WHAT YOU DON T KNOW CAN HURT YOU
|
|
|
- Anabel Hodge
- 10 years ago
- Views:
Transcription
1 WHAT YOU DON T KNOW CAN HURT YOU Beatriz Arnillas, Houston ISD Omar Khan, Common Sense Media HISD DEEPER LEARNING CULTIVATOR SOCIAL AND EMOTIONAL LEARNING FACILITATOR PERSONALIZED LEARNING ARCHITECT LITERACY DEVELOPER LIFELONG LEARNER DATA DRIVEN
2 School Practice Challenges Balance innovation and security Managing opt-outs, parental consent/notification Ease of signup/self disclosure Maintaining a central list of vetted educational online services Vendors and Online Service Challenge High rate of change Free like a puppy Contracts vs. click-wrap Hard to understand, validate and negotiate Regulation Challenges Gaps in interpretation (e.g. Education Record, Student Data) Gaps in coverage (FERPA, COPPA, PPRA, HIPAA, School vs. Vendor) HISD DEEPER LEARNING CULTIVATOR SOCIAL AND EMOTIONAL LEARNING FACILITATOR PERSONALIZED LEARNING ARCHITECT LITERACY DEVELOPER LIFELONG LEARNER DATA DRIVEN
3 CLOUD COMPUTING Benefit Leverage Learning analytics/adaptive capabilities Risk student data could be collected and used for inappropriate purposes (e.g. targeted marketing) Users access services over the Internet Potential data breach, or accidental data disclosure by users Rapid provisioning and deployment of new services Free services Ease of signing up lends itself to unregulated/unapproved use Gray area for vendors as school officials Cloud services are updated regularly Control over changes Changes to privacy policies and terms of service with consent/review Privacy related bugs introduced through new features Economies of scale/shared infrastructure Risks of shared infrastructure/database (Developed by Jim Siegl, Fairfax Co. Public Schools) HISD GLOBAL GRADUATE 3
4 CLOUD MODELS Private: District hosted SIS, LMS Contracted: Microsoft Office 365, Google Apps, Textbooks, iready, or dedicated hosting Operating Systems, App Stores: Apple, Google, Microsoft School Free (and clear): No non-educational data collection Freemium +: Free for user/class use with fee for school/district use, or security (e.g. Edmodo, TypingClub) Free with a catch: Ads or data collection (data brokers) Identity Ecosystems: Sign-in with Facebook, Twitter, Google, Microsoft, Yahoo Extended Social Networks: Like buttons, social commenting End-User (Developed by Jim Siegl, Fairfax Co. Public Schools) HISD GLOBAL GRADUATE 4
5 HISD PRACTICES Educate Social Media Statement: Raise awareness using rubric Manage (control) Google Domain O365 Domain Reduce options (supported apps) PD Partnerships Contracts and DSA Are We Overregulating Student Data Privacy? (Ed Surge) HISD GLOBAL GRADUATE 5
6 HISD RUBRIC Security: Encryption in Transit Privacy Policy and Terms of Use Account creation, data collected, data minimization, supportability, product ownership, account deletion practices Student Safety: Boundaries, Public Sharing, Contact & Privacy Controls Advertising: General and Behavioral HISD GLOBAL GRADUATE 6
7 DEVELOPING EFFORTS HISD GLOBAL GRADUATE 7
8 ROLL-OVER RATINGS AND RECOMMENDATION POP-UPS HISD GLOBAL GRADUATE
9 HOUSTON ISD CYBER SAFETY PAGE HISD GLOBAL GRADUATE
10 SUPPORTING APPS TO CONTROL APPS USAGE HISD GLOBAL GRADUATE
11 Student Privacy Ratings: The Need Privacy a growing challenge to Edtech adoption student privacy bills pending in states - About a dozen active state bills based on CSM s SOPIPA covering large proportion of school kids - Risk of misguided legislation that doesn t address the real issues and stifles innovation Pressure from parents, schools, districts who want to protect kids privacy - We already serve both parents and teachers Vendor changes and responses - to press coverage, e.g. ClassDojo - with Privacy Pledges and certification solutions No existing privacy rubric on edtech products for use by districts, schools, vendors, parents - neither for education nor consumer 11
12 District-Driven Common Sense Privacy Ratings Initiative Goal: Provide a clear privacy rating to inform districts, schools, teachers and parents about an app s privacy and data security policies on Graphite In collaboration with major school districts and key thought leaders and privacy experts, we are developing a comprehensive privacy checklist and process - Detailed info to districts to make decisions based on their own policies - Districts to share key info to support each other - Houston ISD and Fairfax, VA key players Working with vendors to secure support and compliance Creative Commons licensed to spur adoption Representing ~3M students Beta Testing March-August - Presentations to SIIA, Council of Chief School Superintendents, Council of Great City Schools, Texas COSN, ISTE, privacy/security experts and others to gather input and build base of support - Many vendors to go through 12 12
13 Common Sense Comprehensive Privacy Evaluation An open source rubric protected under Creative Commons license Five Key Checklist Elements: A. PRIVACY B. SECURITY C. SAFETY & SOCIAL MEDIA D. ADVERTISING & CONSUMERISM E. LEGAL COMPLIANCE (COPPA, FERPA) Access: Send an to or with your username on Graphite and we will enable for you 13
14 Common Sense Comprehensive Privacy Evaluation: Step 1 STEP 1 STEP 1a Archive Policy in Database STEP 1b (ongoing) Check links against most recent database version STEP 1c Transparent Map Policy Terms to Evaluation Sections Map Policy Terms to Changed Sections Not Transparent Term may change Vendor/District Common Sense Kicks off process with entry of key info Teachers/Students/Schools Common Sense Community Completes Transparency Evaluation, addresses issues to vendor for response in time frame. Common Sense Community Updated Privacy Policy forces a revision putting the current rating on hold. STEP 2 Steps can be done simultaneously ( e.g. Step 1 and Step 5) although it is preferable to start with Step 1 14
15 Common Sense Comprehensive Privacy Evaluation: Steps 2-6 STEP 2 C H E C K L I S T C H E C K L I S T If we or districts are satisfied, rating is given based on evaluation after Step 3, 4 or 5 STEP 3 STEP 4 as needed STEP 5 as needed F U L L R E V I E W F U L L R E V I E W STEP 6 Privacy Review & Rating Published on Graphite Live Rating via Graphite API No Issues Found Think Twice Not Safe Vendor Common Sense Community Fills out evaluation on Graphite for their product, a well- explained checklist. Can be done together with Step 1 or afterwards. Common Sense Community Manually reviews info before it goes live. Checks if any District review/issues w/ App. Contact vendor as needed. Common Sense approves publication of rating. Reviewing District (as needed) Takes the App from prioritized pool and performs full review or as requested by community. Uses District Handbook. District CIO Staff Third Party Co. (as needed) For enterprise apps, 3 rd party review paid directly to firm..? - If App passes the District Review it would receive a badge of some sort - Other certifications can also be included 15
16 Common Sense Privacy Ratings Launch Timeline Developer/District Pilot Program Pressure test rubric checklist and with vendors and districts entering data on Graphite. NOT public (behind private vendor/selected district logins) Q2/3 15 Q3 15 Announce with key partners at ISTE Build district review model and rate up to 1,000 Apps Q4 15 Q1 16 Public Launch Q Questions? Want to Join? or or 16
17 FUTURE OF PRIVACY FORUM Brenda Leong, Senior Counsel and Director of Operations or or Follow @julespolonetsky
18 NEXT STEPS HISD GLOBAL GRADUATE
19 HISD GLOBAL GRADUATE 19
20 HISD GLOBAL GRADUATE 20
21 HISD GLOBAL GRADUATE 21
22 HISD GLOBAL GRADUATE 22
CLOUD COMPUTING AND PRIVACY CURRENT PRACTICES IN FAIRFAX COUNTY PUBLIC SCHOOLS
CLOUD COMPUTING AND PRIVACY CURRENT PRACTICES IN FAIRFAX COUNTY PUBLIC SCHOOLS JCOTS Committee Meeting November 18, 2014 Jim Siegl Technology Architect Fairfax County Public Schools AGENDA Cloud Computing
Cloud Computing and Privacy Toolkit. Protecting Privacy Online. May 2016 CLOUD COMPUTING AND PRIVACY TOOLKIT 1
Cloud Computing and Privacy Toolkit Protecting Privacy Online May 2016 CLOUD COMPUTING AND PRIVACY TOOLKIT 1 Table of Contents ABOUT THIS TOOLKIT... 4 What is this Toolkit?... 4 Purpose of this Toolkit...
Improving Ed-Tech Purchasing
Improving Ed-Tech Purchasing Identifying the key obstacles and potential solutions for the discovery and acquisition of K-12 personalized learning tools Table of Contents 1. An Overview 2. What Have We
Social Application Guide
Social Application Guide Version 2.2.0 Mar 2015 This document is intent to use for our following Magento Extensions Or any other cases it might help. Copyright 2015 LitExtension.com. All Rights Reserved
NCSU SSO. Case Study
NCSU SSO Case Study 2 2 NCSU Project Requirements and Goals NCSU Operating Environment Provide support for a number Apps and Programs Different vendors have their authentication databases End users must
The SparkWeave Private Cloud & Secure Collaboration Suite. Core Features
The SparkWeave Private Cloud & Secure Collaboration Suite The SparkWeave Private Cloud is a virtual platform hosted in the customer s data center. SparkWeave is storage agnostic, autonomously providing
Utilizing big data to bring about innovative offerings and new revenue streams DATA-DERIVED GROWTH
Utilizing big data to bring about innovative offerings and new revenue streams DATA-DERIVED GROWTH ACTIONABLE INTELLIGENCE Ericsson is driving the development of actionable intelligence within all aspects
The SparkWeave Private Cloud & Secure Collaboration Suite. Core Features
The SparkWeave Private Cloud & Secure Collaboration Suite The SparkWeave Private Cloud is a virtual platform hosted in the customer s data center, completely independent from the physical storage hardware,
The Baltimore County Public Schools 2015-2019 Technology Plan
2015-2019 Technology Plan Prepared by: The Department of Information Technology Plan Origination Date: March 2014 Plan Updated April 2015 Version 2.0 The guiding document of Baltimore County Public Schools
Subject: Overview of Information Technology Services and the Strategic Technology Plan. Proposed Committee Action No Action Required Information Only.
AGENDA ITEM: IV Florida Polytechnic University Board of Trustees Technology Committee Subject: Overview of Information Technology Services and the Strategic Technology Plan Proposed Committee Action No
PRIVACY POLICY. Your Personal Information will be processed by Whistle Sports in the United States.
PRIVACY POLICY This Policy was last changed on March 31, 2015. Kids Sports Entertainment, Inc. d/b/a The Whistle ( Whistle Sports ) and its affiliates operate this website, and any and all Whistle Sports
Lessons from the field: Implementing Information Governance and Records Management with Microsoft SharePoint
Lessons from the field: Implementing Information Governance and Records Management with Microsoft SharePoint Veli-Matti Vanamo - Principal Consultant at Ignia - 12 Year SharePoint Veteran (there should
Contracting with a Cloud Service Provider DATA PROTECTION WORKSHOP NJERI OLWENY, MICROSOFT
Contracting with a Cloud Service Provider DATA PROTECTION WORKSHOP NJERI OLWENY, MICROSOFT Overview Cloud computing offers great opportunities for organizations, including schools, hospitals and businesses
Going Google... with Gaggle!!!!
Going Google... with Gaggle!!!! Challenges of "Going Google" WRPS had been using Gaggle.net for student email. We were pleased with the filtering and notification- Google did not provide this level of
Outline of Session 12/2/2013. Social Media & Government Legal and Ethical Issues. Part 1 - Legal Issues More Questions than Answers?
Social Media & Government Legal and Ethical Issues Indiana Legal & Ethics Conference December 4, 2013 Presented by: Julie A. Tappendorf Ancel Glink, Chicago Outline of Session Part 1 Legal Issues with
1. Understanding Big Data
Big Data and its Real Impact on Your Security & Privacy Framework: A Pragmatic Overview Erik Luysterborg Partner, Deloitte EMEA Data Protection & Privacy leader Prague, SCCE, March 22 nd 2016 1. 2016 Deloitte
HOUSTON ISD INSTRUCTIONAL TECHNOLOGY Where learning meets the future
Digital Content Integration 101, Interoperability for Dummies LTI, Common Cartridge, Single Sign-On (SSO) or Links. When to use which? I. Why integrate? Teachers and students have encountered significant
GETS AIRWATCH MDM HANDBOOK
GETS AIRWATCH MDM HANDBOOK October 2014 Abstract Using AirWatch, a mobile device management tool, within the public sector. GTA Product and Services Group EXECUTIVE SUMMARY.. 2 INTRODUCTION TO THE GETS
SIF 3: A NEW BEGINNING
SIF 3: A NEW BEGINNING The SIF Implementation Specification Defines common data formats and rules of interaction and architecture, and is made up of two parts: SIF Infrastructure Implementation Specification
Apple Deployment Programs Apple ID for Students: Parent Guide
Apple Deployment Programs Apple ID for Students: Parent Guide As a parent or guardian, you want the best learning environment for your student. One that makes learning relevant for each student and allows
1. The information we collect and how we collect it.
PRIVACY POLICY AND YOUR PRIVACY RIGHTS CountySportsZone.com aggregates, reports, and publishes high school sports information for jurisdictions across the state of Maryland. In this Privacy Policy, Affiliates
The Changing Shape of Leadership
May 2002 Volume 59 Number 8 Beyond Instructional Leadership Pages 61-63 The Changing Shape of Leadership The Annenberg Institute for School Reform's work with principals, superintendents, and other educators
THE MOBILE MAJORITY: BUILDING PRIVACY BY DESIGN INTO MOBILE APPS
THE MOBILE MAJORITY: BUILDING PRIVACY BY DESIGN INTO MOBILE APPS Clarissa Cerda, EVP, Chief Legal Officer and Secretary, LifeLock Kimberly Cilke, CIPP/US Deputy General Counsel, GoDaddy.com Timothy Sparapani
Realizing the Value Proposition of Cloud Computing
Realizing the Value Proposition of Cloud Computing CIO s Enterprise IT Strategy for Cloud Jitendra Pal Thethi Abstract Cloud Computing is a model for provisioning and consuming IT capabilities on a need
GET IN NOW Step 2: Add Users
GET IN NOW Step 2: Add Users 1. Match My Email User Roles During the set-up of Match My Email Lite, a MME account is created. The individual whose credentials are used to create an account becomes the
Data Security and Identity Management
Data Security and Identity Management Leading Change Data Pre-Conference June 16, 2014 Ed Jung Chief Technology Officer Arizona Department of Education DATA SECURITY Are you prepared Likelihood of a data
EMA Radar for Application Discovery and Dependency Mapping (ADDM): Q4 2013. AppEnsure Profile
EMA Radar for Application Discovery and Dependency Mapping (ADDM): Q4 2013 By Dennis Drogseth, VP of Research ENTERPRISE MANAGEMENT ASSOCIATES (EMA ) Radar Report December 2013 AppEnsure Introduction Santa
European Commission initiatives on e- and mhealth
European Commission initiatives on e- and mhealth Fundamental Rights Forum, 22 June 2016 WG 24: E-health: improving rights fulfilment through innovation Claudia Prettner, Unit for Health and Well-Being,
Privacy and Online Behavioral Advertising
Event hashtag: #truste2011 TRUSTe Research In partnership with Harris Interactive 2011 Consumer Research Results Privacy and Online Behavioral Advertising July 25, 2011 1 Welcome: TRUSTe Overview Mission:
BRING YOUR OWN DEVICES:
BRING YOUR OWN DEVICES: OPPORTUNITIES AND CHALLENGES Corin Richards, Administrator for Instructional Technology Beaverton School District Rebekah Jacobson, Attorney Garrett Hemann Robertson P.C. Agenda
Architecture, Implementations, Integrations, and Technical Overview
Architecture, Implementations, Integrations, and Technical Overview Introduction System Architecture & Infrastructure Implementation Parent Portal Medical Center Strategy Integrations SIS Immunization
Open Cloud Alliance. Choice and Control for the Cloud. Open Cloud Alliance
Choice and Control for the Cloud Open Cloud Alliance Concept and Strategy Date: November 11, 2014 The Cloud from the Consumer's Perspective Cloud computing benefits, challenges and demands from end user
Public Sector Chief Information Officer Council
Report to Public Sector Chief Information Officer Council White Paper on a Pan Canadian Opportunities for Collaboration Project Goal Two Report: Outline and Approach Draft v1.0 Submitted by: Stuart Culbertson
Making the Transition. From ISV to SaaS. with Xterity Wholesale Cloud
Making the Transition From ISV to SaaS with Xterity Wholesale Cloud CONTENTS: 1 The New Business Model...Page 3 2 Business Challenges...Page 5 3 Technology Challenges...Page 7 4 Xterity Wholesale Cloud...Page
SOCIAL MEDIA POLICY. Introduction
Introduction Throughout this Policy, the words Translink Company and/or the Group refer to all corporate entities under the ownership of the Northern Ireland Transport Holding Company (NITHC). This includes
Virginia Government Finance Officers Association Spring Conference May 28, 2014. Cloud Security 101
Virginia Government Finance Officers Association Spring Conference May 28, 2014 Cloud Security 101 Presenters: John Montoro, RealTime Accounting Solutions Ted Brown, Network Alliance Presenters John Montoro
THE CANVAS LMS RECOMMENDATION
THE CANVAS LMS RECOMMENDATION Presented on: January 11, 2013 Prepared by: John Farquhar EXECUTIVE SUMMARY A pilot of the Canvas Learning Platform involving Western faculty, students and support staff,
HIPAA CRITICAL AREAS TECHNICAL SECURITY FOCUS FOR CLOUD DEPLOYMENT
HIPAA CRITICAL AREAS TECHNICAL SECURITY FOCUS FOR CLOUD DEPLOYMENT A Review List This paper was put together with Security in mind, ISO, and HIPAA, for guidance as you move into a cloud deployment Dr.
Leveraging Business to Consumer Learning for Marketing, Training, and Support of Customers
Leveraging Business to Consumer Learning for Marketing, Training, and Support of Customers Developed by rapidld Steve Owens Vice President, Consulting Fall, 2013 2013 Rapid Learning Deployment, LLC B2C
CLOUD COMPUTING ISSUES FOR SCHOOL DISTRICTS. Presented to the 2013 BRADLEY F. KIDDER LAW CONFERENCE. October 2, 2013
CLOUD COMPUTING ISSUES FOR SCHOOL DISTRICTS Presented to the 2013 BRADLEY F. KIDDER LAW CONFERENCE October 2, 2013 By: Diane M. Gorrow Soule, Leslie, Kidder, Sayward & Loughman, P.L.L.C. 220 Main Street
The Business Case for Cloud: Critical Legal, Business & Diligence Considerations
The Business Case for Cloud: Critical Legal, Business & Diligence Considerations Presented by Janine Anthony Bowen, Esq., CIPP/US [email protected] (678) 823-6611 Janine Anthony Bowen, Esq., CIPP/US
Effective Early Literacy Support in Philadelphia Promoting Early Literacy Inside and Outside of the Classroom
Effective Early Literacy Support in Philadelphia Promoting Early Literacy Inside and Outside of the Classroom Rodney Johnson Director of Early Literacy Jill Valunas Children s Literacy Initiative Anchor
PwC Cybersecurity Briefing
www.pwc.com/cybersecurity Cybersecurity Briefing June 25, 2014 The views expressed in these slides are solely the views of the presenters and do not necessarily reflect the views of the PCAOB, the members
WILLSBORO CSD Instructional Technology Plan - Annually - 2015
LEA Information A. LEA Information 1. What is the total student enrollment based on the most recent BEDS Day submission? 2. 249 What is the student enrollment by grade band based on the latest BEDS Day
The downturn and the cloud..challenge and solution?
The downturn and the cloud..challenge and solution? Dr Adrian Davis, MBCS, CITP Head, Leadership and Management Group Information Security Forum Research and Services Team What the ISF provides for its
Adobe Digital Publishing Security FAQ
Adobe Digital Publishing Suite Security FAQ Adobe Digital Publishing Security FAQ Table of contents DPS Security Overview Network Service Topology Folio ProducerService Network Diagram Fulfillment Server
GOVERNMENT USE OF MOBILE TECHNOLOGY
GOVERNMENT USE OF MOBILE TECHNOLOGY Barriers, Opportunities, and Gap Analysis DECEMBER 2012 Product of the Digital Services Advisory Group and Federal Chief Information Officers Council Contents Introduction...
ITP 140 Mobile Technologies. Mobile Topics
ITP 140 Mobile Technologies Mobile Topics Topics Analytics APIs RESTful Facebook Twitter Google Cloud Web Hosting 2 Reach We need users! The number of users who try our apps Retention The number of users
Certified Secure Computer User
Certified Secure Computer User Exam Info Exam Name CSCU (112-12) Exam Credit Towards Certification Certified Secure Computer User (CSCU). Students need to pass the online EC-Council exam to receive the
Facebook Smart Card FB 121211_1800
Facebook Smart Card FB 121211_1800 Social Networks - Do s and Don ts Only establish and maintain connections with people you know and trust. Review your connections often. Assume that ANYONE can see any
APPLICATION OF CLOUD COMPUTING IN EDUCATION. Achmad Benny Mutiara [email protected]
APPLICATION OF CLOUD COMPUTING IN EDUCATION Achmad Benny Mutiara [email protected] OUTLINE: WHAT IS CLOUD COMPUTING?? HISTORY WHY CLOUD COMPUTING??? PROPERTIES OF CLOUD COMPUTING TYPES OF
Mobile Value-added Services (VAS) in the Cloud: Security Challenges, Market Opportunities and Forecasts 2013-2018
Brochure More information from http://www.researchandmarkets.com/reports/2566687/ Mobile Value-added Services (VAS) in the Cloud: Security Challenges, Market Opportunities and Forecasts 2013-2018 Description:
2015 NMSBA SCHOOL LAW CONFERENCE
2015 NMSBA SCHOOL LAW CONFERENCE NETWORK SECURITY, DISTRICT POLICIES ON INTERNET USE, AND THE LAW Andrew M. Sanchez David A. Richter Cuddy & McCarthy, LLP 1 FEDERAL LAWS The Family Educational Rights and
CLOUD COMPUTING. A Primer
CLOUD COMPUTING A Primer A Mix of Voices The incredible shrinking CIO CIO Magazine, 2004 IT Doesn t Matter, The cloud will ship service outside the institution and ship power from central IT groups to
Executive s Guide to Cloud Access Security Brokers
Executive s Guide to Cloud Access Security Brokers Contents Executive s Guide to Cloud Access Security Brokers Contributor: Amy Newman 2 2 Why You Need a Cloud Access Security Broker 5 You Can t Achieve
Cloud-based business innovation, transformation, and the future of enterprise IT
Cloud-based business innovation, transformation, and the future of enterprise IT Professor Marco Iansiti David Sarnoff Professor of Business Administration Harvard Business School May 3, 2011 Copyright
Software as a Service (SaaS) Requirements
Introduction Software as a Service (SaaS) Requirements Software as a Service (SaaS) is a software service model where an application is hosted as a service provided to customers across the Internet. By
Canvas Mid-Semester Report. Prepared by: Penn State Information Technology Services (ITS) and World Campus. April 2015
Canvas Mid-Semester Report Prepared by: Penn State Information Technology Services (ITS) and World Campus April 2015 Executive Summary: The Learning Management System (LMS) Team has been asked to pilot
MANAGING THE GLOBAL INTERNET ECONOMY: A NEW CHALLENGE FOR THE US AND JAPAN
MANAGING THE GLOBAL INTERNET ECONOMY: A NEW CHALLENGE FOR THE US AND JAPAN Jim Foster, Executive Director Keio International Center for the internet & society WHAT IS THE INTERNET? A global technology
03/06/2014. Bring Your Own Device: A Framework for Audit. Acknowledgement
Bring Your Own Device: A Framework for Audit Emily A Knopp, CPA, CISA Audit Director Angelo State University, Member of Texas Tech University System March 6, 2014 Texas Association of College of University
ON THE SAME PAGE EFFECTIVE IMPLEMENTATION OF COLLEGE- AND CAREER-READY STANDARDS THROUGH LABOR-MANAGEMENT COLLABORATION
TM ON THE SAME PAGE EFFECTIVE IMPLEMENTATION OF COLLEGE- AND CAREER-READY STANDARDS THROUGH LABOR-MANAGEMENT COLLABORATION This publication has been adapted from Assessing Implementation of the Common
New York State Education Department Instructional technology plan survey
The instructional technology plan survey is designed to allow districts the opportunity to compile all data related to their technology planning and needs in one location. The data collected in the survey
