Fifty States, Fifty Rules: Navigating Student Privacy Across the U.S. Series (Part 3 of 4) — Guardians of Student Data: Rethinking Privacy in the Age of AI For EdTech companies, understanding federal rules like FERPA and COPPA is only the beginning of navigating a web...
SECURITY
Inside the Algorithm: Understanding Risks of AI Processing of Student Data
Inside the Algorithm: Understanding Risks of AI Processing of Student Data Series (Part 2 of 4) — Guardians of Student Data: Rethinking Privacy in the Age of AI AI is no longer just a buzzword in EdTech; it’s actively shaping how students learn. Intelligent tutoring...
When EdTech Meets Privacy: Navigating Compliance and Maximizing Impact
When EdTech Meets Privacy: Navigating Compliance and Maximizing Impact Series (Part 1 of 4) — Guardians of Student Data: Rethinking Privacy in the Age of AI Classrooms are changing fast. Digital tools from interactive apps to AI-powered tutors are opening up exciting...
New US Consumer Health Privacy Laws: Essential Do’s and Don’ts
PDF version accessible here.
HIPAA Breach Notifications 2020: Analysis, Observations and Recommendations
Health Information Security/Privacy professionals should be familiar with the HIPAA Breach Notification Rule, which requires HIPAA covered entities (CEs) and their business associates (BAs) to provide notification to U.S. Department …
GDPR Code of Conduct : Current State and Considerations for Next Steps
Since the EU General Data Protection Regulations (“GDPR”) came into effect in 2018, there has been much discussion, but little action, with regard to Article 40 Codes of Conduct (”Codes”) …
Next time you do a Risk Assessment or Analysis, make sure you have Risk Intelligence on board
I was prompted to write this quick post this morning when I read this article. I think it is a good example of what some (actually many, in my experience) …
Security Due Diligence For Microsoft 365 User Organizations
Co-written by Monica Meiterman-Rodriguez (Privacy Consultant) and Brian Ching (Information Security and Privacy Analyst) A majority of global enterprises are now using Microsoft 365 (“M365”) as their primary office application. …
How can Infosec GRC Deliver Wins in Risk Management?
Information security (infosec) risk management can often seem overwhelming and hard. Organizations can spend considerable resources on infosec programs or solutions, yet they may have challenges in implementing commensurate and demonstrable …






