Certified Data Privacy Administrator (CDPA)
A Free Training Program for School District IT Leaders
Sign up for this free course today offered exclusively by GG4L for those taking on the role as a school or district Data Privacy Administrator. Data privacy is at the forefront of the use of technology resources in K-12 schools and the use of EdTech tools has grown exponentially. As a result, personally identifiable information (PII) of both students and staff are being shared with hundreds of companies each day. To control this widespread sharing of PII, regional, state, and national educational agencies have begun to establish a variety of standards as to when and how data might be both shared and secured. K-12 educational organizations are being called upon to gain control of data sharing and data protection on an ongoing basis. As a result, K-12 schools are establishing an internal role of Data Privacy Administrator. Prepare your staff for this today!
Highlights of the Course with Four Modules
Four modules will make use video content, discussion groups, and quizzes to deliver and assess the learner’s mastery of the content. At the end of the program, the learner will be given an exam and upon passing will be awarded a Certificate of Completion.
Introduction and Foundation: This module introduces the rationale for controlling the sharing of PII with EdTech resources that use this data. It introduces many of the national, state, and regional standards, guidelines, and requirements for insuring privacy of staff and student data.
Identifying and Managing Products That Use Data: EdTech products that consume and use PII are abundant. First, you need to know what products are in use, and where, how, and why they are being used. It is critical to know what data is being consumed and how frequently it is being consumed. This module will introduce commercially available tools to help with this task.
Moving Data Across the Ecosystem: Data moves between applications using different methodologies. These include Application Program Interface (API) and secure file transfer protocol (SFTP). This section reviews the advantages and disadvantages of different methodologies, in addition to different data exchange standards. It also looks at various third-party data sharing service providers, the standards to which they conform, and methods used by each.
Managing and Monitoring Data Privacy: This module addresses steps you should take and tools to use to be aware of various changes in data sharing. Data Privacy Agreements (DPA) are required by many state, regional, and other governing agencies. This module looks at the different off-the-shelf DPAs that have been adopted by agencies. The DPA, itself, is not a method for insuring data privacy. As a result, this module focuses on available tools that show how to track the ongoing sharing of PII routinely.