DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

NY: Audit of Frontier Central School District finds inadequate security and policies for mobile devices

Posted on March 7, 2014 by Dissent

An audit of Frontier Central School District by the Office of the New York State Comptroller was released yesterday. The audit covered the period July 1, 2010 — August 22, 2013 and included audit of mobile device use and security.

As background: there are six schools in operation within the District, with approximately 5,100 students and 1,000 employees.  The District has approximately 1,450 mobile computing devices, including approximately 250 portable media devices, 500 tablets and 700 laptops. These devices are assigned to administrators, teachers, technology staff and students, and some are located on carts for student classroom use.

From the Executive Summary:

We also found that District officials did not establish adequate safeguards over mobile devices, and that District employees did not use mobile devices in accordance with the District’s acceptable-use policy. For example, on 23 of the District’s 40 mobile devices that we tested, we found indications of personal use such as personal photos, music files, non-District related applications, games, and browsing history related to travel, shopping, personal email, job search and other websites. We also found personal applications on 16 of the 33 portable media players and tablets that we tested. In addition, 26 of the 33 portable media players and tablets did not require a password or passcode prior to use.

We also found that 25 of the devices that we tested had minimal to no discernible use for District purposes and were used predominantly for personal use, or not at all. We interviewed 19 District employees who had been assigned these mobile devices. Of those employees, 10 had three or more mobile devices assigned to them and eight of the 10 stated that they received no training from the District on how to use them. Also, 15 employees stated that they did not request one or more of the mobile devices that the District assigned to them. As a result of these deficiencies there is an increased risk of unauthorized users gaining access to the District’s system and/or system disruptions which could result in the corruption, loss or compromise of the District’s critical data and confidential records.

Elsewhere in the report, they note:

The District does not require password protection on portable media devices or on tablets, allowing anyone to gain access to the information on the device if it is lost, stolen or inappropriately accessed by someone other than the authorized user. The District does not limit administrative access rights, on any device, to IT staff, allowing staff to download and install any program or application to their mobile devices. In fact, the District allows employees to use a personal user ID to download applications to portable media devices and tablets, leaving no way for the District to control what applications are downloaded. Finally, the District does not have any restrictions on these devices, such as disabling certain applications including the application store and music store, and other pre-installed applications.

You can access the full report here (pdf).

Category: Commentaries and AnalysesEducation Sector

Post navigation

← Victim of 2012 hack, British Pregnancy Advice Service fined for violating the Data Protection Act (Updated)
Feds Bust Tijuana-Based Identity Theft Ring →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • Resource: State Data Breach Notification Laws – June 2025
  • WestJet investigates cyberattack disrupting internal systems
  • Plastic surgeons often store nude photos of patients with their identity information. When would we call that “negligent?”
  • India: Servers of two city hospitals hacked; police register FIR
  • Ph: Coop Hospital confirms probe into reported cyberattack
  • Slapped wrists for Financial Conduct Authority staff who emailed work data home
  • School Districts Unaware BoardDocs Software Published Their Private Files
  • A guilty plea in the PowerSchool case still leaves unanswered questions
  • Brussels Parliament hit by cyber-attack
  • Sweden under cyberattack: Prime minister sounds the alarm

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • Vermont signs Kids Code into law, faces legal challenges
  • Data Categories and Surveillance Pricing: Ferguson’s Nuanced Approach to Privacy Innovation
  • Anne Wojcicki Wins Bidding for 23andMe
  • Would you — or wouldn’t you?
  • New York passes a bill to prevent AI-fueled disasters
  • Synthetic Data and the Illusion of Privacy: Legal Risks of Using De-Identified AI Training Sets
  • States sue to block the sale of genetic data collected by DNA testing company 23andMe

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net

Mastodon: Infosec.Exchange/@PogoWasRight

Signal: +1 516-776-7756

DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.