DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

NYS Comptroller releases two more school district IT audits

Posted on December 20, 2019 by Dissent

By now, regular readers may wonder why I continue to post IT audits of New York school districts when the results have generally been so poor.  Where’s the good news, you wonder?

There really has been none or extremely little.  Which is exactly why I will continue to post these — until people wake up and start yelling at their school boards to do a better job of protecting student data and student privacy — and that necessarily includes IT.

Let’s start with the summary of the DeRuyter Central School District:, which was conducted to determine whether District officials ensured students’ personal, private and sensitive information (PPSI) was adequately protected from unauthorized access, use and loss.

Key Findings

District officials did not:

  • Limit or monitor employees’ personal Internet browsing and their use of social media on District computers.
  • Provide IT security awareness training to employees.
  • Restrict user permissions to the network and the student information system software application (SIS) based on job duties.
  • Disable unneeded network and local user accounts.

Sensitive information technology (IT) control weaknesses were communicated confidentially to officials.

Key Recommendations

  • Review and update the acceptable computer use policy and monitor employees’ personal Internet browsing and use of social media.
  • Provide formal IT security awareness training to employees.
  • Evaluate network and SIS user permissions to ensure users only have the permissions needed for their job duties and disable any unneeded user accounts.

District officials generally agreed with our recommendations and indicated they planned to initiate corrective action.

You can access the full report here.

Now let’s look at the audit of Roosevelt Union Free School District, which was conducted to determine whether District officials established adequate controls to help prevent and properly respond to a malicious attack of the District’s Information Technology (IT) system. From their summary:

Key Findings

  • The Board did not appoint a Chief Information Officer responsible for all IT matters.
  • The Board did not adopt a disaster recovery plan.
  • The District’s IT Department did not provide employees and officials with IT security awareness training.

Key Recommendations

  • Consider appointing a Chief Information Officer to be responsible for ensuring computerized data is secure, identifying and recommending technology solutions to the Board, ensuring IT users are appropriately trained and supervising IT Department staff.
  • Adopt a disaster recovery plan.
  • Ensure that computer users receive IT security awareness training and follow up training when District IT policies are updated.
  • District officials disagreed with certain findings in our report. Our comments on issues raised in the District’s response are included in Appendix B.

You can access the full report here. Not all of the state’s recommendations are listed in the bulleted list above, so you may want to really read the whole report.

Category: Commentaries and AnalysesEducation Sector

Post navigation

← Over 267 million Facebook users had their names, phone numbers, and profiles exposed thanks to a public database, researcher says
Fashion rental company HURR Collective exposed user information through misconfigured plugin →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • Turkish Group Hacks Zero-Day Flaw to Spy on Kurdish Forces
  • Cyberattacks on Long Island Schools Highlight Growing Threat
  • Dior faces scrutiny, fine in Korea for insufficient data breach reporting; data of wealthy clients in China, South Korea stolen
  • Administrator Of Online Criminal Marketplace Extradited From Kosovo To The United States
  • Twilio denies breach following leak of alleged Steam 2FA codes
  • Personal information exposed by Australian Human Rights Commission data breach
  • International cybercrime tackled: Amsterdam police and FBI dismantle proxy service Anyproxy
  • Moldovan Police Arrest Suspect in €4.5M Ransomware Attack on Dutch Research Agency
  • N.W.T.’s medical record system under the microscope after 2 reported cases of snooping
  • Department of Justice says Berkeley Research Group data breach may have exposed information on diocesan sex abuse survivors

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • License Plate Reader Company Flock Is Building a Massive People Lookup Tool, Leak Shows
  • FTC dismisses privacy concerns in Google breakup
  • ARC sells airline ticket records to ICE and others
  • Clothing Retailer, Todd Snyder, Inc., Settles CPPA Allegations Regarding California Consumer Privacy Act Violations
  • US Customs and Border Protection Plans to Photograph Everyone Exiting the US by Car
  • Google agrees to pay Texas $1.4 billion data privacy settlement
  • The App Store Freedom Act Compromises User Privacy To Punish Big Tech

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net

Mastodon: Infosec.Exchange/@PogoWasRight

Signal: +1 516-776-7756

DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.