Edtech Solutions
Network Summit

Alexa and Hand Scans and Student Privacy, Oh My!

Times and dates are displayed based on your device's time zone setting.

Participate and share : Interactive lecture

Kathleen Mansfield  
Discover four areas of privacy management to keep your students safe in the classroom when using digital tools. Learn how to tell if apps are safe, about potential threats with biometrics, how to check your hardware devices and about social media guidelines for educators.

Audience: Chief technology officers/superintendents/school board members, Library media specialists, Technology coordinators/facilitators
Skill level: Beginner
Attendee devices: Devices required
Attendee device specification: Smartphone: Android, iOS, Windows
Laptop: Chromebook, Mac, PC
Tablet: Android, iOS, Windows
Participant accounts, software and other materials: Access to internet and a search engine
Topic: Safety, security & student data privacy
Grade level: PK-12
ISTE Standards: For Coaches:
Digital Citizenship
  • Model and facilitate safe, healthy, legal and ethical uses of digital information and technologies.
For Education Leaders:
Equity and Citizenship Advocate
  • Model digital citizenship by critically evaluating online resources, engaging in civil discourse online and using digital tools to contribute to positive social change.
  • Cultivate responsible online behavior, including the safe, ethical and legal use of technology.

Proposal summary

Purpose & objective

Learners will recognize ways they may be revealing student data online and will be able to know how to stop doing it.
Learners will understand the importance of vetting technology resources and will be provided a simple checklist for evaluating terms of usage and privacy agreements
Through a multimedia presentation, the presenter will provide links and valuable research to help the learners be able to evaluate: technology applications, biometrics, social media usage, and the usage of hardware devices for appropriateness within the classroom.
Learners will be successful when they have reflected on the legal and ethical aspects of their own technology usage within an educational setting, and have taken steps to change practices which might be revealing student private data.


This presentation will focus on the ABCs of privacy. There will be multimedia elements and feedback opportunities sprinkled throughout the session to make it interactive. Attendees will be given numerous opportunities to share with one another and collaborate on difficult situations.
Section 1: A =. Apps = 10 - 15 minutes
Information will be shared about application vetting. Attendees will work through the process for vetting an app using a checklist
Section 2: B= Biometrics = 10 - 15 minutes
Information will be presented on biometrics, explaining what they are and what is protected -- such as student faces, voices, etc. We will discuss AR/VR biometric data and collaborate on other devices that may be revealing the data as well.
Section 3: C= Checking on Devices 10-15 minutes
Information will be presented on devices such as Alexa and their legal and ethical usage within a classroom. Attendees will reflect on the learning and we will brainstorm a list of devices to be examined.
Section 4: S = Social Media 10-15 minutes
Information will be presented on personal social media account usage. We will delineate what can be posted and what cannot. Attendees will help to compile a list of unacceptable posts and then apply the learning by examining their own accounts for possible violations of student privacy.

Supporting research

Brumfield, C. (2019, August 8). 11 new state privacy and security laws explained: Is your business ready? Retrieved from
Californians for Consumer Privacy (n.d.) About the California consumer privacy act. Retrieved from
Daniels, F.B. (2019). Google alert! First-ever GDPR complaint ends in record-breaking fine. Retrieved from
Electronic Privacy Information Center (2019). Children’s online privacy protection act (COPPA). Retrieved from
European Commission (n.d.). EU data protection. Retrieved from
Federal Communications Commission (n.d.). Children’s internet protection act (CIPA). Retrieved from
Federal Trade Commision (n.d.) Children’s online privacy protection rule (“COPPA”). Retrieved from
Hardesty, L. (2013, March 27). How hard is it to “de-anonymize cellphone data?” MIT News. Retrieved from
How to prevent identity theft on college campuses (2019, October 4). Retrieved from
Noordyke, M. (2019, April 18) US state comprehensive privacy law comparison. Retrieved from
Rose, A. (2018, August 1). Facial recognition increasing in schools. Retrieved from
Texas Association of School Boards (2019, January 28). DH(Local): Employee standards of conduct. Retrieved from
Texas Association of School Boards (2011, May 26). CQ(Local): Technology resources. Retrieved from
Texas Association of School Boards (2011, November 18). CQ(Regulation): Technology resources. Retrieved from
Texas Education Code, Title 2 Public Education § Chapter 32 (2019). Retrieved from
U.S. Department of Education (n.d.). FERPA regulations. Retrieved from
U.S. Department of Education (n.d.) Student Privacy 101: Student privacy at the U.S. department of education. Retrieved from

More [+]


Kathleen Mansfield, Comal ISD

People also viewed

Creating a Curated Collection of Resources, Personalized to Your School Community
Podcast Professional Development: A DIY Podcast Approach to Teacher PD and Training
The Magic of Green Screens: How to Increase Student Engagement in Classrooms