Skip to main content
Workforce LibreTexts

8.2.1: Information Privacy- Third Party Tools

  • Page ID
    32037
  • \( \newcommand{\vecs}[1]{\overset { \scriptstyle \rightharpoonup} {\mathbf{#1}} } \)

    \( \newcommand{\vecd}[1]{\overset{-\!-\!\rightharpoonup}{\vphantom{a}\smash {#1}}} \)

    \( \newcommand{\id}{\mathrm{id}}\) \( \newcommand{\Span}{\mathrm{span}}\)

    ( \newcommand{\kernel}{\mathrm{null}\,}\) \( \newcommand{\range}{\mathrm{range}\,}\)

    \( \newcommand{\RealPart}{\mathrm{Re}}\) \( \newcommand{\ImaginaryPart}{\mathrm{Im}}\)

    \( \newcommand{\Argument}{\mathrm{Arg}}\) \( \newcommand{\norm}[1]{\| #1 \|}\)

    \( \newcommand{\inner}[2]{\langle #1, #2 \rangle}\)

    \( \newcommand{\Span}{\mathrm{span}}\)

    \( \newcommand{\id}{\mathrm{id}}\)

    \( \newcommand{\Span}{\mathrm{span}}\)

    \( \newcommand{\kernel}{\mathrm{null}\,}\)

    \( \newcommand{\range}{\mathrm{range}\,}\)

    \( \newcommand{\RealPart}{\mathrm{Re}}\)

    \( \newcommand{\ImaginaryPart}{\mathrm{Im}}\)

    \( \newcommand{\Argument}{\mathrm{Arg}}\)

    \( \newcommand{\norm}[1]{\| #1 \|}\)

    \( \newcommand{\inner}[2]{\langle #1, #2 \rangle}\)

    \( \newcommand{\Span}{\mathrm{span}}\) \( \newcommand{\AA}{\unicode[.8,0]{x212B}}\)

    \( \newcommand{\vectorA}[1]{\vec{#1}}      % arrow\)

    \( \newcommand{\vectorAt}[1]{\vec{\text{#1}}}      % arrow\)

    \( \newcommand{\vectorB}[1]{\overset { \scriptstyle \rightharpoonup} {\mathbf{#1}} } \)

    \( \newcommand{\vectorC}[1]{\textbf{#1}} \)

    \( \newcommand{\vectorD}[1]{\overrightarrow{#1}} \)

    \( \newcommand{\vectorDt}[1]{\overrightarrow{\text{#1}}} \)

    \( \newcommand{\vectE}[1]{\overset{-\!-\!\rightharpoonup}{\vphantom{a}\smash{\mathbf {#1}}}} \)

    \( \newcommand{\vecs}[1]{\overset { \scriptstyle \rightharpoonup} {\mathbf{#1}} } \)

    \( \newcommand{\vecd}[1]{\overset{-\!-\!\rightharpoonup}{\vphantom{a}\smash {#1}}} \)

    \(\newcommand{\avec}{\mathbf a}\) \(\newcommand{\bvec}{\mathbf b}\) \(\newcommand{\cvec}{\mathbf c}\) \(\newcommand{\dvec}{\mathbf d}\) \(\newcommand{\dtil}{\widetilde{\mathbf d}}\) \(\newcommand{\evec}{\mathbf e}\) \(\newcommand{\fvec}{\mathbf f}\) \(\newcommand{\nvec}{\mathbf n}\) \(\newcommand{\pvec}{\mathbf p}\) \(\newcommand{\qvec}{\mathbf q}\) \(\newcommand{\svec}{\mathbf s}\) \(\newcommand{\tvec}{\mathbf t}\) \(\newcommand{\uvec}{\mathbf u}\) \(\newcommand{\vvec}{\mathbf v}\) \(\newcommand{\wvec}{\mathbf w}\) \(\newcommand{\xvec}{\mathbf x}\) \(\newcommand{\yvec}{\mathbf y}\) \(\newcommand{\zvec}{\mathbf z}\) \(\newcommand{\rvec}{\mathbf r}\) \(\newcommand{\mvec}{\mathbf m}\) \(\newcommand{\zerovec}{\mathbf 0}\) \(\newcommand{\onevec}{\mathbf 1}\) \(\newcommand{\real}{\mathbb R}\) \(\newcommand{\twovec}[2]{\left[\begin{array}{r}#1 \\ #2 \end{array}\right]}\) \(\newcommand{\ctwovec}[2]{\left[\begin{array}{c}#1 \\ #2 \end{array}\right]}\) \(\newcommand{\threevec}[3]{\left[\begin{array}{r}#1 \\ #2 \\ #3 \end{array}\right]}\) \(\newcommand{\cthreevec}[3]{\left[\begin{array}{c}#1 \\ #2 \\ #3 \end{array}\right]}\) \(\newcommand{\fourvec}[4]{\left[\begin{array}{r}#1 \\ #2 \\ #3 \\ #4 \end{array}\right]}\) \(\newcommand{\cfourvec}[4]{\left[\begin{array}{c}#1 \\ #2 \\ #3 \\ #4 \end{array}\right]}\) \(\newcommand{\fivevec}[5]{\left[\begin{array}{r}#1 \\ #2 \\ #3 \\ #4 \\ #5 \\ \end{array}\right]}\) \(\newcommand{\cfivevec}[5]{\left[\begin{array}{c}#1 \\ #2 \\ #3 \\ #4 \\ #5 \\ \end{array}\right]}\) \(\newcommand{\mattwo}[4]{\left[\begin{array}{rr}#1 \amp #2 \\ #3 \amp #4 \\ \end{array}\right]}\) \(\newcommand{\laspan}[1]{\text{Span}\{#1\}}\) \(\newcommand{\bcal}{\cal B}\) \(\newcommand{\ccal}{\cal C}\) \(\newcommand{\scal}{\cal S}\) \(\newcommand{\wcal}{\cal W}\) \(\newcommand{\ecal}{\cal E}\) \(\newcommand{\coords}[2]{\left\{#1\right\}_{#2}}\) \(\newcommand{\gray}[1]{\color{gray}{#1}}\) \(\newcommand{\lgray}[1]{\color{lightgray}{#1}}\) \(\newcommand{\rank}{\operatorname{rank}}\) \(\newcommand{\row}{\text{Row}}\) \(\newcommand{\col}{\text{Col}}\) \(\renewcommand{\row}{\text{Row}}\) \(\newcommand{\nul}{\text{Nul}}\) \(\newcommand{\var}{\text{Var}}\) \(\newcommand{\corr}{\text{corr}}\) \(\newcommand{\len}[1]{\left|#1\right|}\) \(\newcommand{\bbar}{\overline{\bvec}}\) \(\newcommand{\bhat}{\widehat{\bvec}}\) \(\newcommand{\bperp}{\bvec^\perp}\) \(\newcommand{\xhat}{\widehat{\xvec}}\) \(\newcommand{\vhat}{\widehat{\vvec}}\) \(\newcommand{\uhat}{\widehat{\uvec}}\) \(\newcommand{\what}{\widehat{\wvec}}\) \(\newcommand{\Sighat}{\widehat{\Sigma}}\) \(\newcommand{\lt}{<}\) \(\newcommand{\gt}{>}\) \(\newcommand{\amp}{&}\) \(\definecolor{fillinmathshade}{gray}{0.9}\)

    Privacy and Third Party Tools and Technologies

    Throughout this textbook, we have been discussing different tools to use in your teaching and learning. As we research and use those tools, we need to address student and data privacy. When using third-party tools, instructors face the challenge of maintaining information privacy while leveraging these resources for enhanced learning experiences. Here are some strategies for instructors to ensure privacy when integrating third-party tools into their teaching (US Department of Education, 2014):

    Privacy Strategies for Third Party Tools
    Strategy and Definition Ideas for Implementation
    Vet Third-Party Tools Thoroughly: Vetting third-party tools thoroughly means carefully examining their features, especially how they handle user data, before bringing them into the classroom. It's about ensuring these tools meet the standards for privacy and security that protect students' information. For example, before using a new online grading platform, an instructor should check that it encrypts student grades and complies with educational data privacy laws.
    • Conduct Research:Before adopting any tool, research its privacy policies to ensure they align with educational standards and legal requirements.
    • Check Compliance: Verify that the tool complies with relevant privacy laws such as FERPA, COPPA (Children's Online Privacy Protection Act), and GDPR (General Data Protection Regulation) if applicable.
    Gain Informed Consent: Gaining informed consent involves clearly explaining to students and their guardians what data a third-party app collects and how it will be used, then obtaining their explicit permission. This ensures that personal information is not used without the individual’s knowledge and agreement. An example is sending home a permission slip that details what an educational app does with student data before students are allowed to use it.
    • Inform Parents and Guardians:When using tools that require student information, provide clear information to parents about what data will be used and how it will be protected.
    • Obtain Permissions: Get written consent from parents or guardians, especially for students under 13, before using any third-party services that collect data.
    Limit Data Sharing: Limiting data sharing means only providing the essential information that a third-party service needs to function, and no more. This minimizes the risk of sensitive data being exposed or misused. For instance, a language learning app may only need students' first names and not their full identity details.
    • Minimal Necessary Information:Share only the information necessary for the functionality of the tool—avoid providing excessive details that could compromise privacy.
    • Anonymize Data: Where possible, use anonymous identifiers instead of real names to minimize risks.
    Use Secure Access Protocols: Using secure access protocols refers to the methods and technologies that safeguard user data from unauthorized access. This includes measures like complex passwords and two-factor authentication. If a reading app requires a login, for example, ensure it offers and enforces the creation of strong, unique passwords for each user.
    • Strong Authentication Measures: Ensure that any third-party platform used has strong authentication protocols, like two-factor authentication.
    • Unique Credentials:Encourage or enforce the use of unique login credentials for each service to prevent breaches spreading across platforms.
    Educate Students and Staff: Educating students and staff is about providing them with the knowledge they need to use technology responsibly and protect their personal information. It's also about teaching them to recognize potential privacy risks. A teacher might hold a session on identifying secure websites, using the example of checking for 'https' in a web address.
    • Digital Citizenship:Teach students about the importance of privacy and how to maintain it while using online tools.
    • Professional Development:Offer training sessions for staff to stay updated on the best practices for data privacy.

    Regularly Review Tools and Policies: Regularly reviewing tools and policies means consistently reevaluating the third-party services used and the policies governing them to ensure ongoing protection of data privacy. This could be as simple as reading through the latest update to a math app's privacy policy to check for changes that might affect students.

    • Audit Tools:Regularly review the third-party tools for any changes in their service or privacy policies.
    • Update Agreements: Ensure that any contracts or agreements with third-party vendors include clauses to protect student data and the right to audit their compliance.
    Implement Privacy Protection Features: Implementing privacy protection features involves utilizing the available settings and options within apps and tools to enhance data security. For example, turning on end-to-end encryption in a messaging app used for class communications ensures that messages are secure in transit.
    • Privacy Settings: Utilize privacy protection settings within each tool to restrict visibility of student information.
    • Data Encryption: Choose tools that encrypt data both in transit and at rest.
    Monitor and Manage Tool Use: Monitoring and managing tool use means keeping an eye on how third-party services are used and ensuring they remain a safe environment for students. This could involve periodically checking which websites students can access through the school's library computers.
    • Track Access: Keep logs of who accesses student data and when.
    • Control Continuously: Monitor the use of third-party tools and ensure they are only used for their intended educational purpose.
    Develop a Response Plan: Developing a response plan is about having a strategy in place to deal with potential privacy issues or data breaches. This might include a step-by-step guide for teachers if they discover a data leak in a student information system, outlining who to contact and what actions to take immediately.
    • Plan for Breaches:Have a clear plan in place for responding to any data breaches or unauthorized access incidents.
    • Communicate Quickly:Establish a protocol for communicating any privacy issues to all stakeholders promptly.
    References

    US Department of Education. (2014, February 1). Protecting student privacy while using online educational services: Requirements and best practices. Protecting Student Privacy. 


      • Was this article helpful?