Remove Course Remove MOOC Remove Secondary Remove Student Data Privacy
article thumbnail

Remote Work May Transform Higher Education. But Will Printers and Alexa Undermine Its Privacy?

Edsurge

The report goes on to highlight six key technologies and practices that could provide comfort: cloud vendor management, endpoint detection and response, multifactor authentication/single sign-on, preserving data authenticity/integrity, research security, and student data privacy and governance.

Secondary 106
article thumbnail

The 100 Worst Ed-Tech Debacles of the Decade

Hack Education

It works well, that is, if you disregard student data privacy and security. There are, of course, vast inequalities in access to technology — in school and at home and otherwise — and in how these technologies get used. Students would be required to pay. Students, no surprise, weren’t thrilled by the idea.).

Pearson 145
article thumbnail

Education Technology and Data Insecurity

Hack Education

Furthermore, at launch, Pokémon Go demanded users sign over a great deal of personal data and grant permissions to the app that, for a time , gave it access to a user’s entire Google account. Handing over data, often quite thoughtlessly, has become par for the course – in education and in society more generally.

Data 40