Overview
International webinar on protecting personal data and privacy in online learning during COVID-19. Speakers from UNESCO, OECD, academia, and industry shared risks, frameworks, technical guidance, and practical measures.
Context and Organizers
- Organized by UNESCO IITE, UNESCO (Beijing), Smart Learning Institute (BNU), and partners.
- Fifth webinar following topics on flexible learning, active learning at home, higher education, and OER.
- Two complementary guides introduced: a user-focused handbook and a technical guide for platforms.
Keynotes: Policy and Global Perspective
- Urgency: Online learning growth exposes student data and privacy risks; UNESCO lists this among top challenges.
- OECD perspective (Andreas Schleicher):
- Balance data use benefits (personalized learning, feedback, evidence) with privacy risks (profiling, discrimination).
- Traditional privacy tools (access limits, consent checkboxes) are insufficient in big data contexts.
- Advocate risk-based approach; combine data-focused measures (de-identification) with governance (access models, supervised use, security, training).
- Preserve analytical value while managing residual risk; keep ahead of emerging threats.
- Collaboration: Multi-sector effort including universities and companies (Microsoft, Blackboard, Alibaba, Tencent).
Cryptography Foundations and Applications
- Core security goals:
- Confidentiality: Prevent unauthorized reading (encryption, end-to-end models).
- Integrity: Detect tampering (hash functions, digital signatures).
- Authentication: Verify identity (knowledge-, crypto-, biometric-based; multi-factor).
- Non-repudiation: Prevent denial of actions (digital signatures).
- Implementation notes:
- Use secure encryption modes; avoid insecure AES-ECB; prefer modes that hide patterns.
- End-to-end encryption when servers are untrusted or compromised.
- Biometrics raise privacy concerns; cannot be changed if compromised.
- Distance education protections:
- Protect student/teacher info, learning materials, test items, results.
- Use hierarchical access control, multi-factor authentication, blockchain for integrity proofs.
- Fair exams: honest lottery (mental poker), identity verification, immutable result recording.
Handbook: Guidance for Students, Teachers, Parents
- Rationale: Massive shift online; risks span device, network, platforms, social tools, and content sharing.
- Personal data scope: Identification, authentication, health, financial, communications, contacts, device IDs, IP, location.
- Privacy types: Physical, informational, decisional, associational.
- Process-focused guidance:
- Before learning: Secure devices, networks, tools; configure settings; manage permissions.
- Signing up: Use strong passwords; cautious account creation on shared devices.
- Navigating platforms: Adjust privacy settings; limit data disclosure.
- Using social networks and video: Manage URLs, conferencing settings; post responsibly.
- After learning: Clear personal data, caches, and residual activity; remove unnecessary app access.
- Tension: Data can improve learning and research but carries misuse risk; aim for proper, minimized, and secure use.
Technical Guide: Online Education Platforms
- Audience: Service providers, IT staff; supports authorities on compliance.
- Covered platforms: Webcasting (e.g., conferencing), LMS, MOOCs, communication tools.
- Risk types: Technical (hardware/software), data control, user operational errors.
- Data lifecycle protections:
- Collection, transmission, use, storage, destruction; access control and key management.
- Security management:
- Planning, monitoring, incident response; assurance procedures for large-scale systems.
- Awareness: Curriculum integration, digital citizenship education, public engagement.
- Developed with experts from universities and companies; aligned with ISO standards and UN agency resources.
Digital Citizenship and Practice (ISTE)
- Framing: Privacy as part of being “alert” within digital citizenship (inclusive, engaged, informed, balanced, alert).
- Classroom practices:
- Review and adjust device privacy/location settings.
- Update software; clean unused apps; create positive digital footprints.
- Teach what to share/not share; build valuation of privacy, not just knowledge of steps.
- Support: ISTE Standards (students, educators, leaders), professional learning, platform privacy certification, micro-courses on online learning and data privacy.
National/Institutional Experiences
- Kenya university context:
- Rapid adoption of Moodle and synchronous tools (Zoom, BigBlueButton, Google Meet).
- Importance of protecting learner and instructor data; vulnerabilities include search exposure, password attacks, web indexing, open ports.
- Measures: Frequent LMS updates, vetted plugins, HTTPS, strong passwords, least privilege, backups, firewalls, disable unused services, regular log hygiene.
- Emphasis on user practices: logout, avoid password sharing; security maturity is evolving.
Industry Practices and Tips
- Alibaba Cloud:
- Privacy/security by default; layered defenses across physical, infrastructure, network, app, data.
- Multifaceted controls as single methods can fail; pandemic increased attack surface and urgency.
- Tencent:
- Principles: Data for social good; privacy/security by design across entire data lifecycle.
- Internal security labs and response centers; advanced tools for endpoint protection.
- Practical user tips:
- Encrypt data: Use HTTPS; enable disk/file encryption (e.g., BitLocker).
- Secure devices: AV/anti-spyware/firewall; patch regularly; lock and logout; minimize local sensitive data.
- Strong, unique passwords; consider long passphrases.
- Avoid public Wi‑Fi for sensitive logins; prefer secure networks or encrypted sites.
- Beware phishing; avoid suspicious links/attachments.
- Limit social media sharing; “once online, always online.”
- Control microphones/cameras; cover/unplug when unused.
- Know privacy settings/policies; understand data collection, use, sharing, deletion.
- Ask for help; report suspicions to teachers/parents; contact platforms for data actions.
International Regulations and Actions
- UN resolution (2013): Offline rights apply online; protect privacy in the digital age.
- GDPR referenced; national certifications and strict data access models noted (e.g., EMIS constraints).
Structured Highlights
| Area | Risks/Issues | Recommended Measures | Stakeholders |
|---|
| Data use in education | Profiling, discrimination, repurposing | Risk-based approach; preserve analytical value; governance + data controls | Policymakers, OECD, UNESCO |
| Confidentiality | Interception, server compromise | End-to-end encryption; secure modes (avoid AES-ECB) | Platform providers, IT |
| Integrity/Authenticity | Tampering, identity fraud | Hashes, digital signatures, MFA; blockchain for audits | Platforms, institutions |
| User behavior | Weak passwords, oversharing, phishing | Strong unique passwords; privacy settings; awareness training | Students, teachers, parents |
| Devices/Networks | Unpatched systems, public Wi-Fi | Security software; updates; HTTPS; avoid public Wi‑Fi for logins | Users, IT support |
| Platforms (LMS/Conferencing) | Vulnerable configs, plugins | Updates; vetted plugins; least privilege; firewalls; logs | Universities, admins |
| Lifecycle management | Poor key/access control | Data collection-to-destruction controls; incident response | Service providers |
| Social media/video | Exposure via posts/camera/mic | Limit sharing; manage conferencing settings; cover devices | Users |
| Policy/regulation | Ineffective consent; gaps | Supervised access models; awareness; compliance with standards | Authorities, vendors |
Key Terms & Definitions
- Confidentiality: Preventing unauthorized data access; often via encryption.
- Integrity: Ensuring data remains unaltered; verified by hashes/signatures.
- Authentication: Verifying identity; knowledge-, crypto-, or biometric-based; MFA combines factors.
- Non-repudiation: Assurance that an action cannot be denied later; digital signatures.
- End-to-end encryption: Only endpoints can decrypt; intermediaries cannot read content.
- Digital citizenship: Competencies for safe, ethical, effective digital participation.
Action Items / Next Steps
- Students/Teachers/Parents:
- Audit and adjust device/app privacy and location settings.
- Use strong unique passwords; enable updates; avoid public Wi‑Fi for logins.
- Manage conferencing and posting practices; clear residual data after sessions.
- Institutions/Platforms:
- Implement risk-based privacy frameworks; secure data lifecycle and access controls.
- Keep platforms updated; enforce HTTPS; configure firewalls; vet plugins.
- Provide awareness training and digital citizenship programs.
- Policymakers/Partners:
- Foster multi-sector collaboration; align with international standards.
- Support dissemination of the user handbook and technical guide.