Technology security is an important issue for education technology. All technology systems need technology security extending from the user level to the network, institution and beyond, including vendor partners. As most schools and institutions now use third-party vendor networks, cloud-based services and online educational tools than ever before, it makes them vulnerable to external access. They create additional risk of unauthorized network access if they have multiple devices and sensors (known as the Internet of Things) connected to their network. Here’s how to ensure security in educational technology:
Have a Healthy Data Diet
To accomplish the educational purposes, collect the minimum amount of personal information necessary and retain it for the minimum time necessary.
To protect personal information, use appropriate physical and technological safeguards, such as video surveillance or alarms, particularly higher-risk information, in paper and electronic records.
Develop security protocols for inclusion in contracts an service providers and partners who handle personal information on behalf of the organization should be required to follow the institution’s security policies and procedures as well as state and federal laws (such as COPPA and FERPA).
Use data encryption in combination with host protection and access control for devices used to host or access high-risk information. Particular attention should be paid to protecting high-risk personal information on laptops and mobile storage devices.
Records and equipment containing protected information should be disposed of in a secure manner.
Document Your Security
Security plans should be documented and revised annually or whenever there is a material change in practices for data delivery, storage and access.