Data Privacy & Security Service Digital Digest_Winter 2018

Data Privacy & Security Service

Issue 10

DATA PRIVACY AND SECURITY

APPLE’S FaceID COULD BE A POWERFUL TOOL FOR MASS SPYING

The new feature from Apple called FaceID has caused some concern in the area of consumer privacy. FaceID is a tool that uses facial recognition to identify individuals and unlock their phones. Laws enforcement agencies al- ready use facial recognition technology in investigations. However, this will be the first time a company (Apple) will have a unified single facial recognition system built into their hardware. The wide-spread use of Apple devices throughout the world could theoretically make Apple a target of govern- ment requests for surveillance information, requests that are considered by many to be uncon- stitutional and unlawful. For more information, see below: https://www.wired.com/story/apples-faceid-could-be-a-powerful-tool-for-mass-spying/?

SCHOOLHOUSE COMMERCIALISM TRENDS

The use of digital technologies in schools has been complicated due to the fact that schools are being subjected to corporate marketing and profit-making tactics in regards to student information. Marketing through the use of educational technology regularly engages students in activities that store and collect personal data and associate this stor- age as normal monitoring and surveillance procedures. This year’s 19th annual report on schoolhouse commercialism trends focuses on how this lax attitude can foster the collection of personal data and work against efforts to protect children’s privacy. Please use the link provided below to view the full report. http://nepc.colorado.edu/publication/schoolhouse-commercialism-2017

CYBERSECURITY BEST PRACTICES Cybersecurity is nothing new, but digital users must be more vigilant than ever. This article discusses creating good cyber habits upfront coined as basic “cyberhygiene” to avoid pitfalls down the line. Basic cyberhygiene includes

Additional Resources 5 Mistakes to avoid after a Cybersecurity Breach 1. Acting before fully understand- ing the problem 2. Failing to maintain operational secrecy 3. Being overly reliant on automa- tion

password habits, following best practic- es like multifactor authentication and virtual private network use and knowing how to thwart phishing (great graphic to use in district). For more information, check out: https://edtechmagazine.com/higher/ article/2017/10/best-practices- cybersecurity-are-simple-and-keep- users-mind

3

Made with FlippingBook - Online catalogs