Introduction to Cybersecurity
Lesson 10 of 15

Lesson 10

Lesson 4.1 - Be Accountable: Protecting Student Data and School Networks


In this lesson, you will…

  • Distinguish between secure and insecure methods of student data storage.

  • Classify at least four out of five provided student data storage methods as either “secure” or “insecure”.

INTRODUCTION

ACTIVITY READING

Secure vs Insecure Student Data Storage

Click to expand each section to learn more.

    • Encrypted Cloud Storage (District-Approved)


      Why It’s Secure:
      Data is encrypted at rest and in transit, access is permission-based, audit logs are available.


      Real-World Use Case: Student records stored in OneDrive or Google Workspace for Education with district admin controls.

    • SIS (Student Information System)


      Why It’s Secure:
      Designed for compliance (FERPA), user access roles are clearly defined, regularly backed up.


      Real-World Use Case: Infinite Campus, PowerSchool with MFA enabled.

    • Learning Management System (LMS) with District Controls


      Why It’s Secure: Access is role-based, integrates with district authentication (e.g., SSO), supports encryption and activity logging, often FERPA-compliant.


      Real-World Use Case: Student assignments and grades stored in Canvas or Schoology under district-managed accounts.

    • USB Drives Without Encryption


      Why It’s Insecure:
      Easily lost or stolen, no password or encryption, often shared across devices.


      Real-World Risk: Data breach if lost, no way to remotely wipe.

    • Printed Files in Unlocked Desk Drawers


      Why It’s Insecure:
      Physical security is minimal, anyone can access during off-hours or sub coverage.


      Real-World Risk: Unauthorised viewing or theft.

    • Personal Email or Cloud Accounts (e.g., Gmail, Dropbox)


      Why It’s Insecure:
      Not monitored or secured by the district, can be breached or subpoenaed.


      Real-World Risk: Accidental sharing or exposure, no IT visibility.

PAUSE TO PROCESS

Take a moment to recall what you have learnt.

When you are ready, click the button to begin the activity.

REVISITING BEST PRACTICE

What Makes Storage Secure?

Handling student data securely isn’t just about rules, it’s about protecting your time, your reputation and your peace of mind.

A smart choice now can prevent stress, tech headaches, and uncomfortable conversations later.

Knowing why a method is safe helps you make better choices every time.

Click to expand each section to learn more.

INSECURE

SECURE

  • Data is protected both at rest and in transit, making it unreadable to unauthorized users.

  • The tool is vetted, monitored, and supported by your district’s IT department.

  • Only specific, authorized staff members can access sensitive data based on their role.

  • Secure systems track who accessed data and keep backups in case of loss.

  • Adds an extra layer of login security to prevent unauthorized access.

  • Files are easily opened or intercepted.

  • Data stored on personal drives, phones, or any accounts that lack district oversight are at risk of exposure.

  • Paper files stored in unlocked or shared spaces can be seen or taken.

  • If data is lost or stolen, there’s no way to retrieve it.

  • Data can’t be monitored, secured, or remotely managed by the school or district.

SHOW WHAT YOU KNOW

In this activity, you will distinguish each scenario whether it is secure or insecure data storage method.

Let's see how well you can determine different data storage methods!


JOIN THE CONVERSATION

Think about the last time you saved student data outside of your school system and respond to the following discussion questions:


Was it a secure method, or could it have put data at risk?


What one habit could you change today to improve your data security?