Remove MOOC Remove Secondary Remove Student Data Privacy Remove Survey
article thumbnail

Remote Work May Transform Higher Education. But Will Printers and Alexa Undermine Its Privacy?

Edsurge

The report goes on to highlight six key technologies and practices that could provide comfort: cloud vendor management, endpoint detection and response, multifactor authentication/single sign-on, preserving data authenticity/integrity, research security, and student data privacy and governance.

Secondary 114
article thumbnail

Education Technology and Data Insecurity

Hack Education

As a set of policies, accountability was instantiated in the Elementary and Secondary Education Act (ESEA) of 1965, reauthorized as the No Child Left Behind Act (NCLB) of 2002, and reinforced by the Every Student Succeeds Act (ESSA) of 2015. 11 states introduced bills modeled on language from the ACLU.

Data 40
article thumbnail

The 100 Worst Ed-Tech Debacles of the Decade

Hack Education

It works well, that is, if you disregard student data privacy and security. With all the charges of fraud and deceptive marketing levied against post-secondary institutions this decade — from ITT to coding bootcamps, from Trump University to the Draper University of Heroes — we might ask if, indeed, this is the way it works now.

Pearson 145