Resources address data sharing and dissemination, disclosure avoidance, data security, data governance, and legal references.
Its latest resource, “Protecting Student Privacy While Using Online Educational Services,” offers a number of best practices when it comes to legal issues and policy concerns and student data.
“The new normal embraces a stunning variety of tools and connectedness,” Duncan said in prepared remarks. “In schools, like everywhere else, these new tools and connections have offered extraordinary learning opportunities.”
But these new opportunities have given rise to new concerns and cautions about personal data security.
“The benefits for students of technological advancement can’t be a trade-off with the security and privacy of our children,” Duncan said. “We must provide our schools, teachers and students cutting-edge learning tools. And we must protect our children’s privacy. We can and must accomplish both goals–but we will have to get smarter to do it.”
Schools and districts shouldn’t hesitate to ask hard-hitting questions in an attempt to align policy with evolving technologies and make privacy a priority, Duncan said.
Those questions include:
- Do you know what online services your schools and teachers are using?
- Are you offering teachers timely approval of technology they want to use?
- Do your contracts explicitly lay out the ownership and appropriately limit the use of any data collected?
- Are you transparent with parents about how your district uses data?
- Do your schools allow students to bring their own devices as tools for learning, and do your policies protect them?
“Technology…can help us increase both equity and excellence–if everyone works together to produce solutions that serve students well,” Duncan said. “Smart policies will support–not impede–educators who want to put technology to work for kids.”
Schools and districts are changing their practices to use data in smarter ways to drive improvement at all levels, he said.
“Schools and districts need to develop policies that allow rapid adoption of technologies that meet privacy and security standards–and rejection of those that do not.”