SlideShare a Scribd company logo
1 of 55
Download to read offline
CLASSROOM
STUDENT PRIVACY IN & OUT OF THE
Disclaimer
Lawyers
ā€œStudents don't shed their constitutional rights
at the school house gates."
Central Legal Question We Will Explore:
!
How do schools balance studentsā€™ constitutional
rights with schoolsā€™ needs to maintain order and
a positive educational environment?
!
!
This talk is not about some abstract case studies.
This talk is about you.
What We Will Discuss:
!
Student Privacy Rights on Campus
!
Studentsā€™ Use of Social Networks
!
Student Records and Privacy
!
School Use of Third Party Online Vendors
!
Tracking Students
!
Public Relations & Privacy Issues
!
!
uncharted legal territory
Everyday Scenarios with
the Internet & Technology
Scenario #1: Asking a student for their social
network login credentials.
Not suggested!
!
Not only is the case law all over the place,
various states are debating legislative proposals
to address this issue.
!
Additionally, the Terms of Service of sites like
Facebook expressly prohibit this activity.
Scenario #2: Using private sector tracking
software to monitor students.
Ask yourself the questions:
!
Why and How are you using these monitoring
tools?
DOE & SIIA Issued Guidance
!
1) Legal Awareness: Be aware of the relevant state and federal
laws
!
2) Inventory of Services: Identify all the educational services
being used to assess the range of student information being
shared
!
3) Approval Policies: Important that staff do not bypass internal
controls when deciding to use free online services, and those
should go through the same approval process as paid services
!
4) Insert Contract Provisions: Detail policies for data use,
retention, and destruction
!
5) Transparency: Let students and parents know what is going
on
Scenario #3: Using RFID - Radio Frequency
Identification Technology
Not suggested!
!
Tracking students in this manner can be costly,
hard to manage and intrusive.
!
It can also be a public relations nightmare.
Scenario #4: Accessing Photos or Information
from a Device Such as a Cell or Smartphone.
Seminal Case on Student Privacy:
!
New Jersey v. TLO
Recent Cases:
!
G.C. v. Owensboro Public Schools (2013)
!
N.N. v. Tunkhannock Area School Dist. (2011)
!
Mendoza v. Klein Ind. Sch. Dist. (2011)
!
!
!
!
!
!
!
Scenario #5: Using Webcams or Other Means to
Take Photos of Students, Especially if the Device
Goes Off-Campus.
Relevant Case:
!
Robbins ex. rel Robbins v.
Lower Merion School District (2010)
!
!
!
!
!
!
!
!
ā€œLMSD is enjoined from accessing or reviewing any
student-created files contained on student laptops
(including but not limited to documents, e-mails,
instant messaging records, photographs, Internet
usage logs, and Web browsing histories) for any
reason except as permitted by the policies and
regulations contemplated by paragraph 7 of this
Order or otherwise pursuant to a signed consent
form that clearly and conspicuously sets forth the
ability of LMSD to access or review such files.ā€
!
!
!
!
Scenario #6: Circumventing FERPA.
Example:
!
FERPA changes that allow for sharing
students' personal information with other
state officials and private entities forĀ a broad
spectrum of activities without the consent of
parents.
!
May just be the beginning of these types of
proposals.
Scenario #7: Parent Dissemination of User
Generated Content.
Social Media Amplifies Broadcast Potential
!
Policies should be in place for parents taking
photos with smartphones and sharing on
social networks.
!
Consider the implication for children in
situations where parents may have protective
or other restraining orders.
Parent & Staff Education
!
You may think itā€™s common sense, but write it
down and share it with parents and staff
members.
The Fourth Amendment
When Does It Apply
Distinguishing Fourth Amendment from privacy
in the civil sense.
The Fourth Amendment could apply when you
are searching private accounts.
The First Amendment
When Does It Apply
Tinker v. Des Moines
Long-held precedent, since 1969, that students
have wide latitude to criticize to school officials
and policies.
kidz online.
yes, different rules apply.
Personally Identifiable Information (PII)
ā€œPersonally identifiable informationā€ is information
that identifies a particular person. ā€œPiiā€ includes:
!
ā€¢ Full name;
ā€¢ National identification number;
ā€¢ IP address;
ā€¢ Vehicle registration plate number;
ā€¢ Driverā€™s license number;
ā€¢ Face;
ā€¢ Fingerprints;
ā€¢ Handwriting;
ā€¢ Credit card numbers;
ā€¢ Digital identity;
ā€¢ Date of birth;
ā€¢ Birthplace; and
ā€¢ Genetic information.
Childrenā€™s Online Privacy Protection Act
!
Requires websites to get parental consent before
collecting or sharing info for children under 13.
!
Enforced by the Federal Trade Commission.
!
Applies to commercial websites and other online
services.
!
!
!
COPPA Checklist
!
1) Know what qualifies as personal information under the statute.
!
2) Implement a standardized district-wide process for reviewing
an online or education technology service providerā€™s practices for
information collection, use and disclosure to ensure they are
COPPA compliant.
!
3) Know where students are accessing information.
!
4) Make sure the sites students visit have prominently displayed,
clearly stated privacy policies that meet COPPAā€™s requirements.
!
5) Provide parents with a notice of the websites and online services
whose collection the school has consented to on their behalf.
!
!
COPPA Checklist
!
6) Inform parents of the procedure for opting out of sharing their
childā€™s personal information.
!
7) Know when schools can or cannot consent on behalf of the
parents.
!
8) Ensure the method used to obtain verifiable parental consent is
FTC approved, or you can apply to the FTC for pre-approval of a
new consent mechanism.
!
9) Implement yearly trainings for school administration and
faculty covering the school or districtā€™s COPPA responsibilities
and compliance practices.
!
10) Educate students about online safety and privacy issues.
!
Avoiding the ā€œOh, crap.ā€
General Privacy Tips
California
!
Privacy Policy Required
!
Itā€™s just good sense for schools too.
!
Social Media Privacy Act
!
Enacted to protect students at universities and
employees from the demand of usernames and
passwords.
!
On the horizon - may be amendments to apply to
K-12 schools (exemptions for instances involving
bullying investigations)
Protecting Student Records
!
Over 8 million student privacy records have been
lost from nearly 600 security breaches since 2005.
We just scratched the surface.
?
Lawyers
Gagnier Margossian
@gamallp
consult@gamallp.com
gamallp.com
CLASSROOM
STUDENT PRIVACY IN THE

More Related Content

What's hot

Reliability_Undesirability
Reliability_UndesirabilityReliability_Undesirability
Reliability_UndesirabilityMohamed Omar
Ā 
Eastern Keren
Eastern KerenEastern Keren
Eastern Kerenelizkeren
Ā 
Lansing Cc 2010
Lansing Cc 2010Lansing Cc 2010
Lansing Cc 2010elizkeren
Ā 
11.21.10 inventedstudentuseagreement
11.21.10 inventedstudentuseagreement11.21.10 inventedstudentuseagreement
11.21.10 inventedstudentuseagreementPaula Naugle
Ā 
Manistee
ManisteeManistee
Manisteeelizkeren
Ā 
Its the law
Its the lawIts the law
Its the lawedtechdiva
Ā 
Social Networking and Chilton
Social Networking and ChiltonSocial Networking and Chilton
Social Networking and Chiltonelizkeren
Ā 
Filters firstamendmenttla2011 final
Filters firstamendmenttla2011 finalFilters firstamendmenttla2011 final
Filters firstamendmenttla2011 finalLea Bailey
Ā 
Southfield
SouthfieldSouthfield
Southfieldelizkeren
Ā 
CIPA Children's Internet Protection Act
CIPA Children's Internet Protection ActCIPA Children's Internet Protection Act
CIPA Children's Internet Protection Actgibb0
Ā 
Life in the_digital_world
Life in the_digital_worldLife in the_digital_world
Life in the_digital_worldMaria Petropulos
Ā 
Charter cellphones
Charter cellphones Charter cellphones
Charter cellphones elizkeren
Ā 
Thurston
ThurstonThurston
Thurstonelizkeren
Ā 
CIPA Overview
CIPA OverviewCIPA Overview
CIPA Overviewedtecher
Ā 
Cell byot
Cell byotCell byot
Cell byotelizkeren
Ā 
Traverse kolb 2010
Traverse kolb 2010Traverse kolb 2010
Traverse kolb 2010elizkeren
Ā 
Module 1 b edu 650
Module 1 b edu 650Module 1 b edu 650
Module 1 b edu 650kareneckroth
Ā 

What's hot (20)

Reliability_Undesirability
Reliability_UndesirabilityReliability_Undesirability
Reliability_Undesirability
Ā 
Eastern Keren
Eastern KerenEastern Keren
Eastern Keren
Ā 
Lansing Cc 2010
Lansing Cc 2010Lansing Cc 2010
Lansing Cc 2010
Ā 
11.21.10 inventedstudentuseagreement
11.21.10 inventedstudentuseagreement11.21.10 inventedstudentuseagreement
11.21.10 inventedstudentuseagreement
Ā 
Manistee
ManisteeManistee
Manistee
Ā 
Its the law
Its the lawIts the law
Its the law
Ā 
Social Networking and Chilton
Social Networking and ChiltonSocial Networking and Chilton
Social Networking and Chilton
Ā 
Filters firstamendmenttla2011 final
Filters firstamendmenttla2011 finalFilters firstamendmenttla2011 final
Filters firstamendmenttla2011 final
Ā 
Southfield
SouthfieldSouthfield
Southfield
Ā 
CIPA Children's Internet Protection Act
CIPA Children's Internet Protection ActCIPA Children's Internet Protection Act
CIPA Children's Internet Protection Act
Ā 
Life in the_digital_world
Life in the_digital_worldLife in the_digital_world
Life in the_digital_world
Ā 
Charter cellphones
Charter cellphones Charter cellphones
Charter cellphones
Ā 
Thurston
ThurstonThurston
Thurston
Ā 
CIPA Overview
CIPA OverviewCIPA Overview
CIPA Overview
Ā 
4
44
4
Ā 
Cell byot
Cell byotCell byot
Cell byot
Ā 
Comm Law paper
Comm Law paperComm Law paper
Comm Law paper
Ā 
Traverse kolb 2010
Traverse kolb 2010Traverse kolb 2010
Traverse kolb 2010
Ā 
Texas
TexasTexas
Texas
Ā 
Module 1 b edu 650
Module 1 b edu 650Module 1 b edu 650
Module 1 b edu 650
Ā 

Viewers also liked

Demystifying Student Data Privacy Q&A
Demystifying Student Data Privacy Q&ADemystifying Student Data Privacy Q&A
Demystifying Student Data Privacy Q&ANaviance
Ā 
Sxs wedu 2017 application presentation computer science
Sxs wedu 2017 application presentation   computer scienceSxs wedu 2017 application presentation   computer science
Sxs wedu 2017 application presentation computer scienceAmelia Vance, Esq.
Ā 
Demystifying Student Data Privacy
Demystifying Student Data PrivacyDemystifying Student Data Privacy
Demystifying Student Data PrivacyNaviance
Ā 
Sxsw boot camp_building_student_privacy_program
Sxsw boot camp_building_student_privacy_programSxsw boot camp_building_student_privacy_program
Sxsw boot camp_building_student_privacy_programTeddy Hartman
Ā 
Measuring Grit While Protecting Student Privacy - SXSWedu 2017 Application
Measuring Grit While Protecting Student Privacy - SXSWedu 2017 ApplicationMeasuring Grit While Protecting Student Privacy - SXSWedu 2017 Application
Measuring Grit While Protecting Student Privacy - SXSWedu 2017 ApplicationAmelia Vance, Esq.
Ā 
Student Data Privacy: What Teachers and Administrators Need to KNow
Student Data Privacy: What Teachers and Administrators Need to KNowStudent Data Privacy: What Teachers and Administrators Need to KNow
Student Data Privacy: What Teachers and Administrators Need to KNowEmily Ensign
Ā 
Student data privacy manifesto
Student data privacy manifestoStudent data privacy manifesto
Student data privacy manifestoCaitlin Sharp
Ā 
Education Privacy Presentation
Education Privacy Presentation Education Privacy Presentation
Education Privacy Presentation emilyensign
Ā 
Student Privacy - Teaching's New Moral Dilema
Student Privacy - Teaching's New Moral DilemaStudent Privacy - Teaching's New Moral Dilema
Student Privacy - Teaching's New Moral DilemaDavid Kinane
Ā 
NASBE SXSWedu Application
NASBE SXSWedu ApplicationNASBE SXSWedu Application
NASBE SXSWedu ApplicationAmelia Vance, Esq.
Ā 
Privacy and Data Protection - principles for design of a new part of an ISO s...
Privacy and Data Protection - principles for design of a new part of an ISO s...Privacy and Data Protection - principles for design of a new part of an ISO s...
Privacy and Data Protection - principles for design of a new part of an ISO s...Tore Hoel
Ā 
AngeLA: Putting the teacher in control of student privacy in the online class...
AngeLA: Putting the teacher in control of student privacy in the online class...AngeLA: Putting the teacher in control of student privacy in the online class...
AngeLA: Putting the teacher in control of student privacy in the online class...Andrii Vozniuk
Ā 
Guide to Prospective European Union - United States Privacy Shield Program
Guide to Prospective European Union - United States Privacy Shield ProgramGuide to Prospective European Union - United States Privacy Shield Program
Guide to Prospective European Union - United States Privacy Shield ProgramChristina Gagnier
Ā 
iNACOL Leadership Webinar "Protecting Student Privacy in Blended and Online L...
iNACOL Leadership Webinar "Protecting Student Privacy in Blended and Online L...iNACOL Leadership Webinar "Protecting Student Privacy in Blended and Online L...
iNACOL Leadership Webinar "Protecting Student Privacy in Blended and Online L...iNACOL
Ā 
Student privacy self-management: Implications for learning analytics
Student privacy self-management: Implications for learning analyticsStudent privacy self-management: Implications for learning analytics
Student privacy self-management: Implications for learning analyticsUniversity of South Africa (Unisa)
Ā 
GAMABrief: When Education Meets Big Data
GAMABrief: When Education Meets Big DataGAMABrief: When Education Meets Big Data
GAMABrief: When Education Meets Big DataChristina Gagnier
Ā 
2015 CIC: #EdTech Forum - Data Privacy Standards
2015 CIC: #EdTech Forum - Data Privacy Standards2015 CIC: #EdTech Forum - Data Privacy Standards
2015 CIC: #EdTech Forum - Data Privacy StandardsAAP PreK-12 Learning Group
Ā 
Privacy and Student Data: What to Consider
Privacy and Student Data: What to ConsiderPrivacy and Student Data: What to Consider
Privacy and Student Data: What to ConsiderLisa Marie Gonzales, Ed.D.
Ā 

Viewers also liked (20)

Demystifying Student Data Privacy Q&A
Demystifying Student Data Privacy Q&ADemystifying Student Data Privacy Q&A
Demystifying Student Data Privacy Q&A
Ā 
Sxs wedu 2017 application presentation computer science
Sxs wedu 2017 application presentation   computer scienceSxs wedu 2017 application presentation   computer science
Sxs wedu 2017 application presentation computer science
Ā 
Demystifying Student Data Privacy
Demystifying Student Data PrivacyDemystifying Student Data Privacy
Demystifying Student Data Privacy
Ā 
Sxsw boot camp_building_student_privacy_program
Sxsw boot camp_building_student_privacy_programSxsw boot camp_building_student_privacy_program
Sxsw boot camp_building_student_privacy_program
Ā 
Measuring Grit While Protecting Student Privacy - SXSWedu 2017 Application
Measuring Grit While Protecting Student Privacy - SXSWedu 2017 ApplicationMeasuring Grit While Protecting Student Privacy - SXSWedu 2017 Application
Measuring Grit While Protecting Student Privacy - SXSWedu 2017 Application
Ā 
Student Data Privacy: What Teachers and Administrators Need to KNow
Student Data Privacy: What Teachers and Administrators Need to KNowStudent Data Privacy: What Teachers and Administrators Need to KNow
Student Data Privacy: What Teachers and Administrators Need to KNow
Ā 
Student data privacy manifesto
Student data privacy manifestoStudent data privacy manifesto
Student data privacy manifesto
Ā 
Privacy_SXSWEDU
Privacy_SXSWEDUPrivacy_SXSWEDU
Privacy_SXSWEDU
Ā 
Education Privacy Presentation
Education Privacy Presentation Education Privacy Presentation
Education Privacy Presentation
Ā 
Student Privacy - Teaching's New Moral Dilema
Student Privacy - Teaching's New Moral DilemaStudent Privacy - Teaching's New Moral Dilema
Student Privacy - Teaching's New Moral Dilema
Ā 
OnCUE Magazine - Spring 2016
OnCUE Magazine - Spring 2016OnCUE Magazine - Spring 2016
OnCUE Magazine - Spring 2016
Ā 
NASBE SXSWedu Application
NASBE SXSWedu ApplicationNASBE SXSWedu Application
NASBE SXSWedu Application
Ā 
Privacy and Data Protection - principles for design of a new part of an ISO s...
Privacy and Data Protection - principles for design of a new part of an ISO s...Privacy and Data Protection - principles for design of a new part of an ISO s...
Privacy and Data Protection - principles for design of a new part of an ISO s...
Ā 
AngeLA: Putting the teacher in control of student privacy in the online class...
AngeLA: Putting the teacher in control of student privacy in the online class...AngeLA: Putting the teacher in control of student privacy in the online class...
AngeLA: Putting the teacher in control of student privacy in the online class...
Ā 
Guide to Prospective European Union - United States Privacy Shield Program
Guide to Prospective European Union - United States Privacy Shield ProgramGuide to Prospective European Union - United States Privacy Shield Program
Guide to Prospective European Union - United States Privacy Shield Program
Ā 
iNACOL Leadership Webinar "Protecting Student Privacy in Blended and Online L...
iNACOL Leadership Webinar "Protecting Student Privacy in Blended and Online L...iNACOL Leadership Webinar "Protecting Student Privacy in Blended and Online L...
iNACOL Leadership Webinar "Protecting Student Privacy in Blended and Online L...
Ā 
Student privacy self-management: Implications for learning analytics
Student privacy self-management: Implications for learning analyticsStudent privacy self-management: Implications for learning analytics
Student privacy self-management: Implications for learning analytics
Ā 
GAMABrief: When Education Meets Big Data
GAMABrief: When Education Meets Big DataGAMABrief: When Education Meets Big Data
GAMABrief: When Education Meets Big Data
Ā 
2015 CIC: #EdTech Forum - Data Privacy Standards
2015 CIC: #EdTech Forum - Data Privacy Standards2015 CIC: #EdTech Forum - Data Privacy Standards
2015 CIC: #EdTech Forum - Data Privacy Standards
Ā 
Privacy and Student Data: What to Consider
Privacy and Student Data: What to ConsiderPrivacy and Student Data: What to Consider
Privacy and Student Data: What to Consider
Ā 

Similar to Student Privacy Rights: In and Out of the Classroom

In Class Learning Activity
In Class Learning ActivityIn Class Learning Activity
In Class Learning Activityguest09fcd1
Ā 
Education Privacy
Education Privacy Education Privacy
Education Privacy emilyensign
Ā 
Legalissues
LegalissuesLegalissues
Legalissueselizkeren
Ā 
Cyberbully Module
Cyberbully ModuleCyberbully Module
Cyberbully Modulelpj101
Ā 
Internet Safety Presentation
Internet Safety PresentationInternet Safety Presentation
Internet Safety Presentationtdsparks3
Ā 
Cyber_Safety_K-12_Fact_Sheet_508C.pdf
Cyber_Safety_K-12_Fact_Sheet_508C.pdfCyber_Safety_K-12_Fact_Sheet_508C.pdf
Cyber_Safety_K-12_Fact_Sheet_508C.pdfMi Ra Lavandelo
Ā 
Tec207 -final presentation
Tec207 -final presentationTec207 -final presentation
Tec207 -final presentationSarah Sell
Ā 
Understanding "Cyber" Bullying: California Law & Proactive Steps for School D...
Understanding "Cyber" Bullying: California Law & Proactive Steps for School D...Understanding "Cyber" Bullying: California Law & Proactive Steps for School D...
Understanding "Cyber" Bullying: California Law & Proactive Steps for School D...Christina Gagnier
Ā 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullyingmribera87
Ā 
reSearch with teacher commentIMG_0418.JPGreSearch with teac.docx
reSearch with teacher commentIMG_0418.JPGreSearch with teac.docxreSearch with teacher commentIMG_0418.JPGreSearch with teac.docx
reSearch with teacher commentIMG_0418.JPGreSearch with teac.docxronak56
Ā 
Internet privacy ethics and online security
Internet privacy ethics and online securityInternet privacy ethics and online security
Internet privacy ethics and online securityPaul Berryman
Ā 
Proposal-Example-4.doc
Proposal-Example-4.docProposal-Example-4.doc
Proposal-Example-4.docBobbyThankappan
Ā 
Parenting the MySpace Generation
Parenting the MySpace GenerationParenting the MySpace Generation
Parenting the MySpace Generationdlevin
Ā 
Safe Surfing 4Paras/Clerical Feb 07
Safe Surfing 4Paras/Clerical Feb 07Safe Surfing 4Paras/Clerical Feb 07
Safe Surfing 4Paras/Clerical Feb 07E Robertson
Ā 
Its the law
Its the lawIts the law
Its the lawnsharoff
Ā 
Madison Opening
Madison OpeningMadison Opening
Madison Openingelizkeren
Ā 

Similar to Student Privacy Rights: In and Out of the Classroom (20)

In Class Learning Activity
In Class Learning ActivityIn Class Learning Activity
In Class Learning Activity
Ā 
Education Privacy
Education Privacy Education Privacy
Education Privacy
Ā 
Legalissues
LegalissuesLegalissues
Legalissues
Ā 
Lesson 3 ethical issues
Lesson 3   ethical issuesLesson 3   ethical issues
Lesson 3 ethical issues
Ā 
Cyberbully Module
Cyberbully ModuleCyberbully Module
Cyberbully Module
Ā 
Internet Safety Presentation
Internet Safety PresentationInternet Safety Presentation
Internet Safety Presentation
Ā 
Cyber_Safety_K-12_Fact_Sheet_508C.pdf
Cyber_Safety_K-12_Fact_Sheet_508C.pdfCyber_Safety_K-12_Fact_Sheet_508C.pdf
Cyber_Safety_K-12_Fact_Sheet_508C.pdf
Ā 
Chapter 6
Chapter 6Chapter 6
Chapter 6
Ā 
Chapter6
Chapter6Chapter6
Chapter6
Ā 
Tec207 -final presentation
Tec207 -final presentationTec207 -final presentation
Tec207 -final presentation
Ā 
Understanding "Cyber" Bullying: California Law & Proactive Steps for School D...
Understanding "Cyber" Bullying: California Law & Proactive Steps for School D...Understanding "Cyber" Bullying: California Law & Proactive Steps for School D...
Understanding "Cyber" Bullying: California Law & Proactive Steps for School D...
Ā 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
Ā 
case study.pptx
case study.pptxcase study.pptx
case study.pptx
Ā 
reSearch with teacher commentIMG_0418.JPGreSearch with teac.docx
reSearch with teacher commentIMG_0418.JPGreSearch with teac.docxreSearch with teacher commentIMG_0418.JPGreSearch with teac.docx
reSearch with teacher commentIMG_0418.JPGreSearch with teac.docx
Ā 
Internet privacy ethics and online security
Internet privacy ethics and online securityInternet privacy ethics and online security
Internet privacy ethics and online security
Ā 
Proposal-Example-4.doc
Proposal-Example-4.docProposal-Example-4.doc
Proposal-Example-4.doc
Ā 
Parenting the MySpace Generation
Parenting the MySpace GenerationParenting the MySpace Generation
Parenting the MySpace Generation
Ā 
Safe Surfing 4Paras/Clerical Feb 07
Safe Surfing 4Paras/Clerical Feb 07Safe Surfing 4Paras/Clerical Feb 07
Safe Surfing 4Paras/Clerical Feb 07
Ā 
Its the law
Its the lawIts the law
Its the law
Ā 
Madison Opening
Madison OpeningMadison Opening
Madison Opening
Ā 

More from Christina Gagnier

European Union General Data Protection Regulation (GDPR) Checklist
European Union General Data Protection Regulation (GDPR) ChecklistEuropean Union General Data Protection Regulation (GDPR) Checklist
European Union General Data Protection Regulation (GDPR) ChecklistChristina Gagnier
Ā 
EU Privacy Shield Self Certification
EU Privacy Shield Self Certification EU Privacy Shield Self Certification
EU Privacy Shield Self Certification Christina Gagnier
Ā 
The United Kingdom Raises Red Flag on Initial Coin Offerings
The United Kingdom Raises Red Flag on Initial Coin OfferingsThe United Kingdom Raises Red Flag on Initial Coin Offerings
The United Kingdom Raises Red Flag on Initial Coin OfferingsChristina Gagnier
Ā 
Regulatory Regime for Cryptocurrencies in Gibraltar
Regulatory Regime for Cryptocurrencies in GibraltarRegulatory Regime for Cryptocurrencies in Gibraltar
Regulatory Regime for Cryptocurrencies in GibraltarChristina Gagnier
Ā 
China Bans Initial Coin Offerings, "Illegal Public Financing"
China Bans Initial Coin Offerings, "Illegal Public Financing"China Bans Initial Coin Offerings, "Illegal Public Financing"
China Bans Initial Coin Offerings, "Illegal Public Financing"Christina Gagnier
Ā 
Initial Coin Offerings (ICOs) and Cryptocurrencies in Canada
Initial Coin Offerings (ICOs) and Cryptocurrencies in CanadaInitial Coin Offerings (ICOs) and Cryptocurrencies in Canada
Initial Coin Offerings (ICOs) and Cryptocurrencies in CanadaChristina Gagnier
Ā 
Conducting an Initial Coin Offering: Costs and Considerations
Conducting an Initial Coin Offering: Costs and ConsiderationsConducting an Initial Coin Offering: Costs and Considerations
Conducting an Initial Coin Offering: Costs and ConsiderationsChristina Gagnier
Ā 
SEC Update: Virtual Organizations and the SEC - July 2017
SEC Update: Virtual Organizations and the SEC - July 2017SEC Update: Virtual Organizations and the SEC - July 2017
SEC Update: Virtual Organizations and the SEC - July 2017Christina Gagnier
Ā 
European Union Privacy Law - General Data Protection Regulation Checklist
European Union Privacy Law - General Data Protection Regulation ChecklistEuropean Union Privacy Law - General Data Protection Regulation Checklist
European Union Privacy Law - General Data Protection Regulation ChecklistChristina Gagnier
Ā 
Revenge Pornography: Legal and Policy Issues - Computers, Data & Privacy Prot...
Revenge Pornography: Legal and Policy Issues - Computers, Data & Privacy Prot...Revenge Pornography: Legal and Policy Issues - Computers, Data & Privacy Prot...
Revenge Pornography: Legal and Policy Issues - Computers, Data & Privacy Prot...Christina Gagnier
Ā 
Gender Issues: Creating a Safe Environment for All Students
Gender Issues: Creating a Safe Environment for All StudentsGender Issues: Creating a Safe Environment for All Students
Gender Issues: Creating a Safe Environment for All StudentsChristina Gagnier
Ā 
ABC's of Privacy and Security
ABC's of Privacy and SecurityABC's of Privacy and Security
ABC's of Privacy and SecurityChristina Gagnier
Ā 
Starting a Business: The Legal Details
Starting a Business: The Legal DetailsStarting a Business: The Legal Details
Starting a Business: The Legal DetailsChristina Gagnier
Ā 
GAMABrief: What Every School Needs to Know About Copyright Law
GAMABrief: What Every School Needs to Know About Copyright LawGAMABrief: What Every School Needs to Know About Copyright Law
GAMABrief: What Every School Needs to Know About Copyright LawChristina Gagnier
Ā 
GAMAByte: The Legal Ramifications of Going 3D (Printing, That is)
GAMAByte: The Legal Ramifications of Going 3D (Printing, That is)GAMAByte: The Legal Ramifications of Going 3D (Printing, That is)
GAMAByte: The Legal Ramifications of Going 3D (Printing, That is)Christina Gagnier
Ā 
GAMABrief: Preparing for the Capital Gains Tax Hike
GAMABrief: Preparing for the Capital Gains Tax HikeGAMABrief: Preparing for the Capital Gains Tax Hike
GAMABrief: Preparing for the Capital Gains Tax HikeChristina Gagnier
Ā 
Privacy Identity Innovation 2013: Ignite Talk Slides - Content. Conduct. Cont...
Privacy Identity Innovation 2013: Ignite Talk Slides - Content. Conduct. Cont...Privacy Identity Innovation 2013: Ignite Talk Slides - Content. Conduct. Cont...
Privacy Identity Innovation 2013: Ignite Talk Slides - Content. Conduct. Cont...Christina Gagnier
Ā 
Revenge Porn: Posting Images Without Consent
Revenge Porn: Posting Images Without ConsentRevenge Porn: Posting Images Without Consent
Revenge Porn: Posting Images Without ConsentChristina Gagnier
Ā 
Seth's Law (AB 9) - Understanding "Cyber" Bullying
Seth's Law (AB 9) - Understanding "Cyber" BullyingSeth's Law (AB 9) - Understanding "Cyber" Bullying
Seth's Law (AB 9) - Understanding "Cyber" BullyingChristina Gagnier
Ā 
Employees, Employers & Social Media
Employees, Employers & Social MediaEmployees, Employers & Social Media
Employees, Employers & Social MediaChristina Gagnier
Ā 

More from Christina Gagnier (20)

European Union General Data Protection Regulation (GDPR) Checklist
European Union General Data Protection Regulation (GDPR) ChecklistEuropean Union General Data Protection Regulation (GDPR) Checklist
European Union General Data Protection Regulation (GDPR) Checklist
Ā 
EU Privacy Shield Self Certification
EU Privacy Shield Self Certification EU Privacy Shield Self Certification
EU Privacy Shield Self Certification
Ā 
The United Kingdom Raises Red Flag on Initial Coin Offerings
The United Kingdom Raises Red Flag on Initial Coin OfferingsThe United Kingdom Raises Red Flag on Initial Coin Offerings
The United Kingdom Raises Red Flag on Initial Coin Offerings
Ā 
Regulatory Regime for Cryptocurrencies in Gibraltar
Regulatory Regime for Cryptocurrencies in GibraltarRegulatory Regime for Cryptocurrencies in Gibraltar
Regulatory Regime for Cryptocurrencies in Gibraltar
Ā 
China Bans Initial Coin Offerings, "Illegal Public Financing"
China Bans Initial Coin Offerings, "Illegal Public Financing"China Bans Initial Coin Offerings, "Illegal Public Financing"
China Bans Initial Coin Offerings, "Illegal Public Financing"
Ā 
Initial Coin Offerings (ICOs) and Cryptocurrencies in Canada
Initial Coin Offerings (ICOs) and Cryptocurrencies in CanadaInitial Coin Offerings (ICOs) and Cryptocurrencies in Canada
Initial Coin Offerings (ICOs) and Cryptocurrencies in Canada
Ā 
Conducting an Initial Coin Offering: Costs and Considerations
Conducting an Initial Coin Offering: Costs and ConsiderationsConducting an Initial Coin Offering: Costs and Considerations
Conducting an Initial Coin Offering: Costs and Considerations
Ā 
SEC Update: Virtual Organizations and the SEC - July 2017
SEC Update: Virtual Organizations and the SEC - July 2017SEC Update: Virtual Organizations and the SEC - July 2017
SEC Update: Virtual Organizations and the SEC - July 2017
Ā 
European Union Privacy Law - General Data Protection Regulation Checklist
European Union Privacy Law - General Data Protection Regulation ChecklistEuropean Union Privacy Law - General Data Protection Regulation Checklist
European Union Privacy Law - General Data Protection Regulation Checklist
Ā 
Revenge Pornography: Legal and Policy Issues - Computers, Data & Privacy Prot...
Revenge Pornography: Legal and Policy Issues - Computers, Data & Privacy Prot...Revenge Pornography: Legal and Policy Issues - Computers, Data & Privacy Prot...
Revenge Pornography: Legal and Policy Issues - Computers, Data & Privacy Prot...
Ā 
Gender Issues: Creating a Safe Environment for All Students
Gender Issues: Creating a Safe Environment for All StudentsGender Issues: Creating a Safe Environment for All Students
Gender Issues: Creating a Safe Environment for All Students
Ā 
ABC's of Privacy and Security
ABC's of Privacy and SecurityABC's of Privacy and Security
ABC's of Privacy and Security
Ā 
Starting a Business: The Legal Details
Starting a Business: The Legal DetailsStarting a Business: The Legal Details
Starting a Business: The Legal Details
Ā 
GAMABrief: What Every School Needs to Know About Copyright Law
GAMABrief: What Every School Needs to Know About Copyright LawGAMABrief: What Every School Needs to Know About Copyright Law
GAMABrief: What Every School Needs to Know About Copyright Law
Ā 
GAMAByte: The Legal Ramifications of Going 3D (Printing, That is)
GAMAByte: The Legal Ramifications of Going 3D (Printing, That is)GAMAByte: The Legal Ramifications of Going 3D (Printing, That is)
GAMAByte: The Legal Ramifications of Going 3D (Printing, That is)
Ā 
GAMABrief: Preparing for the Capital Gains Tax Hike
GAMABrief: Preparing for the Capital Gains Tax HikeGAMABrief: Preparing for the Capital Gains Tax Hike
GAMABrief: Preparing for the Capital Gains Tax Hike
Ā 
Privacy Identity Innovation 2013: Ignite Talk Slides - Content. Conduct. Cont...
Privacy Identity Innovation 2013: Ignite Talk Slides - Content. Conduct. Cont...Privacy Identity Innovation 2013: Ignite Talk Slides - Content. Conduct. Cont...
Privacy Identity Innovation 2013: Ignite Talk Slides - Content. Conduct. Cont...
Ā 
Revenge Porn: Posting Images Without Consent
Revenge Porn: Posting Images Without ConsentRevenge Porn: Posting Images Without Consent
Revenge Porn: Posting Images Without Consent
Ā 
Seth's Law (AB 9) - Understanding "Cyber" Bullying
Seth's Law (AB 9) - Understanding "Cyber" BullyingSeth's Law (AB 9) - Understanding "Cyber" Bullying
Seth's Law (AB 9) - Understanding "Cyber" Bullying
Ā 
Employees, Employers & Social Media
Employees, Employers & Social MediaEmployees, Employers & Social Media
Employees, Employers & Social Media
Ā 

Recently uploaded

Audience profile - SF.pptxxxxxxxxxxxxxxxxxxxxxxxxxxx
Audience profile - SF.pptxxxxxxxxxxxxxxxxxxxxxxxxxxxAudience profile - SF.pptxxxxxxxxxxxxxxxxxxxxxxxxxxx
Audience profile - SF.pptxxxxxxxxxxxxxxxxxxxxxxxxxxxMollyBrown86
Ā 
Legal Risks and Compliance Considerations for Cryptocurrency Exchanges in India
Legal Risks and Compliance Considerations for Cryptocurrency Exchanges in IndiaLegal Risks and Compliance Considerations for Cryptocurrency Exchanges in India
Legal Risks and Compliance Considerations for Cryptocurrency Exchanges in IndiaFinlaw Consultancy Pvt Ltd
Ā 
FULL ENJOY - 8264348440 Call Girls in Netaji Subhash Place | Delhi
FULL ENJOY - 8264348440 Call Girls in Netaji Subhash Place | DelhiFULL ENJOY - 8264348440 Call Girls in Netaji Subhash Place | Delhi
FULL ENJOY - 8264348440 Call Girls in Netaji Subhash Place | Delhisoniya singh
Ā 
PPT- Voluntary Liquidation (Under section 59).pptx
PPT- Voluntary Liquidation (Under section 59).pptxPPT- Voluntary Liquidation (Under section 59).pptx
PPT- Voluntary Liquidation (Under section 59).pptxRRR Chambers
Ā 
KEY NOTE- IBC(INSOLVENCY & BANKRUPTCY CODE) DESIGN- PPT.pptx
KEY NOTE- IBC(INSOLVENCY & BANKRUPTCY CODE) DESIGN- PPT.pptxKEY NOTE- IBC(INSOLVENCY & BANKRUPTCY CODE) DESIGN- PPT.pptx
KEY NOTE- IBC(INSOLVENCY & BANKRUPTCY CODE) DESIGN- PPT.pptxRRR Chambers
Ā 
Human Rights_FilippoLuciani diritti umani.pptx
Human Rights_FilippoLuciani diritti umani.pptxHuman Rights_FilippoLuciani diritti umani.pptx
Human Rights_FilippoLuciani diritti umani.pptxfilippoluciani9
Ā 
Negotiable Instruments Act 1881.UNDERSTAND THE LAW OF 1881
Negotiable Instruments Act 1881.UNDERSTAND THE LAW OF 1881Negotiable Instruments Act 1881.UNDERSTAND THE LAW OF 1881
Negotiable Instruments Act 1881.UNDERSTAND THE LAW OF 1881mayurchatre90
Ā 
6th sem cpc notes for 6th semester students samjhe. Padhlo bhai
6th sem cpc notes for 6th semester students samjhe. Padhlo bhai6th sem cpc notes for 6th semester students samjhe. Padhlo bhai
6th sem cpc notes for 6th semester students samjhe. Padhlo bhaiShashankKumar441258
Ā 
Andrea Hill Featured in Canadian Lawyer as SkyLaw Recognized as a Top Boutique
Andrea Hill Featured in Canadian Lawyer as SkyLaw Recognized as a Top BoutiqueAndrea Hill Featured in Canadian Lawyer as SkyLaw Recognized as a Top Boutique
Andrea Hill Featured in Canadian Lawyer as SkyLaw Recognized as a Top BoutiqueSkyLaw Professional Corporation
Ā 
äø€ęƔäø€åŽŸē‰ˆę—§é‡‘山州ē«‹å¤§å­¦ęƕäøščƁ学位čƁ书
 äø€ęƔäø€åŽŸē‰ˆę—§é‡‘山州ē«‹å¤§å­¦ęƕäøščƁ学位čƁ书 äø€ęƔäø€åŽŸē‰ˆę—§é‡‘山州ē«‹å¤§å­¦ęƕäøščƁ学位čƁ书
äø€ęƔäø€åŽŸē‰ˆę—§é‡‘山州ē«‹å¤§å­¦ęƕäøščƁ学位čƁ书SS A
Ā 
如何办ē†(SFStaę–‡å‡­čƁ书)ē¾Žå›½ę—§é‡‘山州ē«‹å¤§å­¦ęƕäøščƁ学位čƁ书
如何办ē†(SFStaę–‡å‡­čƁ书)ē¾Žå›½ę—§é‡‘山州ē«‹å¤§å­¦ęƕäøščƁ学位čƁ书如何办ē†(SFStaę–‡å‡­čƁ书)ē¾Žå›½ę—§é‡‘山州ē«‹å¤§å­¦ęƕäøščƁ学位čƁ书
如何办ē†(SFStaę–‡å‡­čƁ书)ē¾Žå›½ę—§é‡‘山州ē«‹å¤§å­¦ęƕäøščƁ学位čƁ书Fs Las
Ā 
FINALTRUEENFORCEMENT OF BARANGAY SETTLEMENT.ppt
FINALTRUEENFORCEMENT OF BARANGAY SETTLEMENT.pptFINALTRUEENFORCEMENT OF BARANGAY SETTLEMENT.ppt
FINALTRUEENFORCEMENT OF BARANGAY SETTLEMENT.pptjudeplata
Ā 
WhatsApp šŸ“ž 8448380779 āœ…Call Girls In Nangli Wazidpur Sector 135 ( Noida)
WhatsApp šŸ“ž 8448380779 āœ…Call Girls In Nangli Wazidpur Sector 135 ( Noida)WhatsApp šŸ“ž 8448380779 āœ…Call Girls In Nangli Wazidpur Sector 135 ( Noida)
WhatsApp šŸ“ž 8448380779 āœ…Call Girls In Nangli Wazidpur Sector 135 ( Noida)Delhi Call girls
Ā 
Municipal-Council-Ratlam-vs-Vardi-Chand-A-Landmark-Writ-Case.pptx
Municipal-Council-Ratlam-vs-Vardi-Chand-A-Landmark-Writ-Case.pptxMunicipal-Council-Ratlam-vs-Vardi-Chand-A-Landmark-Writ-Case.pptx
Municipal-Council-Ratlam-vs-Vardi-Chand-A-Landmark-Writ-Case.pptxSHIVAMGUPTA671167
Ā 
Indemnity Guarantee Section 124 125 and 126
Indemnity Guarantee Section 124 125 and 126Indemnity Guarantee Section 124 125 and 126
Indemnity Guarantee Section 124 125 and 126Oishi8
Ā 
CALL ON āž„8923113531 šŸ”Call Girls Singar Nagar Lucknow best sexual service
CALL ON āž„8923113531 šŸ”Call Girls Singar Nagar Lucknow best sexual serviceCALL ON āž„8923113531 šŸ”Call Girls Singar Nagar Lucknow best sexual service
CALL ON āž„8923113531 šŸ”Call Girls Singar Nagar Lucknow best sexual serviceanilsa9823
Ā 
Essentials of a Valid Transfer.pptxmmmmmm
Essentials of a Valid Transfer.pptxmmmmmmEssentials of a Valid Transfer.pptxmmmmmm
Essentials of a Valid Transfer.pptxmmmmmm2020000445musaib
Ā 
LITERAL RULE OF INTERPRETATION - PRIMARY RULE
LITERAL RULE OF INTERPRETATION - PRIMARY RULELITERAL RULE OF INTERPRETATION - PRIMARY RULE
LITERAL RULE OF INTERPRETATION - PRIMARY RULEsreeramsaipranitha
Ā 

Recently uploaded (20)

Audience profile - SF.pptxxxxxxxxxxxxxxxxxxxxxxxxxxx
Audience profile - SF.pptxxxxxxxxxxxxxxxxxxxxxxxxxxxAudience profile - SF.pptxxxxxxxxxxxxxxxxxxxxxxxxxxx
Audience profile - SF.pptxxxxxxxxxxxxxxxxxxxxxxxxxxx
Ā 
Legal Risks and Compliance Considerations for Cryptocurrency Exchanges in India
Legal Risks and Compliance Considerations for Cryptocurrency Exchanges in IndiaLegal Risks and Compliance Considerations for Cryptocurrency Exchanges in India
Legal Risks and Compliance Considerations for Cryptocurrency Exchanges in India
Ā 
Russian Call Girls Rohini Sector 7 šŸ’“ Delhi 9999965857 @Sabina Modi VVIP MODEL...
Russian Call Girls Rohini Sector 7 šŸ’“ Delhi 9999965857 @Sabina Modi VVIP MODEL...Russian Call Girls Rohini Sector 7 šŸ’“ Delhi 9999965857 @Sabina Modi VVIP MODEL...
Russian Call Girls Rohini Sector 7 šŸ’“ Delhi 9999965857 @Sabina Modi VVIP MODEL...
Ā 
FULL ENJOY - 8264348440 Call Girls in Netaji Subhash Place | Delhi
FULL ENJOY - 8264348440 Call Girls in Netaji Subhash Place | DelhiFULL ENJOY - 8264348440 Call Girls in Netaji Subhash Place | Delhi
FULL ENJOY - 8264348440 Call Girls in Netaji Subhash Place | Delhi
Ā 
PPT- Voluntary Liquidation (Under section 59).pptx
PPT- Voluntary Liquidation (Under section 59).pptxPPT- Voluntary Liquidation (Under section 59).pptx
PPT- Voluntary Liquidation (Under section 59).pptx
Ā 
KEY NOTE- IBC(INSOLVENCY & BANKRUPTCY CODE) DESIGN- PPT.pptx
KEY NOTE- IBC(INSOLVENCY & BANKRUPTCY CODE) DESIGN- PPT.pptxKEY NOTE- IBC(INSOLVENCY & BANKRUPTCY CODE) DESIGN- PPT.pptx
KEY NOTE- IBC(INSOLVENCY & BANKRUPTCY CODE) DESIGN- PPT.pptx
Ā 
Human Rights_FilippoLuciani diritti umani.pptx
Human Rights_FilippoLuciani diritti umani.pptxHuman Rights_FilippoLuciani diritti umani.pptx
Human Rights_FilippoLuciani diritti umani.pptx
Ā 
Negotiable Instruments Act 1881.UNDERSTAND THE LAW OF 1881
Negotiable Instruments Act 1881.UNDERSTAND THE LAW OF 1881Negotiable Instruments Act 1881.UNDERSTAND THE LAW OF 1881
Negotiable Instruments Act 1881.UNDERSTAND THE LAW OF 1881
Ā 
6th sem cpc notes for 6th semester students samjhe. Padhlo bhai
6th sem cpc notes for 6th semester students samjhe. Padhlo bhai6th sem cpc notes for 6th semester students samjhe. Padhlo bhai
6th sem cpc notes for 6th semester students samjhe. Padhlo bhai
Ā 
Andrea Hill Featured in Canadian Lawyer as SkyLaw Recognized as a Top Boutique
Andrea Hill Featured in Canadian Lawyer as SkyLaw Recognized as a Top BoutiqueAndrea Hill Featured in Canadian Lawyer as SkyLaw Recognized as a Top Boutique
Andrea Hill Featured in Canadian Lawyer as SkyLaw Recognized as a Top Boutique
Ā 
Russian Call Girls Rohini Sector 6 šŸ’“ Delhi 9999965857 @Sabina Modi VVIP MODEL...
Russian Call Girls Rohini Sector 6 šŸ’“ Delhi 9999965857 @Sabina Modi VVIP MODEL...Russian Call Girls Rohini Sector 6 šŸ’“ Delhi 9999965857 @Sabina Modi VVIP MODEL...
Russian Call Girls Rohini Sector 6 šŸ’“ Delhi 9999965857 @Sabina Modi VVIP MODEL...
Ā 
äø€ęƔäø€åŽŸē‰ˆę—§é‡‘山州ē«‹å¤§å­¦ęƕäøščƁ学位čƁ书
 äø€ęƔäø€åŽŸē‰ˆę—§é‡‘山州ē«‹å¤§å­¦ęƕäøščƁ学位čƁ书 äø€ęƔäø€åŽŸē‰ˆę—§é‡‘山州ē«‹å¤§å­¦ęƕäøščƁ学位čƁ书
äø€ęƔäø€åŽŸē‰ˆę—§é‡‘山州ē«‹å¤§å­¦ęƕäøščƁ学位čƁ书
Ā 
如何办ē†(SFStaę–‡å‡­čƁ书)ē¾Žå›½ę—§é‡‘山州ē«‹å¤§å­¦ęƕäøščƁ学位čƁ书
如何办ē†(SFStaę–‡å‡­čƁ书)ē¾Žå›½ę—§é‡‘山州ē«‹å¤§å­¦ęƕäøščƁ学位čƁ书如何办ē†(SFStaę–‡å‡­čƁ书)ē¾Žå›½ę—§é‡‘山州ē«‹å¤§å­¦ęƕäøščƁ学位čƁ书
如何办ē†(SFStaę–‡å‡­čƁ书)ē¾Žå›½ę—§é‡‘山州ē«‹å¤§å­¦ęƕäøščƁ学位čƁ书
Ā 
FINALTRUEENFORCEMENT OF BARANGAY SETTLEMENT.ppt
FINALTRUEENFORCEMENT OF BARANGAY SETTLEMENT.pptFINALTRUEENFORCEMENT OF BARANGAY SETTLEMENT.ppt
FINALTRUEENFORCEMENT OF BARANGAY SETTLEMENT.ppt
Ā 
WhatsApp šŸ“ž 8448380779 āœ…Call Girls In Nangli Wazidpur Sector 135 ( Noida)
WhatsApp šŸ“ž 8448380779 āœ…Call Girls In Nangli Wazidpur Sector 135 ( Noida)WhatsApp šŸ“ž 8448380779 āœ…Call Girls In Nangli Wazidpur Sector 135 ( Noida)
WhatsApp šŸ“ž 8448380779 āœ…Call Girls In Nangli Wazidpur Sector 135 ( Noida)
Ā 
Municipal-Council-Ratlam-vs-Vardi-Chand-A-Landmark-Writ-Case.pptx
Municipal-Council-Ratlam-vs-Vardi-Chand-A-Landmark-Writ-Case.pptxMunicipal-Council-Ratlam-vs-Vardi-Chand-A-Landmark-Writ-Case.pptx
Municipal-Council-Ratlam-vs-Vardi-Chand-A-Landmark-Writ-Case.pptx
Ā 
Indemnity Guarantee Section 124 125 and 126
Indemnity Guarantee Section 124 125 and 126Indemnity Guarantee Section 124 125 and 126
Indemnity Guarantee Section 124 125 and 126
Ā 
CALL ON āž„8923113531 šŸ”Call Girls Singar Nagar Lucknow best sexual service
CALL ON āž„8923113531 šŸ”Call Girls Singar Nagar Lucknow best sexual serviceCALL ON āž„8923113531 šŸ”Call Girls Singar Nagar Lucknow best sexual service
CALL ON āž„8923113531 šŸ”Call Girls Singar Nagar Lucknow best sexual service
Ā 
Essentials of a Valid Transfer.pptxmmmmmm
Essentials of a Valid Transfer.pptxmmmmmmEssentials of a Valid Transfer.pptxmmmmmm
Essentials of a Valid Transfer.pptxmmmmmm
Ā 
LITERAL RULE OF INTERPRETATION - PRIMARY RULE
LITERAL RULE OF INTERPRETATION - PRIMARY RULELITERAL RULE OF INTERPRETATION - PRIMARY RULE
LITERAL RULE OF INTERPRETATION - PRIMARY RULE
Ā 

Student Privacy Rights: In and Out of the Classroom

  • 3.
  • 4. ā€œStudents don't shed their constitutional rights at the school house gates."
  • 5.
  • 6.
  • 7. Central Legal Question We Will Explore: ! How do schools balance studentsā€™ constitutional rights with schoolsā€™ needs to maintain order and a positive educational environment? ! !
  • 8. This talk is not about some abstract case studies. This talk is about you.
  • 9. What We Will Discuss: ! Student Privacy Rights on Campus ! Studentsā€™ Use of Social Networks ! Student Records and Privacy ! School Use of Third Party Online Vendors ! Tracking Students ! Public Relations & Privacy Issues ! !
  • 10. uncharted legal territory Everyday Scenarios with the Internet & Technology
  • 11. Scenario #1: Asking a student for their social network login credentials.
  • 12. Not suggested! ! Not only is the case law all over the place, various states are debating legislative proposals to address this issue. ! Additionally, the Terms of Service of sites like Facebook expressly prohibit this activity.
  • 13. Scenario #2: Using private sector tracking software to monitor students.
  • 14.
  • 15.
  • 16. Ask yourself the questions: ! Why and How are you using these monitoring tools?
  • 17.
  • 18. DOE & SIIA Issued Guidance ! 1) Legal Awareness: Be aware of the relevant state and federal laws ! 2) Inventory of Services: Identify all the educational services being used to assess the range of student information being shared ! 3) Approval Policies: Important that staff do not bypass internal controls when deciding to use free online services, and those should go through the same approval process as paid services ! 4) Insert Contract Provisions: Detail policies for data use, retention, and destruction ! 5) Transparency: Let students and parents know what is going on
  • 19. Scenario #3: Using RFID - Radio Frequency Identification Technology
  • 20.
  • 21. Not suggested! ! Tracking students in this manner can be costly, hard to manage and intrusive. ! It can also be a public relations nightmare.
  • 22. Scenario #4: Accessing Photos or Information from a Device Such as a Cell or Smartphone.
  • 23.
  • 24. Seminal Case on Student Privacy: ! New Jersey v. TLO
  • 25. Recent Cases: ! G.C. v. Owensboro Public Schools (2013) ! N.N. v. Tunkhannock Area School Dist. (2011) ! Mendoza v. Klein Ind. Sch. Dist. (2011) ! ! ! ! ! ! !
  • 26. Scenario #5: Using Webcams or Other Means to Take Photos of Students, Especially if the Device Goes Off-Campus.
  • 27. Relevant Case: ! Robbins ex. rel Robbins v. Lower Merion School District (2010) ! ! ! ! ! ! !
  • 28. ! ā€œLMSD is enjoined from accessing or reviewing any student-created files contained on student laptops (including but not limited to documents, e-mails, instant messaging records, photographs, Internet usage logs, and Web browsing histories) for any reason except as permitted by the policies and regulations contemplated by paragraph 7 of this Order or otherwise pursuant to a signed consent form that clearly and conspicuously sets forth the ability of LMSD to access or review such files.ā€ ! ! ! !
  • 30. Example: ! FERPA changes that allow for sharing students' personal information with other state officials and private entities forĀ a broad spectrum of activities without the consent of parents. ! May just be the beginning of these types of proposals.
  • 31.
  • 32. Scenario #7: Parent Dissemination of User Generated Content.
  • 33. Social Media Amplifies Broadcast Potential ! Policies should be in place for parents taking photos with smartphones and sharing on social networks. ! Consider the implication for children in situations where parents may have protective or other restraining orders.
  • 34. Parent & Staff Education ! You may think itā€™s common sense, but write it down and share it with parents and staff members.
  • 35. The Fourth Amendment When Does It Apply
  • 36. Distinguishing Fourth Amendment from privacy in the civil sense.
  • 37. The Fourth Amendment could apply when you are searching private accounts.
  • 38. The First Amendment When Does It Apply
  • 39. Tinker v. Des Moines
  • 40. Long-held precedent, since 1969, that students have wide latitude to criticize to school officials and policies.
  • 43. ā€œPersonally identifiable informationā€ is information that identifies a particular person. ā€œPiiā€ includes: ! ā€¢ Full name; ā€¢ National identification number; ā€¢ IP address; ā€¢ Vehicle registration plate number; ā€¢ Driverā€™s license number; ā€¢ Face; ā€¢ Fingerprints; ā€¢ Handwriting; ā€¢ Credit card numbers; ā€¢ Digital identity; ā€¢ Date of birth; ā€¢ Birthplace; and ā€¢ Genetic information.
  • 44. Childrenā€™s Online Privacy Protection Act ! Requires websites to get parental consent before collecting or sharing info for children under 13. ! Enforced by the Federal Trade Commission. ! Applies to commercial websites and other online services. ! ! !
  • 45. COPPA Checklist ! 1) Know what qualifies as personal information under the statute. ! 2) Implement a standardized district-wide process for reviewing an online or education technology service providerā€™s practices for information collection, use and disclosure to ensure they are COPPA compliant. ! 3) Know where students are accessing information. ! 4) Make sure the sites students visit have prominently displayed, clearly stated privacy policies that meet COPPAā€™s requirements. ! 5) Provide parents with a notice of the websites and online services whose collection the school has consented to on their behalf. ! !
  • 46. COPPA Checklist ! 6) Inform parents of the procedure for opting out of sharing their childā€™s personal information. ! 7) Know when schools can or cannot consent on behalf of the parents. ! 8) Ensure the method used to obtain verifiable parental consent is FTC approved, or you can apply to the FTC for pre-approval of a new consent mechanism. ! 9) Implement yearly trainings for school administration and faculty covering the school or districtā€™s COPPA responsibilities and compliance practices. ! 10) Educate students about online safety and privacy issues. !
  • 47. Avoiding the ā€œOh, crap.ā€ General Privacy Tips
  • 48. California ! Privacy Policy Required ! Itā€™s just good sense for schools too. !
  • 49. Social Media Privacy Act ! Enacted to protect students at universities and employees from the demand of usernames and passwords. ! On the horizon - may be amendments to apply to K-12 schools (exemptions for instances involving bullying investigations)
  • 50. Protecting Student Records ! Over 8 million student privacy records have been lost from nearly 600 security breaches since 2005.
  • 51.
  • 52. We just scratched the surface.
  • 53. ?