Time
2 hours 19 minutes
Difficulty
Beginner
CEU/CPE
3

Video Transcription

00:00
welcome to student data privacy fundamentals. This lesson is defining your data lifecycle.
00:07
In this video, we will learn an overview over the data life cycle and what each phase of the data lifecycle entails.
00:16
Data governance is necessary at each phase in the data lifecycle.
00:21
This life cycle starts at evaluating the need for data collection and ends when the data is destroyed. It is important that appropriate safeguards, policies, procedures and practices are in place for each phase of the data. Lifecycle. Let's take a closer look at each phase of the data lifecycle.
00:40
Identify need
00:42
to accomplish the district's mission and to comply with the law, the district may need to maintain confidential information, including information regarding students, parents or guardians, employees,
00:54
applicants for employment and various others.
00:57
The district will collect, create or store confidential information on Lee. When the superintendent or designee determines it is necessary,
01:06
the district will ensure that data collection is aligned with board policy.
01:10
Data systems shall be regularly reviewed to ensure that Onley necessary data is being transmitted and collected.
01:15
Additionally, before any new service or application is purchased or used to collect or store confidential or critical information, the I so or designee must approve the use of the service or application and verify that it meets the requirements of the law and board policy and appropriately protects confidential
01:34
and critical information.
01:37
This leads to the next phase. Create and acquire
01:41
any new digital resource that either has an associated cost or collect staff or student Data should go through a software request process, which would vet the software for compatibility with district systems and, more importantly, verify that it meets best practice for securing and protecting user data.
01:59
Prior to initiating services in our present. Transmitting any data, the district should conduct a risk management audit using a data security checklist. Suggestions for both a software request process and data security checklist will be shared in a later module.
02:16
Manage and store
02:19
for system security. You will want to describe how the district will provide access to confidential information toe appropriately trained district employees and volunteers on Lee when the district determines that such access is necessary for the performance of their duties.
02:35
If your organization will disclose data to vendors or contractors, describe that in this section as well.
02:40
You will also want to reference any board policies or other regulations that you have regarding system security
02:47
for data management. The effective education of students and management of district personnel often require the district to collect information, some of which is considered confident told by law.
02:59
In addition, the district maintains information that is critical to district operations and must be accurately and securely maintained to avoid disruption to district operations.
03:09
For data inventory in classification, the eyesore designee will identify all systems containing district data, such a student information systems, financial systems, payroll transportation, food service, email, instructional software applications and others
03:25
for securing data at rest and transit
03:29
district at a security applies to all forms of data, including data stored on devices or an additional resource is such as cloud storage. All district external hard drives will be maintained in inventory and verified through the regular inventory verification process.
03:44
Users must ensure that there securely storing their data.
03:47
Guidelines have been established for cloud storage and file sharing, external storage devices and file transmission practices.
03:54
These guidelines will be further discussed in another lesson specifically on this topic.
04:02
Protecting data
04:04
for risk management Ah, thorough risk analysis of all data networks, systems policies and procedures shall be conducted on an annual basis or is requested by the superintendent is so or designee.
04:16
More details about risk management will be discussed in the data security checklist, which will be discussed in detail In a later lesson
04:25
for security logs, the district will maintain a comprehensive list of critical system events that will be logged and monitored to ensure data security.
04:32
These events will include but are not limited to, access to critical systems and modification of critical data
04:40
when applicability notifications will be established for critical event triggers
04:45
for log on banners, the district will ensure that staff, students and parents using district systems are aware of the district data security policies.
04:53
When possible, District system users will acknowledge the full technology usage agreement prior to accessing all district technical systems.
05:01
For example, at the beginning of each school year, every student will sign the Student technology usage agreement and then every time that they log on to a common computer in a computer lab, it, for example, they will acknowledge a
05:16
little log on being her that says they are responsible for following all district policies
05:25
for physical security controls. You will outline how your organization will maintain physical security through inventory management, protection against virus malware, phishing and spam, and how to secure electronic access
05:40
for usage and sharing. A consistently high level of personal responsibility is expected of all users granted access to the district's technology resource is
05:48
all the service staff. Volunteers, contractors and agents who are granted access to critical and confidential information are required to keep the information secure and are prohibited from disclosing or assisting in the unauthorized disclosure of confidential information.
06:04
You'll want to address each of the bullet points here in detail for however your organization will handle them.
06:12
For example, for password security. You might require users to change their password every six months, or maybe every three months.
06:19
And you might require a certain number of characters, number symbols, etcetera to increase password strength. And you will want to spell that out specifically for the users. For your policy
06:32
archival, you will want to outline here how you will archive data and how long it will be archived.
06:39
You also want to address data in litigation If you have any active litigation in your district, for example, in new lawsuits going on currently, you will want to make sure that you are not archiving or deleting any of the data that might be subpoenaed by courts
07:00
and lastly destruction.
07:01
You want to outline your process for destruction and disposal of assets. A detailed description of how to dispose and destroy data and technology resource is will be discussed in a later lesson on asset management.
07:15
Now for the quiz, I want you think about the parts of the data life cycle that we discussed today. What part do you think your organization currently does? Well,
07:25
you might pause the video and take a minute to think about this.
07:30
When you thought of some things that your organization does well.
07:32
Now think about what parts of the data lifecycle your organization might need to improve.
07:39
Pause the video and think about this
07:46
in summary today's video. We discussed what the data life cycle is and what it looks like,
07:50
and we discuss specific phases in the life cycle and what each phase specifically entails.
07:59
In the next lesson, we will work to define our critical incident response.
08:03
See you soon

Up Next

Student Data Privacy Governance

This training course is an introduction to federal, state, and local laws and regulations safeguarding online data, including FERPA and other student data privacy programs. Students will learn how to create a data governance policy for their organization.

Instructed By

Instructor Profile Image
Ivy Nelson
Instructor