Privacy by Decisions: Security Starts with You

Privacy by Decisions: Security Starts with You

Once you start exploring the challenges of protecting personal information online, you quickly see that digital privacy involves a variety of players, including social media and messaging platforms, internet service providers, app developers, and government agencies. Many different entities are involved in collecting, moving, and sharing your information, for many different reasons. If you want to limit that sharing, you as the user have a lot of significant decisions to make.

The complexity of this environment helps explain the many different arguments about the best way to strengthen our digital privacy. Some want government to mandate protections from online platforms and service providers. Others are more concerned about protections from government itself. Some hope for better privacy and security through business competition. Others debate which government agencies should be the primary watchdogs, and whether to focus on collection, sharing, or abuse of personal information. Some people concentrate on sectors, such as finance, health care, or education, while others want a comprehensive approach to protect all personal information.

Spend any time in digital privacy discussions, and you recognize that each of these approaches has been argued and rebutted extensively, and that little progress has been made. But in all of these debates, what’s ironic and somewhat surprising is that we spend little time talking about something that makes a big difference: steps we can each take as actors and consumers in the online world.

If you’re reading this on Student Privacy Compass, you may be an exception, but most people – including those who tell pollsters that they’re concerned about their online privacy – aren’t taking basic steps to protect their own information.

Some of these “Privacy 101” steps include building stronger passwords, creating multiple passwords for different accounts, activating and using two-factor authentication when it is available, and avoiding insecure sites. Another key step is demonstrated in news reports about data breaches and phishing incidents, which often begin when someone at a company or organization clicks on a link in a message from someone they don’t know. Maybe this step is Privacy 102, but “don’t click on unidentified links or attachments in messages from strangers” is a lesson we’ve been taught from the earliest virus attacks, and “don’t talk to strangers” is a concept that has been around a lot longer than the internet.

There are lots of pieces to the privacy puzzle, but some of the most important ones – and the place where many breaches, hacks, and other problems begin – begin with our own decisions.

These are examples of how privacy and security start with us, as users. We can each get smarter about passwords, phishing, and other security threats and protections. There are lots of pieces to the privacy puzzle, but some of the most important ones – and the place where many breaches, hacks, and other problems begin – begin with our own decisions.

Privacy 101 steps are especially important for teachers and school leaders, for several reasons:

  • they are custodians for a significant amount of student information, and making decisions about someone else’s information increases their responsibility,
  • mistakes at their desks might affect dozens, hundreds, even thousands of students and families, and
  • just like parents should demonstrate smart behavior with devices at home and in a car, educators should model data privacy and security for their students. It’s hard to teach what you don’t practice.

Educators should also be smart about Privacy 101 decisions because their leadership matters to students and families. Parent concerns are still a primary driver of education privacy debates, and parents are much more likely to be reassured by smart privacy and security decisions at their schools than by proclamations from their legislators.

Obviously, users can’t control everything. Companies need to continue building better tools and settings for managing personal information. Smart guidance from government can help as well. But as we engage in nebulous debates about who must do what to protect our privacy, we have a stronger case – and more protection – if we make smart decisions to secure our information in the first place.

For more tips on how users can and should protect their information online, take a look at:

***

Alan Simpson has extensive experience bridging Silicon Valley and DC as a Californian who spent 15 years in Washington. He helps companies, educators, families, and others navigate policy issues – including to encourage adoption and smart use of technology, and to address concerns about student data privacy. He has worked and consulted for organizations such as the Internet Education Foundation, iKeepSafe, Common Sense Media, the National Association for the Education of Young Children, Voices for Illinois Children, National Public Radio, and the Cable Satellite Public Affairs Network (C-SPAN).

Image: “Cloud Security – Secure Data – Cyber Security” by Blue Coat Photos  is licensed under CC BY-SA 2.0. The original picture was cut to 1200×545 for this blog.

Related Resources

  • Blog

    New Title IX Rule Defines Deepfakes as Sexual Harassment

    Aug 14, 2024Chloe Altieri

    <As of 1/9/2025, the information below is out of date and provided for historical reference only>On April 19, 2024, the U.S. Department of Education rele…

    Learn More
  • Blog

    FERPA Exceptions: A Study in Studies

    Aug 5, 2024Alexa Mooney

    The Family Educational Rights and Privacy Act, or FERPA, protects personally identifiable information from education records from unauthorized disclosure. The …

    Learn More
  • EdTech Perspectives, LEA Perspectives

    A Critical Line of Defense-The Security.txt File’s Potential to Mitigate School Cybersecurity Attacks

    Jul 28, 2024Jim Siegl

    Current Cybersecurity Challenges in SchoolsAll it takes is somebody opening up an attachment for cybercriminals to infiltrate a school’s data system. And it’s …

    Learn More