No Result
View All Result
SUBSCRIBE | NO FEES, NO PAYWALLS
MANAGE MY SUBSCRIPTION
NEWSLETTER
Corporate Compliance Insights
  • Home
  • About
    • About CCI
    • CCI Magazine
    • Writing for CCI
    • Career Connection
    • NEW: CCI Press – Book Publishing
    • Advertise With Us
  • Explore Topics
    • See All Articles
    • Compliance
    • Ethics
    • Risk
    • FCPA
    • Governance
    • Fraud
    • Internal Audit
    • HR Compliance
    • Cybersecurity
    • Data Privacy
    • Financial Services
    • Well-Being at Work
    • Leadership and Career
    • Opinion
  • Vendor News
  • Library
    • Download Whitepapers & Reports
    • Download eBooks
    • New: Living Your Best Compliance Life by Mary Shirley
    • New: Ethics and Compliance for Humans by Adam Balfour
    • 2021: Raise Your Game, Not Your Voice by Lentini-Walker & Tschida
    • CCI Press & Compliance Bookshelf
  • Podcasts
    • Great Women in Compliance
    • Unless: The Podcast (Hemma Lomax)
  • Research
  • Webinars
  • Events
  • Subscribe
Jump to a Section
  • At the Office
    • Ethics
    • HR Compliance
    • Leadership & Career
    • Well-Being at Work
  • Compliance & Risk
    • Compliance
    • FCPA
    • Fraud
    • Risk
  • Finserv & Audit
    • Financial Services
    • Internal Audit
  • Governance
    • ESG
    • Getting Governance Right
  • Infosec
    • Cybersecurity
    • Data Privacy
  • Opinion
    • Adam Balfour
    • Jim DeLoach
    • Mary Shirley
    • Yan Tougas
No Result
View All Result
Corporate Compliance Insights
Home Compliance

New Focus on Student Data Privacy – How to Navigate it All

by Grant Waterfall
August 14, 2015
in Compliance
New Focus on Student Data Privacy – How to Navigate it All

with contributing author Carolyn Holcomb

Advances in school technology have revolutionized the classroom experience. The information generated from the applications and tools running on student computers allow teachers to personalize student learning and lesson plans, as well as provide real-time feedback tailored to each student’s academic needs. This boom in digital solutions for the classroom is not only revolutionary, but arguably critical to student learning and development. Yet in recent months there has been increased legal and regulatory focus on how leading tech companies and educational organizations use student data. The challenge for these tech and educational organizations is how they can continue progress in the classroom while complying with an abundance of new and changing laws, regulations and guidance.

Regulatory Environment

Federal Legislation

There are two primary federal laws impacting the use of student data: the Family Educational Rights and Privacy Act (FERPA), which protects student data from the unauthorized disclosure of education records, and the Children’s Online Privacy Protection Act (COPPA), which regulates marketing to children 13 years or younger.

While both federal laws are nearly 40 and 20 years old respectively, the challenge for businesses and organizations touching student data is figuring out how these legacy laws apply to modern classroom digital issues.

State Legislation

In 2014, 36 states introduced a whopping 110 bills. California distinguished itself as a leader in student data protection legislation by enacting the Student Online Personal Information Protection Act (SOPIPA), a law prohibiting technology companies from collecting student information for advertising and marketing purposes. To date, California’s law is one of the more comprehensive student privacy laws enacted. Subsequent state laws have modeled their requirements off California’s comprehensive legislation. However, while many state laws reflect California’s SOPIPA legislation, the volume of bills introduced, discussed and enacted across the country has created a patchwork of laws that are anything but uniform. Tech companies, their vendors and educational organizations are finding it increasingly challenging to navigate the varying, and potentially conflicting, state laws.

White House Initiatives

In January 2015, President Obama visited the Federal Trade Commission (FTC), where he proposed legislative improvements on student privacy. These sentiments were further reinforced during the State of the Union address that same month, where the President encouraged Congress to enact legislation around protecting student data. As a result, Congress proposed three different bills specifically addressing children’s educational data:  the Student Privacy Protection Act (Senator David Vitter, R-LA), the Student Digital Privacy and Parental Rights Act of 2015 (Representatives Luke Messer, R-IN and Jared Polis, D-CO) and the Protecting Student Privacy Act (Senators Edward Markey, D-MA and Orrin Hatch, R-UT).  While it is unclear whether any of these bills will eventually establish a new compliance standard for protecting student data, it is nevertheless a key focus for the White House and an item for leading tech companies and educational organizations to keep in mind.

Protecting Student Data Beyond Legislation

While federal and state law are in flux, President Obama publicly encouraged leading tech companies to sign and immediately adhere to the K-12 School Service Provider Pledge to Safeguard Student Privacy, commonly known as the Student Privacy Pledge. With Presidential support, the Student Privacy Pledge has quickly become a baseline standard by which tech companies can assess their conformance with generally accepted student privacy practices. While compliance with the Pledge is currently voluntary, it is enforceable by the FTC under Section 5 of the Consumer Protection Act and over 150 companies have signed on to honor the Pledge to date.

At a glance, the Student Privacy Pledge requires ed-tech companies to:

  • Not sell student information
  • Not use behavioral advertising
  • Use data for authorized education purposes only
  • Not change privacy policies without notice and choice
  • Enforce strict limits on data retention
  • Support parental access to, and correction of errors in, their children’s information
  • Provide comprehensive security standards
  • Be transparent about collection and use of data

Guidance from the U.S Department of Education earlier this year encouraged school districts to check if their ed-tech provider(s) had signed the Pledge as a part of the contract negotiation process. Failure to sign the pledge could raise a presumption of inadequacy in privacy and security governance in these negotiations. Without the Pledge as a baseline, the provider might be forced to negotiate “one-off” assurances around security and privacy across multiple agreements with different customers. These assurances could be more burdensome and more difficult to monitor, increasing the risk of noncompliance.

Ed-tech companies must weigh the potential risks and benefits of signing the Pledge. In doing so, the organization will need to assess its practices in relation to student data. However, taking a more holistic view of all personal information may be beneficial and, perhaps, necessary.

So what now?

Whether your organization is struggling with how to identify laws and regulations that apply, or whether you’re debating signing the Student Privacy Pledge, there are steps you can take to assess general compliance around accepted privacy and security practices. By implementing these initial best practices, you will help your organization better understand your data handling procedures and determine the impact they have on student data.  Some key best practices include:

Identify Regulatory Compliance Requirements: Creating a blueprint for regulatory compliance impacting your business will help identify specific state, federal and/or regulatory guidance with which you and your vendors must comply. This further includes identifying whether signing the Student Privacy Pledge is appropriate for your organization.

Conduct Program Maturity Assessment: Conducting a privacy and security program maturity assessment can help your organization identify how mature policies, procedures and training are, and especially whether they are considering student data privacy protections. Using a third-party assessor can help provide an assessment of your organization’s maturity as compared to peers.

Create Data Inventory: Creating a data inventory to better understand how data, and specifically student data, is collected, used, shared (including by vendors) and stored, as well as what risks are associated with the data flow is essential to knowing how to protect that information. Only when organizations understand where their data is stored can they determine and implement appropriate protection.

Implement an Information Governance Model: Implementing a strong governance model creates a necessary culture around protecting data. Defining roles for accountability and responsibility are first steps in establishing strong governance within your organization, especially if protecting student data privacy specifically has not been a historical focus.

Implement a Vendor-Management Program: Implementing a robust vendor on-boarding program to analyze contracting processes can identify how data is being collected, used and shared only based on defined purposes. For multi-year contracts, define and implement a process to re-assess controls and re-validate contracts periodically to check that high-risk vendors remain operationally effective. Control assessments can be achieved by reviewing a vendor’s SOC2 report or by performing independent audit procedures.

Implement Privacy by Design: Integrating privacy throughout the product life cycle, including design, architecture and associated marketing campaigns can increase privacy’s visibility in product development, as well as the likelihood that potential misuse of data, specifically student data, is identified.

Require Privacy Training and Promotion: Training employees on their obligations to protect and safeguard sensitive data, specifically how they use educational data, will highlight a commitment to complying with student data-handling requirements.

Continuously Improve: View this effort as a program and not a project. Implement oversight, monitoring and independent verification to identify risks to over the life cycle of student data. Take action to remediate uncovered risks.

 

Resources:

Chrys Dougherty, Getting FERPA Right: Encouraging Data Use While Protecting Student Privacy, in A Byte at the Apple: Rethinking Education Data for the Post-NCLB Era 38, 39 (Marci Kanstoroom & Eric Osberg eds., 2008).

edSurge: https://www.edsurge.com/n/2015-06-16-state-by-state-legislation-understanding-ferpa-and-a-student-s-role-in-data-privacy

Will Congress Overhaul FERPA; https://privacyassociation.org/news/a/will-congress-overhaul-ferpa/

Data Quality Campaign, State Student Data Privacy Legislation Resource

edSurge: https://www.edsurge.com/n/2015-06-18-which-student-data-privacy-bill-will-become-law

Full link to the Student Privacy Pledge http://studentprivacypledge.org.


Tags: Board Risk Oversight
Previous Post

ACA Preparedness: Get Ready – The Train Is Coming

Next Post

U.S. Supreme Court Sides With EEOC in Abercrombie Headscarf Case

Grant Waterfall

Grant Waterfall

August 14 - Grant Waterfall headshot (300x450)Grant Waterfall is a partner on international assignment from the PwC UK London office. He is based in New York and is PwC’s global cybersecurity, privacy and technology risk assurance leader. He primarily serves Fortune 500 clients in the areas of cybersecurity, cross border privacy and IT Risk. After joining PwC in 1994, Grant held a number of positions across the firm in Europe and the U.S. He is a risk and controls specialist with a strong background of advising clients on developing their information risk management and assurance functions. Over the past 7 years he has been responsible for building and leading the UK cybersecurity and IT Risk Assurance practice and developing PwC’s digital practice.   Grant has a long history in large-scale systems implementation projects, large program assurance, systems assurance, outsourcing and offshoring projects, cybersecurity, privacy and IT risk management.  Grant also has led internal audit co-sourcing assignments at a number of companies and has led the systems and process assurance elements of a number of multinational audits. This experience has equipped him to work seamlessly across IT and finance functions and with internal auditors and external auditors while also effectively communicating issues with Boards and audit committees. Grant is a chartered accountant and Certified Information Systems Auditor (CISA).

Related Posts

signing deal signature

When the Ink Dries: 6 Critical Post-Transaction Areas That Make or Break M&A Success

by Jim DeLoach
April 14, 2025

Poor follow-up once the deal is closed can cause culture clashes & value erosion

news roundup new

Bang for the Buck: Regulators Pivot to Fewer But Higher-Value Enforcement Actions

by Staff and Wire Reports
April 11, 2025

CCI staff share recent surveys, reports and analysis on risk, compliance, governance, infosec and leadership issues. Share details of your...

merger concept figurines

When Money Isn’t Cheap, M&A Due Diligence Must Go Deeper

by Jim DeLoach
March 17, 2025

Today's dealmakers must scrutinize targets through multiple lenses to avoid costly post-acquisition surprises

chess pieces

10 Questions That Separate Strategic Leaders From Spectators

by Jim DeLoach
February 19, 2025

From pattern recognition to emotional intelligence, key indicators reveal true boardroom influence

Next Post
U.S. Supreme Court Sides With EEOC in Abercrombie Headscarf Case

U.S. Supreme Court Sides With EEOC in Abercrombie Headscarf Case

No Result
View All Result

Privacy Policy | AI Policy

Founded in 2010, CCI is the web’s premier global independent news source for compliance, ethics, risk and information security. 

Got a news tip? Get in touch. Want a weekly round-up in your inbox? Sign up for free. No subscription fees, no paywalls. 

Follow Us

Browse Topics:

  • CCI Press
  • Compliance
  • Compliance Podcasts
  • Cybersecurity
  • Data Privacy
  • eBooks Published by CCI
  • Ethics
  • FCPA
  • Featured
  • Financial Services
  • Fraud
  • Governance
  • GRC Vendor News
  • HR Compliance
  • Internal Audit
  • Leadership and Career
  • On Demand Webinars
  • Opinion
  • Research
  • Resource Library
  • Risk
  • Uncategorized
  • Videos
  • Webinars
  • Well-Being
  • Whitepapers

© 2025 Corporate Compliance Insights

Welcome to CCI. This site uses cookies. Please click OK to accept. Privacy Policy
Cookie settingsACCEPT
Manage consent

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may affect your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. These cookies ensure basic functionalities and security features of the website, anonymously.
CookieDurationDescription
cookielawinfo-checbox-analytics11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Analytics".
cookielawinfo-checbox-functional11 monthsThe cookie is set by GDPR cookie consent to record the user consent for the cookies in the category "Functional".
cookielawinfo-checbox-others11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Other.
cookielawinfo-checkbox-necessary11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookies is used to store the user consent for the cookies in the category "Necessary".
cookielawinfo-checkbox-performance11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Performance".
viewed_cookie_policy11 monthsThe cookie is set by the GDPR Cookie Consent plugin and is used to store whether or not user has consented to the use of cookies. It does not store any personal data.
Functional
Functional cookies help to perform certain functionalities like sharing the content of the website on social media platforms, collect feedbacks, and other third-party features.
Performance
Performance cookies are used to understand and analyze the key performance indexes of the website which helps in delivering a better user experience for the visitors.
Analytics
Analytical cookies are used to understand how visitors interact with the website. These cookies help provide information on metrics the number of visitors, bounce rate, traffic source, etc.
Advertisement
Advertisement cookies are used to provide visitors with relevant ads and marketing campaigns. These cookies track visitors across websites and collect information to provide customized ads.
Others
Other uncategorized cookies are those that are being analyzed and have not been classified into a category as yet.
SAVE & ACCEPT
No Result
View All Result
  • Home
  • About
    • About CCI
    • CCI Magazine
    • Writing for CCI
    • Career Connection
    • NEW: CCI Press – Book Publishing
    • Advertise With Us
  • Explore Topics
    • See All Articles
    • Compliance
    • Ethics
    • Risk
    • FCPA
    • Governance
    • Fraud
    • Internal Audit
    • HR Compliance
    • Cybersecurity
    • Data Privacy
    • Financial Services
    • Well-Being at Work
    • Leadership and Career
    • Opinion
  • Vendor News
  • Library
    • Download Whitepapers & Reports
    • Download eBooks
    • New: Living Your Best Compliance Life by Mary Shirley
    • New: Ethics and Compliance for Humans by Adam Balfour
    • 2021: Raise Your Game, Not Your Voice by Lentini-Walker & Tschida
    • CCI Press & Compliance Bookshelf
  • Podcasts
    • Great Women in Compliance
    • Unless: The Podcast (Hemma Lomax)
  • Research
  • Webinars
  • Events
  • Subscribe

© 2025 Corporate Compliance Insights