Being proactive and taking precautions now can help minimize risk. Learn some initial steps.
Yesterday, Cloudflare disclosed a fairly serious bug that had been leaking user data since September 2016. While there are no known cases of this data being exploited, people using affected sites ... Read more
Use our open-source tools to check whether or not data is encrypted in transit.
In the fall of 2016, we conducted a survey of over 1,100 tech products used in schools or by youth. We tested login locations because that's where sensitive information gets handled. A more comprehensive ... Read more
If you're attending EduCon in Philadelphia, please stop by and say hello!
Over the weekend, I'll be part of two conversations at EduCon 2017. In the first, I will be part of a group that includes Hugh Culik, Chris Gilliard, and several of their students from Macomb Community ... Read more
In 2016, the Privacy Evaluation Initiative was busy. But we are just getting started, and more is on its way.
The Privacy Evaluation Initiative is an effort led by over 100 schools and districts. The central deliverables of the work are the individual app evaluations, but the foundation of the work rests on communication ... Read more
While today is the final day of our Five Days of Privacy, the strategies we discuss in this series of posts can and should be used year-round. In describing different ways to protect our privacy and security, ... Read more
As we head into Day Four of the Five Days of Privacy, we have already covered topics that include in-person privacy protections, filter bubbles and online tracking, and strategic use of email, file storage, ... Read more
When we protect ourselves from tracking, we gain necessary tools to extend our information literacy.
In this post, and in this series, we describe steps we can take to regain an element of privacy as we browse the web and find information. The steps we define here stop many types of tracking; however, ... Read more
The first of five posts on accessible, achievable steps we can all take to regain control of our privacy.
Conversations about privacy and security often focus on technology and give scant attention to the human, non-technological factors that affect personal privacy. This post is the initial installment of ... Read more
We surveyed over 1100 applications to get a clearer sense of their support for encrypting data in transit.
Protecting the data of students needs to be a top priority. That is why Common Sense Education, in collaboration with over 100 schools and districts nationwide, launched the Privacy Evaluation Initiative ... Read more