Security and Privacy

##AUTHORSPLIT##<--->

Concerns over information security have increased since the Sept. 11 terrorist attacks, which emphasized the need for government-wide planning, collaboration and security. This tragedy revealed how federal and local governments had thousands of incompatible information systems, not only to capture and share information about terrorists, but to aid the police officers, fire fighters and rescue crews. The recently established Department of Homeland Security will serve as a central clearinghouse to collect and analyze data related to terrorism. At least eight major agencies and a number of smaller ones will funnel information to this new department. However, in a recent column in The New York Times, William Safire expressed concern that “every purchase you make with a credit card, every magazine subscription you buy, every medicine prescription, every Web site visited and e-mail sent or received, every trip and event attended will go into what the Defense Department describes as a virtual centralized general database.”

Security Steps Up

A variety of security problems was expressed by a group of IT managers and school administrators at the National School Boards Association’s Technology+Learning Conference held last month in Dallas. Concern was expressed regarding both inside and outside security, including network security, proper use of ID cards, spam e-mail, content filtering of information, student disregard of privacy, and protection against hackers. Anti-virus protection is a particular problem, because students bring in disks that contain viruses from home computers that can crash the network.

Plano Independent School District in Texas uses an anti-virus solution that allows the district to manage its approximately 23,000 workstations from a single point of management. All updates are pushed from a centralized location to local servers and configured to work with the desktop so that security is completely transparent to the end user.

Copyright protection and its misuse by students is also a continuing problem. Illegal distribution and piracy of copyrighted material is costing media corporations, the entertainment software industry and publishers billions of dollars. So, content providers have begun to incorporate Digital Rights Management technologies into their products, making CDs using DRM that cannot be played on a computer. But, the interests of consumers as well as those of industries need to be addressed.

Assessment and Technology

At the Technology+Learning Conference, the major emphasis was on the implementation of the No Child Left Behind Act, and the role of technology in assessment and accountability. The assessment requirements hold schools accountable for the achievement of all students. NCLB has major implementations in the areas of assessment and technology. It permits greater flexibility in the delivery of instruction, but mandates extensive accountability and evaluation of the effectiveness of programs, resources and products.

Many conference exhibitors addressed the stringent testing and technology demands, and how their products could assist in gathering, managing and implementing assessment results. Other noteworthy issues at the conference included the growing number of collaborations, the increasing use of wireless and handhelds, as well as the ongoing interest of multimedia presentations in the classroom.

Conclusions

Educators at all levels are finding security issues growing, especially in managing network security. It is a complicated endeavor, and a need for network security specialists is evident. An average of $2 million is spent on security every year by large companies, as reported by respondents to a recent area survey by the FBI. Planning for security is an ongoing process, and prevention is just as important as response. Educational institutions have increased the number of bag and badge checks, and are attempting to create uniformity in their security efforts. However, security is mostly a people issue, not a technology issue, and educating the user is of great importance.

Featured

  • laptop with digital productivity and calendar symbols

    September 2025 Tech Tactics in Education Conference Agenda Announced

    Registration is free for this fully virtual Sept. 25 event, focused on "Overcoming Roadblocks to Innovation" in K-12 and higher education.

  • computer science classroom featuring a desktop setup with code on the screen, a large wall display with charts, and a labeled book on a clean desk

    McGraw Hill Expands CTE Offerings

    Education company McGraw Hill has announced a host of new career and technical education courses, designed to help learners gain professional, technical, and academic skills for workforce success.

  • red brick school building with a large yellow "AI" sign above its main entrance

    New National Academy for AI Instruction to Provide Free AI Training for Educators

    In an effort to "transform how artificial intelligence is taught and integrated into classrooms across the United States," the American Federation of Teachers (AFT), in partnership with Microsoft, OpenAI, Anthropic, and the United Federation of Teachers, is launching the National Academy for AI Instruction, a $23 million initiative that will provide access to free AI training and curriculum for all AFT members, beginning with K-12 educators.

  • ClassVR headsets

    Avantis Education Launches New Headsets for ClassVR Solution

    Avantis Education recently introduced two new headsets for its flagship educational VR/AR solution, ClassVR. According to a news release, the Xcelerate and Xplorer headsets expand the company’s offerings into higher education while continuing to meet the evolving needs of K–12 users.