Alexa and Hand Scans and Student Privacy, Oh My!
Participate and share : Interactive lecture
Discover four areas of privacy management to keep your students safe in the classroom when using digital tools. Learn how to tell if apps are safe, about potential threats with biometrics, how to check your hardware devices and about social media guidelines for educators.
|Audience:||Chief technology officers/superintendents/school board members, Library media specialists, Technology coordinators/facilitators|
|Attendee devices:||Devices required|
|Attendee device specification:||Smartphone: Android, iOS, Windows
Laptop: Chromebook, Mac, PC
Tablet: Android, iOS, Windows
|Participant accounts, software and other materials:||Access to internet and a search engine|
|Topic:||Safety, security & student data privacy|
|ISTE Standards:||For Education Leaders:
Equity and Citizenship Advocate
Learners will recognize ways they may be revealing student data online and will be able to know how to stop doing it.
Learners will understand the importance of vetting technology resources and will be provided a simple checklist for evaluating terms of usage and privacy agreements
Through a multimedia presentation, the presenter will provide links and valuable research to help the learners be able to evaluate: technology applications, biometrics, social media usage, and the usage of hardware devices for appropriateness within the classroom.
Learners will be successful when they have reflected on the legal and ethical aspects of their own technology usage within an educational setting, and have taken steps to change practices which might be revealing student private data.
This presentation will focus on the ABCs of privacy. There will be multimedia elements and feedback opportunities sprinkled throughout the session to make it interactive. Attendees will be given numerous opportunities to share with one another and collaborate on difficult situations.
Section 1: A =. Apps = 10 - 15 minutes
Information will be shared about application vetting. Attendees will work through the process for vetting an app using a checklist
Section 2: B= Biometrics = 10 - 15 minutes
Information will be presented on biometrics, explaining what they are and what is protected -- such as student faces, voices, etc. We will discuss AR/VR biometric data and collaborate on other devices that may be revealing the data as well.
Section 3: C= Checking on Devices 10-15 minutes
Information will be presented on devices such as Alexa and their legal and ethical usage within a classroom. Attendees will reflect on the learning and we will brainstorm a list of devices to be examined.
Section 4: S = Social Media 10-15 minutes
Information will be presented on personal social media account usage. We will delineate what can be posted and what cannot. Attendees will help to compile a list of unacceptable posts and then apply the learning by examining their own accounts for possible violations of student privacy.
Brumfield, C. (2019, August 8). 11 new state privacy and security laws explained: Is your business ready? Retrieved from https://www.csoonline.com/article/3429608/11-new-state-privacy-and-security-laws-explained-is-your-business-ready.html
Californians for Consumer Privacy (n.d.) About the California consumer privacy act. Retrieved from https://www.caprivacy.org/about
Daniels, F.B. (2019). Google alert! First-ever GDPR complaint ends in record-breaking fine. Retrieved from https://ec.europa.eu/commission/priorities/justice-and-fundamental-rights/data-protection/2018-reform-eu-data-protection-rules/eu-data-protection-rules_en
Electronic Privacy Information Center (2019). Children’s online privacy protection act (COPPA). Retrieved from https://epic.org/privacy/kids/
European Commission (n.d.). EU data protection. Retrieved from https://ec.europa.eu/commission/priorities/justice-and-fundamental-rights/data-protection/2018-reform-eu-data-protection-rules/eu-data-protection-rules_en
Federal Communications Commission (n.d.). Children’s internet protection act (CIPA). Retrieved from https://www.fcc.gov/consumers/guides/childrens-internet-protection-act
Federal Trade Commision (n.d.) Children’s online privacy protection rule (“COPPA”). Retrieved from https://www.ftc.gov/enforcement/rules/rulemaking-regulatory-reform-proceedings/childrens-online-privacy-protection-rule
Hardesty, L. (2013, March 27). How hard is it to “de-anonymize cellphone data?” MIT News. Retrieved from https://news.mit.edu/2013/how-hard-it-de-anonymize-cellphone-data
How to prevent identity theft on college campuses (2019, October 4). Retrieved from https://www.safety.com/prevent-identity-theft-college-campuses/
Noordyke, M. (2019, April 18) US state comprehensive privacy law comparison. Retrieved from https://iapp.org/news/a/us-state-comprehensive-privacy-law-comparison/
Rose, A. (2018, August 1). Facial recognition increasing in schools. Retrieved from https://www.govtech.com/em/preparedness/Facial-Recognition-Increasing-in-Schools.html
Texas Association of School Boards (2019, January 28). DH(Local): Employee standards of conduct. Retrieved from https://pol.tasb.org/Policy/Download/326?filename=DH(LOCAL).pdf
Texas Association of School Boards (2011, May 26). CQ(Local): Technology resources. Retrieved from https://pol.tasb.org/Policy/Download/871?filename=CQ(LOCAL).pdf&filename=CQ(LOCAL).pdf
Texas Association of School Boards (2011, November 18). CQ(Regulation): Technology resources. Retrieved from https://pol.tasb.org/Policy/Download/1146?filename=CQ(REGULATION).pdf
Texas Education Code, Title 2 Public Education § Chapter 32 (2019). Retrieved from https://statutes.capitol.texas.gov/Docs/ED/htm/ED.32.htm
U.S. Department of Education (n.d.). FERPA regulations. Retrieved from https://studentprivacy.ed.gov/node/548/#0.1__top
U.S. Department of Education (n.d.) Student Privacy 101: Student privacy at the U.S. department of education. Retrieved from https://studentprivacy.ed.gov/