Read more
Informationen zum Autor Linnette Attai is a recognized expert in youth and education data privacy regulations, and the founder of PlayWell, LLC, a global privacy compliance consulting firm. Linnette brings more than twenty-five years of experience to the work, helping organizations build their compliance practices and serving as a virtual Chief Privacy Officer and Data Protection Officer. She is a TEDx speaker and author of the books, “Student Data Privacy: Building a School Compliance Program” and “Protecting Student Data Privacy: Classroom Fundamentals." Klappentext Protecting the privacy of student data when bringing technology into the classroom is one of the toughest organizational challenges facing schools and districts today. Parent and legislator concerns about how school systems protect the privacy of student data are at an all-time high. School systems must navigate complex federal and state regulations, understand how technology providers collect and protect student data, explain those complexities to parents, and provide the reassurance the community needs that the student information will remain safe. Student Data Privacy: Building a School Compliance Program provides solutions for all of these challenges and more. It is a step-by-step journey through the process of building the policies and practices to protect student data, and shifting the organizational culture to prioritize privacy while still taking advantage of the tremendous benefits that technology has to offer in the modern classroom. Zusammenfassung A guide for school systems to help them understand why protecting student data privacy is a critical responsibility for the entire organization. Inhaltsverzeichnis Epigraph Dedication Introduction Chapter 1: What is Data Privacy Compliance? Chapter 2: How Did We Get Here? Chapter 3: Why Build a Data Privacy Compliance Program? Chapter 4: What Does it Take? Chapter 5: The Role of Leadership Chapter 6: Start Where You Are Chapter 7: Preparing for a Data Privacy Impact Assessment Chapter 8: Privacy Impact Assessment Chapter 9: Security Chapter 10: Disclosure, Deletion and Deidentification Chapter 11: Inventories and Making Maps Chapter 12: Gaps and Mitigation Chapter 13: Policy Development Chapter 14: Working with Technology Providers Chapter 15: Training Chapter 16: Audit Chapter 17: Parent Rights Chapter 18: Communications Chapter 19: Building Your External Support Team Conclusion About the Author Endnotes ...