Posts in Technology.
Making Cybersecurity a Priority

Education institutions face a number of challenges as they gear up for and start the 2022-2023 school year including, but not limited to, lack of adequate staffing in a number of departments.  These staffing shortages are common in technology departments, where staff and resources have been spread thin trying to meet the increased technology demands of remote workforces, virtual learning by students, and ever changing instructional technology.  To this landscape, the threat of cyberattacks is added.

Categories: Technology
Students and Social Media – Can Schools Discipline Students for Off-Campus Speech?

With an estimated 3.96 billion social media users worldwide, it is no surprise to learn that most students have at least one social media account.  Whether it is Facebook, Snapchat, Instagram, or TikTok, people of all ages, from your 85 year-old grandmother to your 7 year-old nephew, can be found sharing their life somewhere on a social media platform (and possibly, your life too!).  In 2021, it appears acceptable to share all types of information, from the tiniest of details, such as what you ate for lunch or your newest dance moves, to more controversial items, such as political and religious beliefs.  People share the details of their everyday lives with friends, family, and strangers.  For many social media users, their first inclination is to “post” about any experience they have just encountered - the good, the bad, and the ugly, with their closest “friends.”  In a world where posting or snapping about any thought instantaneously occurs, when is sharing an opinion or criticism too much, and who decides when enough is enough?  This is the question the U.S. Supreme Court recently reviewed in Mahanoy Area School District v. B.L. By and Through Levy (2021) _ _ _ U.S. _ _ _ 2021 WL 2557069, when the Court reviewed whether school officials had the right to regulate or punish a student for her off-campus, social media speech.

Students arrive to school with different resources and levels of preparedness, thus, the systems put in place to ensure each student succeeds must be different and take into account this underlying inequity. To put effective systems in place requires understanding of the unique challenges and barriers faced by students in the school community, and providing additional supports to assist students in overcoming barriers.  While educational equity does not ensure equal outcomes, educational equity is designed to ensure each student has an equal opportunity to be successful in school through the provision of appropriate and necessary support.

Leading and Managing Employees Remotely: Telecommuting in Education

This is the first blog post in a series that will address issues that arise when educational employees work remotely using technology and when students access education remotely including, but not limited to: learning applications, cybersecurity, equity, and accessibility.

***

Is Your Website ADA-Compliant?  Web Accessibility Lawsuits May Soon Be On the Rise as California High Courts Expand the Reach of the Americans with Disabilities Act and the Unruh Civil Rights Act

Within the past month, California courts have issued rulings expanding the types of lawsuits that may be filed against website operators for failing to maintain certain accessibility standards.  Given these rulings and the U.S. Department of Education, Office for Civil Rights’ recent trend towards focusing on website accessibility for local educational agencies (LEA), it is more important than ever to assess whether your websites meet industry standards for accessibility.

“But It’s on the Internet!” You Still Need a License to Use that Photo!

A recent decision of the Fourth Circuit Court of Appeals demonstrates the risks of using “stock” photographs and other images found on the internet without obtaining a license from the copyright holder. (Brammer v. Violent Hues Productions, LLC (4th Cir. 2019) 922 F.3d 255.) Under U.S. copyright law, all “works of authorship” are protected by copyright, regardless of whether they are posted online and regardless of whether they feature a copyright symbol or notice. So-called “stock” images posted online are protected to the same extent as other visual works.

Does the Public Have a First Amendment Right to Post Comments on a Public Official’s Twitter Feed?  First Amendment Challenges to Social Media Access in the 21st Century

For many people, social media platforms such as Facebook, Twitter, Instagram, Snapchat, and LinkedIn are essential for communicating in their daily lives.  Social media plays an integral role in the transmission of news, ideas, opinions, and personal expression.

Live Streaming – Legal Issues for the School or Community College

How could thy notes flow in such a crystal stream? — Percy Bysshe Shelley

Streaming school or college events live over the Internet allows anyone in the world — relatives, friends, and sundry interested parties — access to student choir concerts, plays, sporting events, or graduations. It’s almost like being there! But live streaming these events raises a variety of legal concerns. Before deciding to stream an event online, districts should carefully consider these issues.

Tags: Streaming

Across the country, students, parents, and community members rely on websites as a primary source for information about their children’s education, meal planning, and community events. The websites may be operated by a school, a district, a county office of education, or a state-level educational agency. A recent study entitled Tracking: EDU: Education Agency Website Security and Privacy Practices, produced by consulting firm EdTech Strategies, LLC, highlights significant privacy, online surveillance, and other security issues with the websites of many school districts and state departments of education.

Categories: Technology

Ransomware is a profitable criminal enterprise that continues to expand while targeting the education sector.

Ransomware is a form of damaging software used by hackers to prevent or limit users from accessing the user’s own system, either by locking the system’s screen or by locking the files. It’s called ransomware because the attackers demand to be paid a “ransom” before allowing a victim to ...

Other AALRR Blogs

Recent Posts

Popular Categories

Contributors

Archives

Back to Page

By scrolling this page, clicking a link or continuing to browse our website, you consent to our use of cookies as described in our Cookie and Privacy Policy. If you do not wish to accept cookies from our website, or would like to stop cookies being stored on your device in the future, you can find out more and adjust your preferences here.