SlideShare a Scribd company logo
1 of 3
Download to read offline
GAMABrief:
When Education Meets Big Data
The move by many schools to adopt cloud-based data storage and data analytics solutions is unsurprising, since
schools can generate significant pedagogical value through use of these technologies. With these rewards come broad
risks associated with legal and regulatory data privacy compliance. Given the slew of recent retail industry data
breaches making national headlines, the risks of data collection and storage are immediately apparent. With data
privacy on everyone’s mind, there has never been a better time for school administrators to fully evaluate and address
their student data privacy policies.
Big	
  Data	
  and	
  Educa-on:	
  The	
  Rewards
According to one recent study, “[n]early 90 percent of K–12 institutions report[ed] using one or more cloud-based
applications.” Data storage and analytics can provide powerful pedagogical tools. In fact, “data analytics is identified as
one of the two most important emerging technology trends in the coming two- to three-year ‘horizon’ for learning.”
The rewards are evident – data driven education can help differentiate coursework in a highly targeted and
automated way never previously possible. Analytics can help teachers assess student progress faster, saving teachers’
valuable time.
Big	
  Data	
  and	
  Educa-on:	
  The	
  Risks
Like any organization that collects and stores user data, schools must abide by certain national- and state-level
regulations, including avoiding deceptive business practices under the Federal Trade Commission’s (FTC) regulatory
scheme, abiding by data breach notification laws, and, in California, maintaining separate privacy policies for any mobile
applications and identifying in any website privacy policies how the site handles do-not-track browser settings.
Schools are unique and face an even greater data privacy burden under the Children’s Online Privacy Protection Act
(COPPA) and the Family Education Rights and Privacy Act (FERPA).
The patchwork of laws and regulations at all levels makes the increasing collection of student data all the more risky.
For schools, a full understanding of relevant privacy laws—specifically FERPA—is imperative before engaging in the
collection, analysis or storage of student data.
Cloud	
  Storage,	
  Data	
  Analy-cs	
  &	
  FERPA
The Family Education Rights and Privacy Act (FERPA) restricts the disclosure of student records that are maintained by
educational institutions who receive funds from the Department of Education. Generally speaking, FERPA allows
disclosure of personally identifiable information (PII) from a student’s education record only with consent from that
student’s parent or guardian. An exception to the rule – known as the “school official” exception – allows disclosure
without consent to contractors or other outside parties (known as third party providers or TPPs) if that TPP meets
certain requirements.
For example, the TPP must: (1) perform an institutional service or function for which the educational institution would
otherwise use employees; (2) be under the direct control of the educational institution with respect to the use and
maintenance of education records; (3) not disclose the information to any other party without the prior consent of
the parents or eligible student; and (4) may only use the information for the purposes for which the disclosure was
made.
A  GAMA  White  Paper  produced  by  Brandon  Wiebe  &  Noah  Johnson                                            ©  2014.  Gagnier  Margossian  LLP.    All  rights  reserved.  
Some important questions to ask when selecting a cloud service provider:
•	

Will parents be able to review and potentially delete portions of a student’s education data record if they so
request?
•	

What are the cloud service provider’s data retention and deletion policies?
•	

Does the cloud service provider disclose information to third parties?
•	

Does the cloud service provider plan to release any anonymized data to third parties?
•	

How will the cloud service provider implement data security protections for the education data records?
What	
  About	
  COPPA?
The Children’s Online Privacy Protection Act (COPPA) restricts the online collection of personally identifiable
information of any child aged 12 or younger without parental consent. Websites that aim their services towards
children must adopt some mechanism of obtaining parental consent before they begin data collection and must
permit parents to access and delete data records regarding their children.
COPPA generally does not effect educational institutions directly, as very few build and maintain their own websites
or mobile applications. As the line between big data and education further blurs, schools should be aware of COPPA
and its implications. It is quite possible that schools themselves may be drawn to develop their own proprietary data
technologies – a move that would directly implicate COPPA.
Compliance in California: Even More Legal Risks
California has led the way in passing a variety of data privacy laws, including state-specific additions to the FERPA
requirements, as well as robust regulations governing the collection of data online. Any educational institutions
located in California must also be aware of these regulations before drafting and implementing a student data
privacy policy.
The California Attorney General’s Office maintains a website summarizing the major aspects of these privacy laws:
http://oag.ca.gov/privacy/privacy-laws.
Conclusion
The regulatory landscape regarding data privacy can be overwhelming for institutions handling sensitive student
information. As districts continue to embrace new data-driven technologies, they must develop plans to assess and
maintain compliance with both federal and state rules. A data privacy attorney can help a school district makes sense
of the requirements imposed by the web of data laws, allowing districts to mitigate legal risks while reaping the
rewards of exciting new technologies.
For	
  more	
  informa-on	
  on	
  how	
  your	
  school	
  district	
  can	
  manage	
  data	
  privacy,
contact	
  an	
  aIorney	
  at	
  Gagnier	
  Margossian	
  LLP.
References
Jim Finkle and Mark Hosenball, Exclusive: More Well-Known U.S. Retailers Victims of Cyber Attacks, REUTERS (January 12,
2014), available at http://www.reuters.com/article/2014/01/12/us-target-databreach-retailersidUSBREA0B01720140112.
Keith R. Krueger, Data Privacy: What School Leaders Should Know, ESCHOOLNEWS (January 6, 2014), available at
http://www.eschoolnews.com/2014/01/06/data-privacy-cosn-119/ (study citation omitted).
See generally 20 U.S.C. § 1232g; 34 C.F.R. 99.
See generally 15 U.S.C. §§ 6501–6506.
See, e.g., CAL. EDUC. CODE § 49069, et seq. (specifying a parent’s right to inspect, review and challenge the content of a
student’s records maintained at a school district); Id. § 49073 et seq. (specifying requirements for school districts
pertaining to student directory information and exceptions to parental consent requirements).
See, e.g., California Online Privacy Protection Act of 2003, CAL. BUS. & PROF. CODE §§ 22575-22579.

Internet
Intellectual Property
Privacy
Social Media
Technology
The Good Stuff

#nerdlawyers
Los Angeles

Sacramento

T: 415.766.4591
F: 909.972.1639
E: consult@gamallp.com

gamallp.com
@gamallp

San Francisco

More Related Content

What's hot

Understanding gdpr compliance gdpr analytics tools
Understanding gdpr compliance  gdpr analytics toolsUnderstanding gdpr compliance  gdpr analytics tools
Understanding gdpr compliance gdpr analytics toolsRominaMariaBaltariu
 
GDPR: data needs to be in safe hands
GDPR: data needs to be in safe hands GDPR: data needs to be in safe hands
GDPR: data needs to be in safe hands legalandgeneral
 
What is GDPR?
What is GDPR?What is GDPR?
What is GDPR?Faidepro
 
The Countdown to the GDPR Regulations
The Countdown to the GDPR RegulationsThe Countdown to the GDPR Regulations
The Countdown to the GDPR RegulationsElliot Reeman
 
An Overview of GDPR by Pathway Group
An Overview of GDPR by Pathway GroupAn Overview of GDPR by Pathway Group
An Overview of GDPR by Pathway GroupThe Pathway Group
 
GDPR- Get the facts and prepare your business
GDPR- Get the facts and prepare your businessGDPR- Get the facts and prepare your business
GDPR- Get the facts and prepare your businessMark Baker
 
How to get your business GDPR ready
How to get your business GDPR readyHow to get your business GDPR ready
How to get your business GDPR readyPremier EPOS
 
Teleran Data Protection - Addressing 5 Critical GDPR Requirements
Teleran Data Protection - Addressing 5 Critical GDPR RequirementsTeleran Data Protection - Addressing 5 Critical GDPR Requirements
Teleran Data Protection - Addressing 5 Critical GDPR RequirementsChris Doolittle
 
European Union General Data Protection Regulation (GDPR) Checklist
European Union General Data Protection Regulation (GDPR) ChecklistEuropean Union General Data Protection Regulation (GDPR) Checklist
European Union General Data Protection Regulation (GDPR) ChecklistChristina Gagnier
 
Operations network - consent under gdpr 24.01.2018
Operations network - consent under gdpr 24.01.2018Operations network - consent under gdpr 24.01.2018
Operations network - consent under gdpr 24.01.2018MRS
 
GDPR ASAP: A Seven-Step Guide to Prepare for the General Data Protection Regu...
GDPR ASAP: A Seven-Step Guide to Prepare for the General Data Protection Regu...GDPR ASAP: A Seven-Step Guide to Prepare for the General Data Protection Regu...
GDPR ASAP: A Seven-Step Guide to Prepare for the General Data Protection Regu...ObservePoint
 
Getting Ready for GDPR
Getting Ready for GDPRGetting Ready for GDPR
Getting Ready for GDPRJessvin Thomas
 
The Essential Guide to GDPR
The Essential Guide to GDPRThe Essential Guide to GDPR
The Essential Guide to GDPRTim Hyman LLB
 

What's hot (20)

Binding corporate rules
Binding corporate rulesBinding corporate rules
Binding corporate rules
 
An Overview of GDPR
An Overview of GDPR An Overview of GDPR
An Overview of GDPR
 
Understanding gdpr compliance gdpr analytics tools
Understanding gdpr compliance  gdpr analytics toolsUnderstanding gdpr compliance  gdpr analytics tools
Understanding gdpr compliance gdpr analytics tools
 
GDPR: data needs to be in safe hands
GDPR: data needs to be in safe hands GDPR: data needs to be in safe hands
GDPR: data needs to be in safe hands
 
What is GDPR?
What is GDPR?What is GDPR?
What is GDPR?
 
GDPR
GDPRGDPR
GDPR
 
The Countdown to the GDPR Regulations
The Countdown to the GDPR RegulationsThe Countdown to the GDPR Regulations
The Countdown to the GDPR Regulations
 
An Overview of GDPR by Pathway Group
An Overview of GDPR by Pathway GroupAn Overview of GDPR by Pathway Group
An Overview of GDPR by Pathway Group
 
GDPR infographic
GDPR infographicGDPR infographic
GDPR infographic
 
GDPR- Get the facts and prepare your business
GDPR- Get the facts and prepare your businessGDPR- Get the facts and prepare your business
GDPR- Get the facts and prepare your business
 
How to get your business GDPR ready
How to get your business GDPR readyHow to get your business GDPR ready
How to get your business GDPR ready
 
GDPR
GDPRGDPR
GDPR
 
Teleran Data Protection - Addressing 5 Critical GDPR Requirements
Teleran Data Protection - Addressing 5 Critical GDPR RequirementsTeleran Data Protection - Addressing 5 Critical GDPR Requirements
Teleran Data Protection - Addressing 5 Critical GDPR Requirements
 
European Union General Data Protection Regulation (GDPR) Checklist
European Union General Data Protection Regulation (GDPR) ChecklistEuropean Union General Data Protection Regulation (GDPR) Checklist
European Union General Data Protection Regulation (GDPR) Checklist
 
Operations network - consent under gdpr 24.01.2018
Operations network - consent under gdpr 24.01.2018Operations network - consent under gdpr 24.01.2018
Operations network - consent under gdpr 24.01.2018
 
The Basics of GDPR
The Basics of GDPR The Basics of GDPR
The Basics of GDPR
 
GDPR ASAP: A Seven-Step Guide to Prepare for the General Data Protection Regu...
GDPR ASAP: A Seven-Step Guide to Prepare for the General Data Protection Regu...GDPR ASAP: A Seven-Step Guide to Prepare for the General Data Protection Regu...
GDPR ASAP: A Seven-Step Guide to Prepare for the General Data Protection Regu...
 
Getting Ready for GDPR
Getting Ready for GDPRGetting Ready for GDPR
Getting Ready for GDPR
 
The Essential Guide to GDPR
The Essential Guide to GDPRThe Essential Guide to GDPR
The Essential Guide to GDPR
 
Driving change
Driving changeDriving change
Driving change
 

Similar to GAMABrief: When Education Meets Big Data

Lt safety of student data
Lt safety of student dataLt safety of student data
Lt safety of student datagwens502
 
CHEPTER The Internet and ClientServer, Intranet & Cloud Computin.docx
CHEPTER The Internet and ClientServer, Intranet & Cloud Computin.docxCHEPTER The Internet and ClientServer, Intranet & Cloud Computin.docx
CHEPTER The Internet and ClientServer, Intranet & Cloud Computin.docxchristinemaritza
 
Student Data and Its Discontents: How FUD undermined an education reform agenda
Student Data and Its Discontents: How FUD undermined an education reform agendaStudent Data and Its Discontents: How FUD undermined an education reform agenda
Student Data and Its Discontents: How FUD undermined an education reform agendaPatrick McCormick
 
Student data privacy manifesto
Student data privacy manifestoStudent data privacy manifesto
Student data privacy manifestoCaitlin Sharp
 
Education Privacy
Education Privacy Education Privacy
Education Privacy emilyensign
 
CHILDREN’S EDUCATIONAL RECORDS AND PRIVACY
CHILDREN’S EDUCATIONAL RECORDS AND PRIVACYCHILDREN’S EDUCATIONAL RECORDS AND PRIVACY
CHILDREN’S EDUCATIONAL RECORDS AND PRIVACYLuis Taveras EMBA, MS
 
Filtering.pete
Filtering.peteFiltering.pete
Filtering.petekadair26
 
COPPA and Over 13 Age Restrictions
COPPA and Over 13 Age RestrictionsCOPPA and Over 13 Age Restrictions
COPPA and Over 13 Age RestrictionsMark Moran
 
IT Security in Higher Education
IT Security in Higher EducationIT Security in Higher Education
IT Security in Higher EducationRapid7
 
Ruth Hammond - Saftguarding Children in a Digital World
Ruth Hammond - Saftguarding Children in a Digital WorldRuth Hammond - Saftguarding Children in a Digital World
Ruth Hammond - Saftguarding Children in a Digital WorldNaace Naace
 
Communities online policy 190813
Communities online policy 190813Communities online policy 190813
Communities online policy 190813jennifer_lawrence
 
Social Media for School Districts - OTA 15
Social Media for School Districts - OTA 15Social Media for School Districts - OTA 15
Social Media for School Districts - OTA 15Diana Benner
 
B9_21_子供のプライバシー対策に必要なもの Speakers' slide deck for Privacy By Design Conference...
B9_21_子供のプライバシー対策に必要なもの Speakers' slide deck for Privacy By Design Conference...B9_21_子供のプライバシー対策に必要なもの Speakers' slide deck for Privacy By Design Conference...
B9_21_子供のプライバシー対策に必要なもの Speakers' slide deck for Privacy By Design Conference...Keiko Tanaka
 
Addressing the wicked problem of learning data privacy though principle and p...
Addressing the wicked problem of learning data privacy though principle and p...Addressing the wicked problem of learning data privacy though principle and p...
Addressing the wicked problem of learning data privacy though principle and p...Jisc
 
Tx data system deployment project
Tx data system deployment projectTx data system deployment project
Tx data system deployment projectAnn Tarasena
 
Filters firstamendmenttla2011 final
Filters firstamendmenttla2011 finalFilters firstamendmenttla2011 final
Filters firstamendmenttla2011 finalLea Bailey
 
Lesson plan: How to improve data management in education
Lesson plan: How to improve data management in educationLesson plan: How to improve data management in education
Lesson plan: How to improve data management in educationDataGravity
 
Student Privacy Rights in the Classroom
Student Privacy Rights in the ClassroomStudent Privacy Rights in the Classroom
Student Privacy Rights in the ClassroomChristina Gagnier
 
Report_PrivacyAmongChildren.pdf
Report_PrivacyAmongChildren.pdfReport_PrivacyAmongChildren.pdf
Report_PrivacyAmongChildren.pdfDaviesParker
 

Similar to GAMABrief: When Education Meets Big Data (20)

Lt safety of student data
Lt safety of student dataLt safety of student data
Lt safety of student data
 
CHEPTER The Internet and ClientServer, Intranet & Cloud Computin.docx
CHEPTER The Internet and ClientServer, Intranet & Cloud Computin.docxCHEPTER The Internet and ClientServer, Intranet & Cloud Computin.docx
CHEPTER The Internet and ClientServer, Intranet & Cloud Computin.docx
 
Privacy and Student Data: What to Consider
Privacy and Student Data: What to ConsiderPrivacy and Student Data: What to Consider
Privacy and Student Data: What to Consider
 
Student Data and Its Discontents: How FUD undermined an education reform agenda
Student Data and Its Discontents: How FUD undermined an education reform agendaStudent Data and Its Discontents: How FUD undermined an education reform agenda
Student Data and Its Discontents: How FUD undermined an education reform agenda
 
Student data privacy manifesto
Student data privacy manifestoStudent data privacy manifesto
Student data privacy manifesto
 
Education Privacy
Education Privacy Education Privacy
Education Privacy
 
CHILDREN’S EDUCATIONAL RECORDS AND PRIVACY
CHILDREN’S EDUCATIONAL RECORDS AND PRIVACYCHILDREN’S EDUCATIONAL RECORDS AND PRIVACY
CHILDREN’S EDUCATIONAL RECORDS AND PRIVACY
 
Filtering.pete
Filtering.peteFiltering.pete
Filtering.pete
 
COPPA and Over 13 Age Restrictions
COPPA and Over 13 Age RestrictionsCOPPA and Over 13 Age Restrictions
COPPA and Over 13 Age Restrictions
 
IT Security in Higher Education
IT Security in Higher EducationIT Security in Higher Education
IT Security in Higher Education
 
Ruth Hammond - Saftguarding Children in a Digital World
Ruth Hammond - Saftguarding Children in a Digital WorldRuth Hammond - Saftguarding Children in a Digital World
Ruth Hammond - Saftguarding Children in a Digital World
 
Communities online policy 190813
Communities online policy 190813Communities online policy 190813
Communities online policy 190813
 
Social Media for School Districts - OTA 15
Social Media for School Districts - OTA 15Social Media for School Districts - OTA 15
Social Media for School Districts - OTA 15
 
B9_21_子供のプライバシー対策に必要なもの Speakers' slide deck for Privacy By Design Conference...
B9_21_子供のプライバシー対策に必要なもの Speakers' slide deck for Privacy By Design Conference...B9_21_子供のプライバシー対策に必要なもの Speakers' slide deck for Privacy By Design Conference...
B9_21_子供のプライバシー対策に必要なもの Speakers' slide deck for Privacy By Design Conference...
 
Addressing the wicked problem of learning data privacy though principle and p...
Addressing the wicked problem of learning data privacy though principle and p...Addressing the wicked problem of learning data privacy though principle and p...
Addressing the wicked problem of learning data privacy though principle and p...
 
Tx data system deployment project
Tx data system deployment projectTx data system deployment project
Tx data system deployment project
 
Filters firstamendmenttla2011 final
Filters firstamendmenttla2011 finalFilters firstamendmenttla2011 final
Filters firstamendmenttla2011 final
 
Lesson plan: How to improve data management in education
Lesson plan: How to improve data management in educationLesson plan: How to improve data management in education
Lesson plan: How to improve data management in education
 
Student Privacy Rights in the Classroom
Student Privacy Rights in the ClassroomStudent Privacy Rights in the Classroom
Student Privacy Rights in the Classroom
 
Report_PrivacyAmongChildren.pdf
Report_PrivacyAmongChildren.pdfReport_PrivacyAmongChildren.pdf
Report_PrivacyAmongChildren.pdf
 

More from Christina Gagnier

EU Privacy Shield Self Certification
EU Privacy Shield Self Certification EU Privacy Shield Self Certification
EU Privacy Shield Self Certification Christina Gagnier
 
The United Kingdom Raises Red Flag on Initial Coin Offerings
The United Kingdom Raises Red Flag on Initial Coin OfferingsThe United Kingdom Raises Red Flag on Initial Coin Offerings
The United Kingdom Raises Red Flag on Initial Coin OfferingsChristina Gagnier
 
Regulatory Regime for Cryptocurrencies in Gibraltar
Regulatory Regime for Cryptocurrencies in GibraltarRegulatory Regime for Cryptocurrencies in Gibraltar
Regulatory Regime for Cryptocurrencies in GibraltarChristina Gagnier
 
China Bans Initial Coin Offerings, "Illegal Public Financing"
China Bans Initial Coin Offerings, "Illegal Public Financing"China Bans Initial Coin Offerings, "Illegal Public Financing"
China Bans Initial Coin Offerings, "Illegal Public Financing"Christina Gagnier
 
Initial Coin Offerings (ICOs) and Cryptocurrencies in Canada
Initial Coin Offerings (ICOs) and Cryptocurrencies in CanadaInitial Coin Offerings (ICOs) and Cryptocurrencies in Canada
Initial Coin Offerings (ICOs) and Cryptocurrencies in CanadaChristina Gagnier
 
Conducting an Initial Coin Offering: Costs and Considerations
Conducting an Initial Coin Offering: Costs and ConsiderationsConducting an Initial Coin Offering: Costs and Considerations
Conducting an Initial Coin Offering: Costs and ConsiderationsChristina Gagnier
 
SEC Update: Virtual Organizations and the SEC - July 2017
SEC Update: Virtual Organizations and the SEC - July 2017SEC Update: Virtual Organizations and the SEC - July 2017
SEC Update: Virtual Organizations and the SEC - July 2017Christina Gagnier
 
Guide to Prospective European Union - United States Privacy Shield Program
Guide to Prospective European Union - United States Privacy Shield ProgramGuide to Prospective European Union - United States Privacy Shield Program
Guide to Prospective European Union - United States Privacy Shield ProgramChristina Gagnier
 
Revenge Pornography: Legal and Policy Issues - Computers, Data & Privacy Prot...
Revenge Pornography: Legal and Policy Issues - Computers, Data & Privacy Prot...Revenge Pornography: Legal and Policy Issues - Computers, Data & Privacy Prot...
Revenge Pornography: Legal and Policy Issues - Computers, Data & Privacy Prot...Christina Gagnier
 
Student Privacy Rights: In and Out of the Classroom
Student Privacy Rights: In and Out of the ClassroomStudent Privacy Rights: In and Out of the Classroom
Student Privacy Rights: In and Out of the ClassroomChristina Gagnier
 
Gender Issues: Creating a Safe Environment for All Students
Gender Issues: Creating a Safe Environment for All StudentsGender Issues: Creating a Safe Environment for All Students
Gender Issues: Creating a Safe Environment for All StudentsChristina Gagnier
 
ABC's of Privacy and Security
ABC's of Privacy and SecurityABC's of Privacy and Security
ABC's of Privacy and SecurityChristina Gagnier
 
Starting a Business: The Legal Details
Starting a Business: The Legal DetailsStarting a Business: The Legal Details
Starting a Business: The Legal DetailsChristina Gagnier
 
GAMABrief: What Every School Needs to Know About Copyright Law
GAMABrief: What Every School Needs to Know About Copyright LawGAMABrief: What Every School Needs to Know About Copyright Law
GAMABrief: What Every School Needs to Know About Copyright LawChristina Gagnier
 
GAMAByte: The Legal Ramifications of Going 3D (Printing, That is)
GAMAByte: The Legal Ramifications of Going 3D (Printing, That is)GAMAByte: The Legal Ramifications of Going 3D (Printing, That is)
GAMAByte: The Legal Ramifications of Going 3D (Printing, That is)Christina Gagnier
 
GAMABrief: Preparing for the Capital Gains Tax Hike
GAMABrief: Preparing for the Capital Gains Tax HikeGAMABrief: Preparing for the Capital Gains Tax Hike
GAMABrief: Preparing for the Capital Gains Tax HikeChristina Gagnier
 
Privacy Identity Innovation 2013: Ignite Talk Slides - Content. Conduct. Cont...
Privacy Identity Innovation 2013: Ignite Talk Slides - Content. Conduct. Cont...Privacy Identity Innovation 2013: Ignite Talk Slides - Content. Conduct. Cont...
Privacy Identity Innovation 2013: Ignite Talk Slides - Content. Conduct. Cont...Christina Gagnier
 
Revenge Porn: Posting Images Without Consent
Revenge Porn: Posting Images Without ConsentRevenge Porn: Posting Images Without Consent
Revenge Porn: Posting Images Without ConsentChristina Gagnier
 
Understanding "Cyber" Bullying: California Law & Proactive Steps for School D...
Understanding "Cyber" Bullying: California Law & Proactive Steps for School D...Understanding "Cyber" Bullying: California Law & Proactive Steps for School D...
Understanding "Cyber" Bullying: California Law & Proactive Steps for School D...Christina Gagnier
 
Seth's Law (AB 9) - Understanding "Cyber" Bullying
Seth's Law (AB 9) - Understanding "Cyber" BullyingSeth's Law (AB 9) - Understanding "Cyber" Bullying
Seth's Law (AB 9) - Understanding "Cyber" BullyingChristina Gagnier
 

More from Christina Gagnier (20)

EU Privacy Shield Self Certification
EU Privacy Shield Self Certification EU Privacy Shield Self Certification
EU Privacy Shield Self Certification
 
The United Kingdom Raises Red Flag on Initial Coin Offerings
The United Kingdom Raises Red Flag on Initial Coin OfferingsThe United Kingdom Raises Red Flag on Initial Coin Offerings
The United Kingdom Raises Red Flag on Initial Coin Offerings
 
Regulatory Regime for Cryptocurrencies in Gibraltar
Regulatory Regime for Cryptocurrencies in GibraltarRegulatory Regime for Cryptocurrencies in Gibraltar
Regulatory Regime for Cryptocurrencies in Gibraltar
 
China Bans Initial Coin Offerings, "Illegal Public Financing"
China Bans Initial Coin Offerings, "Illegal Public Financing"China Bans Initial Coin Offerings, "Illegal Public Financing"
China Bans Initial Coin Offerings, "Illegal Public Financing"
 
Initial Coin Offerings (ICOs) and Cryptocurrencies in Canada
Initial Coin Offerings (ICOs) and Cryptocurrencies in CanadaInitial Coin Offerings (ICOs) and Cryptocurrencies in Canada
Initial Coin Offerings (ICOs) and Cryptocurrencies in Canada
 
Conducting an Initial Coin Offering: Costs and Considerations
Conducting an Initial Coin Offering: Costs and ConsiderationsConducting an Initial Coin Offering: Costs and Considerations
Conducting an Initial Coin Offering: Costs and Considerations
 
SEC Update: Virtual Organizations and the SEC - July 2017
SEC Update: Virtual Organizations and the SEC - July 2017SEC Update: Virtual Organizations and the SEC - July 2017
SEC Update: Virtual Organizations and the SEC - July 2017
 
Guide to Prospective European Union - United States Privacy Shield Program
Guide to Prospective European Union - United States Privacy Shield ProgramGuide to Prospective European Union - United States Privacy Shield Program
Guide to Prospective European Union - United States Privacy Shield Program
 
Revenge Pornography: Legal and Policy Issues - Computers, Data & Privacy Prot...
Revenge Pornography: Legal and Policy Issues - Computers, Data & Privacy Prot...Revenge Pornography: Legal and Policy Issues - Computers, Data & Privacy Prot...
Revenge Pornography: Legal and Policy Issues - Computers, Data & Privacy Prot...
 
Student Privacy Rights: In and Out of the Classroom
Student Privacy Rights: In and Out of the ClassroomStudent Privacy Rights: In and Out of the Classroom
Student Privacy Rights: In and Out of the Classroom
 
Gender Issues: Creating a Safe Environment for All Students
Gender Issues: Creating a Safe Environment for All StudentsGender Issues: Creating a Safe Environment for All Students
Gender Issues: Creating a Safe Environment for All Students
 
ABC's of Privacy and Security
ABC's of Privacy and SecurityABC's of Privacy and Security
ABC's of Privacy and Security
 
Starting a Business: The Legal Details
Starting a Business: The Legal DetailsStarting a Business: The Legal Details
Starting a Business: The Legal Details
 
GAMABrief: What Every School Needs to Know About Copyright Law
GAMABrief: What Every School Needs to Know About Copyright LawGAMABrief: What Every School Needs to Know About Copyright Law
GAMABrief: What Every School Needs to Know About Copyright Law
 
GAMAByte: The Legal Ramifications of Going 3D (Printing, That is)
GAMAByte: The Legal Ramifications of Going 3D (Printing, That is)GAMAByte: The Legal Ramifications of Going 3D (Printing, That is)
GAMAByte: The Legal Ramifications of Going 3D (Printing, That is)
 
GAMABrief: Preparing for the Capital Gains Tax Hike
GAMABrief: Preparing for the Capital Gains Tax HikeGAMABrief: Preparing for the Capital Gains Tax Hike
GAMABrief: Preparing for the Capital Gains Tax Hike
 
Privacy Identity Innovation 2013: Ignite Talk Slides - Content. Conduct. Cont...
Privacy Identity Innovation 2013: Ignite Talk Slides - Content. Conduct. Cont...Privacy Identity Innovation 2013: Ignite Talk Slides - Content. Conduct. Cont...
Privacy Identity Innovation 2013: Ignite Talk Slides - Content. Conduct. Cont...
 
Revenge Porn: Posting Images Without Consent
Revenge Porn: Posting Images Without ConsentRevenge Porn: Posting Images Without Consent
Revenge Porn: Posting Images Without Consent
 
Understanding "Cyber" Bullying: California Law & Proactive Steps for School D...
Understanding "Cyber" Bullying: California Law & Proactive Steps for School D...Understanding "Cyber" Bullying: California Law & Proactive Steps for School D...
Understanding "Cyber" Bullying: California Law & Proactive Steps for School D...
 
Seth's Law (AB 9) - Understanding "Cyber" Bullying
Seth's Law (AB 9) - Understanding "Cyber" BullyingSeth's Law (AB 9) - Understanding "Cyber" Bullying
Seth's Law (AB 9) - Understanding "Cyber" Bullying
 

Recently uploaded

Karra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptxKarra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptxAshokKarra1
 
Judging the Relevance and worth of ideas part 2.pptx
Judging the Relevance  and worth of ideas part 2.pptxJudging the Relevance  and worth of ideas part 2.pptx
Judging the Relevance and worth of ideas part 2.pptxSherlyMaeNeri
 
Keynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designKeynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designMIPLM
 
Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Jisc
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxthorishapillay1
 
Science 7 Quarter 4 Module 2: Natural Resources.pptx
Science 7 Quarter 4 Module 2: Natural Resources.pptxScience 7 Quarter 4 Module 2: Natural Resources.pptx
Science 7 Quarter 4 Module 2: Natural Resources.pptxMaryGraceBautista27
 
Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Celine George
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTiammrhaywood
 
4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptxmary850239
 
How to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPHow to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPCeline George
 
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...JhezDiaz1
 
Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Mark Reed
 
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfInclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfTechSoup
 
Barangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptxBarangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptxCarlos105
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatYousafMalik24
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️9953056974 Low Rate Call Girls In Saket, Delhi NCR
 

Recently uploaded (20)

Karra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptxKarra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptx
 
Judging the Relevance and worth of ideas part 2.pptx
Judging the Relevance  and worth of ideas part 2.pptxJudging the Relevance  and worth of ideas part 2.pptx
Judging the Relevance and worth of ideas part 2.pptx
 
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
 
Keynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designKeynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-design
 
Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptx
 
Science 7 Quarter 4 Module 2: Natural Resources.pptx
Science 7 Quarter 4 Module 2: Natural Resources.pptxScience 7 Quarter 4 Module 2: Natural Resources.pptx
Science 7 Quarter 4 Module 2: Natural Resources.pptx
 
Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
 
4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx
 
OS-operating systems- ch04 (Threads) ...
OS-operating systems- ch04 (Threads) ...OS-operating systems- ch04 (Threads) ...
OS-operating systems- ch04 (Threads) ...
 
How to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPHow to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERP
 
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
 
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptxLEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
 
Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)
 
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfInclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
 
Raw materials used in Herbal Cosmetics.pptx
Raw materials used in Herbal Cosmetics.pptxRaw materials used in Herbal Cosmetics.pptx
Raw materials used in Herbal Cosmetics.pptx
 
Barangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptxBarangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptx
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice great
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
 

GAMABrief: When Education Meets Big Data

  • 1. GAMABrief: When Education Meets Big Data The move by many schools to adopt cloud-based data storage and data analytics solutions is unsurprising, since schools can generate significant pedagogical value through use of these technologies. With these rewards come broad risks associated with legal and regulatory data privacy compliance. Given the slew of recent retail industry data breaches making national headlines, the risks of data collection and storage are immediately apparent. With data privacy on everyone’s mind, there has never been a better time for school administrators to fully evaluate and address their student data privacy policies. Big  Data  and  Educa-on:  The  Rewards According to one recent study, “[n]early 90 percent of K–12 institutions report[ed] using one or more cloud-based applications.” Data storage and analytics can provide powerful pedagogical tools. In fact, “data analytics is identified as one of the two most important emerging technology trends in the coming two- to three-year ‘horizon’ for learning.” The rewards are evident – data driven education can help differentiate coursework in a highly targeted and automated way never previously possible. Analytics can help teachers assess student progress faster, saving teachers’ valuable time. Big  Data  and  Educa-on:  The  Risks Like any organization that collects and stores user data, schools must abide by certain national- and state-level regulations, including avoiding deceptive business practices under the Federal Trade Commission’s (FTC) regulatory scheme, abiding by data breach notification laws, and, in California, maintaining separate privacy policies for any mobile applications and identifying in any website privacy policies how the site handles do-not-track browser settings. Schools are unique and face an even greater data privacy burden under the Children’s Online Privacy Protection Act (COPPA) and the Family Education Rights and Privacy Act (FERPA). The patchwork of laws and regulations at all levels makes the increasing collection of student data all the more risky. For schools, a full understanding of relevant privacy laws—specifically FERPA—is imperative before engaging in the collection, analysis or storage of student data. Cloud  Storage,  Data  Analy-cs  &  FERPA The Family Education Rights and Privacy Act (FERPA) restricts the disclosure of student records that are maintained by educational institutions who receive funds from the Department of Education. Generally speaking, FERPA allows disclosure of personally identifiable information (PII) from a student’s education record only with consent from that student’s parent or guardian. An exception to the rule – known as the “school official” exception – allows disclosure without consent to contractors or other outside parties (known as third party providers or TPPs) if that TPP meets certain requirements. For example, the TPP must: (1) perform an institutional service or function for which the educational institution would otherwise use employees; (2) be under the direct control of the educational institution with respect to the use and maintenance of education records; (3) not disclose the information to any other party without the prior consent of the parents or eligible student; and (4) may only use the information for the purposes for which the disclosure was made. A  GAMA  White  Paper  produced  by  Brandon  Wiebe  &  Noah  Johnson                                            ©  2014.  Gagnier  Margossian  LLP.    All  rights  reserved.  
  • 2. Some important questions to ask when selecting a cloud service provider: • Will parents be able to review and potentially delete portions of a student’s education data record if they so request? • What are the cloud service provider’s data retention and deletion policies? • Does the cloud service provider disclose information to third parties? • Does the cloud service provider plan to release any anonymized data to third parties? • How will the cloud service provider implement data security protections for the education data records? What  About  COPPA? The Children’s Online Privacy Protection Act (COPPA) restricts the online collection of personally identifiable information of any child aged 12 or younger without parental consent. Websites that aim their services towards children must adopt some mechanism of obtaining parental consent before they begin data collection and must permit parents to access and delete data records regarding their children. COPPA generally does not effect educational institutions directly, as very few build and maintain their own websites or mobile applications. As the line between big data and education further blurs, schools should be aware of COPPA and its implications. It is quite possible that schools themselves may be drawn to develop their own proprietary data technologies – a move that would directly implicate COPPA. Compliance in California: Even More Legal Risks California has led the way in passing a variety of data privacy laws, including state-specific additions to the FERPA requirements, as well as robust regulations governing the collection of data online. Any educational institutions located in California must also be aware of these regulations before drafting and implementing a student data privacy policy. The California Attorney General’s Office maintains a website summarizing the major aspects of these privacy laws: http://oag.ca.gov/privacy/privacy-laws. Conclusion The regulatory landscape regarding data privacy can be overwhelming for institutions handling sensitive student information. As districts continue to embrace new data-driven technologies, they must develop plans to assess and maintain compliance with both federal and state rules. A data privacy attorney can help a school district makes sense of the requirements imposed by the web of data laws, allowing districts to mitigate legal risks while reaping the rewards of exciting new technologies. For  more  informa-on  on  how  your  school  district  can  manage  data  privacy, contact  an  aIorney  at  Gagnier  Margossian  LLP.
  • 3. References Jim Finkle and Mark Hosenball, Exclusive: More Well-Known U.S. Retailers Victims of Cyber Attacks, REUTERS (January 12, 2014), available at http://www.reuters.com/article/2014/01/12/us-target-databreach-retailersidUSBREA0B01720140112. Keith R. Krueger, Data Privacy: What School Leaders Should Know, ESCHOOLNEWS (January 6, 2014), available at http://www.eschoolnews.com/2014/01/06/data-privacy-cosn-119/ (study citation omitted). See generally 20 U.S.C. § 1232g; 34 C.F.R. 99. See generally 15 U.S.C. §§ 6501–6506. See, e.g., CAL. EDUC. CODE § 49069, et seq. (specifying a parent’s right to inspect, review and challenge the content of a student’s records maintained at a school district); Id. § 49073 et seq. (specifying requirements for school districts pertaining to student directory information and exceptions to parental consent requirements). See, e.g., California Online Privacy Protection Act of 2003, CAL. BUS. & PROF. CODE §§ 22575-22579. Internet Intellectual Property Privacy Social Media Technology The Good Stuff #nerdlawyers Los Angeles Sacramento T: 415.766.4591 F: 909.972.1639 E: consult@gamallp.com gamallp.com @gamallp San Francisco