article thumbnail

Remote Work May Transform Higher Education. But Will Printers and Alexa Undermine Its Privacy?

Edsurge

The report goes on to highlight six key technologies and practices that could provide comfort: cloud vendor management, endpoint detection and response, multifactor authentication/single sign-on, preserving data authenticity/integrity, research security, and student data privacy and governance.

Secondary 117
article thumbnail

Trump's Edtech Agenda Should Address Effectiveness, Equity, and Equilibrium in Higher Ed

Edsurge

radio and televisions in the early 20th century and online learning and MOOCs via the Internet in the early 21st century.) However, the questions have largely stayed the same: Do technologies ensure quality learning and positive student outcomes? Do they help or hurt underrepresented students? Distance education took place via.

EdTech 60
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Education Technology and Data Insecurity

Hack Education

As a set of policies, accountability was instantiated in the Elementary and Secondary Education Act (ESEA) of 1965, reauthorized as the No Child Left Behind Act (NCLB) of 2002, and reinforced by the Every Student Succeeds Act (ESSA) of 2015. 11 states introduced bills modeled on language from the ACLU.

Data 40
article thumbnail

The 100 Worst Ed-Tech Debacles of the Decade

Hack Education

It works well, that is, if you disregard student data privacy and security. With all the charges of fraud and deceptive marketing levied against post-secondary institutions this decade — from ITT to coding bootcamps, from Trump University to the Draper University of Heroes — we might ask if, indeed, this is the way it works now.

Pearson 145