Skip to main content

Home/ Diigo In Education/ Group items tagged privacy Service

Rss Feed Group items tagged

Sheri Edwards

Privacy Policy - Google Privacy Center - 4 views

  •  
    Information sharing Google only shares personal information with other companies or individuals outside of Google in the following limited circumstances: We have your consent. We require opt-in consent for the sharing of any sensitive personal information. We provide such information to our subsidiaries, affiliated companies or other trusted businesses or persons for the purpose of processing personal information on our behalf. We require that these parties agree to process such information based on our instructions and in compliance with this Privacy Policy and any other appropriate confidentiality and security measures. We have a good faith belief that access, use, preservation or disclosure of such information is reasonably necessary to (a) satisfy any applicable law, regulation, legal process or enforceable governmental request, (b) enforce applicable Terms of Service, including investigation of potential violations thereof, (c) detect, prevent, or otherwise address fraud, security or technical issues, or (d) protect against harm to the rights, property or safety of Google, its users or the public as required or permitted by law. If Google becomes involved in a merger, acquisition, or any form of sale of some or all of its assets, we will ensure the confidentiality of any personal information involved in such transactions and provide notice before personal information is transferred and becomes subject to a different privacy policy.
Katie Akers

COPPA and Schools: The (Other) Federal Student Privacy Law, Explained - Education Week - 4 views

  • In a nutshell, COPPA requires operators of commercial websites, online services, and mobile apps to notify parents and obtain their consent before collecting any personal information on children under the age of 13. The aim is to give parents more control over what information is collected from their children online.
  • This law directly regulates companies, not schools. But as the digital revolution has moved into the classroom, schools have increasingly been put in the middle of the relationship between vendors and parents.
  • In some cases, companies may try to shift some of the burden of COPPA compliance away from themselves and onto schools
  • ...15 more annotations...
  • “That is not without risk, and COPPA has a whole lot of gray area that gives school attorneys pause.”
  • Less clear, though, is whether COPPA covers information such as IP (internet protocol) address, device identification number, the type of browser being used, or other so-called metadata that can often be used to identify users.
  • some school lawyers have taken the FTC’s previous guidance to mean that their districts must get consent from every single parent, for every single product that collects information online from young children.
  • First, according to the FTC, schools can grant consent on behalf of parents only when the operator of the website, online service, or app in question is providing a service that is “solely for the benefit of students and the school system” and is specific to “the educational context.”
  • How are schools supposed to determine if a website or app is strictly educational?
  • will any information collected from children under 13 be used or shared for commercial purposes unrelated to education? Are schools allowed to review the information collected on students? Can schools request that student info be deleted? If the answers to that second group of questions are, respectively, yes, no, or no, schools are not allowed to grant consent on behalf of parents, according to the FTC.
  • Many vendors also allow third-party trackers (usually related to analytics or advertising) to be embedded into their sites and services.
  • How do schools notify parents and get their consent under COPPA?
  • Often through an Acceptable Use Policy or similar document that is sent home to parents at the beginning of the school year, said Fitzgerald of Common Sense Media.
  • Even better, Fitzgerald said, is when schools provide a detailed list of exactly what websites/online services/apps students will be using, and what the information practices of each are.
  • some privacy experts say that a one-time, blanket sign-off at the beginning of the school year may not be considered valid notification and consent under COPPA, especially if it doesn’t list the specific online services that children will be using.
  • responsibility for deciding “whether a particular site’s or service’s information practices are appropriate” not be delegated to teachers.
  • Many districts do in fact have that kind of review-and-approval process.
  • One is “click-wrap agreements.” Often, these are the kinds of agreements that almost all of us are guilty of just clicking through without actually reading
  • Herold, Benjamin. (2017, July 28). The Children’s Online Privacy Protection Act. Education Week. Retrieved Month Day, Year from http://www.edweek.org/ew/issues/childrens-online-privacy-protection-act-coppa/
Sheri Edwards

Privacy FAQ - Google Privacy Center - 4 views

  •  
    Privacy FAQ -- 
Phil Taylor

Education 2.0 - Edmodo - Free Private Microblogging For Education - 28 views

  • strong and growing. Thank you!

    Mrs. Smokorowski

    Middle School Teacher
    Andover, Kansas

     
    • Kalin Wilburn
       
      If you are fearful of Facebook and MySpace then you need to create an Edmodo account. Edmodo was designed specifically for educational purposes. You must be a teacher, student, or parent to gain access. It allows you all the amenities of those other social networking sites but with a lot more security/privacy.
    • Maryalice Kilbourne
       
      You are so right. I already love edmodo!
    • Denise Krefting
       
      Is it COPPA Compliant?
    • Luv2ride
       
      I've used Edmodo for 3 years now. It has revolutionized my teaching to the degree that I don't know what I'll do if I ever have to stop using it.
    • Herb Schulte
       
      That is great question. And do you need parent permission for students to use it?
    • Jordan Moody
       
      Is it free?
    • Gil Anspacher
       
      Yes, it is free and you can manage student accounts. It is only open to those you invite in and only educators may obtain an account. You may monitor and moderate all conversations, administer quizes, embed media, etc. The groups feature is very effective and you may grant access to your group to other classes. We just had 700+ students interacting in a global collaboration project, Digiteen. Students do not need an email address to use Edmodo, so under 13 is OK for CIPA. It looks much like Facebook, so kids love it and parents need some education on it as they fear it at first. Parents can get monitoring access so they may monitor their child's activity. It is a great tool to show parents how social media is used in education.
  •  
    Social networking for teachers & students. Send homework, links, videos, participate in discussions, share ideas.
Sandy Munnell

Social networking - digizen.org - 36 views

  •  
    "Social Networking Evaluation Chart This checklist is designed to help review Social Networking Services (SNS). Although services develop continually, Childnet is committed to ensuring that the information provided is accurate at the time of publication (March 2008). We have drawn on publicly available information from service providers' websites (particularly each service's Terms of Use and Privacy Policy), as well as trying out each of the sites reviewed extensively. Additionally, we contacted the service providers included here and invited them to contribute to the project and comment on the chart entry for their service. "
D. S. Koelling

Embracing the Cloud: Caveat Professor - The Digital Campus - The Chronicle of Higher Ed... - 37 views

  • My work as chief privacy and security officer at a large public university has, however, given me pause to ask if our posture toward risk prevents us from fully embracing technology at a moment of profound change.
  • Consequently, faculty members are accepting major personal and institutional risk by using such third-party services without any institutional endorsement or support. How we provide those services requires a nuanced view of risk and goes to the heart of our willingness to trust our own faculty and staff members.
  • The technologically savvy among us recognize that hard physical, virtual, and legal boundaries actually demark this world of aggressively competitive commercial entities. Our students, faculty, and staff often do not.
  • ...5 more annotations...
  • But can we embrace the cloud? Can the faculty member who wears our institution's name in her title and e-mail address, to whom we've entrusted the academic and research mission of the institution, be trusted to reach into the cloud and pluck what she believes is the optimal tool to achieve her pedagogical aims and use it? Unfortunately, no. Many faculty and staff members simply use whatever service they choose, but they often do not have the knowledge or experience needed to evaluate those choices. And those who do try to work through the institution soon find themselves mired in bureaucracy.
  • First we review the company's terms of service. Of course, we also ask the company for any information it can provide on its internal data security and privacy practices. Our purchasing unit rewrites the agreement to include all of the state-required procurement language; we also add our standard contract language on data security. All of this information is fed into some sort of risk assessment of varying degrees of formality, depending on the situation, and, frankly, the urgency. That leads to yet another round of modifications to the agreement, negotiations with the company, and, finally, if successful, circulation for signatures. After which we usually exhume the corpse of the long-deceased faculty member and give him approval to use the service in his class. We go through this process not from misguided love of bureaucracy, but because our institutions know of no other way to manage risk. That is, we have failed to transform ourselves so we can thrive and compete in the 21st century.
  • But our faculty and staff are increasingly voting with their feet—they're more interested in the elegance, portability, and integration of commercial offerings, despite the inability to control how those programs change over time. By insisting on remaining with homegrown solutions, we are failing to fall in lockstep with those we support.
  • Data security? Of course there are plenty of fly-by-night operations with terrible security practices. However, as the infrastructure market has matured (one of the generally unrecognized benefits of cloud services), more and more small companies can provide assurances of data security that would shame many of us even at large research-intensive institutions.
  • If higher education is to break free of the ossified practices of the past, we must find ways to transfer risk acceptance into the faculty domain—that is, to enable faculty to accept risk. Such a transformation is beyond the ability of the IT department alone—it will require our campus officials, faculty senates, registrars, and research and compliance officers working together to deeply understand both the risks and the benefits
Steve Kelly

Terms of Service and Privacy Policy | - 10 views

    • Steve Kelly
       
      Easel.ly I teach 6th grade. We are not allowed to have our [under age 13] students sign up on any website that requires personally identifiable information. Can I create a "generic" account that all of my students may use for a class project? * Reply * Share › − Avatar vernon Mod Book Lady * 5 months ago Hi! So what you can do is use our Groups feature it allows everything that you need: http://www.easel.ly/blog/easel... vernon@easel.ly is my email if you need any help getting up and running.
Ed Webb

Web-monitoring software gathers data on kid chats by AP: Yahoo! Tech - 0 views

  • Parents who install a leading brand of software to monitor their kids' online activities may be unwittingly allowing the company to read their children's chat messages — and sell the marketing data gathered.
  • Software sold under the Sentry and FamilySafe brands can read private chats conducted through Yahoo, MSN, AOL and other services, and send back data on what kids are saying about such things as movies, music or video games. The information is then offered to businesses seeking ways to tailor their marketing messages to kids.
  • a separate data-mining service called Pulse that taps into the data gathered by Sentry software to give businesses a glimpse of youth chatter online. While other services read publicly available teen chatter, Pulse also can read private chats. It gathers information from instant messages, blogs, social networking sites, forums and chat rooms.
  • ...1 more annotation...
  • Parents who don't want the company to share their child's information to businesses can check a box to opt out. But that option can be found only by visiting the company's Web site, accessible through a control panel that appears after the program has been installed. It was not in the agreement contained in the Sentry Total Home Protection program The Associated Press downloaded and installed Friday.
Margaret FalerSweany

With Tech Taking Over in Schools, Worries Rise - NYTimes.com - 43 views

  • Technology companies are collecting a vast amount of data about students, touching every corner of their educational lives — with few controls on how those details are used.
  • growing parental concern that sensitive information about children — like data about learning disabilities, disciplinary problems or family trauma — might be disseminated and disclosed, potentially hampering college or career prospects.
  • implications beyond education.
  •  
    Discusses laws proposed in 16 states "prohibiting educational sites, apps and cloud services used by schools from selling or disclosing personal information about students from kindergarten through high school; from using the children's data to market to them; and from compiling dossiers on them."
mmdenne

https://stkate.desire2learn.com/content/enforced/113596-410502017/Readings%20for%20Modu... - 9 views

    • mmdenne
       
      There are moany online businesses on facebook. I can't even begin to htink about the number of people selling Rodan and Fields, 31, etc... - My negihbor works n the prison and she still can't have a cell phone - You have ti be careful what you ike and don't like because that could look bad to potential employrs. You have tore realize that your posts are seen by everyone. Ha! Line 23 just said wthe same thing! - Why can't stuents, exmployees, have personel lives and live them on facebook. How you are in a social speace does not define you as an employee, students, etc... Okay- this background- checking service that takes pictures and keeps themfor 7 years is skechy! - It is scary to think that anything we post can be used by anyone for any purpose.
    • mmdenne
       
      Really? We are monitored if we type in a cerain term? Pork seems abit scary in that a certain group is clearly being targeted here. - I do like the advanteages soical media can bring to horrific siutation: missing children. thefts, etc... It can really help people find who they are looking for: parents looking for birth children, etc... -- Streaming in our own state on facebook of cop shooting F"Facebook holds the cards , and its citizens have little recourse- other than to leave the service entirely." ( ) scary! page 9 - ads on facebook r targeted to us for what we search which is unsettling. Facebook knows alot about me! - Where do companies like Spokeo get all of our information??? Ahh- okay I see. But because they claim they are out there for entertainment that do not have to be accurate and can post that stuff??
Jay Bohnsack

Red Tape - Govt. agencies, colleges demand applicants' Facebook passwords - 6 views

  • job seekers applying to the state's Department of Corrections have been asked during interviews to log into their accounts and let an interviewer watch while the potential employee clicks through wall posts, friends, photos and anything else that might be found behind the privacy wall.
  • schools are requiring them to "friend" a coach or compliance officer,
  • it had reviewed 2,689 applicants via social media, and denied employment to seven because of items found on their pages
  • ...4 more annotations...
  • For student athletes, though, the access isn't voluntary. No access, no sports.
  • the rush to social media monitoring raises an often overlooked legal concern: It's against Facebook's Terms of Service
  • You will not share your password ... let anyone else access your account or do anything else that might jeopardize the security of your account
  • And the state of Illinois has followed Maryland's lead and is considering similar legislation to ban social media password demands by employers
1 - 12 of 12
Showing 20 items per page