Privacy and education experts sound alarms about the movement to capture and analyze more and more student data, even as edu tech companies decry ulterior motives.
12 Open Educational Resources: From Khan to MIT
(click image for slideshow)
As increasing amounts of student, class and school data are captured and analyzed, some people have started to sound alarms about potential privacy violations and other kinds of misuse.
"I think it's totally illegitimate to take kids' data without parental consent," said Leonie Haimson, a parent activist and executive director of Class Size Matters, a nonprofit organization that wants smaller classes in New York City's public schools and the nation as a whole. "If these exact same records were in a doctor's office or hospital, it would be illegal to collect them without parental consent," she told InformationWeek in a phone interview.
Haimson has taken special aim at inBloom, a nonprofit startup funded by the Bill & Melinda Gates Foundation and the Carnegie Corporation of New York that seeks to be a vendor-neutral data service to collect student data gathered in many different software systems and services.
Haimson and others worry inBloom and other efforts using student data -- such as the Ed-Fi Alliance, the Michael and Susan Dell Foundation-funded education data integration initiative -- may ultimately feed sensitive, personally identifiable information to for-profit companies. They also worry about accidental release of the data through, for example, hacking.
For its part, inBloom states in its FAQ that the company "has no ownership of student records." It continues: "Neither inBloom nor any other participating agency or vendor may sell or share confidential student data" unless "authorized by a state or district with legal authority over those student records."
Vendors of data collection, analysis and sharing platforms in education routinely say they are sensitive to privacy concerns. Personally identifiable information (PII) is programmatically anonymized for this very reason, they say.
But the critics aren't convinced.
"You can always put it back together, nothing is really ever anonymized," said Sheila Kaplan, who has been monitoring regulations around student directory information for years. Kaplan's website, Educationnewyork.com has become a clearinghouse for news and information about the topic.
Suspicions also involve the specific types of data being collected.
For example, Haimson wonders why inBloom needs to collect so much "incredibly individualized data," including a student's address, disciplinary history and special-needs status.
In April, InformationWeek asked inBloom about reports that its data set would include social security numbers. An inBloom spokesperson responded:
inBloom discourages districts and states from storing social security numbers in our data service; instead we agree with the industry-wide best practice many school districts and states have of assigning a unique student ID number that is separate from the student's social security number. That said, it's ultimately up to each school district or state to decide whether or not they track and store student social security numbers.
"That's a cop-out," Joel R. Reidenberg, a law professor and founding academic director of the Fordham Center on Law and Information Policy at Fordham University School of Law, told InformationWeek in a phone interview. "InBloom includes [the social security number] as a data field, and if they didn't include it, schools would have to use something else. The choice of data fields is a policy decision."
Separately, inBloom has said its data privacy and security protections exceed Family Educational Rights and Privacy Act (FERPA) requirements. FERPA is a decades-old federal law that protects the privacy of student education records and provides parents certain rights to their children's education records.
But FERPA itself has been the target of privacy activists.
How Enterprises Are Attacking the IT Security EnterpriseTo learn more about what organizations are doing to tackle attacks and threats we surveyed a group of 300 IT and infosec professionals to find out what their biggest IT security challenges are and what they're doing to defend against today's threats. Download the report to see what they're saying.
IT Strategies to Conquer the CloudChances are your organization is adopting cloud computing in one way or another -- or in multiple ways. Understanding the skills you need and how cloud affects IT operations and networking will help you adapt.