DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

NY: Audit of Frontier Central School District finds inadequate security and policies for mobile devices

Posted on March 7, 2014 by Dissent

An audit of Frontier Central School District by the Office of the New York State Comptroller was released yesterday. The audit covered the period July 1, 2010 — August 22, 2013 and included audit of mobile device use and security.

As background: there are six schools in operation within the District, with approximately 5,100 students and 1,000 employees.  The District has approximately 1,450 mobile computing devices, including approximately 250 portable media devices, 500 tablets and 700 laptops. These devices are assigned to administrators, teachers, technology staff and students, and some are located on carts for student classroom use.

From the Executive Summary:

We also found that District officials did not establish adequate safeguards over mobile devices, and that District employees did not use mobile devices in accordance with the District’s acceptable-use policy. For example, on 23 of the District’s 40 mobile devices that we tested, we found indications of personal use such as personal photos, music files, non-District related applications, games, and browsing history related to travel, shopping, personal email, job search and other websites. We also found personal applications on 16 of the 33 portable media players and tablets that we tested. In addition, 26 of the 33 portable media players and tablets did not require a password or passcode prior to use.

We also found that 25 of the devices that we tested had minimal to no discernible use for District purposes and were used predominantly for personal use, or not at all. We interviewed 19 District employees who had been assigned these mobile devices. Of those employees, 10 had three or more mobile devices assigned to them and eight of the 10 stated that they received no training from the District on how to use them. Also, 15 employees stated that they did not request one or more of the mobile devices that the District assigned to them. As a result of these deficiencies there is an increased risk of unauthorized users gaining access to the District’s system and/or system disruptions which could result in the corruption, loss or compromise of the District’s critical data and confidential records.

Elsewhere in the report, they note:

The District does not require password protection on portable media devices or on tablets, allowing anyone to gain access to the information on the device if it is lost, stolen or inappropriately accessed by someone other than the authorized user. The District does not limit administrative access rights, on any device, to IT staff, allowing staff to download and install any program or application to their mobile devices. In fact, the District allows employees to use a personal user ID to download applications to portable media devices and tablets, leaving no way for the District to control what applications are downloaded. Finally, the District does not have any restrictions on these devices, such as disabling certain applications including the application store and music store, and other pre-installed applications.

You can access the full report here (pdf).

Category: Commentaries and AnalysesEducation Sector

Post navigation

← Victim of 2012 hack, British Pregnancy Advice Service fined for violating the Data Protection Act (Updated)
Feds Bust Tijuana-Based Identity Theft Ring →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • Dutch Government: More forms of espionage to be a criminal offence from 15 May onwards
  • B.C. health authority faces class-action lawsuit over 2009 data breach (1)
  • Private Industry Notification: Silent Ransom Group Targeting Law Firms
  • Data Breach Lawsuits Against Chord Specialty Dental Partners Consolidated
  • PA: York County alerts residents of potential data breach
  • FTC Finalizes Order with GoDaddy over Data Security Failures
  • Hacker steals $223 million in Cetus Protocol cryptocurrency heist
  • Operation ENDGAME strikes again: the ransomware kill chain broken at its source
  • Mysterious Database of 184 Million Records Exposes Vast Array of Login Credentials
  • Mysterious hacking group Careto was run by the Spanish government, sources say

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • AI: the Italian Supervisory Authority fines Luka, the U.S. company behind chatbot “Replika,” 5 Million €
  • D.C. Federal Court Rules Termination of Democrat PCLOB Members Is Unlawful
  • Meta may continue to train AI with user data, German court says
  • Widow of slain Saudi journalist can’t pursue surveillance claims against Israeli spyware firm
  • Researchers Scrape 2 Billion Discord Messages and Publish Them Online
  • GDPR is cracking: Brussels rewrites its prized privacy law
  • Telegram Gave Authorities Data on More than 20,000 Users

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net

Mastodon: Infosec.Exchange/@PogoWasRight

Signal: +1 516-776-7756

DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.