DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

NYS Comptroller releases two more school district IT audits

Posted on December 20, 2019 by Dissent

By now, regular readers may wonder why I continue to post IT audits of New York school districts when the results have generally been so poor.  Where’s the good news, you wonder?

There really has been none or extremely little.  Which is exactly why I will continue to post these — until people wake up and start yelling at their school boards to do a better job of protecting student data and student privacy — and that necessarily includes IT.

Let’s start with the summary of the DeRuyter Central School District:, which was conducted to determine whether District officials ensured students’ personal, private and sensitive information (PPSI) was adequately protected from unauthorized access, use and loss.

Key Findings

District officials did not:

  • Limit or monitor employees’ personal Internet browsing and their use of social media on District computers.
  • Provide IT security awareness training to employees.
  • Restrict user permissions to the network and the student information system software application (SIS) based on job duties.
  • Disable unneeded network and local user accounts.

Sensitive information technology (IT) control weaknesses were communicated confidentially to officials.

Key Recommendations

  • Review and update the acceptable computer use policy and monitor employees’ personal Internet browsing and use of social media.
  • Provide formal IT security awareness training to employees.
  • Evaluate network and SIS user permissions to ensure users only have the permissions needed for their job duties and disable any unneeded user accounts.

District officials generally agreed with our recommendations and indicated they planned to initiate corrective action.

You can access the full report here.

Now let’s look at the audit of Roosevelt Union Free School District, which was conducted to determine whether District officials established adequate controls to help prevent and properly respond to a malicious attack of the District’s Information Technology (IT) system. From their summary:

Key Findings

  • The Board did not appoint a Chief Information Officer responsible for all IT matters.
  • The Board did not adopt a disaster recovery plan.
  • The District’s IT Department did not provide employees and officials with IT security awareness training.

Key Recommendations

  • Consider appointing a Chief Information Officer to be responsible for ensuring computerized data is secure, identifying and recommending technology solutions to the Board, ensuring IT users are appropriately trained and supervising IT Department staff.
  • Adopt a disaster recovery plan.
  • Ensure that computer users receive IT security awareness training and follow up training when District IT policies are updated.
  • District officials disagreed with certain findings in our report. Our comments on issues raised in the District’s response are included in Appendix B.

You can access the full report here. Not all of the state’s recommendations are listed in the bulleted list above, so you may want to really read the whole report.

Category: Commentaries and AnalysesEducation Sector

Post navigation

← Over 267 million Facebook users had their names, phone numbers, and profiles exposed thanks to a public database, researcher says
Fashion rental company HURR Collective exposed user information through misconfigured plugin →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • Rewards for Justice offers $10M reward for info on RedLine developer or RedLine’s use by foreign governments
  • New evidence links long-running hacking group to Indian government
  • Zaporizhzhia Cyber ​​Police Exposes Hacker Who Caused Millions in Losses to Victims by Mining Cryptocurrency
  • Germany fines Vodafone $51 million for privacy, security breaches
  • Google: Hackers target Salesforce accounts in data extortion attacks
  • The US Grid Attack Looming on the Horizon
  • US govt login portal could be one cyberattack away from collapse, say auditors
  • Two Men Sentenced to Prison for Aggravated Identity Theft and Computer Hacking Crimes
  • 100,000 UK taxpayer accounts hit in £47m phishing attack on HMRC
  • CISA Alert: Updated Guidance on Play Ransomware

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • How the FBI Sought a Warrant to Search Instagram of Columbia Student Protesters
  • Germany fines Vodafone $51 million for privacy, security breaches
  • Malaysia enacts data sharing rules for public sector
  • U.S. Enacts Take It Down Act
  • 23andMe Bankruptcy Judge Ponders Trump Bill’s Injunction Impact
  • Hell No: The ODNI Wants to Make it Easier for the Government to Buy Your Data Without Warrant
  • US State Dept. says silence or anonymity on social media is suspicious

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net

Mastodon: Infosec.Exchange/@PogoWasRight

Signal: +1 516-776-7756

DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.