article thumbnail

Remote Work May Transform Higher Education. But Will Printers and Alexa Undermine Its Privacy?

Edsurge

The report goes on to highlight six key technologies and practices that could provide comfort: cloud vendor management, endpoint detection and response, multifactor authentication/single sign-on, preserving data authenticity/integrity, research security, and student data privacy and governance.

Secondary 109
article thumbnail

Hero Awards finalists: 18 schools and educators dedicated to learning

eSchool News

In particular, they wanted to be able to encourage consistent practices across school buildings, ensure compliance with Colorado’s student data privacy requirements, reduce frustration and confusion among stakeholders (including parents and staff), and begin to evaluate the impact of edtech on student outcomes.

Education 121
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Education Technology and Data Insecurity

Hack Education

As a set of policies, accountability was instantiated in the Elementary and Secondary Education Act (ESEA) of 1965, reauthorized as the No Child Left Behind Act (NCLB) of 2002, and reinforced by the Every Student Succeeds Act (ESSA) of 2015.

Data 40
article thumbnail

The 100 Worst Ed-Tech Debacles of the Decade

Hack Education

It works well, that is, if you disregard student data privacy and security. With all the charges of fraud and deceptive marketing levied against post-secondary institutions this decade — from ITT to coding bootcamps, from Trump University to the Draper University of Heroes — we might ask if, indeed, this is the way it works now.

Pearson 145