Among one of the more damaging issues Demirkapi found in Follett’s student information system was an improper access control vulnerability, which if exploited could have allowed an attacker to read and write to the central Aspen database and obtain any student’s data.
U.S. Department of Justice attorney Michael Drezner, representing the government, said no court has ever required probable cause or a warrant for any border search of a person or property.
Kings College London breached the General Data Protection Regulations when it shared a list of student activists with the police and barred the activists from campus during a visit by the Queen, an independent report (PDF) has found.
Then it launches 100 (yes, 100) tabs in your browser that are designed to make your browsing behavior look like one of its stereotypical profile types. For example, picking Influencer will launch dozens of tabs with Amazon searches for holistic remedies, pages for meditation apps and other online New Age goodies.
In some public places, such as schools and hospitals, microphones installed with software listen for noise that sounds like aggression. It sounds useful, but in practice, the detection algorithms might not be ready yet.
A professor at the University of Colorado’s Colorado Springs campus led a project that secretly snapped photos of more than 1,700 students, faculty members and others walking in public more than six years ago in an effort to enhance facial-recognition technology.
Products like Securly and Gaggle, which surveil typically private online spaces like email accounts, documents, private calendars, and search histories and, unlike locker or backpack searches, can involve reaching into the documents and communications that a student creates while at home, sit on the extreme end of the spectrum of ways schools monitor and safeguard students.
Let alone knowing there’s a camera.” And when students from other schools asked why their teachers started collecting facial data, someone responded: “The whole country is advocating ‘intelligent education.’ It’s probably your principal who wants to add glory to his career accomplishments.”.
Privacy by obscurity, as Woodrow Hartzog and Evan Selinger have written , “is the idea that when information is hard to obtain or understand, it is, to some degree, safe.” I wanted to demonstrate to my students how the most common of technologies can be used to shatter the perceived protections of obscurity and, in turn, reveal the admittedly thin mechanisms by which privacy is actually protected.
In the wake of the Parkland, Sandy Hook and other school shootings too numerous to mention, U.S. school districts and parents who pay the bills are pouring millions of dollars into high-tech surveillance, crisis response, and police technologies in a desperate search for solutions.
Schools in southern China are forcing children to wear uniforms embedded with computer chips that track their movement and trigger an alarm if they skip class.
Some users of communication service Slack have reported their accounts have been closed over visits to countries under US sanctions. The move, which Slack says is to comply with US regulations, is believed to be affecting users who have visited nations including Iran and North Korea.
Five months later—pursuant to a court order in the Robbins case—it informed Hasan for the first time that it had secretly taken the photographs. The district was put on notice of a third parallel suit that a third student intended to bring against the district, for "improper surveillance of the Lower Merion High School student on his school issued laptop", which included taking over 700 webcam shots and screenshots between December 2009 and February 2010.
The announcement warns parents, students and teachers of the potential exploitation of information stored on these technologies, which include personalized learning experiences, tracking academics, disciplinary issues, student information systems and classroom management programs.
In the process of investigating the hacks and identity theft, the employee, Brooke Henderson, and her sister Brette Hay, who is also employed by the district, discovered that all of their personal information — account login credentials with passwords, web sites visited, and even voice recordings of Hays’s children, had been collected and stored in their district-issued Google Drive accounts for years.
Amassing and integrating large amounts of data without first proving it will be effective, establishing boundaries on its use, enacting strong data governance practices that limit access, or articulating clear data retention and deletion timelines and protocols will almost certainly lead to misuse of this information that may harm the very students it is aimed to protect.
Amanda Lenhart, a New America Foundation researcher who has studied how teens use the internet, says it’s understandable schools like the idea of monitoring social media.
SLU is quick to note that it’s “the first college or university in the country to bring Amazon Alexa-enabled devices, managed by Alexa for Business, into every student residence hall room and student apartment on campus.” It’s certainly not the first to adopt Amazon’s smart speakers, but it’s among the largest scale for this sort of deployment.