When an employee of the mistakenly clicked on a phishing link in an email last year, the private data of about 500 employees were put at risk.
District officials personally went to every school and district department to meet with employees face to face and explain what occurred. The district also paid the bill for a year of credit monitoring for employees. Afterwards, the district altered its practices on sharing sensitive information to improve data security, and employees were retrained to better recognize suspicious links and other scams.
鈥淚t was a kind of learn-as-we-went-along kind of thing,鈥 said Caleb Price, the spokesman for the 13,000-student district.
Many districts have found themselves in similar situations. They are vulnerable to outside hacking, in-house errors, and even technology gaps at companies they work with. The consequences of a data breach can be embarrassing and expensive, with the potential for costly lawsuits and other problems.
One challenge is that school systems often lack specific plans for dealing with data breaches once they occur, experts say. But in today鈥檚 climate, where major corporations like Home Depot and Target are having a difficult time fending off hackers, security experts say school districts need to prepare.
鈥淩ight now, we are at a crossroads with how to deal with data breaches,鈥 said Amelia Vance, the director of education data and technology for the . 鈥淧arents want to know the data that schools have can be protected, 鈥 but when you鈥檙e dealing with data, there鈥檚 always a level of danger.鈥
Lawmakers are starting to take action. Forty-seven states have data-breach laws that apply to public entities, including school districts. Many states have also passed laws or introduced bills aimed specifically at protecting education data. Some of those states鈥攊ncluding California, New Hampshire, and Utah鈥攈ave passed laws that require districts to notify students, parents, or employees if the security of personally identifiable information is compromised.
But districts are still catching up, said Dane Lancaster, the chief technology officer for the Marin County, Calif., office of education, which supports 19 area districts. Lancaster is also chairman of the Technology and Telecommunications Steering Committee of the California County Superintendents Educational Services Association, containing a range of best practices, sample vendor contracts, and steps to take when a data breach occurs, Lancaster said.
Districts are 鈥減robably not鈥 prepared, he said. 鈥淢any districts don鈥檛 have the resources.鈥
Hacking and Phishing
To help districts prevent and prepare for such data breaches, the Consortium for School Networking has developed SEND, or , as a guide. It recommends a host of technical-network-security strategies to keep private data secure. The organization鈥檚 cybersecurity-planning framework also aims to help districts determine whether they have prepared adequately in areas such as technological readiness, data-breach handling when it happens, and minimizing the impact on students and employees.
Chris Paschke, the director of data privacy and security for the 86,500-student in Golden, Colo., said his district鈥檚 technology infrastructure is constantly being probed for weaknesses鈥攕tudents getting teachers鈥 passwords and hacking into the system, phishing links, and denial-of-service attacks, he said.
The 5,400-student Mount Pleasant Independent School District in Texas experienced a data breach earlier this year that put 915 former employees鈥 private information, including Social Security numbers, at risk.
1. Mount Pleasant ISD is informed of its likely data breach by another school system, which had experienced something similar and found references to the Mount Pleasant district during its investigation.
2. Mount Pleasant district technology director tests school system鈥檚 technology infrastructure and determines that hackers had retrieved district data, but not through district computer systems.
3. Superintendent alerts district employees via email.
4. School leaders work with the media to inform the public.
5. District determines private employee information was likely taken by hackers through a third-party district vendor, possibly a health-care provider. Breach only affected former district employees.
6. District cooperates with investigation by FBI and U.S. Department of Homeland Security officials.
7. Even though the breach affected only former employees, the district provides all current employees with credit-monitoring services for one year, at a cost of about $36,000. (Such services were not offered to former employees, because they were too difficult to track down.)
8. District technology director provides guidance to other Texas school systems on how to prevent and handle a data breach.
Source: Mount Pleasant Independent School District
The key, he said, is to be prepared, including the drafting of a formal preparedness plan. He also said the district prioritizes what he calls 鈥渓og management,鈥 so if a security breakdown occurs, the district can track it and determine what took place. Some districts are also investing in insurance policies to cover litigation that might result from data that don鈥檛 remain private, as well as to cover the cost of cleaning up from a cyber attack, he said.
鈥淲hat鈥檚 unique to our industry is balancing that need for teachers to be able to explore and be innovative and creative with technology, versus keeping kids and their data and all of our district members鈥 data safe,鈥 he said.
School systems may find themselves walking a fine line when a data breach occurs, said Noelle Ellerson, the associate executive director of policy and advocacy for , the School Superintendents Association. Districts need to be open about a breach to make sure they inform those affected and make sure it doesn鈥檛 appear they鈥檙e hiding anything. But before announcing an incident, school leaders also must make sure to correct the problem and seal off any other data that could be at risk, she said.
鈥淵ou don鈥檛 want to sit on it and look like you鈥檙e trying to be sneaky,鈥 Ellerson said. 鈥淏ut if you haven鈥檛 been able to fully address the problem, you don鈥檛 want to call attention to it.鈥
鈥楨verybody Is Vulnerable鈥
Having a relationship of trust in place between district leadership and the school community before an incident occurs makes a difference in that process, said Judith Saxton, the director of communications for the 5,400-student , which discovered a data breach in January. A district investigation determined that about 915 former employees had their private data accessed. The superintendent notified employees and the public, and the school community appeared to accept that the district was taking necessary steps to rectify the situation and protect data, Saxton said.
Though the private data accessed was only that of former employees, the district provided all employees with credit-monitoring services for a year, at a cost of $36,000, Saxton said. Since former employees were difficult to track down, district officials said they were not given credit-monitoring services.
鈥淲e were open and honest and direct,鈥 she said. 鈥淭he community here knows that if something happens, we鈥檙e going to be as transparent as possible.鈥
During the investigation by Mount Pleasant officials, Technology Director Noe Arzate said he discovered the district system itself had not been breached and that the incursion was likely through a third-party vendor鈥攑ossibly a health-care company鈥攖hat did business with the district. 鈥淭o this day, we really don鈥檛 know how this data got out,鈥 he said.
Many states, including California, provide technical expertise to districts in these situations. In the 4,000-student Southwest Licking Local district in Pataskala, Ohio, two students hacked into district data earlier this year and retrieved Social Security numbers for about 100 students. To investigate, the district used its own personnel plus technical help from the Licking Area Computer Association, which provides technical services to local districts, said district spokeswoman Paula Brunton.
The security lapse was corrected, and the breach was traced to the two students, who were expelled from the district and prosecuted by local law enforcement, Brunton said. The students whose private data were accessed were offered credit-monitoring protection. All school secretaries were equipped with a statement to provide to concerned parents, and the district went through a 鈥渞efresh鈥 with staff, having them update passwords and review proper data-security procedures, Brunton said.
鈥淓verybody is vulnerable鈥 to cyberattack, she said. 鈥淚t鈥檚 not inevitable, but it certainly is possible.鈥