Home Modules Announcements Files
Since this is a Security Standard related course and you’re taking it at a University, it seems apropos to address the FERPA regulations. The FERPA regulations are federally sponsored and help to protect information that students have on his with colleges, schools, Universities, etc.
Initially, Me parent’s tights for the privacy of this information are covered. When a student turns 18 years old, the rights transfer to the student and the parent loses Al rights associated with that individual’s information. This transfer of rights can also take place when a high school students moves into a higher education institution but may not meet the 18 year age requirement.
The individual holding these rights has the right to review the documents on his with Me institution at any time. This includes ALL information pertaining to Me student The school, however, is not required to provide copies.
The individual holding the rights has Me right to request the school correct records it holds on the student that are believed to be incorrect If the school retists, there can be a hearing on the matter. Aker the hearing, if the school STILL decides there is no error, a record can be placed in the his by the individual slating the point of contention. This is in case anyone reads the file late, they can see both sides of the issue.
Written permission must be obtained, in MOST cases before releasing any information related to a student. In cases of law enforcement, this doesn’t always hold true. Another avenue is when a directory listing is made telling student name, address, phone, honors, etc. However, the school IS required to notify Audents and parents about these actions in advance, allowing enough time to deny the action if warranted.
Now when we take all of this information and start considering, what does this mean to UAT as as institution and our networks? A compromise of the UAT administrative systems would mean what? A loss of company information? Perhaps. A loss of student information? Possibly. A loss of credibility? Probably.
Now, Aong with every other security standard were studying, you’ve probably started to notice a severe lack of details concerning technical security implementations to protect information. There are lots of fines, penalties, and what ifs, but not real structured guidance. So in order to avoid these bothersome things, the institution is left with individuals such as yourself to give them advice on securing their networks and systems in order to protect their student information.
Expectations • Read the FERPA document ft-Pare. Pdf Deliverables
Post your opinion and thoughts on the documents and comment on at least two of your peers’ responses. You can ask technical questions or respond generally to the overall experience. Be objective, clear, and concise. Always use constructive language, even in criticism, to work towards the goal of positive progress.