Security of Data in the Future
Years ago, we just had to worry about physical security. Questions like Did we lock our door, or are we going to get home before dark were on the forefront of our minds. However, we have entered into a digital era where everything has changed. The amount of data allowed on the internet has grown exponentially. This has created a new form of security that needs to be considered.
Technology has been incorporated into almost all aspects of our lives. People have credit cards stored on their phones, allowing them to pay for items either by touch or online. We post our Social Security numbers online on multiple sites without considering who might gain access to that information.
The danger might not be immediate. Technology hackers periodically breach large websites and can get personal information of all those who have posted it on the site. Between the risk of hackers targeting individual devices or breaches from large companies, it is crucial to protect the information being shared online. As Dave Ramsey says, “Even if you are careful, your identity can still be stolen” (Ramsey). With that knowledge, we must assume that our privacy needs to be protected more than ever.
Schools maintain a database of all students who have passed through the district, detailing their activities throughout their academic career. Physical security was once the primary means of protecting these files. However, with the increasing use of student information systems (SIS) to streamline student information, protecting the data that schools utilize has become more critical than ever (Çelik & Ayaz, 2021). Students and parents trust the school system to prevent the general public or a hacker from accessing their information. As technology continues to advance, maintaining data privacy will become increasingly challenging. Yet, it will be up to lawmakers to create laws that protect the privacy of students. It will be up to the administration to ensure that the SIS programs have sufficient security to protect students fully. It will be up to the teachers to advocate for the students. Regardless of who, students' privacy must be protected, and it is up to every stakeholder in a school to ensure that this is the outcome.
Adler‐Nissen, R., & Eggeling, K. A. (2024). The discursive struggle for digital sovereignty: Security, economy, rights and the cloud project gaia‐x. JCMS: Journal of Common Market Studies, 62(4), 993–1011. https://doi.org/10.1111/jcms.13594
Ramsey, D. (n.d.). Identity Theft Protection Worth having. Ramsey Solutions. https://www.ramseysolutions.com/insurance/id-theft-protection
Çelik, K., & Ayaz, A. (2021). Validation of the Delone and McLean Information Systems Success Model: A Study on Student Information System. Education and Information Technologies, 27(4), 4709–4727. https://doi.org/10.1007/s10639-021-10798-4
Comments
Post a Comment