A LETTER TO PARENTSNational Opt-Out Campaign Informs Parents How to Protect the Privacy of their Children's School RecordsDate Captured | Tuesday September 20, 2011 04:53 PM | Parents have rights under the Family Educational Rights Privacy Act (FERPA) to restrict access to their children's personal information. |
|
Achievement Gap |
ApplicationsPRIVACY ON THE GO: RECOMMENDATIONS FOR THE MOBILE ECOSYSTEMDate Captured | Saturday January 12, 2013 07:18 AM | Kamala D. Harris, Attorney General; California Department of Justice. Privacy on the Go recommends a “surprise minimization” approach. This approach means supplementing the general privacy policy with enhanced measures to alert users and give them control over data practices that are not related to an app’s basic functionality or that involve sensitive information |
|
“Mobile Apps for Kids: Disclosures Still Not Making the Grade"Date Captured | Thursday December 13, 2012 12:18 PM | FTC: The report strongly urges all entities in the mobile app industry – including app stores, app developers, and third parties providing services within the apps – to accelerate efforts to ensure that parents have the key information they need to make decisions about the apps they download for their children. The report also urges industry to implement recommendations in the recent FTC Privacy Report including:
Incorporating privacy protections into the design of mobile products and services;
Offering parents easy-to-understand choices about the data collection and sharing through kids’ apps; and
Providing greater transparency about how data is collected, used, and shared through kids’ apps. |
|
Smartphones and the 2012 ElectionDate Captured | Tuesday August 14, 2012 10:38 AM | EPIC has released a report, "Smartphones and the 2012 Election," which focuses on the potential risks to voters who download election-related apps to their smartphones and tablets. The report contends that these apps promote greater citizen participation in e-democracy, but also may contain malware, disseminate false information --- or, as was recently reported about an Obama campaign app, compromise voter privacy by making voters' personal and locational information widely available. A recent study by the University of Pennsylvania's Annenberg School for Communication revealed that voters are ambivalent about "personalized" political advertising, a practice likely to increase with the number of election and political apps available for download. EPIC's report also examines the role of federal and state regulation in protecting voters and providing guidance to campaigns, and recommends actions that voters, election administrators, and campaigns can take to better protect voter privacy. |
|
Big Data"Big Data and the Future of Privacy" Date Captured | Monday April 07, 2014 11:09 AM | EPIC comments to the White House on topic. |
|
BlogsMISSOURI EDUCATION WATCHDOGDate Captured | Thursday February 02, 2012 11:25 AM | |
|
The Smart Grid and PrivacyDate Captured | Sunday February 21, 2010 07:14 PM | Concerning Privacy and Smart Grid Technology |
|
Electronic Privacy Information Center (EPIC)Date Captured | Wednesday February 25, 2009 03:27 PM | EPIC is a public interest research center in Washington, D.C. It was established in 1994 to focus public attention on emerging civil liberties issues and to protect privacy, the First Amendment, and constitutional values.
EPIC publishes an award-winning e-mail and online newsletter on civil liberties in the information age – the EPIC Alert. EPIC also publishes reports and even books about privacy, open government, free speech, and other important topics related to civil liberties.
|
|
Legal Guide for Bloggers - Electronic Frontier Foundation - EFFDate Captured | Saturday February 14, 2009 01:51 AM | EFF- [Like all journalists and publishers, bloggers sometimes publish information that other people don't want published. You might, for example, publish something that someone considers defamatory, republish an AP news story that's under copyright, or write a lengthy piece detailing the alleged crimes of a candidate for public office.
The difference between you and the reporter at your local newspaper is that in many cases, you may not have the benefit of training or resources to help you determine whether what you're doing is legal. And on top of that, sometimes knowing the law doesn't help - in many cases it was written for traditional journalists, and the courts haven't yet decided how it applies to bloggers.]
|
|
Matt Blaze's EXHAUSTIVE SEARCH Date Captured | Sunday December 28, 2008 03:21 PM | Cryptography blog and links to research. University of Pennsylvania.
Matt bio excerpt [I coined the term, and am one of the inventors of, Trust Management, which provides the abstract layer in which a system decides whether to allow some potentially dangerous action. This work has led to two trust management languages, KeyNote and PolicyMaker, that provide tools for specifying policy, delegating authority, and controlling access. In addition to providing a useful framework for studying and proving security properties of distributed systems, our tools have been used to build powerful policy control mechanisms into several important applications, including the OpenBSD IPSEC implementation.]
|
|
DeeplinksDate Captured | Tuesday December 16, 2008 06:21 PM | Electronic Frontier Foundation (EFF) -- Noteworthy news from around the internet.
|
|
Surveillance State blogDate Captured | Sunday December 14, 2008 09:42 PM | Christopher Soghoian, a student fellow at Harvard University's Berkman Center for Internet and Society and PhD candidate at Indiana University's School of Informatics. |
|
Privacy LivesDate Captured | Friday December 12, 2008 06:15 PM | Melissa Ngo -- more than a blog -- lots of policy and topic specific archives. |
|
Multi-State Information Sharing and Analysis Center Date Captured | Wednesday December 03, 2008 07:16 PM | Digital Dashboard |
|
Tech Daily DoseDate Captured | Wednesday December 03, 2008 05:12 PM | Congress Watch -- National Journal's portal to politics and policy online |
|
Pogowasright.orgDate Captured | Wednesday December 03, 2008 04:37 PM | Privacy news, data breaches, and privacy-related events and resources from around the world.
|
|
BreachesEducation Breaches 2013Date Captured | Friday December 06, 2013 10:00 AM | |
|
Privacy Rights ClearinghouseDate Captured | Thursday March 12, 2009 02:45 PM | Chronology of Data Breaches and lots more. Nice upgrade to website.
|
|
Children Privacy |
Database StateDate Captured | Wednesday March 19, 2014 04:55 PM | The report assesses 46 databases across the major government departments (UK) |
|
Civil LibertiesThe Center for Democracy and Technology Date Captured | Monday June 02, 2008 03:34 PM | The Center for Democracy and Technology is a non-profit public interest organization working to keep the Internet open, innovative, and free. As a civil liberties group with expertise in law, technology, and policy, CDT works to enhance free expression and privacy in communications technologies by finding practical and innovative solutions to public policy challenges while protecting civil liberties. CDT is dedicated to building consensus among all parties interested in the future of the Internet and other new communications media.
|
|
Civil RightsRevealing New Truths About Our Nation's SchoolsDate Captured | Tuesday March 06, 2012 05:54 PM | CRDC makes public long-hidden data about which students are suspended, expelled, and arrested in school. |
|
Cloud ComputingCPO on Privacy, Emerging Technologies, and New Uses of DataDate Captured | Sunday February 10, 2013 06:35 PM | US ED CPO STYLES: Colleges, universities, and other postsecondary institutions often have research agendas that involve data; they often have medical facilities; and most importantly, colleges and universities often function as change agents, particularly for technological and social change. The combination of new technologies and new uses of data create today’s cutting-edge privacy issues, including “Big Data,” matching with wage data, data sharing in general, the use of analytics, cloud computing, MOOCs, and school use of web engagemen |
|
IN THE CLOUDDate Captured | Wednesday February 06, 2013 02:14 PM | News & policy about the CLOUD. Check paper archives. Updated regularly. |
|
SPOTLIGHT ON CLOUD COMPUTING: IF IN THE CLOUD, GET IT ON PAPER: CLOUD COMPUTING CONTRACT ISSUESDate Captured | Friday February 01, 2013 11:30 PM | SPOTLIGHT ON CLOUD COMPUTING: IF IT'S IN THE CLOUD, GET IT EDUCAUSE WEBINAR ON CLOUD COMPUTING CONTRACT ISSUES
Friday, December 10, 2010
Author(s) Thomas Trappler (UCLA)
Source(s) EDUCAUSE Live! Webinars, Webinars |
|
FERPA and the Cloud: What FERPA Can Learn from HIPAADate Captured | Tuesday December 18, 2012 07:01 AM | SOLOVE: Parents need to look at what their schools are doing about student privacy and speak up, because the law isn’t protecting their children’s privacy.
School officials who want to develop a more meaningful and robust protection of privacy should talk to government officials who are tasked with complying with HIPAA. They can learn a lot from studying HIPAA and following some of its requirements.
Congress should remake FERPA more in the model of HIPAA. If Congress won’t act, state legislatures should pass better education privacy laws.
Because FERPA does not provide adequate oversight and enforcement of cloud computing providers, schools must be especially aggressive and assume the responsibility. Otherwise, their students’ data will not be adequately protected. School officials shouldn’t assume that the law is providing regulation of cloud computing providers and that they need not worry. The law isn’t, so right now the schools need to be especially vigilant. |
|
FERPA and the Cloud: Why FERPA Desperately Needs ReformDate Captured | Tuesday December 11, 2012 06:51 AM | SOLOVE: Parents should lobby Congress and their state legislatures to pass laws providing better protections of their children’s data. This is an issue that should be of great concern to parents since educational institutions possess a staggering amount of personal data about students, and this data can currently be outsourced to nearly any company anywhere – even to a cloud computing provider in the most totalitarian country in the world! |
|
Common Core |
GAO: States Have Made Progress in Implementing New Standards and Assessments but Challenges RemainDate Captured | Monday December 15, 2014 08:24 AM | What is known about states' implementation of college- and career-ready standards?
2. What key considerations are states facing as they implement assessments aligned to college- and career-ready standards?
3. How does Education plan to oversee statewide assessments, and how has it overseen the Assessment Program?
GAO is not making recommendations. |
|
Tell Gov Cuomo to Fix NY SchoolsDate Captured | Thursday August 01, 2013 05:46 PM | PLEASE SIGN PETITION |
|
|
|
Race to the Top Reform Flow ChartDate Captured | Saturday September 29, 2012 10:04 AM | |
|
Common RuleThe Belmont ReportDate Captured | Monday November 24, 2014 10:57 AM | Belmont Report does not make specific recommendations for administrative action by the Secretary of Health, Education, and Welfare. Rather, the Commission recommended that the Belmont Report be adopted in its entirety, as a statement of the Department's policy.
|
|
World Privacy Forum comments Big Data StudyDate Captured | Thursday November 20, 2014 01:52 PM | The World Privacy Forum’s recent public comments to the White House regarding Big Data focus on using a foundation of Fair Information Principles to address issues connected to bias, error, and privacy regarding big data as applied to vulnerable populations. The comments also discuss large medical research data sets, and stress the importance of applying the Common Rule in any human subjects research, in particular, identifiable data. The benefits of analysis using large data sets need to be maintained while resolving problems raised in analysis of vulnerable populations. Pam Dixon & Bob Gellman |
|
Consumer ProtectionData Brokers – Is Consumers’ Information SecureDate Captured | Friday November 13, 2015 09:27 AM | Ms. Pam Dixon; Executive Director -World Privacy Forum before Subcommittee on Privacy, Technology and the Law, Date: Tuesday, November 3, 2015;
Time: 02:30 PM;
Location: Dirksen Senate Office Building 226;
Presiding: Chairman Flake |
|
COPPA |
16 C.F.R. Part 312: Children’s Online Privacy Protection Rule: Final Rule Amendments(COPPA)Date Captured | Wednesday December 19, 2012 01:15 PM | 16 C.F.R. Part 312: Children’s Online Privacy Protection Rule: Final Rule Amendments – Consistent With the Requirements of the Children’s Online Privacy Protection Act – To Clarify the Scope of the Rule and Strengthen Its Protections For Children’s Personal Information |
|
The Need for Privacy Protections: Perspectives from the Administration & FTCDate Captured | Tuesday May 29, 2012 09:08 AM | FTC May 9, 2012 testimony before the Committee on Commerce, Science & Transportation; US Senate |
|
Mobile Apps for Kids: Current Privacy Disclosures Are DisappointingDate Captured | Thursday February 16, 2012 11:10 AM | FTC staff report: Parents should be able to learn, before downloading an app for their children, what data will be collected, how the data will be used, and who will obtain access to the data. |
|
Current law & proposed legislationNY Assembly bill A.8474 same as NY Senate bill S.2357BDate Captured | Monday January 23, 2012 12:38 PM | Requires active parental consent to release personal and sensitive information (categorized as directory information under FERPA) about students. This bill passed the NY Senate 62-0 in the 2011 session. It has been sponsored & reintroduced in the Assembly by Assemblywoman Linda Rosenthal & in the Senate by Sen. Suzi Oppenheimer for the 2012 legislative session.
|
|
APPENDIX A: FERPA Guidance for Reasonable Methods and Written AgreementsDate Captured | Thursday January 05, 2012 05:57 PM | FERPA represents the floor for protecting [student] privacy, not the ceiling. PAGE A-5 Federal Register/Vol. 76, No. 232/Friday, December 2, 2011/Rules and Regulations. |
|
Cyber BullyingNew York’s Definitive Cyberbullying CensusDate Captured | Thursday June 14, 2012 08:20 AM | |
|
Cyber SecurityINFORMATION POLICY WATCH - EMERGING TRENDS & THREATSDate Captured | Friday January 25, 2013 09:13 AM | JANUARY 2013 |
|
Data BrokerData Brokers – Is Consumers’ Information SecureDate Captured | Friday November 13, 2015 09:27 AM | Ms. Pam Dixon; Executive Director -World Privacy Forum before Subcommittee on Privacy, Technology and the Law, Date: Tuesday, November 3, 2015;
Time: 02:30 PM;
Location: Dirksen Senate Office Building 226;
Presiding: Chairman Flake |
|
What Information Do Data Brokers Have on Consumers, and How Do They Use It?Date Captured | Saturday December 21, 2013 10:31 AM | Chairman John D. (Jay) Rockefeller IV today announced the U.S. Senate Committee on Commerce, Science, and Transportation will hold a hearing on Wednesday, December 18, 2013, at 2:30 p.m. to examine the data broker industry and how industry practices may impact consumers. The hearing comes after a yearlong Commerce Committee examination of how data brokers collect, compile, and sell consumer information for marketing purposes.
In October 2012, Rockefeller launched an investigation into the data broker industry to give consumers a better understanding of how their personal information is handled, issuing information requests to nine representative data brokers. Rockefeller sent an additional set of inquiries in September 2013 to twelve popular personal finance, health, and family-focused websites to further explore data broker information collection practices, and further expanded the investigation in October 2013 by requesting that Experian provide specific information about the company’s customer vetting practices following news reports alleging that an Experian subsidiary sold data to an identity theft scheme. |
|
Testimony of Pam Dixon Executive Director, World Privacy Forum Before the Senate Committee on Commerce, Science, and Transportation What Information Do Data Brokers Have on Consumers, and How Do They Use It?Date Captured | Saturday December 21, 2013 09:13 AM | The data broker industry has not shown restraint. Nothing is out of bounds. No list is too obnoxious to sell. Data brokers sell lists that allow for the use of racial, ethnic and other factors that would be illegal or unacceptable in other circumstances. These lists and scores are used everyday to make decisions about how consumers can participate in the economic marketplace. Their information determines who gets in and who gets shut out. All of this must change. I urge you to take action.
|
|
A Review of the Data Broker Industry: Collection, Use, and Sale of Consumer Data for Marketing PurposesDate Captured | Saturday December 21, 2013 08:45 AM | STAFF REPORT FOR CHAIRMAN ROCKEFELLER; DECEMBER 18, 2013; This Committee inquiry has been conducted at a time when sources of consumer data and
technological capabilities for storage and speedy analysis of data continue to expand. As data
brokers are creating increasingly detailed dossiers on millions of consumers, it is important for
policymakers to continue vigorous oversight to assess the potential harms and benefits of
evolving industry practices and to make sure appropriate consumer protections are in place. |
|
FTC to Study Data Broker Industry’s Collection and Use of Consumer DataDate Captured | Tuesday December 18, 2012 01:44 PM | The nine data brokers receiving orders from the FTC are: 1) Acxiom, 2) Corelogic, 3) Datalogix, 4) eBureau, 5) ID Analytics, 6) Intelius, 7) Peekyou, 8) Rapleaf, and 9) Recorded Future. The FTC is seeking details about:
the nature and sources of the consumer information the data brokers collect;
how they use, maintain, and disseminate the information; and
the extent to which the data brokers allow consumers to access and correct their information or to opt out of having their personal information sold. |
|
Protecting Consumer Privacy in an Era of Rapid Change: A Proposed Framework for Businesses and PolicymakersDate Captured | Monday March 26, 2012 11:16 AM | The final report calls on companies handling consumer data to implement recommendations for protecting privacy, including:
Privacy by Design - companies should build in consumers' privacy protections at every stage in developing their products. These include reasonable security for consumer data, limited collection and retention of such data, and reasonable procedures to promote data accuracy;
Simplified Choice for Businesses and Consumers - companies should give consumers the option to decide what information is shared about them, and with whom. This should include a Do-Not-Track mechanism that would provide a simple, easy way for consumers to control the tracking of their online activities.
Greater Transparency - companies should disclose details about their collection and use of consumers' information, and provide consumers access to the data collected about them. *****Data Brokers - The Commission calls on data brokers to make their operations more transparent by creating a centralized website to identify themselves, and to disclose how they collect and use consumer data. In addition, the website should detail the choices that data brokers provide consumers about their own information. |
|
Data MiningStatus of the Department of Education’s Inventory of Its Data CollectionsDate Captured | Saturday August 03, 2013 08:32 AM | 1. What information will the inventory of Education’s data collections contain and when will the inventory be completed?
2. What process is Education using to catalog its data collections, and to what extent does that process include internal controls to ensure the accuracy of the information collected?
3. What are Education’s plans to make its data collection inventory publicly available? |
|
Deidentification |
Case Study #5: Minimizing Access to PII: Best Practices for Access Controls and Disclosure Avoidance Techniques (Oct 2012)Date Captured | Thursday November 27, 2014 07:14 AM | is case study illustrates best practices for minimizing access to sensitive information with education data maintained in a Statewide Longitudinal Data System. |
|
Data De-identification: An Overview of Basic TermsDate Captured | Wednesday January 16, 2013 01:35 PM | PTAC-GL, Oct 2012: In addition to defining and clarifying the distinction among several key terms, the paper provides
general best practice suggestions regarding data de-identification strategies for different types of
data. The information is presented in the form of an alphabetized list of definitions, followed at the
end by additional resources on FERPA requirements and statistical techniques that can be used to
protect student data against disclosures |
|
Directory InformationProposed Part 121 Regulation for Protecting PII in Educational AgenciesDate Captured | Sunday March 31, 2019 08:11 PM | March 31, 2019
Proposed Part 121 Regulation for Protecting PII in Educational Agencies
Commentary by Sheila Kaplan, Founder, Education New York |
|
|
Data Brokers – Is Consumers’ Information SecureDate Captured | Friday November 13, 2015 09:27 AM | Ms. Pam Dixon; Executive Director -World Privacy Forum before Subcommittee on Privacy, Technology and the Law, Date: Tuesday, November 3, 2015;
Time: 02:30 PM;
Location: Dirksen Senate Office Building 226;
Presiding: Chairman Flake |
|
Hearing on “How Emerging Technology Affects Student Privacy" Date Captured | Monday February 16, 2015 12:24 PM | United States House of Representatives
114th Congress, 1st Session;
Committee on Education and the Workforce
Subcommittee on Early Childhood, Elementary
and Secondary Education
Hearing on
“How Emerging Technology Affects Student Privacy"
February 12, 2015
Statement of Joel R. Reidenberg
Stanley D. and Nikki Waxberg Chair and Professor of Law
Founding Academic Director, Center on Law and Information Policy
Fordham University
New York, NY
Good morning Chairman Rokita, Ranking Member Fudge and distinguished |
|
Opt-Out 2014: Protect Children videoDate Captured | Tuesday August 12, 2014 06:39 PM | |
|
Opt-Out 2014: Protect ChildrenDate Captured | Tuesday August 12, 2014 06:10 PM | |
|
Testimony of Pam Dixon Executive Director, World Privacy Forum Before the Senate Committee on Commerce, Science, and Transportation What Information Do Data Brokers Have on Consumers, and How Do They Use It?Date Captured | Saturday December 21, 2013 09:13 AM | The data broker industry has not shown restraint. Nothing is out of bounds. No list is too obnoxious to sell. Data brokers sell lists that allow for the use of racial, ethnic and other factors that would be illegal or unacceptable in other circumstances. These lists and scores are used everyday to make decisions about how consumers can participate in the economic marketplace. Their information determines who gets in and who gets shut out. All of this must change. I urge you to take action.
|
|
OPT-OUT NOW Press ReleaseDate Captured | Tuesday September 10, 2013 08:25 AM | |
|
Model State Law: Student Privacy Protection Act Date Captured | Tuesday December 25, 2012 08:36 AM | This Act shall be known and cited as the “Student Privacy Protection Act.” This Act shall be liberally and remedially construed to effectuate its purpose. The purpose of the Act is to protect the privacy of students by establishing standards for the disclosure of directory information about students by schools. |
|
EquitySection 5: Enabling Access and Effective UseDate Captured | Wednesday December 23, 2015 08:45 AM | Goal: All students and educators will have access to a robust and comprehensive infrastructure when and where they need it for learning. |
|
|
European UnionReconciling Personal Information in the United States and European Union Date Captured | Thursday June 27, 2013 04:16 PM | Paul M. Schwartz,
University of California, Berkeley - School of Law;
Daniel J. Solove,
George Washington University Law School;
May 3, 2013 |
|
Fair Information PracticeINFORMATION RESELLERS Consumer Privacy Framework Needs to Reflect Changes in Technology and the MarketplaceDate Captured | Thursday November 21, 2013 02:23 PM | What GAO Recommends:
Congress should consider strengthening the consumer privacy framework to reflect the effects of changes in technology and the increased market for consumer information. Any changes should seek to provide consumers with appropriate privacy protections without unduly inhibiting commerce and innovation. The Department of Commerce agreed that strengthened privacy protections could better protect consumers |
|
FERPAProposed Part 121 Regulation for Protecting PII in Educational AgenciesDate Captured | Sunday March 31, 2019 08:11 PM | March 31, 2019
Proposed Part 121 Regulation for Protecting PII in Educational Agencies
Commentary by Sheila Kaplan, Founder, Education New York |
|
|
|
Protecting Student Privacy in Research ProjectsDate Captured | Saturday April 04, 2015 04:26 PM | While a great deal of attention has been paid recently to protecting the privacy of students’ personal information and education records, families and educators also need to be aware of the use and disclosure of students‘ personal information in research conducted by universities and other entities.
|
|
Hearing on “How Emerging Technology Affects Student Privacy" Date Captured | Monday February 16, 2015 12:24 PM | United States House of Representatives
114th Congress, 1st Session;
Committee on Education and the Workforce
Subcommittee on Early Childhood, Elementary
and Secondary Education
Hearing on
“How Emerging Technology Affects Student Privacy"
February 12, 2015
Statement of Joel R. Reidenberg
Stanley D. and Nikki Waxberg Chair and Professor of Law
Founding Academic Director, Center on Law and Information Policy
Fordham University
New York, NY
Good morning Chairman Rokita, Ranking Member Fudge and distinguished |
|
|
|
|
Opt-Out 2014: Protect ChildrenDate Captured | Tuesday August 12, 2014 06:10 PM | |
|
FERPA Exceptions SummaryDate Captured | Monday April 14, 2014 09:03 AM | |
|
|
|
|
|
EPIC letter to CongressDate Captured | Friday October 11, 2013 06:12 PM | |
|
OPT-OUT NOW Press ReleaseDate Captured | Tuesday September 10, 2013 08:25 AM | |
|
EPIC v US ED Reply Date Captured | Wednesday March 06, 2013 12:02 PM | 2/15/13 |
|
EPIC vs US ED replyDate Captured | Friday February 22, 2013 09:30 AM | |
|
|
EPIC V US ED Defendant Statement of ISSUESDate Captured | Tuesday February 05, 2013 11:26 AM | |
|
EPIC v US EDDate Captured | Tuesday February 05, 2013 11:05 AM | ORDERED that Defendant’s Motion is GRANTED, and further
ORDERED that Plaintiffs’ Cross-Motion is DENIED, and further
ORDERED that Plaintiffs’ Complaint is DISMISSED for lack of subject matter jurisdiction. |
|
EPIC v US ED Date Captured | Monday January 21, 2013 01:46 PM | PLAINTIFFS’ CROSS-MOTION FOR SUMMARY JUDGMENT AND MEMORANDUM
OPPOSING DEFENDANT’S MOTION TO DISMISS AND MOTION FOR SUMMARY
JUDGMENT |
|
‘‘Uninterrupted Scholars Act (USA)Date Captured | Wednesday January 16, 2013 02:01 PM | Amends FERPA: ‘‘(L) an agency caseworker or other representative of a
State or local child welfare agency, or tribal organization (as
defined in section 4 of the Indian Self-Determination and Education
Assistance Act (25 U.S.C. 450b)), who has the right
to access a student’s case plan, |
|
Data De-identification: An Overview of Basic TermsDate Captured | Wednesday January 16, 2013 01:35 PM | PTAC-GL, Oct 2012: In addition to defining and clarifying the distinction among several key terms, the paper provides
general best practice suggestions regarding data de-identification strategies for different types of
data. The information is presented in the form of an alphabetized list of definitions, followed at the
end by additional resources on FERPA requirements and statistical techniques that can be used to
protect student data against disclosures |
|
DECEMBER 2011 – REVISED FERPA REGULATIONS: AN OVERVIEW FOR PARENTS AND STUDENTSDate Captured | Monday November 12, 2012 11:00 AM | It is important for schools to have directory information policies, as schools may not do even mundane activities (such as publishing yearbooks or creating graduation programs) without having designated the items about the students contained in the publications as directory information. For example, without a directory information policy, FERPA would require schools to obtain consent for every student every time it wants to publish a yearbook. However, many schools have been forgoing designations of directory information, as they have concluded that such designations would put students at risk of becoming targets of marketing campaigns, the media, or even victims of criminal acts |
|
EPIC v US EDDate Captured | Wednesday August 22, 2012 11:54 PM | PLAINTIFFS’ REPLY MOTION TO DEFENDANT’S OPPOSITION TO PLAINTIFFS’
MOTION TO SUPPLEMENT THE ADMINISTRATIVE RECORD AND CONSIDER
EXTRA-RECORD EVIDENCE |
|
EPIC v US ED : MOTION TO SUPPLEMENT THE ADMINISTRATIVE RECORD AND CONSIDER EXTRA-RECORD EVIDENCEDate Captured | Monday July 23, 2012 06:23 PM | EPIC’S MOTION TO SUPPLEMENT THE ADMINISTRATIVE RECORD AND
CONSIDER EXTRA-RECORD EVIDENCE |
|
EPIC v US ED (US ED answer) Date Captured | Friday May 04, 2012 02:53 PM | |
|
SHARED LEARNING INFRASTRUCTURE AND FERPA Date Captured | Wednesday April 25, 2012 04:02 PM | |
|
|
EPIC v US Department of EducationDate Captured | Thursday March 01, 2012 09:08 AM | EPIC has filed a lawsuit under the Administrative Procedure Act against the Department of Education. EPIC's lawsuit argues that the agency's December 2011 regulations amending the Family Educational Rights and Privacy Act exceed the agency's statutory authority, and are contrary to law. The agency issued the revised regulations despite the fact that “numerous commenters . . . believe the Department lacks the statutory authority to promulgate the proposed regulations." |
|
NY Assembly bill A.8474 same as NY Senate bill S.2357BDate Captured | Monday January 23, 2012 12:38 PM | Requires active parental consent to release personal and sensitive information (categorized as directory information under FERPA) about students. This bill passed the NY Senate 62-0 in the 2011 session. It has been sponsored & reintroduced in the Assembly by Assemblywoman Linda Rosenthal & in the Senate by Sen. Suzi Oppenheimer for the 2012 legislative session.
|
|
APPENDIX A: FERPA Guidance for Reasonable Methods and Written AgreementsDate Captured | Thursday January 05, 2012 05:57 PM | FERPA represents the floor for protecting [student] privacy, not the ceiling. PAGE A-5 Federal Register/Vol. 76, No. 232/Friday, December 2, 2011/Rules and Regulations. |
|
DEPARTMENT OF EDUCATION 34 CFR Part 99 in the Federal Register (76 FR 19726)Date Captured | Monday December 05, 2011 11:20 AM | SUMMARY: The Secretary of Education
(Secretary) amends the regulations
implementing section 444 of the General
Education Provisions Act (GEPA),
which is commonly referred to as the
Family Educational Rights and Privacy
Act (FERPA). These amendments are
needed to ensure that the U.S.
Department of Education (Department
or we) continues to implement FERPA
in a way that protects the privacy of
education records while allowing for the
effective use of data. Improved access to
data will facilitate States’ ability to
evaluate education programs, to ensure
limited resources are invested
effectively, to build upon what works
and discard what does not, to increase
accountability and transparency, and to
contribute to a culture of innovation and
continuous improvement in education.
|
|
National Opt-Out Campaign Informs Parents How to Protect the Privacy of their Children's School RecordsDate Captured | Tuesday September 20, 2011 04:53 PM | Parents have rights under the Family Educational Rights Privacy Act (FERPA) to restrict access to their children's personal information. |
|
FTC CONSUMER ALERT: Protecting Your Child's Personal Information at SchoolDate Captured | Friday September 02, 2011 06:10 PM | [Ask your child's school about its directory information policy. Student directory information can include your child's name, address, date of birth, telephone number, email address, and photo. FERPA requires schools to notify parents and guardians about their school directory policy, and give you the right to opt-out of the release of directory information to third parties. It's best to put your request in writing and keep a copy for your files. If you don't opt-out, directory information may be available not only to the people in your child's class and school, but also to the general public.]
|
|
Education New York comments re Student Privacy submitted to FERPA NPRM - May 23, 2011Date Captured | Monday May 23, 2011 09:22 PM | Document ID: ED-2011-OM-0002-0001: Family Educational Rights and Privacy. The proposed changes to FERPA do not adequately address the capacity of marketers
and other commercial enterprises to capture, use, and re-sell student information. Even
with privacy controls in place, it is also far too easy for individuals to get a hold of
student information and use it for illegal purposes, including identity theft, child
abduction in custody battles, and domestic violence. Few parents are aware, for
example, that anyone can request -- and receive -- a student directory from a school.
Data and information breaches occur every day in Pre-K-20 schools across the country,
so that protecting student privacy has become a matter of plugging holes in a dyke
rather than advancing a comprehensive policy that makes student privacy protection
the priority.
|
|
Schools Selling Students' Personal InformationDate Captured | Wednesday October 06, 2010 03:17 PM | Link to stories about schools selling student information |
|
Freedom of Information (FOI)NYS Department of State Committee on Open GovernmentDate Captured | Saturday February 14, 2009 01:43 AM | The Committee on Open Government is responsible for overseeing and advising with regard to the Freedom of Information, Open Meetings and Personal Privacy Protection Laws (Public Officers Law, Articles 6, 7 and 6-A respectively). |
|
Freedom of Information (FOI)Date Captured | Saturday December 06, 2008 05:12 PM | Links to FOI sites. |
|
FTC“Mobile Apps for Kids: Disclosures Still Not Making the Grade"Date Captured | Thursday December 13, 2012 12:18 PM | FTC: The report strongly urges all entities in the mobile app industry – including app stores, app developers, and third parties providing services within the apps – to accelerate efforts to ensure that parents have the key information they need to make decisions about the apps they download for their children. The report also urges industry to implement recommendations in the recent FTC Privacy Report including:
Incorporating privacy protections into the design of mobile products and services;
Offering parents easy-to-understand choices about the data collection and sharing through kids’ apps; and
Providing greater transparency about how data is collected, used, and shared through kids’ apps. |
|
Future Ready |
|
Identity TheftID THEFT RESOURCESDate Captured | Friday February 01, 2013 08:50 PM | |
|
InfrastructureSection 5: Enabling Access and Effective UseDate Captured | Wednesday December 23, 2015 08:45 AM | Goal: All students and educators will have access to a robust and comprehensive infrastructure when and where they need it for learning. |
|
|
iotThe Internet of Things: Privacy and Security in a Connected WorldDate Captured | Tuesday January 27, 2015 09:14 AM | Federal Trade Commission Staff Report On the November 2013 Workshop |
|
IRBProtecting Student Privacy in Research ProjectsDate Captured | Saturday April 04, 2015 04:26 PM | While a great deal of attention has been paid recently to protecting the privacy of students’ personal information and education records, families and educators also need to be aware of the use and disclosure of students‘ personal information in research conducted by universities and other entities.
|
|
Three Bad Ideas in the Consumer Privacy Bill of RightsDate Captured | Friday March 06, 2015 05:12 PM | Bob Gellman |
|
Lettter to IRB Date Captured | Sunday December 07, 2014 08:53 AM | |
|
The Belmont ReportDate Captured | Monday November 24, 2014 10:57 AM | Belmont Report does not make specific recommendations for administrative action by the Secretary of Health, Education, and Welfare. Rather, the Commission recommended that the Belmont Report be adopted in its entirety, as a statement of the Department's policy.
|
|
World Privacy Forum comments Big Data StudyDate Captured | Thursday November 20, 2014 01:52 PM | The World Privacy Forum’s recent public comments to the White House regarding Big Data focus on using a foundation of Fair Information Principles to address issues connected to bias, error, and privacy regarding big data as applied to vulnerable populations. The comments also discuss large medical research data sets, and stress the importance of applying the Common Rule in any human subjects research, in particular, identifiable data. The benefits of analysis using large data sets need to be maintained while resolving problems raised in analysis of vulnerable populations. Pam Dixon & Bob Gellman |
|
Learning Registry |
LegislationNYSSBA Opposition to S.2357/A.8474Date Captured | Friday June 22, 2012 02:09 PM | |
|
Longitudinal DatabaseChallenges in Matching Student and Worker Information Raise Concerns about Longitudinal Data SystemsDate Captured | Wednesday July 15, 2015 07:29 AM | EDUCATION AND WORKFORCE DATA
Challenges in Matching Student and Worker Information Raise Concerns about Longitudinal Data Systems
Report to the Chairman, Committee on Health, Education, Labor, and Pensions, U.S. Senate
November 2014
GAO-15-27
United States Government Accountability Office |
|
How Much Data Is Enough Data? What happens to privacy when bureaucracies exceed their scopeDate Captured | Thursday October 18, 2012 04:38 PM | The following is a detailed account of Oklahoma’s P20 Council (that organization dedicated to the collection of “educational data” as prescribed by the Obama Administration through development of a State Longitudinal Data System (SLDS))- their operation, goals and function in the state of Oklahoma. This is, in fact, very important information, as EVERY STATE IN THE UNION is to have a similar council. Not all SLDS development groups are called, P20 (which stands for pre-K to 20 years of age – the time span over which this data is to be collected and accrued). Some other acronyms are P12, P20 Workforce and SLDS. |
|
Pivotal Role of Policymakers as Leaders of P–20/Workforce Data GovernanceDate Captured | Friday September 21, 2012 01:40 PM | Outlines the actions policymakers can take to effectively develop and lead P–20W data governance and ensure that data systems meet stakeholder needs. |
|
MOOCCPO on Privacy, Emerging Technologies, and New Uses of DataDate Captured | Sunday February 10, 2013 06:35 PM | US ED CPO STYLES: Colleges, universities, and other postsecondary institutions often have research agendas that involve data; they often have medical facilities; and most importantly, colleges and universities often function as change agents, particularly for technological and social change. The combination of new technologies and new uses of data create today’s cutting-edge privacy issues, including “Big Data,” matching with wage data, data sharing in general, the use of analytics, cloud computing, MOOCs, and school use of web engagemen |
|
What Campus Leaders Need to Know About MOOCsDate Captured | Friday February 08, 2013 12:59 PM | |
|
MOOC ALERTDate Captured | Wednesday February 06, 2013 02:09 PM | MOOCs are MASSIVE OPEN ONLINE COURSES |
|
What Campus Leaders Need to Know About MOOCsDate Captured | Friday February 01, 2013 10:42 PM | An EDUCAUSE Executive Briefing on MASSIVE OPEN ONLINE COURSES (MOOCs) |
|
NYS Education DepartmentSUNY NYSED regsDate Captured | Sunday March 31, 2019 08:37 PM | The State University of New York (“SUNY”) has reviewed the Department’s proposed regulations adding a new Part 121 to Title 8 NYCRR in relation to protecting students’ personally identifiable information |
|
Opt-OutOpt-Out 2014: Protect Children videoDate Captured | Tuesday August 12, 2014 06:39 PM | |
|
Opt-Out 2014: Protect ChildrenDate Captured | Tuesday August 12, 2014 06:10 PM | |
|
OPT-OUT NOW Press ReleaseDate Captured | Tuesday September 10, 2013 08:25 AM | |
|
OPT-OUT PROTECT KIDS braceletsDate Captured | Tuesday January 01, 2013 12:23 PM | FREE! |
|
OPT-OUT PROTECT KIDSDate Captured | Sunday December 30, 2012 03:21 PM | |
|
Model State Law: Student Privacy Protection Act Date Captured | Tuesday December 25, 2012 08:36 AM | This Act shall be known and cited as the “Student Privacy Protection Act.” This Act shall be liberally and remedially construed to effectuate its purpose. The purpose of the Act is to protect the privacy of students by establishing standards for the disclosure of directory information about students by schools. |
|
DECEMBER 2011 – REVISED FERPA REGULATIONS: AN OVERVIEW FOR PARENTS AND STUDENTSDate Captured | Monday November 12, 2012 11:00 AM | It is important for schools to have directory information policies, as schools may not do even mundane activities (such as publishing yearbooks or creating graduation programs) without having designated the items about the students contained in the publications as directory information. For example, without a directory information policy, FERPA would require schools to obtain consent for every student every time it wants to publish a yearbook. However, many schools have been forgoing designations of directory information, as they have concluded that such designations would put students at risk of becoming targets of marketing campaigns, the media, or even victims of criminal acts |
|
Genetic Testing and Screening in the Age of Genomic MedicineDate Captured | Thursday October 18, 2012 08:38 AM | Most states, including New York, have added tests to their newborn screening panels without formal criteria or processes to guide them. Many commentators recommend that newborn screening programs form advisory committees composed of medical and laboratory professionals and community participants to establish criteria for screening tests and to review screening test panels and program outcomes. |
|
PPRA |
PrivacyPrivacy and Security Developments 2014 Issue 01Date Captured | Monday November 24, 2014 06:23 AM | Privacy and Security Developments is a periodic briefing of new cases, statutes, articles, books, resources, and other developments. It is authored by Professors Daniel J. Solove and Paul M. Schwartz. |
|
|
|
CPO for Education in NYDate Captured | Saturday March 29, 2014 10:24 AM | |
|
Chief Privacy Officer for Education ActDate Captured | Saturday August 24, 2013 04:18 PM | Version 2.1 |
|
Forensics WeeklyDate Captured | Thursday October 18, 2012 04:55 PM | |
|
Get Cocoon Daily Privacy NewsDate Captured | Saturday October 06, 2012 01:30 PM | Great resource. |
|
“The Right to Privacy” Date Captured | Saturday December 11, 2010 05:58 PM | Warren and Brandeis - Harvard Law Review. Vol. IV - December 15, 1890 - No. 5 [Recent inventions and business methods call attention to the next step which must be taken for the protection of the person, and for securing to the individual what Judge Cooley calls the right "to be let alone" [10] Instantaneous photographs and newspaper enterprise have invaded the sacred precincts of private and domestic life; and numerous mechanical devices threaten to make good the prediction that "what is whispered in the closet shall be proclaimed from the house-tops." For years there has been a feeling that the law must afford some remedy for the unauthorized circulation of portraits of private persons;[11] and the evil of invasion of privacy by the newspapers, long keenly felt, has been but recently discussed by an able writer.[12] The alleged facts of a somewhat notorious case brought before an inferior tribunal in New York a few months ago,[13] directly involved the consideration of the right of circulating portraits; and the question whether our law will recognize and protect the right to privacy in this and in other respects must soon come before our courts for consideration.]
|
|
Race to the Top (RttT)Tell Gov Cuomo to Fix NY SchoolsDate Captured | Thursday August 01, 2013 05:46 PM | PLEASE SIGN PETITION |
|
|
Race to the Top Reform Flow ChartDate Captured | Saturday September 29, 2012 10:04 AM | |
|
State and District Receipt of Recovery Act FundsDate Captured | Friday September 21, 2012 03:09 PM | A Report From Charting the Progress of Education Reform: An Evaluation of the Recovery Act’s Role;
SEPTEMBER 2012: The American Recovery and Reinvestment Act (ARRA or the Recovery Act) of 2009 provided an unprecedented level of funding designed to “stimulate the economy in the short-term and invest wisely, using these funds to improve schools, raise achievement, drive reforms and produce better results for children and young people for the long-term health of our nation.”1 The distribution of Recovery Act funds was intended to reflect these multiple goals. Nearly $97.4 billion were allocated to the U.S. Department of Education (ED), of which $70.6 billion were awarded by ED for primary and secondary (K-12) education through existing and new federal programs.2 These funds were distributed to states and districts using formulas based primarily on population and student poverty and through competitive grants.
In return for grants, Recovery Act recipients were required to commit to four core reforms or assurances:
1. Adopting rigorous college-ready and career-ready standards and high-quality assessments,
2. Establishing data systems and using data to improve performance,
3. Increasing educator effectiveness and the equitable distribution of effective educators, and
4. Turning around the lowest-performing schools. |
|
2010-11 Beta Growth Model for Educator Evaluation Technical Report Date Captured | Friday August 24, 2012 02:34 PM | 2010-11 Beta Growth Model
for Educator Evaluation
Technical Report
New York State Education Department |
|
New York Race to Top Budget SummaryDate Captured | Tuesday February 14, 2012 11:02 AM | |
|
Records ManagementInterPARESDate Captured | Sunday April 18, 2010 08:42 PM | [The International Research on Permanent Authentic Records in Electronic Systems (InterPARES) aims at developing the knowledge essential to the long-term preservation of authentic records created and/or maintained in digital form and providing the basis for standards, policies, strategies and plans of action capable of ensuring the longevity of such material and the ability of its users to trust its authenticity. InterPARES has developed in three phases:] |
|
Resource LinksKey Terms/Definitions in Privacy and ConfidentialityDate Captured | Thursday January 06, 2011 02:23 PM | American Statistical Association's Privacy and Confidentiality Committee |
|
New York State Consumer Protection Board (CPB)Date Captured | Friday December 26, 2008 05:07 PM | The Consumer Protection Board, established in 1970 by the New York State Legislature, is the State's top consumer watchdog and "think tank." The CPB's core mission is to protect New Yorkers by publicizing unscrupulous and questionable business practices and product recalls; conducting investigations and hearings; enforcing the "Do Not Call Law"; researching issues; developing legislation; creating consumer education programs and materials; responding to individual marketplace complaints by securing voluntary agreements; and, representing the interests of consumers before the Public Service Commission (PSC) and other State and federal agencies.
|
|
School Safety |
School-Prison-PipelineEDUCATION INTERRUPTED: The Growing Use of Suspensions in New York City’s Public SchoolsDate Captured | Thursday October 13, 2011 04:16 PM | This report analyzes 449,513 suspensions served by New York City students from 1999 to 2009 to draw
a picture of zero tolerance practices in the nation’s largest school district. The number of suspensions
served each school year has nearly doubled in a decade—even though the student population has
decreased over the same period—sending a clear message that public education is a reward for “good”
behavior, rather than a fundamental right. This section explains the methodology we used to analyze the
suspension data, and provides valuable background on zero tolerance discipline.
Section II provides an overview of New York City disciplinary policies and practices. It examines the ever-
increasing emphasis on out-of-class and out-of-school suspensions in New York City’s Discipline Code,
which governs student behavior. This section also analyzes the impact that NYPD school safety officers
have had on the increasing reliance on suspensions and arrests as primary disciplinary tools.
Section III analyzes 10 years of school discipline data in New York City, explaining the data behind our
conclusions. Finally, the report concludes with our recommendations for the DOE, as well as city and
state lawmakers.
|
|
Breaking Schools’ Rules: A Statewide Study of How School Discipline Relates to Students’ Success and Juvenile Justice InvolvementDate Captured | Tuesday August 02, 2011 10:09 AM | This report was prepared by the Council of State Governments Justice Center in
partnership with the Public Policy Research Institute at Texas A&M University.
Key findings in the report include the following:
1. Nearly six in ten public school students studied were suspended or expelled at least once between their seventh- and twelfth-grade school years.
2. African-American students and those with particular educational disabilities were disproportionately likely to be removed from the classroom for disciplinary reasons.
3. Students who were suspended and/or expelled, particularly those who were repeatedly disciplined, were more likely to be held back a grade or to drop out than were students not involved in the disciplinary system.
4. When a student was suspended or expelled, his or her likelihood of being involved in the juvenile justice system the subsequent year increased significantly.
5. Suspension and expulsion rates among schools—even those schools with similar student compositions and campus characteristics—varied significantly. |
|
SegregationPower Lines: Race, Class, a City and Its SchoolsDate Captured | Thursday December 24, 2015 05:37 PM | |
|
SLDSChallenges in Matching Student and Worker Information Raise Concerns about Longitudinal Data SystemsDate Captured | Wednesday July 15, 2015 07:29 AM | EDUCATION AND WORKFORCE DATA
Challenges in Matching Student and Worker Information Raise Concerns about Longitudinal Data Systems
Report to the Chairman, Committee on Health, Education, Labor, and Pensions, U.S. Senate
November 2014
GAO-15-27
United States Government Accountability Office |
|
Social Networking |
Privacy management on social media sitesDate Captured | Wednesday April 04, 2012 03:10 PM | Mary Madden Senior Research Specialist, Pew Internet Project: Most users choose restricted privacy settings while profile “pruning” and unfriending people is on the rise. |
|
ACLU: Social Networking, your privacy rights explainedDate Captured | Thursday March 08, 2012 09:05 AM | The vast majority of young people living in the United States go online daily and use social networking sites like Twitter, Facebook and YouTube. With all this information-sharing, many questions about ownership of personal information and possible discipline for postings arise. This guide will answer some of those questions so that you can better understand the rights you have when using social networking both in and out of school. |
|
FACEBOOK privacy policy link:Date Captured | Monday April 26, 2010 08:32 PM | Facebook’s Privacy Policy.
This policy contains eight sections:
1. Introduction;
2. Information We Receive;
3. Information You Share With Third Parties;
4. Sharing Information on Facebook;
5. How We Use Your Information;
6. How We Share Information;
7. How You Can View, Change, or Remove Information;
8. How We Protect Information;
9. Other Terms. |
|
Student Privacy Data Brokers – Is Consumers’ Information SecureDate Captured | Friday November 13, 2015 09:27 AM | Ms. Pam Dixon; Executive Director -World Privacy Forum before Subcommittee on Privacy, Technology and the Law, Date: Tuesday, November 3, 2015;
Time: 02:30 PM;
Location: Dirksen Senate Office Building 226;
Presiding: Chairman Flake |
|
Hearing on “How Emerging Technology Affects Student Privacy" Date Captured | Monday February 16, 2015 12:24 PM | United States House of Representatives
114th Congress, 1st Session;
Committee on Education and the Workforce
Subcommittee on Early Childhood, Elementary
and Secondary Education
Hearing on
“How Emerging Technology Affects Student Privacy"
February 12, 2015
Statement of Joel R. Reidenberg
Stanley D. and Nikki Waxberg Chair and Professor of Law
Founding Academic Director, Center on Law and Information Policy
Fordham University
New York, NY
Good morning Chairman Rokita, Ranking Member Fudge and distinguished |
|
Guide to Student Data PrivacyDate Captured | Thursday August 21, 2014 12:45 AM | |
|
Access Controls Over Student Information SystemsDate Captured | Tuesday August 19, 2014 01:28 PM | Final report - March 2014 -Employees in six upstate New York school districts had inappropriate computer access to sensitive student data and were able to change student grades and attendance records without proper authorization, according to an audit released by New York State Comptroller Thomas P. DiNapoli. |
|
“Using Data Safely and Effectively to Strengthen Student Performance”Date Captured | Thursday June 26, 2014 10:28 AM | Written Testimony of
Thomas C. Murray
State and District Digital Learning Director
Alliance for Excellent Education
Prepared for the
House Subcommittee on Cybersecurity, Infrastructure Protection, and Security Technologies
and
House Subcommittee on Early Childhood, Elementary, and Secondary Education
June 25, 2014 |
|
“How Data Mining Threatens Student Privacy”Date Captured | Thursday June 26, 2014 10:24 AM | Joyce Popp
Chief Information Officer
Idaho State Department of Education
June 25, 2014
“How Data Mining Threatens Student Privacy” |
|
“How Data Mining Threatens Student Privacy"Date Captured | Thursday June 26, 2014 10:19 AM | 1
United States House of Representatives
113th Congress, 2nd Session
Committee on Homeland Security
Subcommittee on Cybersecurity, Infrastructure Protection
and Security Technologies
and
Committee on Education and the Workforce
Subcommittee on Early Childhood, Elementary
and Secondary Education
Hearing on
“How Data Mining Threatens Student Privacy"
June 25, 2014
Statement of Joel R. Reidenberg
Stanley D. and Nikki Waxberg Chair and Professor of Law
Founding Academic Director, Center on Law and Information Policy
Fordham University
New York, NY |
|
“How Data Mining Threatens Student Privacy”Date Captured | Thursday June 26, 2014 07:49 AM | Prepared Statement of
Mark MacCarthy
Vice President, Public Policy
Software & Information Industry Association
Before the
Subcommittee on
Early Childhood, Elementary, and Secondary Education
Of the
Committee on Education and the Workforce
And the
Subcommittee on
Cybersecurity, Infrastructure Protection, and Security Technologies
Of the
Committee on Homeland Security
United States House of Representatives
On
“How Data Mining Threatens Student Privacy”
June 25, 2014 |
|
Database StateDate Captured | Wednesday March 19, 2014 04:55 PM | The report assesses 46 databases across the major government departments (UK) |
|
Children’s Databases Safety and Privacy A Report for the Information Commissioner Foundation for Information Policy ResearchDate Captured | Wednesday March 19, 2014 04:42 PM | The specific background to the project is the establishment recently of databases relating
to children across social services, education, crime and health. |
|
Teacher Evaluation2010-11 Beta Growth Model for Educator Evaluation Technical Report Date Captured | Friday August 24, 2012 02:34 PM | 2010-11 Beta Growth Model
for Educator Evaluation
Technical Report
New York State Education Department |
|
“Study of Promising Features of Teacher Preparation Programs”Date Captured | Tuesday August 14, 2012 03:59 PM | COMMENTS OF THE ELECTRONIC PRIVACY INFORMATION CENTER
to
THE INSTITUTE OF EDUCATION SCIENCES
of the
DEPARTMENT OF EDUCATION
Notice of New System of Records: For the foregoing reasons, the Education Department must revise its Privacy Act
notice for the Study of Promising Features of Teacher Preparation Programs to: (1) limit
the collection of student information to only that which is necessary and relevant; and (2)
clarify the circumstances under which it will disclose information pursuant to the routine
use exception. |
|
Technology |
Unfair and DeceptiveEducation Marketing Group/ECRA LAWSUIT RE: SALE OF STUDENT INFORMATIONDate Captured | Friday October 30, 2009 10:15 AM | Parties Subject to Order
ORDERED, ADJUDGED AND DECREED that this Consent Order and Judgment
shall extend to Student Marketing Group, Inc. (“SMG”) and Educational Research Center of
America, Inc. (“ERCA”), their successors, assignees, officers, agents, representatives, affiliates and
employees and any other person under their direction or control, whether acting individually or in
concert with others or through any corporate entity or device through which they may now or
hereafter act or conduct business (collectively “respondents”).
|
|
US Department of EducationEPIC v US ED (US ED answer) Date Captured | Friday May 04, 2012 02:53 PM | |
|
US Education Department |
|
EPIC v US ED : MOTION TO SUPPLEMENT THE ADMINISTRATIVE RECORD AND CONSIDER EXTRA-RECORD EVIDENCEDate Captured | Monday July 23, 2012 06:23 PM | EPIC’S MOTION TO SUPPLEMENT THE ADMINISTRATIVE RECORD AND
CONSIDER EXTRA-RECORD EVIDENCE |
|
Who Is Watching Your Children? |
It's 3PM: Who's Watching Your Children?Date Captured | Wednesday December 12, 2012 05:48 PM | Parents concerned about their children's privacy should be aware of how easily personally identifiable information can be bought and sold by marketers as well as by identity thieves.
FERPA was enacted in 1974 to protect the privacy of education records and directory information -- including name, address, phone number, date of birth, and e-mail address, among other personally identifiable information. Parents should be aware that under FERPA, directory information can be disclosed without parental consent. If you do not opt-out of directory information personal and identifiable information about your children may be public. |
|