420 likes | 658 Views
Privacy Beyond Security FERPA, Privacy, and the Importance of Data Governance. Secure IT Conference Pomona, CA March 28, 2013. Michael Hawes Statistical Privacy Advisor U.S. Department of Education. Presentation Overview. What is Privacy? Intersection of Privacy and Security
E N D
Privacy Beyond SecurityFERPA, Privacy, and the Importance of Data Governance Secure IT Conference Pomona, CA March 28, 2013 Michael Hawes Statistical Privacy Advisor U.S. Department of Education
Presentation Overview • What is Privacy? Intersection of Privacy and Security • Growing Demand for Quality Data Online Services, Analytics, Research • Considerations for Data Access, Use, and Sharing Legal, Technical, Procedural • Keeping People Informed… …without scaring them… …and without violating privacy
IT Security Privacy Confidentiality Privacy: “the state of being free from intrusion or disturbance in one's private life or affairs” (Random House) Many components of privacy: Information Privacy Bodily Privacy Territorial Privacy Communications Privacy
IT Security Privacy Confidentiality Privacy Principles: Authority and Purpose Accountability Data Quality and Integrity Data Minimization and Retention Individual Participation and Redress Security Transparency Use Limitation NIST Special Publication 800-53, Appendix J www.nist.gov
IT Security Privacy Confidentiality IT Security: “Measures and controls that protect an [information system] against denial of and unauthorized (accidental or intentional) disclosure, modification, or destruction of [information systems] and data.” (Vacca, ed. 2009, Computer and Information Security Handbook) Focused on protecting the: Confidentiality; Integrity; and Availability of information systems
IT Security Privacy Confidentiality Privacy IT Security • Use Limitation • Data Minimization & Retention • Transparency • Individual Participation & Redress • Authority & Purpose • Data Quality • Confidentiality • Integrity • Accountability, Audit, & Risk Management • Avail-ability
Student Portals • Financial Aid • Communications • Remote Learning • MOOCs Online ServicesNew Ways of Accessing Data • Lower Costs • Extend/Improve Services • Convenience
Learning AnalyticsNew Ways of Using Data “Big Data” meets Education! Customization of the learning process (content, delivery, method) through “large-n” analysis of the “digital breadcrumbs” that students create as they learn.
Research and EvaluationOpening Up Data for Academic & Policy Analysis Growing use of quantitative analysis in the social sciences.
Individual Level • Drop-out prevention • Career Readiness • Targeted intervention Enhancing the learning process, and identifying students in need of additional assistance
Group Level • Equal access and opportunity • School accountability and improvement Tracking cohorts and demographic groups
Institutional Level • Enrollment • Budgets • Accountability • College Scorecards Examine Trends, Predict Future Requirements
Program Level • Curriculum Design • Faculty Staffing Plans • Budgets • Facilities Program Evaluation, Resource Allocation
Finding the Negatives • Personnel evaluations • Budget cuts Data can help us make difficult decisions
Considerations • Legal • Data Security • Authentication • Appropriate Level of Access • Releasing Data to the Public • Best Practices
Family Educational Rights and Privacy Act (FERPA) Key Definitions and Requirements
FERPA – Access & Consent • Gives eligible students the right to access and seek to amend their education records • Protects personally identifiable information (PII) from education records from unauthorized disclosure • Requirement for written consent before sharing PII Training Video: FERPA 101 for Colleges and Universities ptac.ed.gov
Personally Identifiable Information (PII) • Name • Name of parents or other family members • Address • Personal identifier (e.g., SSN, Student ID#) • Other indirect identifiers (e.g., date or place of birth) • “Other information that, alone or in combination, is linked or linkable to a specific student that would allow a reasonable person in the school community, who does not have personal knowledge of the relevant circumstances, to identify the student with reasonable certainty.” (34 CFR § 99.3)
Education Records • FERPA regulations define education records as those records that are: • Directly related to a student; and • Maintained by an educational agency or institution or by a party acting for the agency or institution.
Education Records • Excludes: • Sole-possession materials; • Law enforcement records ; • Employee records; • Post-secondary students’ medical treatment records; • records created or received by an educational agency or institution after an individual is no longer a student in attendance and that are not directly related to the individual's attendance as a student; • Grades on peer-graded papers before they are collected and recorded by a teacher. (Paraphrased -- See 34 CFR §99.3 for precise definition)
FERPA Pop Quiz Is a student’s name, phone number, or email address protected under FERPA?
FERPA Pop Quiz Can a university give a parent a copy of their child’s transcript?
Exceptions • Exceptions from the consent requirement for: • “Directory Information” • “Studies” • “Audits and Evaluations” • Health and Safety emergencies • And others purposes as specified in §99.31
Directory Information • Students don’t attend school anonymously! • Allows schools to release certain information, without consent, such as: • name, address, telephone listing, electronic mail address; • date and place of birth; • photographs; • participation in officially recognized activities and sports; • field of study; • weight and height of athletes; • enrollment status (full-, part-time, undergraduate, graduate); • degrees & awards received; • dates of attendance; • most recent previous school attended; and • grade level.
Directory Information • Common uses: • Yearbooks • Concert programs • Telephone directories • National Student Clearinghouse • Students have a right to opt-out!
Studies Exception • “For or on behalf of” schools, school districts, or postsecondary institutions • Studies must be for the purpose of • Developing, validating, or administering predictive tests; or • Administering student aid programs; or • Improving instruction • Written Agreements
Audit/Evaluation Exception Allows PII from education records to be shared without consent with • “Authorized representatives” of • “FERPA-permitted entities” • Comptroller General of U.S., • U.S. Attorney General, • U.S. Secretary of Education, and • State or Local Educational Authorities 34 CFR Section 99.31(a)(3)
Audit/Evaluation • Data can only be shared in order to • Audit or evaluate a Federal- or State-supported education program, or • Enforce or comply with Federal legal requirements that relate to those education programs • Education program – broad, but not limitless Training Video (coming soon): FERPA 201: Data Sharing Under FERPA ptac.ed.gov
Other Legal Requirements • FERPA is only one applicable statute covering post-secondary data; other laws may apply too! • HIPAA • Gramm-Leach-Bliley • and other federal/state/local laws
Data Security • Risks, Threats, and Vulnerabilities • Hacking, Phishing • Removable Media • Cloud Computing • The “oops” moment • Responding to a breach • Importance of training “Data Breach Response Checklist” “Data Security and Management Training: Best Practice Considerations” and other data security resources are available at: www.ed.gov/ptac
Pop Quiz If a college has a data breach do they need to notify the U.S. Department of Education?
Authentication • Reasonable assurance of identity • Methods • Knowledge Factors • Ownership Factors • Inherence Factors • Particularly challenging for electronic transactions WARNING: YOU MAY NOT USE STUDENT ID NUMBER AS AN EXCLUSIVE AUTHENTICATION FACTOR IF THAT ID NUMBER IS DESIGNATED AS DIRECTORY INFORMATION “Identity Authentication Best Practices” available at: ptac.ed.gov
Level of Access • Just because someone canlegally access the data doesn’t mean they shouldbe accessing it! • Masking, redaction, and de-identification Resources on Data De-Identification available at: ptac.ed.gov
Public Release • Aggregation or Anonymization isn’t enough • Importance of Disclosure Avoidance • It’s more than a method…it’s a process
Keeping People Informed • Accountability Allows the public to have confidence in program performance and decision-making • Transparency Allows individuals to know how their personal information is being used and protected
Data Governance Protecting privacy requires IT Security BUT A robust IT Security program will only take you partway. You need strong and effective data governance to ensure that: • You only collect the information you need • You only use it for allowable/appropriate uses • You only share what you need to, and only with the right people • You inform people about what information you are collecting, and what you are doing with it. “Data Governance and Stewardship” Issue Brief Data Governance Checklist ptac.ed.gov
Michael Hawes Statistical Privacy Advisor U.S. Department of Education Michael.Hawes@ed.gov (202) 453-7017