02:32 PM

Dept. Of Education Proffers New Privacy Rules

The U.S. Department of Education has proposed a number of new initiatives aimed to better safeguard student privacy.

The goal, according to a news release issued late last week, is to balance the needs of student privacy with the needs of the authorities to track student progress over time so that the government can judge the effectiveness of education programs.

The proposed privacy enhancements will fall under the purview of the Family Educational Rights and Privacy Act of 1974 (FERPA), and were published into the Federal Register on Friday.

According to the statement, the move is designed to bring student record privacy protections up to date. "Over time, interpretations of FERPA have complicated valid and necessary disclosures of student information without increasing privacy protections and, in some cases, dramatically decreased the protections afforded students."

"Data should only be shared with the right people for the right reasons," said U.S. Secretary of Education Arne Duncan. "We need common-sense rules that strengthen privacy protections and allow for meaningful uses of data. The initiatives announced today will help us do just that," the statement continues.

Toward those goals, the education department has hired its first chief privacy officer. The privacy officer will head a new division that will promote responsible stewardship, collection, use, maintenance, and disclosure of information at the national level within the Education Department. The new officer will also coordinate technical assistance efforts for states, districts, and other education stakeholders, helping them understand important privacy issues such as minimizing unnecessary collection of personal information.

The Education Department has also said it will establish a Privacy Technical Assistance Center that will work within the National Center for Education Sciences. The Privacy Technical Assistance Center will provide educational institutions guidance on privacy, confidentiality, and data security. The Education Department has also started published a new series of briefs that offer best practices on data security and privacy. They are available here.

Also under the proposal:

-- Enforcement provisions of FERPA would be strengthened to ensure that every entity working with personally identifiable information from student education records is using it for authorized purposes only.

-- Schools will be able to implement directory information policies that limit access to student records, preventing marketers or criminals from accessing the data.

-- States can enter into research agreements on behalf of their districts to measure the success of programs, such as early childhood programs that effectively prepare kids for kindergarten.

-- High school administrators can share information on student achievement to track how their graduates perform academically in college.

The commenting period at www.regulations.gov will run until May 23, 2011.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Current Issue
Dark Reading Tech Digest September 7, 2015
Some security flaws go beyond simple app vulnerabilities. Have you checked for these?
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
Published: 2015-10-09
Simple Streams (simplestreams) does not properly verify the GPG signatures of disk image files, which allows remote mirror servers to spoof disk images and have unspecified other impact via a 403 (aka Forbidden) response.

Published: 2015-10-09
The Telephony component in Apple OS X before 10.11, when the Continuity feature is enabled, allows local users to bypass intended telephone-call restrictions via unspecified vectors.

Published: 2015-10-09
IcedTea-Web before 1.5.3 and 1.6.x before 1.6.1 does not properly sanitize applet URLs, which allows remote attackers to inject applets into the .appletTrustSettings configuration file and bypass user approval to execute the applet via a crafted web page, possibly related to line breaks.

Published: 2015-10-09
IcedTea-Web before 1.5.3 and 1.6.x before 1.6.1 does not properly determine the origin of unsigned applets, which allows remote attackers to bypass the approval process or trick users into approving applet execution via a crafted web page.

Published: 2015-10-09
The Safari Extensions implementation in Apple Safari before 9 does not require user confirmation before replacing an installed extension, which has unspecified impact and attack vectors.

Dark Reading Radio
Archived Dark Reading Radio
What can the information security industry do to solve the IoT security problem? Learn more and join the conversation on the next episode of Dark Reading Radio.