DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

FERPA does not require data breach disclosure

Posted on July 20, 2014 by Dissent

Over on PogoWasRight.org, I’ve recapped the U.S. Education Department’s responses to privacy complaints filed by parent and students under the Family Educational Rights and Privacy Act (FERPA).  In going through the data provided to EPIC in response to their Freedom of Information Act request, I noted that in a few cases, the Family Policy Compliance Office (FPCO) either responded to an inquiry about a data breach or reached out to university or school to offer technical assistance to help them comply with FERPA if they had had a data breach.

Here is part of their boilerplate response in 2011 to an entity that had experienced a breach involving missing folders with education records:

The preamble to the December 8, 2009, FERPA regulations explains the necessity for educational agencies and institutions to ensure that adequate controls are in place so that the education records of all students are handled in accordance with FERPA’s privacy protections. See 73 Fed Reg. 74806, 74843 (Dec. 9, 2008). The “Department Recommendations for Safeguarding Education Records” (Safeguarding Recommendations) that were published in both the Notice of Proposed Rulemaking (NPRM) and the Final Regulations are intended to provide agencies and institutions additional information and resources to assist them in meeting this responsibility. (The NPRM was published at 73 Fed Reg. 15574, March 24,2008.)

The FERPA Safeguarding Recommendations recognize that no system for maintaining and transmitting education records, whether in paper or electronic form, can be guaranteed safe from every hacker and thief, technological failure, violation of administrative rules, and other causes of unauthorized access and disclosure. Although FERPA does not dictate requirements for safeguarding education records, the Department encourages the holders of personally identifiable information to consider actions that mitigate the risk and are reasonably calculated to protect such information. Of course, an educational agency or institution may use any reasonable method, combination of methods, or tecimologies, taking into consideration the size, complexity, and resources available to the institution; the context of the information; the type of information to be protected (such as SSNs or directory information); and methods used by other institutions in similar circwnstances. The greater the harm that would result from unauthorized access or disclosure and the greater the likelihood that unauthorized access or disclosure will be attempted, the more protections an agency or institution should consider using to ensure that its methods are reasonable.

As explained in the FERPA Safeguarding Recommendations, one resource for administrators of electronic data systems is “The National Institute of Standards and Technology (NIST) 800-100, Information Security Handbook: A Guide for Managers” (October 2006). See http://csrc.nist.gov/publicationS/nistpubs/800-100/SP800-1 OO-Mar07 -2007.pdf. Another resource is NIST 800-53, Information Security, which catalogs information security controls. See http://csrc.nist.gov/publications/nistpu bs/800-5 3 -Rev 11800-53-rev 1-final-clean-sz.pdf. Similarly, a May 22, 2007, memorandum to heads of Federal agencies from the Office of Management and Budget requires executive departments and agencies to ensure that proper safeguards are in place to protect personally identifiable information that they maintain, eliminate the unnecessary use of SSNs, and develop and implement a “breach notification policy.” Although directed towards Federal agencies, this memorandum may also serve as a resource for educational agencies and institutions. See http://www.whitehouse.gov/omb/memorandaJfy2007/m07-16.pdf.

The Department’s FERPA Safeguarding Recommendations specify that an educational agency or institution that has experienced a theft of files or computer equipment, hacking or other intrusion, software or hardware malfunction, inadvertent release of data to Internet sites, or other unauthorized release or disclosure of education records, should consider one or more of the following steps:

  • Report the incident to law enforcement authorities.
  • Determine exactly what information was compromised, i.e., names, addresses, SSNs, ID, numbers, credit card numbers, grades, and the like.
  • Take steps immediately to retrieve data and prevent any further disclosures.
  • Identify all affected records and students.
  • Determine how the incident occurred, including which school officials had control of and responsibility for the information that was compromised.
  • Determine whether institutional policies and procedures were breached, including organizational requirements governing access (user names, passwords, PINS, etc.); storage; transmission; and destruction of information from education records.
  • Determine whether the incident occurred because of a lack of monitoring and oversight.
  • Conduct a risk assessment and identify appropriate physical, technological, and administrative measures to prevent similar incidents in the future.
  • Notify students that the Department’s Office of Inspector General maintains a website describing steps students may take if they suspect they are a victim of identity theft at http://www.ed.gov/about/offices/list/oig/misused/idtheft.html; and http://www.ed.gov/about/offices/list/oig/misused/victim.html.

The Safeguarding Recommendations note also that FERPA does not require an educational agency or institution to notify students that information from their education records was stolen or otherwise subject to an unauthorized release, although it does require the agency or institution to maintain a record of each disclosure. 34 CFR §99.32(a)(1). However, student notification may be required in these circumstances for postsecondary institutions under the Federal Trade Commission’s Standards for Insuring the Security, Confidentiality, Integrity and Protection of Customer Records and Information (“Safeguards Rule”) in 16 CFR part 314. In any case, direct student notification may be advisable if the compromised data includes student SSNs and other identifying information that could lead to identity theft.

Under FERPA, no funds shall be made available to an educational agency or institution that has a policy or practice of permitting the release of personally identifiable information in education records except as authorized by statute. 20 U.S.C. §1232g(b). Failure to take reasonable and appropriate steps to protect education records could result in the release or disclosure of personally identifiable information from education records and may also constitute a policy or practice of permitting the release or disclosure of education records in violation of FERPA requirements. Should this Office investigate a complaint or other indications of noncompliance, we would take into consideration what steps an educational agency or institution has taken in response to a data breach or other unauthorized access to, release, or other disclosure of education records.

Category: Commentaries and AnalysesEducation SectorU.S.

Post navigation

← Vendini Ticketing Breach May Have Affected More Than 3 Million Customers – Attorneys
Ca: Med records privacy breached in mystery phone call →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • Department of Justice says Berkeley Research Group data breach may have exposed information on diocesan sex abuse survivors
  • Masimo Manufacturing Facilities Hit by Cyberattack
  • Education giant Pearson hit by cyberattack exposing customer data
  • Star Health hacker claims sending bullets, threats to top executives: Reports
  • Nova Scotia Power hit by cyberattack, critical infrastructure targeted, no outages reported
  • Georgia hospital defeats data-tracking lawsuit
  • 60K BTC Wallets Tied to LockBit Ransomware Gang Leaked
  • UK: Legal Aid Agency hit by cyber security incident
  • Public notice for individuals affected by an information security breach in the Social Services, Health Care and Rescue Services Division of Helsinki
  • PowerSchool paid a hacker’s extortion demand, but now school district clients are being extorted anyway (3)

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • ARC sells airline ticket records to ICE and others
  • Clothing Retailer, Todd Snyder, Inc., Settles CPPA Allegations Regarding California Consumer Privacy Act Violations
  • US Customs and Border Protection Plans to Photograph Everyone Exiting the US by Car
  • Google agrees to pay Texas $1.4 billion data privacy settlement
  • The App Store Freedom Act Compromises User Privacy To Punish Big Tech
  • Florida bill requiring encryption backdoors for social media accounts has failed
  • Apple Siri Eavesdropping Payout Deadline Confirmed—How To Make A Claim

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net

Mastodon: Infosec.Exchange/@PogoWasRight

Signal: +1 516-776-7756

DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.