Searching for "student privacy"
Report: Tech Companies Are Spying on Children Through Devices and Software Used in Classroom
By Richard Chang 04/17/17
according to a new report from the nonprofit Electronic Frontier Foundation (EFF), “Spying on Students: School-Issued Devices and Student Privacy”
shows that state and federal laws, as well as industry self-regulation, have failed to keep up with a growing education technology industry.
One-third of all K–12 students in the United States use school-issued devices running software and apps that collect far more information on kids than is necessary.
Resource-poor school districts can receive these tools at deeply discounted prices or for free, as tech companies seek a slice of the $8 billion ed tech industry. But there’s a real, devastating cost — the tracking, cataloging and exploitation of data about children as young as 5 years old.
Our report shows that the surveillance culture begins in grade school, which threatens to normalize the next generation to a digital world in which users hand over data without question in return for free services
EFF surveyed more than 1,000 stakeholders across the country, including students, parents, teachers and school administrators, and reviewed 152 ed tech privacy policies.
“Spying on Students” provides comprehensive recommendations for parents, teachers, school administrators and tech companies to improve the protection of student privacy. Asking the right questions, negotiating for contracts that limit or ban data collection, offering families the right to opt out, and making digital literacy and privacy part of the school curriculum are just a few of the 70-plus recommendations for protecting student privacy contained in the report.
more on students and privacy
What Happens to Student Data Privacy When Chinese Firms Acquire U.S. Edtech Companies?
Between the creation of a social rating system and street cameras with facial recognition capabilities, technology reports coming out of China have raised serious concerns for privacy advocates. These concerns are only heightened as Chinese investors turn their attention to the United States education technology space acquiring companies with millions of public school users.
A particularly notable deal this year centers on Edmodo, a cross between a social networking platform and a learning management system for schools that boasts having upwards of 90 million users. Net Dragon, a Chinese gaming company that is building a significant education division, bought Edmodo for a combination of cash and equity valued at $137.5 million earlier this month.
Edmodo began shifting to an advertising model last year, after years of struggling to generate revenue. This has left critics wondering why the Chinese firm chose to acquire Edmodo at such a price, some have gone as far as to call the move a data grab.
as data becomes a tool that governments such as Russia and China could use to influence voting systems or induce citizens into espionage, more legislators are turning their attention to the acquisitions of early-stage technology startups.
NetDragon officials, however, say they have no interest in these types of activities. Their main goal in acquiring United States edtech companies lies in building profitability, says Pep So, NetDragon’s Director of Corporate Development.
In 2015, the firm acquired the education technology platform, Promethean, a company that creates interactive displays for schools. NetDragon executives say that the Edmodo acquisition rounds out their education product portfolio—meaning the company will have tools for supporting multiple aspects of learning including; preparation, instructional delivery, homework, assignment grading, communication with parents students and teachers and a content marketplace.
NetDragon’s monetization plan for Edmodo focuses on building out content that gets sold via its platform. Similar to tools like TeachersPayTeachers, So hopes to see users putting up content on the platform’s marketplace, some free and others for a fee (including some virtual reality content), so that the community can buy, sell and review available educational tools.
As far as data privacy is concerned, So notes that NetDragon is still learning what it can and cannot do. He noted that the company will comply with Children’s Online Privacy Protection Act (COPPA), a federal regulation created in order to protect the privacy of children online, but says that the rules and regulations surrounding the law are confusing for all actors involved.
Historically, Chinese companies have faced trust and branding issues when moving into the United States market, and the reverse is also true for U.S. companies seeking to expand overseas. Companies have also struggled to learn the rules, regulations and operational procedures in place in other countries.
more on data privacy in this IMS blog:
Bill seeks to shield students social media info
The proposed social media privacy law, scheduled to be considered by the state Senate Wednesday, bars any institution from asking or requiring an applicant or enrolled student to disclose a user name or password for a personal social media account.
Under the bill, a student could also not be prevented from participating in extracurricular activities if they refuse to disclose social media accounts or provide a list of contacts associated with those accounts.
more on privacy in this IMS blog:
Edtech’s Blurred Lines Between Security, Surveillance and Privacy
Tony Wan, Bill Fitzgerald, Courtney Goodsell, Doug Levin, Stephanie Cerda
SXSW EDU https://schedule.sxswedu.com/
privacy advocates joined a school administrator and a school safety software product manager to offer their perspectives.
Navigating that fine line between ensuring security and privacy is especially tricky, as it concerns newer surveillance technologies available to schools. Last year, RealNetworks, a Seattle-based company, offered its facial recognition software to schools, and a few have pioneered the tool. http://blog.stcloudstate.edu/ims/2019/02/02/facial-recognition-technology-in-schools/
The increasing availability of these kinds of tools raise concerns and questions for Doug Levin, founder of EdTech Strategies.acial-recognition police tools have been decried as “staggeringly inaccurate.”
acial-recognition police tools have been decried as “staggeringly inaccurate.”School web filters can also impact low-income families inequitably, he adds, especially those that use school-issued devices at home. #equity.
Social-Emotional Learning: The New Surveillance?
Using data to profile students—even in attempts to reinforce positive behaviors—has Cerda concerned, especially in schools serving diverse demographics. #equity.
As in the insurance industry, much of the impetus (and sales pitches) in the school and online safety market can be driven by fear. But voicing such concerns and red flags can also steer the stakeholders toward dialogue and collaboration.
more in this IMS blog on
Chief Privacy Officers: The Unicorns of K-12 Education
Last month, the nonprofit Center for Democracy and Technology (CDT) published a report arguing schools and districts should go the way of other industries and hire a Chief Privacy Officer to oversee their organization’s privacy policies and practices.
But the reality is that Chief Privacy Officers in K-12 education are about as common as unicorns.
Two years ago, Denver Public Schools created a new role, the Student Data Privacy Officer, after the Colorado legislature passed a law to promote student data privacy and transparency.
CALL FOR CHAPTER PROPOSALS
Proposal Submission Deadline: February 12, 2019
Leveraging Technology for the Improvement of School Safety and Student Wellbeing
A book edited by Dr. Stephanie Huffman, Dr. Stacey Loyless, Dr. Shelly Allbritton, and Dr. Charlotte Green (University of Central Arkansas)
Technology permeates all aspects of today’s school systems. An Internet search on technology in schools can generate millions of website results. The vast majority of these websites (well over 8,000,000 results for one simple search) focuses on advice, activities, and uses of technology in the classroom. Clearly teaching and learning with technology dominates the literature and conversations on how technology should or could be used in classroom settings. A search on school safety and technology can produce more than 3,000,000 results with many addressing technological tools such as video cameras, entry control devices, weapon detectors, and other such hardware. However, in recent times, cyberbullying appears to dominate the Internet conversations in references to school safety. With an increase in school violence in the past two decades, school safety is a fundamental concern in our nation’s schools. Policy makers, educators, parents, and students are seeking answers in how best to protect the physical, emotional, and social well-being of all children.
Objective of the Book
The proposed edited book covers the primary topic of P-12 school safety and the use of technology and technology used for fostering an environment in which all students can be academically successful and thrive as global citizens. School safety is defined as the physical, social, and emotional well-being of children. The book will comprise empirical, conceptual and case based (practical application) research that craft an overall understanding of the issues in creating a “safe” learning environment and the role technology can and should play; where a student’s well-being is valued and protected from external and internal entities, equitable access is treasured as a means for facilitating the growth of the whole student, and policy, practices, and procedures are implemented to build a foundation to transform the culture and climate of the school into an inclusive nurturing environment.
The target audience is leadership and education scholars, leadership practitioners, and technology coordinators. This book will be used as a collective body of work for the improvement of K-12 schools and as a tool for improving leadership and teacher preparation programs. School safety is a major concern for educators. Technology has played a role in creating unsafe environments for children; however it also is an avenue for addressing the challenges of school safety
Recommended topics include, but are not limited to, the following:
Section I – Digital Leadership
- Technology as a Climate and Cultural Transformation Tool
- School Leadership in the Digital Age: Building a Shared Vision for all Aspects of Learning and Teaching
- Ensuring Equity within a “One to One” Technology Framework
- Infrastructure within Communities
- Accessible WiFi for Low SES Students
- Developing Culturally Responsive Pedagogy
- Professional Development for School Leaders
Section II – Well Being
- Social Media and School Safety: Inputs and Outputs
- Tip lines: Crime, Bullying, Threats
- Communication and Transparency
- Platform for Social Justice
- Teaching Strategies to Promote Healthy Student Interactions in Cyberspace (Digital Citizenship?)
- Building Capacity and Efficacy, Platform to lower incidence of Cyber-Bullying, Boosting Instructional Engagement
- Literacy and Preparedness for the Influence and Consequence of Digital Media Marketing Campaigns directed toward Children, Adolescents, and Teens.
- Pioneering Innovative Technology Program in Curriculum: Fostering “Belonging” beyond Athletics & Arts.
Section III- Infrastructure Safety
- Campus/Facility Safety and Security
- Rural Schools vs. Urban Schools
- Digital A/V Systems
- Background Check – Visitor Registration (i.e. Raptor)
- Network Security Systems and Protocols
- User Filtering and Monitoring
- Appropriate use policies
- Digital Citizenship
- Web development policy
- Intellectual Property & Copyright
Section IV – Academic Success
- Professional Development for Classroom Teachers
- Pedagogical Integration of Technology
- Instructional Coaching for Student Engagement
- Increase Rigor with Technology
- Competence in the Blended/Hybrid/Flipped Classroom
- Technology to enhance learning for all
- Assistive Technology
- Accessibility issues
- Internet access for Low SES Students in the Blended/Hybrid/Flipped Classroom
- Personal Learning Design
- Differentiation for Student Efficacy
- Strategies for Increasing Depth of Knowledge
- Design Qualities for Enhanced Engagement
Researchers and practitioners are invited to submit on or before February 12, 2019, a chapter proposal of 1,000 to 2,000 words clearly explaining the purpose, methodology, and a brief summary findings of his or her proposed chapter. Authors will be notified by March 12, 2019 about the status of their proposals and sent chapter guidelines. Full chapters are expected to be submitted by June 12, 2019, and all interested authors must consult the guidelines for manuscript submissions at http://www.igi-global.com/publish/contributor-resources/before-you-write/ prior to submission. See Edited Chapter Template. All submitted chapters will be reviewed on a double-blind review basis. Contributors may also be requested to serve as reviewers for this project.
Note: There are no submission or acceptance fees for manuscripts submitted to this book publication, Leveraging Technology for the Improvement of School Safety and Student Wellbeing. All manuscripts are accepted based on a double-blind peer review editorial process.
All proposals should be submitted through the eEditorial Discovery®TM online submission manager. USE THE FOLLOWING LINK TO SUBMIT YOUR PROPOSAL. https://www.igi-global.com/publish/call-for-papers/call-details/3709
This book is scheduled to be published by IGI Global (formerly Idea Group Inc.), an international academic publisher of the “Information Science Reference” (formerly Idea Group Reference), “Medical Information Science Reference,” “Business Science Reference,” and “Engineering Science Reference” imprints. IGI Global specializes in publishing reference books, scholarly journals, and electronic databases featuring academic research on a variety of innovative topic areas including, but not limited to, education, social science, medicine and healthcare, business and management, information science and technology, engineering, public administration, library and information science, media and communication studies, and environmental science. For additional information regarding the publisher, please visit http://www.igi-global.com. This publication is anticipated to be released in 2020.
February 12, 2019: Proposal Submission Deadline
March 12, 2019: Notification of Acceptance
June 12, 2019: Full Chapter Submission
August 10, 2019: Review Results Returned
August 10, 2019: Final Acceptance Notification
September 7, 2019: Final Chapter Submission
Inquiries can be forwarded to
Dr. Stephanie Huffman
University of Central Arkansas
firstname.lastname@example.org or 501-450-5430
How to Craft Useful, Student-Centered Social Media Policies
By Tanner Higgin 08/09/18
Whether your school or district has officially adopted social media or not, conversations are happening in and around your school on everything from Facebook to Snapchat. Schools must reckon with this reality and commit to supporting thoughtful and critical social media use among students, teachers and administrators. If not, schools and classrooms risk everything from digital distraction to privacy violations.
Key Elements to Include in a Social Media Policy
- Create parent opt-out forms that specifically address social media use.Avoid blanket opt-outs that generalize all technology or obfuscate how specific social media platforms will be used. (See this example by the World Privacy Forum as a starting point.)
- Use these opt-out forms as a way to have more substantive conversations with parents about what you’re doing and why.
- Describe what platforms are being used, where, when and how.
- Avoid making the consequences of opt-out selections punitive (e.g., student participation in sports, theater, yearbook, etc.).
- Establish baseline guidelines for protecting and respecting student privacy.
- Prohibit the sharing of student faces.
- Restrict location sharing: Train teachers and students on how to turn off geolocation features/location services on devices as well as in specific apps.
- Minimize information shared in teacher’s social media profiles: Advise teachers to list only grade level and subject in their public profiles and not to include specific school or district information.
- Make social media use transparent to students: Have teachers explain their social media plan, and find out how students feel about it.
- Most important: As with any technology, attach social media use to clearly articulated goals for student learning. Emphasize in your guidelines that teachers should audit any potential use of social media in terms of student-centered pedagogy: (1) Does it forward student learning in a way impossible through other means? and (2) Is using social media in my best interests or in my students’?
Moving from Policy to Practice.
Social media policies, like policies in general, are meant to mitigate the risk and liability of institutions rather than guide and support sound pedagogy and student learning. They serve a valuable purpose, but not one that impacts classrooms. So how do we make these policies more relevant to classrooms?
First, it forces policy to get distilled into what impacts classroom instruction and administration. Second, social media changes monthly, and it’s much easier to update a faculty handbook than a policy document. Third, it allows you to align social media issues with other aspects of teaching (assessment, parent communication, etc.) versus separating it out in its own section.
more on social media in education in this IMS blog
more on social media policies in this IMS blog
Teachers Turn to Gaming for Online Privacy Lessons
By Dian Schaffhauser 10/10/18
Blind Protocol, an alternate reality game created by two high school English teachers to help students understand online privacy and data security. This form of gaming blends fact and fiction to immerse players in an interactive world that responds to their decisions and actions. In a recent article on KQED, Paul Darvasi and John Fallon described how they chose the gaming format to help their students gain a deeper look at how vulnerable their personal data is.
Darvasi, who blogs at “Ludic Learning,” and Fallon, who writes at “TheAlternativeClassroom,” are both immersed in the education gaming realm.
more on online privacy and data security
How to Craft Useful, Student-Centered Social Media Policies
08/09/18 Tanner Higgin
Whether your school or district has officially adopted social media or not, conversations are happening in and around your school on everything from Facebook to Snapchat.
Use policy creation as an opportunity to take inventory of your students’ needs, how social media is already being used by your teachers, and how policy can support both responsibly.
1. Create parent opt-out forms that specifically address social media use.
2. Establish baseline guidelines for protecting and respecting student privacy.
3. Make social media use transparent to students
4. Most important: As with any technology, attach social media use to clearly articulated goals for student learning
Moving from Policy to Practice
Social media isn’t a novel phenomenon requiring separate attention. Ed tech, and the tech world in general, wants to tout every new development as a revolution. Most, however, are an iteration. While we get caught up re-inventing everything to wrestle with a perceived social media sea change, our students see it simply as a part of school life.
more on social media in education in this IMS blog
How Data Privacy Lessons in Alternative Reality Games Can Help Kids In Real Life
Ubiquitous social media platforms—including Facebook, Twitter and Instagram—have created a venue for people to share and connect with others. We use these services by clicking “I Agree” on Terms of Service screens, trading off some of our private and personal data for seemingly free services. While these services say data collection helps create a better user experience, that data is also potentially exploitable.
The news about how third parties obtain and use Facebook users’ data to wage political campaigns and the mounting evidence of election interference have shined a spotlight on just how secure our data is when we share online. Educating youth about data security can fall under the larger umbrella of digital citizenship, such as social media uses and misuses and learning how not to embarrass or endanger oneself while using the internet.
Darvasi’s students in Toronto can pool together 55 faux bitcoins to purchase and launch the BOTTING protocol against an opponent. The student targeted at Fallon’s school in Connecticut would then have 48 hours to record audio of 10 words of Darvasi’s students choosing and send it back to them through an intermediary (Darvasi or Fallon). For a higher price of 65 faux bitcoins, students can launch MORPHLING, which would give the opponent 48 hours to record a one-minute video explaining three ways to stay safe while using Facebook, while making their school mascot (or a close approximation of) appear in the video in some way during the entire minute.
more on digital citizenship in this IMS blog