The Invasion Of Student Privacy

Improved Essays
1. Introduction
Information can be considered as the new currency of the current digital era, and it’s highly imperative for organizations to safeguard their information from falling into the wrong hands. The existing technology landscape provides multiple platforms through which information can be aggregated, propagated, and used for varied purposes.
Educational Institutions have started using these technology platforms to aggregate a diverse range of student information like personal identification information, racial characteristics, medical information, economic status of their family etc. (Thomas B. Fordham Institute, 2008). The student information aggregated by educational institutions is highly sought and used for various purposes.
…show more content…
The major concern of sharing student information is the invasion of student privacy. We are seeing the development of new hardware and software tools which specially aids large scale information aggregation, storage and analytic capabilities. These practices of aggregation and sharing possesses a greater threat to student’s privacy and security. Solove (2008) clearly understood the problem of information aggregation and has wonderfully articulated these problems as below,
“[P]rivacy may be implicated if one combines a variety of relatively innocuous bits of information. Businesses and government often aggregate a wide array of information fragments, including pieces of information we would not view as private in isolation. Yet when combined, they paint a rather detailed portrait of our personalities and behavior, a problem I call “aggregation.” (Solove 2008, p. 70).
The ease of access to student databases through internet has given rise to a new problem of identity theft. According to a federal report, there were 93 documented security breaches in 2005 to gain access to personal information like Social Security Number (SSN), date of birth, credit card information from education records, and most of these breaches occurred in colleges and universities (Thomas B. Fordham Institute,
…show more content…
FERPA should be adhered by all educational institutions receiving federal funds. FERPA lays a clear framework to help determine who can view the educational records, and under what conditions. It also contains procedures for complaints in case it’s not adhered.
3.1 Parents Rights under FERPA
One of the important aspect of FERPA is that it guarantees parents of minor students the rights to prevent any personal identification information and educational records of the student from being disclosed without their written consent. The parents also have the right to inspect and review the accuracy of the educational records. FERPA also guarantees them the right to challenge the accuracy of the records, and can request correction of inaccurate data (Refer Appendix 1a).
3.2 Students Rights under FERPA
When a student becomes an eligible student, all the rights and consents from parents would be transferred to the student. Students would have the rights to prevent disclosure of any educational records, including from their parents (Refer Appendix

Related Documents

  • Superior Essays

    P5 - Explain how employment contracts can affect security Hiring Policy At the point when procuring somebody or notwithstanding elevating somebody to an alternate employment inside of the association they have to verify that they have a decent employing record which would think back on the past occupations, in the event that they have any criminal records and a general foundation to the individual they are utilizing, references would be something which would go under this classification. Something which would go under the contracting arrangement is something many refer to as a trial period. This would be to pick up trust with the worker so that the security of the association is kept at a decent standard, this will then give the ideal for the superintendent to then sack the representative if they somehow managed to do…

    • 1688 Words
    • 7 Pages
    Superior Essays
  • Decent Essays

    The following paper will dissect and analyze the US Bill H.R. 2797 – Student Disciplinary Fairness Act of 2015 regarding the policy’s goals, effectiveness, efficiency, and lastly equity. The sponsor of the US Bill H.R. 2797 is Representative Cedric L. Richmond, and the cosponsor is Representative Gwen Moore. The US Bill H.R. 2797 goal is to establish an Office of School and Discipline Policy within the Department of Justice that will support consistency in juvenile equal protection, fairness and rights which will reduce the number of juvenile that are incarcerated. U.S Bill H.R. 2797 proposes a few requirements and the participation of the Office of School and Discipline Policy, the state, local governments, and all teachers working within…

    • 221 Words
    • 1 Pages
    Decent Essays
  • Improved Essays

    Loo1 Unit 2 Research Paper

    • 1344 Words
    • 6 Pages

    Blackboard Name: Sanya Murgai PSID: 1264832 LO1: Discuss information privacy and methods for improving the privacy of information. LO2: Explain the effects on information privacy of e-mail, data collection, and censorship. In today’s day and age, privacies definition can be manipulated to personal preferences. Once we put something on the internet, it will be accessible forever even if we delete it.…

    • 1344 Words
    • 6 Pages
    Improved Essays
  • Improved Essays

    Dr. Coswalt Case

    • 1520 Words
    • 7 Pages

    According to Bachman & Schutt (2014): Research should expose participants to no more than minimal risk of personal harm, researchers should fully disclose the purposes of their research, participation in research should be voluntary, and therefore subjects must give their informed consent to participate in the research, and confidentiality must be maintained for individual research participants unless it is voluntarily and explicitly waived. (p. 60) Although Dr. Coswalt protects the research participants from no more than a minimal risk of personal harm, the research scenario still violates three of these principles. Dr. Coswalt has failed to fully disclose the purpose of her research to the participants and their guardians. Dr. Coswalt and the participating schools mistakenly believed that the students and guardians should not be informed of the study, so that students would not change their behavior, a term known as the “Hawthorne effect” (Bachman & Schutt, 2014, p. 192).…

    • 1520 Words
    • 7 Pages
    Improved Essays
  • Great Essays

    Imagine a university professor accuses a student of cheating on a final exam. Before the student can defend herself, the university decides to expel the student. Understandably, the student decides she wants to challenge the expulsion as a violation of her due process rights. Can the student challenge the action?…

    • 1298 Words
    • 5 Pages
    Great Essays
  • Improved Essays

    9/11 Cons

    • 591 Words
    • 3 Pages

    Massive amounts of data being collected are causing extremely high risks of identity theft. When…

    • 591 Words
    • 3 Pages
    Improved Essays
  • Decent Essays

    FERPA or the Family Educational Rights and Privacy Act (1974) is a federal law that regulates privacy and confidentiality of “maintained educational information/records” and personal identifiable information (PII) by educational institutions and their agents. The review and inspection of both educational records and or student PII is subject to FERPA . “Eligible parties” per FERPA have the right to inspect, review, and or request education information the inspection and or review of educational records. Eligible parties per FERPA for students under the age or 18 or considered dependents per IRS policy are the students guardians or parents. Certain student data information may be classified by the educational institution as directory information…

    • 192 Words
    • 1 Pages
    Decent Essays
  • Improved Essays

    Grutter Vs Billinger

    • 775 Words
    • 4 Pages

    3. What can school administrators hope to gain from knowledge of the sources of law that impact schools? School administrators make certain decisions everyday and many of them have remarkable legal significance. Because of these decisions, school leaders have the responsibility of knowing and understanding state, federal, and case law that governs general education, special education, and community education.…

    • 775 Words
    • 4 Pages
    Improved Essays
  • Decent Essays

    The general argument made in the Los Angeles Times article, “College Kids Have Too Much Privacy” , is that the Family educational Rights and Privacy Act (FERPA) transfers all rights under FERPA from the parent to the student and that parents, under this act, are ignorant of their child’s grades, and their wellbeing in school. The author states that “you have no right, as a parent, to know what or how your children are doing in school” and that “FERPA was made to protect student’s privacy, ensuring that no outside parties could gain access to their educational information”. The extreme educational privacy nonetheless can lead to the lack of knowledge of failing classes, violation of campus policies, and mental health problems. The author states…

    • 188 Words
    • 1 Pages
    Decent Essays
  • Improved Essays

    In the essay, “How Computers Change the Way We Think”, written by Sherry Turkle, begins by explaining her first experience on how PCs change the way we think. Turkle, a Professor of the Social Studies of Science and Technology at the Massachusetts Institute of Technology, talks about the move from slide guidelines to calculators and how it was troublesome for that move for college students. Turkle proceeds on and discusses how technology gives individuals another approach to consider knowing and understanding. Likewise, Turkle concentrates on privacy and how middle-school and high-school students have a tendency to give out personal information without any safeguard. In the essay, Turkle discusses some computer programs that are being created…

    • 709 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Social Media Data Analysis

    • 1277 Words
    • 5 Pages

    Having the necessary information is crucial in almost any area, especially for research and development. The purpose of collecting data is primarily for knowledge discovery, then for further consideration. In other words, all websites gather people’s information and base on them to explore their behaviours and trends. From there, they will shape the browsing experience that match each person’s preference in the future. As mentioned above, social media, especially Facebook and Google, track all users’ activities online.…

    • 1277 Words
    • 5 Pages
    Improved Essays
  • Improved Essays

    Any health care provider, health organizations, or government health plans that use, store, maintain, or transmit patient information must comply with the federal law. HIPAA also protects employees from having their information released by their employer. Along with protecting the privacy of participants the law was also established to cut down on fraudulent activity and improve data systems. Information obtained from your records can not be…

    • 1145 Words
    • 5 Pages
    Improved Essays
  • Improved Essays

    With the advancement of technology comes a startling decrease in privacy. Nothing is considered ‘personal’ by the internet, or private, or kept a secret. Anything put on the internet is forever immortalized. Technology like cellphones, laptops, and drones have invaded the sense of personal privacy and eliminated the prospects of privacy returning to those who possess technology.…

    • 382 Words
    • 2 Pages
    Improved Essays
  • Great Essays

    Why Privacy Matters

    • 1428 Words
    • 6 Pages

    Privacy is not frequently undermined by a solitary great act, yet rather by a moderate aggregation of little unobtrusive acts. Every act may appear to be innocuous, yet in time the government will be watching and knowing every little thing about us. Solove states that even if you don't have anything to hide, the government can hurt coincidentally, because of mistakes or carelessness. All in all, he fights that when you comprehend the immeasurable measure of privacy concerns connected with government data gathering and observation, the nothing-to-hide argument is less powerful. This essay addresses the ramifications of proceeded with government data accumulation and reconnaissance, before these practices get to be marked into perpetual law as a major aspect of the USA Patriot Act.…

    • 1428 Words
    • 6 Pages
    Great Essays
  • Improved Essays

    Today’s internet has become an integral part of our daily lives. It changed the world in so many positive ways, but it has also a negative side to it. The negative issues that we are facing today with internet are our online privacy and data breaches. Recently, many people were divided in terms of their strong views about the importance of privacy and the exchange “between security needs and personal privacy” (Rainie & Maniam, 2016) as millions of Americans were also affected by online threats and privacy breaches and at the same time concerned with our security. The focus has been on government monitoring, although there are some other significant issues and concerns about how industries use our data.…

    • 952 Words
    • 4 Pages
    Improved Essays