{"id":339,"date":"2015-01-27T14:14:30","date_gmt":"2015-01-27T19:14:30","guid":{"rendered":"https:\/\/openstudio.pub\/teachinginadigitalagev3m\/chapter\/9-9-the-sections-model-speed-and-security\/"},"modified":"2025-05-10T07:34:01","modified_gmt":"2025-05-10T11:34:01","slug":"9-9-the-sections-model-speed-and-security","status":"publish","type":"chapter","link":"https:\/\/openstudio.pub\/teachinginadigitalagev3m\/chapter\/9-9-the-sections-model-speed-and-security\/","title":{"raw":"10.9 Security and privacy","rendered":"10.9 Security and privacy"},"content":{"raw":"<a href=\"https:\/\/www.dlapiperdataprotection.com\/\"><img class=\"aligncenter size-full wp-image-336\" src=\"https:\/\/openstudio.pub\/wp-content\/uploads\/sites\/22\/2015\/01\/Data-protection-by-country-2022-scaled.png\" alt=\"\" width=\"2604\" height=\"1342\"><\/a>\n\nFigure 10.9.1 Strength of data protection laws. Click on image for more information.\nImage: \u00a9 2022 DLA Piper\n\n'S' too is a change from the earlier ACTIONS model, where 'S' stood for speed, in terms of how quickly a technology enabled a course to be developed. However, the issues previously raised under speed have also been included in SECTIONS 'Ease of Use' (<a href=\"https:\/\/openstudio.pub\/teachinginadigitalagev3m\/chapter\/9-3-the-sections-model-ease-of-use\/\">Chapter 10, Section 3<\/a>). This allows 'Speed' to be replaced with 'Security and privacy', issues which have become increasingly important for education in a digital age.\n<h2>10.9.1 The need for privacy and security when teaching<\/h2>\n<p class=\"p1\">Teachers, instructors and students need a private place to work online. Instructors want to be able to criticize politicians or corporations without fear of reprisal; students may want to keep rash or radical comments from going public or will want to try out perhaps controversial ideas without having them spread all over Facebook. Institutions want to protect students from personal data collection for commercial purposes by private companies, tracking of their online learning activities by government agencies, or marketing and other unrequested commercial or political interruption to their studies. In particular, institutions want to protect students, as far as possible, from online harassment or bullying. Creating a strictly controlled environment enables institutions to manage privacy and security more effectively. For a good example of a simple, transparent set of policies for privacy, see <a href=\"https:\/\/universitycounsel.ubc.ca\/files\/2015\/05\/Fact-Sheet-Overview-of-Privacy.pdf\">University of British Columbia's Privacy Fact Sheet.<\/a><\/p>\nLearning management systems provide password protected access to registered students and authorised instructors. Learning management systems were originally\u00a0housed on servers managed by the institution itself.\u00a0Password protected LMSs on secure servers have provided that protection. Institutional policies regarding appropriate online behaviour can be managed more easily if the communications are managed 'in-house.'\n<h2>10.9.2 Cloud based services and privacy<\/h2>\nHowever, in recent years, more and more online services have moved 'to the cloud', hosted on massive servers whose physical location is often unknown even to the institution's IT services department. Contract agreements between an educational institution and the cloud service provider are meant to ensure security and back-ups.\n\nNevertheless, Canadian institutions and privacy commissioners have been particularly wary of data being hosted out of country, where it may be accessed through the laws of another country. There has been concern that Canadian student information and communications held on cloud servers in the USA may be accessible via the U.S. Patriot Act. For instance, Klassen (<a href=\"https:\/\/courses.olblogs.tru.ca\/eddl5151-may19\/files\/2019\/05\/Background-Paper-Privacy-and-Ed-Tech.pdf\">2015<\/a>) wrote:\n<p class=\"no-indent\" style=\"padding-left: 30px\"><em><span class=\"very-loose\"><span class=\"p1 loose\">]<\/span><\/span><\/em><em><span class=\"very-loose\"><span class=\"p1 loose\">Social media companies are almost exclusively based in the United States, where the provisions of the Patriot Act apply no matter where the information originates. The Patriot Act allows the U.S. government to access the social media content and the personally identifying information without the end users\u2019 knowledge or consent. The government of British Columbia, concerned with both the privacy and security of personal information, enacted a stringent piece of legislation to protect the personal information of British Columbians. The Freedom of Information and Protection of Privacy Act (FIPPA) mandates that no personally identifying information of British Columbians can be collected without their knowledge and consent, and that such information not be used for anything other than the purpose for which it was originally collected. [but see note at end of this section]<\/span><\/span><\/em><\/p>\nConcerns about student privacy have increased even more when it became known that countries were sharing intelligence information, so there remains a risk that even student data\u00a0on Canadian-based servers may well be shared with foreign countries.\n\nBishop (2011 - no longer available) discussed the risks to institutions in using Facebook:\n<ul>\n \t<li>privacy is different from security, in that security is primarily a technical, hence mainly an IT, issue. Privacy needs a different set of policies that involves a much wider range of stakeholders within an institution, and hence a different (and more complex) governance approach from security;<\/li>\n \t<li>many institutions do not have a simple, transparent set of policies for privacy, but different policies set by different parts of the institution. This will inevitably lead to confusion and difficulties in compliance;<\/li>\n \t<li>there is a whole range of laws and regulations that aim to protect privacy;\u00a0these cover not only students but also staff; privacy policy needs to be consistent across the institution and be compliant with such laws and regulation;<\/li>\n \t<li>Facebook's current privacy policy (2011) leaves many institutions using Facebook at a high level of risk of infringing or violating privacy laws - merely writing some kind of disclaimer will in many cases not be sufficient to avoid \u00a0breaking the law. <em><span class=\"very-loose\"><span class=\"p1 loose\">[but see note at end of this section]<\/span><\/span><\/em><\/li>\n<\/ul>\n<a href=\"https:\/\/cdn.dal.ca\/content\/dam\/dalhousie\/pdf\/cultureofrespect\/DalhousieDentistry-TaskForceReport-June2015.pdf\">The controversy at Dalhousie University<\/a> where dental students used Facebook for violent sexist remarks about their fellow women students is an example of the risks endemic in the use of social media.\n\nIn 2019, the U.S. Federal Trade Commission imposed<a href=\"https:\/\/www.ftc.gov\/news-events\/news\/press-releases\/2019\/07\/ftc-imposes-5-billion-penalty-sweeping-new-privacy-restrictions-facebook\"> a US$5 billion <\/a>penalty and sweeping new privacy restrictions on Facebook. <em>'Despite repeated promises to its billions of users worldwide that they could control how their personal information is shared, Facebook undermined consumers\u2019 choices<\/em>, said FTC Chairman Joe Simons'. I leave it to you to judge whether this will be sufficient to protect students' private data from being exploited by social media companies.\n<h2>10.9.3 The need for balance<\/h2>\nAlthough there may well be some areas of teaching and learning where it is essential to operate behind closed doors, such as in some areas of medicine or areas related to public security, or in discussion of sensitive political or moral issues, in general though there have been relatively few privacy or security problems when teachers and instructors have opened up their courses, have followed institutional privacy policies, and above all where students and instructors have used common sense and behaved ethically. Nevertheless, as teaching and learning becomes more open and public, the level of risk does increase.\n<h2>10.9.4 Questions for consideration<\/h2>\n1. What student information am I obliged to keep private and secure? What are my institution's policies on this?\n\n2. What is the risk that by using a particular technology my institution's policies concerning\u00a0privacy could easily be breached? Who in my institution could advise me on this?\n\n3. What areas of teaching and learning, if any, must I keep behind closed doors, available only to students registered in my course? Which technologies will best allow me to do this?\n\n<hr>\n<p class=\"p1\"><span class=\"s1\"><b>Note:<\/b> In November 2021, the Government of British Columbia enacted Bill 22 to make significant changes to the\u00a0<i>Freedom of Information and Protection of Privacy Act. <\/i>As a result of Bill 22, public bodies may now disclose personal information outside Canada 'provided they comply with applicable regulations.' This is an attempt to take account of the increasing use of cloud services. The BC Privacy Commissioner <a href=\"https:\/\/www.oipc.bc.ca\/public-comments\/3592\"><span class=\"s2\">was very unhappy about these changes<\/span><\/a>. Privacy is clearly an area where governments are struggling to keep up with technological developments. All the more reason to be cautious.<\/span><\/p>\n\n<h2>References<\/h2>\nBishop, J. (2011) \u00a0Facebook Privacy Policy: Will Changes End Facebook for Colleges? <em>The Higher Ed CIO<\/em>, October 4 - no longer available; see note above]\n\nFederal Trade Commission (2019) <a href=\"https:\/\/www.ftc.gov\/news-events\/news\/press-releases\/2019\/07\/ftc-imposes-5-billion-penalty-sweeping-new-privacy-restrictions-facebook\">FTC Imposes $5 billion Penalty and Sweeping New Privacy Restrictions on Facebook <\/a>Washington DC: Federal Trade Commission\n\nKlassen, V. (2015) <a href=\"https:\/\/courses.olblogs.tru.ca\/eddl5151-may19\/files\/2019\/05\/Background-Paper-Privacy-and-Ed-Tech.pdf\"><em>Privacy and Cloud-\u00adBased \u00a0Educational\u00a0Technology in\u00a0British\u00a0Columbia<\/em><\/a> Victoria BC: BCCampus\n\nSee also:\n\nBates, T. (2011) <a href=\"http:\/\/www.tonybates.ca\/2011\/03\/25\/cloud-based-educational-technology-and-privacy-a-canadian-perspective\/\">Cloud-based educational technology and privacy: a Canadian perspective<\/a>, <em>Online Learning and Distance Education Resources<\/em>, March 25\n<div class=\"textbox exercises\">\n<h3>Activity 10.9: Security and Privacy<\/h3>\n<div class=\"textbox textbox--exercises\">\n<div class=\"textbox__content\">\n<ol>\n \t<li>Who in your institution can advise you on the institution's policy or the state law on the use of social media or indeed any network outside your institution's private internal network(s)?<\/li>\n<\/ol>\nClick on the podcast for my personal comments on this issue:\n\n[audio mp3=\"https:\/\/opentextbc.ca\/teachinginadigitalage\/wp-content\/uploads\/sites\/29\/2015\/01\/Privacy-2019-09-21-5.28-PM.mp3\"][\/audio]\n\n<\/div>\n<\/div>\n<\/div>","rendered":"<p><a href=\"https:\/\/www.dlapiperdataprotection.com\/\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-336\" src=\"https:\/\/openstudio.pub\/wp-content\/uploads\/sites\/22\/2015\/01\/Data-protection-by-country-2022-scaled.png\" alt=\"\" width=\"2604\" height=\"1342\" \/><\/a><\/p>\n<p>Figure 10.9.1 Strength of data protection laws. Click on image for more information.<br \/>\nImage: \u00a9 2022 DLA Piper<\/p>\n<p>&#8216;S&#8217; too is a change from the earlier ACTIONS model, where &#8216;S&#8217; stood for speed, in terms of how quickly a technology enabled a course to be developed. However, the issues previously raised under speed have also been included in SECTIONS &#8216;Ease of Use&#8217; (<a href=\"https:\/\/openstudio.pub\/teachinginadigitalagev3m\/chapter\/9-3-the-sections-model-ease-of-use\/\">Chapter 10, Section 3<\/a>). This allows &#8216;Speed&#8217; to be replaced with &#8216;Security and privacy&#8217;, issues which have become increasingly important for education in a digital age.<\/p>\n<h2>10.9.1 The need for privacy and security when teaching<\/h2>\n<p class=\"p1\">Teachers, instructors and students need a private place to work online. Instructors want to be able to criticize politicians or corporations without fear of reprisal; students may want to keep rash or radical comments from going public or will want to try out perhaps controversial ideas without having them spread all over Facebook. Institutions want to protect students from personal data collection for commercial purposes by private companies, tracking of their online learning activities by government agencies, or marketing and other unrequested commercial or political interruption to their studies. In particular, institutions want to protect students, as far as possible, from online harassment or bullying. Creating a strictly controlled environment enables institutions to manage privacy and security more effectively. For a good example of a simple, transparent set of policies for privacy, see <a href=\"https:\/\/universitycounsel.ubc.ca\/files\/2015\/05\/Fact-Sheet-Overview-of-Privacy.pdf\">University of British Columbia&#8217;s Privacy Fact Sheet.<\/a><\/p>\n<p>Learning management systems provide password protected access to registered students and authorised instructors. Learning management systems were originally\u00a0housed on servers managed by the institution itself.\u00a0Password protected LMSs on secure servers have provided that protection. Institutional policies regarding appropriate online behaviour can be managed more easily if the communications are managed &#8216;in-house.&#8217;<\/p>\n<h2>10.9.2 Cloud based services and privacy<\/h2>\n<p>However, in recent years, more and more online services have moved &#8216;to the cloud&#8217;, hosted on massive servers whose physical location is often unknown even to the institution&#8217;s IT services department. Contract agreements between an educational institution and the cloud service provider are meant to ensure security and back-ups.<\/p>\n<p>Nevertheless, Canadian institutions and privacy commissioners have been particularly wary of data being hosted out of country, where it may be accessed through the laws of another country. There has been concern that Canadian student information and communications held on cloud servers in the USA may be accessible via the U.S. Patriot Act. For instance, Klassen (<a href=\"https:\/\/courses.olblogs.tru.ca\/eddl5151-may19\/files\/2019\/05\/Background-Paper-Privacy-and-Ed-Tech.pdf\">2015<\/a>) wrote:<\/p>\n<p class=\"no-indent\" style=\"padding-left: 30px\"><em><span class=\"very-loose\"><span class=\"p1 loose\">]<\/span><\/span><\/em><em><span class=\"very-loose\"><span class=\"p1 loose\">Social media companies are almost exclusively based in the United States, where the provisions of the Patriot Act apply no matter where the information originates. The Patriot Act allows the U.S. government to access the social media content and the personally identifying information without the end users\u2019 knowledge or consent. The government of British Columbia, concerned with both the privacy and security of personal information, enacted a stringent piece of legislation to protect the personal information of British Columbians. The Freedom of Information and Protection of Privacy Act (FIPPA) mandates that no personally identifying information of British Columbians can be collected without their knowledge and consent, and that such information not be used for anything other than the purpose for which it was originally collected. [but see note at end of this section]<\/span><\/span><\/em><\/p>\n<p>Concerns about student privacy have increased even more when it became known that countries were sharing intelligence information, so there remains a risk that even student data\u00a0on Canadian-based servers may well be shared with foreign countries.<\/p>\n<p>Bishop (2011 &#8211; no longer available) discussed the risks to institutions in using Facebook:<\/p>\n<ul>\n<li>privacy is different from security, in that security is primarily a technical, hence mainly an IT, issue. Privacy needs a different set of policies that involves a much wider range of stakeholders within an institution, and hence a different (and more complex) governance approach from security;<\/li>\n<li>many institutions do not have a simple, transparent set of policies for privacy, but different policies set by different parts of the institution. This will inevitably lead to confusion and difficulties in compliance;<\/li>\n<li>there is a whole range of laws and regulations that aim to protect privacy;\u00a0these cover not only students but also staff; privacy policy needs to be consistent across the institution and be compliant with such laws and regulation;<\/li>\n<li>Facebook&#8217;s current privacy policy (2011) leaves many institutions using Facebook at a high level of risk of infringing or violating privacy laws &#8211; merely writing some kind of disclaimer will in many cases not be sufficient to avoid \u00a0breaking the law. <em><span class=\"very-loose\"><span class=\"p1 loose\">[but see note at end of this section]<\/span><\/span><\/em><\/li>\n<\/ul>\n<p><a href=\"https:\/\/cdn.dal.ca\/content\/dam\/dalhousie\/pdf\/cultureofrespect\/DalhousieDentistry-TaskForceReport-June2015.pdf\">The controversy at Dalhousie University<\/a> where dental students used Facebook for violent sexist remarks about their fellow women students is an example of the risks endemic in the use of social media.<\/p>\n<p>In 2019, the U.S. Federal Trade Commission imposed<a href=\"https:\/\/www.ftc.gov\/news-events\/news\/press-releases\/2019\/07\/ftc-imposes-5-billion-penalty-sweeping-new-privacy-restrictions-facebook\"> a US$5 billion <\/a>penalty and sweeping new privacy restrictions on Facebook. <em>&#8216;Despite repeated promises to its billions of users worldwide that they could control how their personal information is shared, Facebook undermined consumers\u2019 choices<\/em>, said FTC Chairman Joe Simons&#8217;. I leave it to you to judge whether this will be sufficient to protect students&#8217; private data from being exploited by social media companies.<\/p>\n<h2>10.9.3 The need for balance<\/h2>\n<p>Although there may well be some areas of teaching and learning where it is essential to operate behind closed doors, such as in some areas of medicine or areas related to public security, or in discussion of sensitive political or moral issues, in general though there have been relatively few privacy or security problems when teachers and instructors have opened up their courses, have followed institutional privacy policies, and above all where students and instructors have used common sense and behaved ethically. Nevertheless, as teaching and learning becomes more open and public, the level of risk does increase.<\/p>\n<h2>10.9.4 Questions for consideration<\/h2>\n<p>1. What student information am I obliged to keep private and secure? What are my institution&#8217;s policies on this?<\/p>\n<p>2. What is the risk that by using a particular technology my institution&#8217;s policies concerning\u00a0privacy could easily be breached? Who in my institution could advise me on this?<\/p>\n<p>3. What areas of teaching and learning, if any, must I keep behind closed doors, available only to students registered in my course? Which technologies will best allow me to do this?<\/p>\n<hr \/>\n<p class=\"p1\"><span class=\"s1\"><b>Note:<\/b> In November 2021, the Government of British Columbia enacted Bill 22 to make significant changes to the\u00a0<i>Freedom of Information and Protection of Privacy Act. <\/i>As a result of Bill 22, public bodies may now disclose personal information outside Canada &#8216;provided they comply with applicable regulations.&#8217; This is an attempt to take account of the increasing use of cloud services. The BC Privacy Commissioner <a href=\"https:\/\/www.oipc.bc.ca\/public-comments\/3592\"><span class=\"s2\">was very unhappy about these changes<\/span><\/a>. Privacy is clearly an area where governments are struggling to keep up with technological developments. All the more reason to be cautious.<\/span><\/p>\n<h2>References<\/h2>\n<p>Bishop, J. (2011) \u00a0Facebook Privacy Policy: Will Changes End Facebook for Colleges? <em>The Higher Ed CIO<\/em>, October 4 &#8211; no longer available; see note above]<\/p>\n<p>Federal Trade Commission (2019) <a href=\"https:\/\/www.ftc.gov\/news-events\/news\/press-releases\/2019\/07\/ftc-imposes-5-billion-penalty-sweeping-new-privacy-restrictions-facebook\">FTC Imposes $5 billion Penalty and Sweeping New Privacy Restrictions on Facebook <\/a>Washington DC: Federal Trade Commission<\/p>\n<p>Klassen, V. (2015) <a href=\"https:\/\/courses.olblogs.tru.ca\/eddl5151-may19\/files\/2019\/05\/Background-Paper-Privacy-and-Ed-Tech.pdf\"><em>Privacy and Cloud-\u00adBased \u00a0Educational\u00a0Technology in\u00a0British\u00a0Columbia<\/em><\/a> Victoria BC: BCCampus<\/p>\n<p>See also:<\/p>\n<p>Bates, T. (2011) <a href=\"http:\/\/www.tonybates.ca\/2011\/03\/25\/cloud-based-educational-technology-and-privacy-a-canadian-perspective\/\">Cloud-based educational technology and privacy: a Canadian perspective<\/a>, <em>Online Learning and Distance Education Resources<\/em>, March 25<\/p>\n<div class=\"textbox exercises\">\n<h3>Activity 10.9: Security and Privacy<\/h3>\n<div class=\"textbox textbox--exercises\">\n<div class=\"textbox__content\">\n<ol>\n<li>Who in your institution can advise you on the institution&#8217;s policy or the state law on the use of social media or indeed any network outside your institution&#8217;s private internal network(s)?<\/li>\n<\/ol>\n<p>Click on the podcast for my personal comments on this issue:<\/p>\n<p><audio class=\"wp-audio-shortcode\" id=\"audio-339-1\" preload=\"none\" style=\"width: 100%;\" controls=\"controls\"><source type=\"audio\/mpeg\" src=\"https:\/\/opentextbc.ca\/teachinginadigitalage\/wp-content\/uploads\/sites\/29\/2015\/01\/Privacy-2019-09-21-5.28-PM.mp3?_=1\" \/><a href=\"https:\/\/opentextbc.ca\/teachinginadigitalage\/wp-content\/uploads\/sites\/29\/2015\/01\/Privacy-2019-09-21-5.28-PM.mp3\">https:\/\/opentextbc.ca\/teachinginadigitalage\/wp-content\/uploads\/sites\/29\/2015\/01\/Privacy-2019-09-21-5.28-PM.mp3<\/a><\/audio><\/p>\n<\/div>\n<\/div>\n<\/div>\n","protected":false},"author":1,"menu_order":9,"template":"","meta":{"pb_show_title":"","pb_short_title":"","pb_subtitle":"","pb_authors":[],"pb_section_license":""},"chapter-type":[],"contributor":[],"license":[],"class_list":["post-339","chapter","type-chapter","status-publish","hentry"],"part":306,"_links":{"self":[{"href":"https:\/\/openstudio.pub\/teachinginadigitalagev3m\/wp-json\/pressbooks\/v2\/chapters\/339","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/openstudio.pub\/teachinginadigitalagev3m\/wp-json\/pressbooks\/v2\/chapters"}],"about":[{"href":"https:\/\/openstudio.pub\/teachinginadigitalagev3m\/wp-json\/wp\/v2\/types\/chapter"}],"author":[{"embeddable":true,"href":"https:\/\/openstudio.pub\/teachinginadigitalagev3m\/wp-json\/wp\/v2\/users\/1"}],"version-history":[{"count":1,"href":"https:\/\/openstudio.pub\/teachinginadigitalagev3m\/wp-json\/pressbooks\/v2\/chapters\/339\/revisions"}],"predecessor-version":[{"id":340,"href":"https:\/\/openstudio.pub\/teachinginadigitalagev3m\/wp-json\/pressbooks\/v2\/chapters\/339\/revisions\/340"}],"part":[{"href":"https:\/\/openstudio.pub\/teachinginadigitalagev3m\/wp-json\/pressbooks\/v2\/parts\/306"}],"metadata":[{"href":"https:\/\/openstudio.pub\/teachinginadigitalagev3m\/wp-json\/pressbooks\/v2\/chapters\/339\/metadata\/"}],"wp:attachment":[{"href":"https:\/\/openstudio.pub\/teachinginadigitalagev3m\/wp-json\/wp\/v2\/media?parent=339"}],"wp:term":[{"taxonomy":"chapter-type","embeddable":true,"href":"https:\/\/openstudio.pub\/teachinginadigitalagev3m\/wp-json\/pressbooks\/v2\/chapter-type?post=339"},{"taxonomy":"contributor","embeddable":true,"href":"https:\/\/openstudio.pub\/teachinginadigitalagev3m\/wp-json\/wp\/v2\/contributor?post=339"},{"taxonomy":"license","embeddable":true,"href":"https:\/\/openstudio.pub\/teachinginadigitalagev3m\/wp-json\/wp\/v2\/license?post=339"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}