Skip to main content

Home/ educators/ Group items tagged data protection

Rss Feed Group items tagged

Martin Burrett

Helping schools comply with GDPR - 0 views

  •  
    "You may be aware that in May 2018, the regulations regarding data protection in the United Kingdom will change, becoming the General Data Protection Regulations (GDPR). This means the way you manage all data and information within your school will also be changing. Once the new regulations come into force, schools will have a number of objectives to meet regarding the accuracy and security of the data held on their pupils, parents and staff."
Martin Burrett

GDPR and Education - 0 views

  •  
    "New rights and responsibilities regarding personal data are set to be released in Europe on 25th May 2018 under the new General Data Protection Regulation (GDPR). For individuals, new rights are given by knowing what information organisations hold about you, and what they can do with it. Organisations have new obligations, including ensuring permission has been given to hold such data and responsibilities about the way the data is held. The changes affect everyone, including schools, educational companies, and individuals."
Anne Bubnic

Play It Safe: Hackers use the back door to get into your computer; a strong, well-chose... - 0 views

  • For the home user, however, password safety requires more than on-the-fly thinking. Pacheco suggests a system built around a main word for all instances. The distinction is that the name of the site is added somewhere. For example, if the main word is "eggplant," the password might be "eggyyplant" Yahoo, "eggplantgg" for Google or "wleggplant" for Windows Live. He suggests listing the variations in an Excel spreadsheet.
  • Password security is a big deal, and if you don't think it is, then someone might be hacking into your computer even as you read this. A strong password isn't foolproof, but it proves that you're no fool. And it might protect you from compromised data, a broken computer or identity theft. Your bank account, your personal e-mails and lots of other stuff are at risk with weak passwords.
  • "A good password is the most important part of Internet security," said Robert Pacheco, the owner of Computer Techs of San Antonio. "It's the beginning and end of the issue. You can't stop it (hacking). You do what you can do to prevent it. You just try to stop most of it." A strong firewall, as well as spyware -- and virus-detection software -- protect a computer's so-called "back door," Pacheco said, where a hacker can gain access through various cyber threats. Those threats include infected e-mail attachments; phishing Web pages that exploit browser flaws; downloaded songs or pictures with hidden trojans; or plain ol' poking-and-prodding of a computer's shields. But passwords protect information from a frontal assault by way of the computer's keyboard.
  • ...7 more annotations...
  • Other people use easy-to-remember passwords. Trouble is, Rogers said, they're easy-to-guess passwords, too. Good examples of bad passwords are your name, your family's names, your pet's name, the name of your favorite team, your favorite athlete or your favorite anything. Get to know the person -- a technique that geeks refer to as "social engineering" -- and the password is easy to guess. There are message-board stalkers who can guess passwords in a half-dozen tries. Hackers rely on a lot of methods. Some, Rogers said, employ "shoulder surfing." That means what it sounds like -- looking over someone's shoulder as that person is typing in a password.
  • Other people use easy-to-remember passwords. Trouble is, Rogers said, they're easy-to-guess passwords, too. Good examples of bad passwords are your name, your family's names, your pet's name, the name of your favorite team, your favorite athlete or your favorite anything
  • The type of hardware being used can be a clue, said Rogers, a senior technical staffer in the CERT Program, a Web security research center in Carnegie-Mellon University's software engineering institute. It's easy to find a default password, typically in the user's manual on a manufacturer's Web site. If the user hasn't changed the default, that's an easy break-in.
  • Hackers rely on a lot of methods. Some, Rogers said, employ "shoulder surfing." That means what it sounds like -- looking over someone's shoulder as that person is typing in a password
  • Most of the password hacking activity these days goes on at homes, in school or in public settings. These days, many workplaces mandate how a password is picked.
  • The idea is to choose a password that contains at least one uppercase letter, one numeral and at least eight total characters. Symbols are good to throw in the mix, too. Many companies also require that passwords be changed regularly and that pieces of older ones can't be re-used for months. And user names cannot be part of the password. Examples: Eggplant99, 99eggpLanT, --eggp--99Lant. For the next quarter, the password might change to variations on "strawberry.
  • The idea is to choose a password that contains at least one uppercase letter, one numeral and at least eight total characters. Symbols are good to throw in the mix, too. Many companies also require that passwords be changed regularly and that pieces of older ones can't be re-used for months. And user names cannot be part of the password. Examples: Eggplant99, 99eggpLanT, --eggp--99Lant. For the next quarter, the password might change to variations on "strawberry."
  •  
    Password security is a big deal, and if you don't think it is, then someone might be hacking into your computer even as you read this. A strong password isn't foolproof, but it proves that you're no fool. And it might protect you from compromised data, a broken computer or identity theft. Your bank account, your personal e-mails and lots of other stuff are at risk with weak passwords.
Ed Webb

Web-monitoring software gathers data on kid chats by AP: Yahoo! Tech - 0 views

  • Parents who install a leading brand of software to monitor their kids' online activities may be unwittingly allowing the company to read their children's chat messages — and sell the marketing data gathered.
  • Software sold under the Sentry and FamilySafe brands can read private chats conducted through Yahoo, MSN, AOL and other services, and send back data on what kids are saying about such things as movies, music or video games. The information is then offered to businesses seeking ways to tailor their marketing messages to kids.
  • a separate data-mining service called Pulse that taps into the data gathered by Sentry software to give businesses a glimpse of youth chatter online. While other services read publicly available teen chatter, Pulse also can read private chats. It gathers information from instant messages, blogs, social networking sites, forums and chat rooms.
  • ...1 more annotation...
  • Parents who don't want the company to share their child's information to businesses can check a box to opt out. But that option can be found only by visiting the company's Web site, accessible through a control panel that appears after the program has been installed. It was not in the agreement contained in the Sentry Total Home Protection program The Associated Press downloaded and installed Friday.
Martin Burrett

10 GDPR Questions Answered - 1 views

  •  
    "As you will see below you can do very little without gaining express permission, yet if you are clear about how you will use the data and strictly adhere to this, in addition to evidencing this permission, you can do so much."
Art Gelwicks

No videoconference to Williamsburg - I'm sad » Moving at the Speed of Creativity - 0 views

  • but we’ll do so from our church, away from school, and we will not involve any Edmond PS students in the videoconference to comply with the directive from the district technology director. I did not realize the district forbids any parents or students from using any type of personal computer and outside Internet connection device (like my cell network data card) to provide an interactive learning opportunity for students. Now I know.
  •  
    Yet another district technology director giving the rest of us a bad name. Good grief....justify yourself without using the paranoid buzzphrase, "To Protect the Children!"
  •  
    Why are we afraid to confront district technology personnel and administrators over knee-jerk tragic decisions like this?
Deron Durflinger

Niall Ferguson: How American Civilization Can Avoid Collapse - The Daily Beast - 4 views

  • “killer applications
  • Competition
  • The Scientific Revolution
  • ...29 more annotations...
  • Modern Medicine
  • The Consumer Society
  • The Work Ethic
  • The Rule of Law and Representative Government.
  • these killer apps were essentially monopolized by Europeans and their cousins who settled in North America and Australasia
  • the great divergence
  • They also grew more powerful
  • 20th century, just a dozen Western empires—-including the United States—controlled 58 percent of the world’s land surface and population, and a staggering 74 percent of the global economy.
  • tendency of Western societies to delete their own killer apps.
  • But there is a second, more insidious cause of the “great reconvergence,” which I do deplore—and that is the
  • Ask yourself: who’s got the work ethic now? The average South Korean works about 39 percent more hours per week than the average American. The school year in South Korea is 220 days long, compared with 180 days here. And you don’t have to spend too long at any major U.S. university to know which students really drive themselves: the Asians and Asian-Americans
  • Yet life expectancy in the U.S. has risen from 70 to 78 in the past 50 years, compared with leaps from 68 to 83 in Japan and from 43 to 73 in China.
  • On no fewer than 15 of 16 different issues relating to property rights and governance, the United States fares worse than Hong Kong. Indeed, the U.S. makes the global top 20 in only one area: investor protection
  • The future belongs not to them but to today’s teenagers
  • The latest data on “mathematical literacy” reveal that the gap between the world leaders—the students of Shanghai and Singapore—and their American counterparts is now as big as the gap between U.S. kids and teenagers in Albania and Tunisia.
  • Yet statistics from the World Intellectual Property Organization show that already more patents originate in Japan than in the U.S., that South Korea overtook Germany to take third place in 2005, and that China is poised to overtake Germany too
  • the United States’ average competitiveness score has fallen from 5.82 to 5.43, one of the steepest declines among developed economies. China’s score, meanwhile, has leapt up from 4.29 to 4.90.
  • Perhaps more disturbing is the decline of meaningful competition at home, as the social mobility of the postwar era has given way to an extraordinary social polarization. You don’t have to be an Occupy Wall Street leftist to believe that the American super-rich elite—the 1 percent that collects 20 percent of the income—has become dangerously divorced from the rest of society, especially from the underclass at the bottom of the income distribution.
  • Far more than in Europe, most Americans remain instinctively loyal to the killer applications of Western ascendancy, from competition all the way through to the work ethic. They know the country has the right software. They just can’t understand why it’s running so damn slowly.
  • What we need to do is to delete the viruses that have crept into our system: the anticompetitive quasi monopolies that blight everything from banking to public education; the politically correct pseudosciences and soft subjects that deflect good students away from hard science; the lobbyists who subvert the rule of law for the sake of the special interests they represent—to say nothing of our crazily dysfunctional system of health care, our overleveraged personal finances, and our newfound unemployment ethic
  • And finally we need to reboot our whole system.
  • If what we are risking is not decline but downright collapse, then the time frame may be even tighter than one election cycle
  • Western Civilization's Killer Apps
  • COMPETITION
  • THE SCIENTIFIC REVOLUTION
  • THE RULE OF LAW
  • MODERN MEDICINE
  • THE CONSUMER SOCIETY
  • THE WORK ETHIC
1 - 7 of 7
Showing 20 items per page