER send HIGHLY SENSITIVE information through . ( should *never* be considered secure!)

PGP: Pretty Good Privacy (approx. $20 per unit) Requires use of Public Keys Sample PGP encrypted

Without the proper keys... the message is unreadable.

Sample Encrypted Document:

1.File / Save As 2.Click on TOOLS 3.Select GENERAL OPTIONS 4.Enter passwords Password Protecting Windows Documents

Practical Privacy Techniques for Teachers: 1.Practice Proper Information Security Techniques 2. Awareness 3.Use of Encryption 4.Download Precautions 5.Close the Cookie Jar 6.Read Privacy Statements 7.Set up a Second Online Account

Dissemination of Privacy Practices to Students: Fundamentals of protecting privacy is a “new” skill that schools should address (Willard, 2000) Privacy issues need to be embedded within the curriculum as readily as technical skills (FTC, 2001) Short lessons and natural teaching moments work well for identifying the topic. Teachers must serve as a role model for privacy protection practices.

Conclusion: As technology is introduced into schools, it is critical to combine the technical skills with the soft (ethical) skills surrounding the media. Attention needs to given to both teachers and students upon this topic. Teachers must practice privacy techniques daily---to protect the information and serve as a positive role model.

Excellent Resources: Stealth Surfing by Matt Lake: Follett Software Company: Privacy Sites: Make Your PC Hacker Proof by Jeff Sengstack: