{"id":2295,"date":"2024-02-26T19:51:46","date_gmt":"2024-02-26T19:51:46","guid":{"rendered":"https:\/\/wpdev01.mdek12.org\/otss\/?page_id=2295"},"modified":"2024-09-25T22:03:20","modified_gmt":"2024-09-25T22:03:20","slug":"isdp","status":"publish","type":"page","link":"https:\/\/wpdev01.mdek12.org\/otss\/isdp\/","title":{"rendered":"Information Security and Data Privacy"},"content":{"rendered":"<p style=\"margin-bottom: 10px;\">The MDE and educators across Mississippi school districts are committed to ensuring the confidentiality of student data while enabling that information to be used appropriately to improve student outcomes.<\/p>\n<p style=\"margin-bottom: 10px;\"><span style=\"font-size: 11pt;\"><span style=\"background: white;\"><span style=\"font-family: Calibri,sans-serif;\">\u00a0<\/span><\/span><\/span><\/p>\n<h4><strong>K12 Security Advisory Guidance for Improving Cyber Security in Mississippi School Districts<\/strong><\/h4>\n<p style=\"margin-bottom: 10px;\">Information Security, or Cybersecurity is a dynamic, ever-evolving field.\u00a0 The days of a school district addressing its data security concerns through the purchase of fireproof cabinets have given way to fighting daily online attacks from overseas parties.\u00a0 The emergence of new threats is happening in a world where near-instant access to student and district information is expected not only by school employees, but also by numerous stakeholders. \u00a0Layer into this the need to attend to regulatory issues such as the Family Educational Rights and Privacy Act (FERPA), the Children\u2019s Online Privacy Protection Act (COPPA), and the Protection of Pupil Rights Amendment (PPRA), and the complexities of school districts\u2019 cybersecurity status can seem overwhelming.<\/p>\n<p>Mississippi school district personnel wrestling with cyber security challenges have expressed their desire for guidance from the Mississippi Department of Education (MDE).\u00a0 In response, and in cooperation with district technology directors, MDE\u2019s Office of Technology and Strategic Services (OTSS) is creating a series of guidance webinars and documentation to advise district administrators, technology directors, and staff on these issues and support them as they develop and\/or revise their district\u2019s cybersecurity plan.<\/p>\n<p>&nbsp;<\/p>\n<h4 style=\"margin-bottom: 10px;\"><strong>Introduction<\/strong><\/h4>\n<ul>\n<li><a href=\"https:\/\/www.mdek12.org\/sites\/default\/files\/Offices\/MDE\/OTSS\/ISDP\/OTSS_Cybersec_Guid_Inaug_Webinar_chapters.mp4\" data-cke-saved-href=\"https:\/\/www.mdek12.org\/sites\/default\/files\/Offices\/MDE\/OTSS\/ISDP\/OTSS_Cybersec_Guid_Inaug_Webinar_chapters.mp4\">MDE\u00a0K12 Security Guidance Introduction Webinar<\/a>: A discussion with Greg Mallette (CISA) and Dr. Tracy Daniel-Hardy<\/li>\n<li>Please click\u00a0<a href=\"https:\/\/www.mdek12.org\/sites\/default\/files\/Offices\/MDE\/OTSS\/ISDP\/OTSS%20Cybersecurity%20K12%20Security%20Guidance_1.pptx\" data-cke-saved-href=\"https:\/\/www.mdek12.org\/sites\/default\/files\/Offices\/MDE\/OTSS\/ISDP\/OTSS%20Cybersecurity%20K12%20Security%20Guidance_1.pptx\">here<\/a>\u00a0to download a copy of the slide deck<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<h4><strong>Framework of Guidance to Districts<\/strong><\/h4>\n<p style=\"margin-bottom: 8px;\">The guidance given to district in three parts:<\/p>\n<p><strong>To Know:<\/strong><span style=\"font-size: 11pt;\"><span style=\"background: white;\"><span style=\"font-family: Calibri,sans-serif;\">\u00a0<\/span><\/span><\/span>What do districts need\u00a0to know\u00a0about their current cybersecurity state to understand their level of risk and to determine next steps?<\/p>\n<p>&nbsp;<\/p>\n<h4 style=\"margin-bottom: 10px;\"><strong>To Know<\/strong><\/h4>\n<p class=\"MsoBodyText\">The recording from the webinar are available in three parts.<\/p>\n<ul>\n<li><a href=\"https:\/\/www.mdek12.org\/sites\/default\/files\/Offices\/MDE\/OTSS\/ISDP\/To%20Part%201_July%202023.mp4\" data-cke-saved-href=\"https:\/\/www.mdek12.org\/sites\/default\/files\/Offices\/MDE\/OTSS\/ISDP\/To%20Part%201_July%202023.mp4\">To Know \u201cWebinar Recording Part 1- with Greg Millette and Shelly Hollis\u201d<\/a>\u00a0&#8211; a discussion about assessments and how they help districts \u201cTo Know\u201d.<\/li>\n<li><a href=\"https:\/\/www.mdek12.org\/sites\/default\/files\/Offices\/MDE\/OTSS\/ISDP\/5%20minute%20discussion%20on%20vulnerability%20scans-20230718_090658-Meeting%20Recording.mp4\" data-cke-saved-href=\"https:\/\/www.mdek12.org\/sites\/default\/files\/Offices\/MDE\/OTSS\/ISDP\/5%20minute%20discussion%20on%20vulnerability%20scans-20230718_090658-Meeting%20Recording.mp4\">5 Minute \u201cDiscussion on Vulnerability Scans with Dr. Tracy\u201d<\/a>\u00a0&#8211; a Technology Director\u2019s take on using CISA assessments.<\/li>\n<li><a href=\"https:\/\/www.mdek12.org\/sites\/default\/files\/Offices\/MDE\/OTSS\/ISDP\/To%20Know%20Part%202%20July%202023.mp4\" data-cke-saved-href=\"https:\/\/www.mdek12.org\/sites\/default\/files\/Offices\/MDE\/OTSS\/ISDP\/To%20Know%20Part%202%20July%202023.mp4\">To Know \u201cWebinar Recording \u2013 with Technology Coordinators Part 2\u201d<\/a>\u00a0&#8211; a discussion with other Technology Directors on what \u201cTo Know\u201d.<\/li>\n<li>Please click\u00a0<a href=\"https:\/\/mdek12-my.sharepoint.com\/:p:\/g\/personal\/wgrant_mdek12_org\/ER4kDDFDvMlFoByu4zSCA_YBvQTFDDtKrru8gW12lfXyIg?e=ACUQG5\" data-cke-saved-href=\"https:\/\/mdek12-my.sharepoint.com\/:p:\/g\/personal\/wgrant_mdek12_org\/ER4kDDFDvMlFoByu4zSCA_YBvQTFDDtKrru8gW12lfXyIg?e=ACUQG5\">here<\/a>\u00a0to download a copy of the slide deck.<\/li>\n<li>Click here to download the\u00a0<a href=\"https:\/\/www.mdek12.org\/sites\/default\/files\/Offices\/MDE\/OTSS\/ISDP\/toknow_07-21-23.pdf\" data-cke-saved-href=\"https:\/\/www.mdek12.org\/sites\/default\/files\/Offices\/MDE\/OTSS\/ISDP\/toknow_07-21-23.pdf\">\u201cTo Know\u201d Guidance<\/a>\u00a0document for districts.<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<h4 style=\"margin-bottom: 10px;\"><strong>\u201cTo Do: The Mitigation Feedback Loop\u201d<\/strong><\/h4>\n<ul>\n<li><a href=\"https:\/\/www.mdek12.org\/sites\/default\/files\/Offices\/MDE\/OTSS\/ISDP\/Discussion%20with%20Bobby%20Freeman%20-%20MOHS-MCU.mp4\" data-cke-saved-href=\"https:\/\/www.mdek12.org\/sites\/default\/files\/Offices\/MDE\/OTSS\/ISDP\/Discussion%20with%20Bobby%20Freeman%20-%20MOHS-MCU.mp4\">To Do: A Discussion with Bobby Freeman<\/a>\u00a0&#8211; a discussion with Bobby Freeman the director of Mississippi Cyber Unit about the State and Local Government Grant for 2022-2023.<\/li>\n<li><a href=\"https:\/\/www.mdek12.org\/sites\/default\/files\/Offices\/MDE\/OTSS\/ISDP\/Chapter%202%20To%20Do%20%20The%20The%20Mitigation%20Feedback%20Loop.mp4\" data-cke-saved-href=\"https:\/\/www.mdek12.org\/sites\/default\/files\/Offices\/MDE\/OTSS\/ISDP\/Chapter%202%20To%20Do%20%20The%20The%20Mitigation%20Feedback%20Loop.mp4\">To Do: The Mitigation Feedback Loop<\/a>\u00a0&#8211; a webinar about the next chapter on the mitigation process districts should use to build into a cybersecurity plan.<\/li>\n<li>Please click\u00a0<a href=\"https:\/\/www.mdek12.org\/sites\/default\/files\/Offices\/MDE\/OTSS\/ISDP\/OTSS%20Cybersecurity%20K12%20Security%20Guidance%20Chapter%202.a%20To%20Do%20Part%202%20-%20The%20Mitigation%20Feedback%20Loop_1.pptx\" data-cke-saved-href=\"https:\/\/www.mdek12.org\/sites\/default\/files\/Offices\/MDE\/OTSS\/ISDP\/OTSS%20Cybersecurity%20K12%20Security%20Guidance%20Chapter%202.a%20To%20Do%20Part%202%20-%20The%20Mitigation%20Feedback%20Loop_1.pptx\">here<\/a>\u00a0to download a copy of the slide deck.<\/li>\n<li>Click here to download the\u00a0<a href=\"https:\/\/www.mdek12.org\/sites\/default\/files\/Offices\/MDE\/OTSS\/ISDP\/k12_security_advisory_guidance_to-do.pdf\" data-cke-saved-href=\"https:\/\/www.mdek12.org\/sites\/default\/files\/Offices\/MDE\/OTSS\/ISDP\/k12_security_advisory_guidance_to-do.pdf\">\u201cTo Do: The Mitigation Feedback Loop\u201d<\/a>\u00a0document for districts.<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<h4 style=\"margin-bottom: 10px;\"><strong>\u201cTo Do: Policies and Procedures\u201d<\/strong><\/h4>\n<ul>\n<li><a href=\"https:\/\/www.mdek12.org\/sites\/default\/files\/Offices\/MDE\/OTSS\/ISDP\/Discussion%20with%20Steven%20Smith%20on%20K12%20Privacy%20-%2010-23-23b.mp4\" data-cke-saved-href=\"https:\/\/www.mdek12.org\/sites\/default\/files\/Offices\/MDE\/OTSS\/ISDP\/Discussion%20with%20Steven%20Smith%20on%20K12%20Privacy%20-%2010-23-23b.mp4\">A Discussion with Steven Smith on K12 Privacy Policies.<\/a><\/li>\n<li><a href=\"https:\/\/www.mdek12.org\/sites\/default\/files\/Offices\/MDE\/OTSS\/ISDP\/k12_security_advisory_guidance_to_do_policies_and_procedures.pdf\" data-cke-saved-href=\"https:\/\/www.mdek12.org\/sites\/default\/files\/Offices\/MDE\/OTSS\/ISDP\/k12_security_advisory_guidance_to_do_policies_and_procedures.pdf\">To Do: Policies and Procedures<\/a><\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<h4><strong>To Do:<\/strong> Once the current state is understood, what do districts need\u00a0to do\u00a0in order to improve their cybersecurity posture?<\/h4>\n<ol>\n<li>Develop Policies and Procedures<\/li>\n<li>Training for TC<\/li>\n<li>Training for Staff<\/li>\n<\/ol>\n<p>&nbsp;<\/p>\n<h4><strong>\u201cTo Become\u201d<\/strong><\/h4>\n<p><strong>To Become:<\/strong>\u00a0As an improvement plan is defined and implemented, how do districts alter their approach to cybersecurity issues\u00a0to become\u00a0nimble in handling incidents and proactively aware of emerging threats?<\/p>\n<p>Districts that fully engage in the guidance provided should find themselves with a better understanding of their cybersecurity outlook and\u00a0insurable.<\/p>\n<p>OTSS will follow the outline below in releasing guidance over the next few months. \u00a0Regular updates and refinements to content as changes in the cyber security landscape may dictate will be released as they occur.<\/p>\n<ol>\n<li>Become Supportive: Buy-In from Supt &amp; Administration.<\/li>\n<li>Become Ready \u2013 Have PLANs Cybersecurity Incidents.<\/li>\n<li>Become Proactive, including future risks, emerging tech\/strategies.<\/li>\n<li>Become Insured \u2013 not necessarily the end goal but to be insurable should be A goal of all school districts.<\/li>\n<\/ol>\n<p>&nbsp;<\/p>\n<h4><strong>Additional Resources<\/strong><\/h4>\n<ul>\n<li><a href=\"https:\/\/studentprivacy.ed.gov\/node\/548\/\">The Family Educational Rights and Privacy Act (FERPA)<\/a>:\u00a0Link to this law and associated training materials<\/li>\n<li><a href=\"https:\/\/studentprivacy.ed.gov\/training\/ferpa-101-local-education-agencies\">FERPA 101 for Local Education Agencies<\/a>:\u00a0FERPA training for districts and schools<\/li>\n<li><a href=\"https:\/\/studentprivacy.ed.gov\/\">Privacy and Education Technology<\/a>:\u00a0Protecting student privacy while using new instructional technology<\/li>\n<li><a href=\"https:\/\/studentprivacy.ed.gov\/content\/ppra\">The Protection of Pupil Rights Amendment (PPRA)<\/a>:\u00a0Link to this law and associated guidance<\/li>\n<li><a href=\"https:\/\/privacy.a4l.org\/\">Student Data Privacy Consortium<\/a>:\u00a0Addressing \u201cday-to-day, real-world multi-faceted issues faced each day by privacy stewards\u201d<\/li>\n<li><a href=\"https:\/\/studentprivacy.ed.gov\/\">Student Data Privacy Resources, Training and FAQs from the US Department of Education<\/a><\/li>\n<li><a href=\"https:\/\/dataqualitycampaign.org\/resource\/what-is-student-data\/\">What is Student Data?<\/a>:\u00a0Understanding the basics of student data from The Data Quality Campaign<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The MDE and educators across Mississippi school districts are committed to ensuring the confidentiality of student data while enabling that information to be used appropriately to improve student outcomes. \u00a0 K12 Security Advisory Guidance for Improving Cyber Security in Mississippi School Districts Information Security, or Cybersecurity is a dynamic, ever-evolving field.\u00a0 The days of a [&hellip;]<\/p>\n","protected":false},"author":30,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-2295","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/wpdev01.mdek12.org\/otss\/wp-json\/wp\/v2\/pages\/2295"}],"collection":[{"href":"https:\/\/wpdev01.mdek12.org\/otss\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/wpdev01.mdek12.org\/otss\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/wpdev01.mdek12.org\/otss\/wp-json\/wp\/v2\/users\/30"}],"replies":[{"embeddable":true,"href":"https:\/\/wpdev01.mdek12.org\/otss\/wp-json\/wp\/v2\/comments?post=2295"}],"version-history":[{"count":6,"href":"https:\/\/wpdev01.mdek12.org\/otss\/wp-json\/wp\/v2\/pages\/2295\/revisions"}],"predecessor-version":[{"id":2525,"href":"https:\/\/wpdev01.mdek12.org\/otss\/wp-json\/wp\/v2\/pages\/2295\/revisions\/2525"}],"wp:attachment":[{"href":"https:\/\/wpdev01.mdek12.org\/otss\/wp-json\/wp\/v2\/media?parent=2295"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}