TLE Seal Practices
Leadership
1. The deliberations and decisions of school system leaders reflect an understanding of data privacy and security.
2. The school system has up to date policies and regulations addressing data privacy compliance requirements.
3. The school system’s policies and regulations set clear expectations for the protection of student data privacy and security, as well as the transparent use of data.
4. A school system executive leader is identified as the person responsible for development and implementation of data privacy and security policies and practices.
5. School system leaders provide transparent, updated and accessible communications regarding the collection, management and use of student data to their community.
6. School system leaders ensure adequate resources are available to meet data privacy and security needs.
2. The school system has up to date policies and regulations addressing data privacy compliance requirements.
3. The school system’s policies and regulations set clear expectations for the protection of student data privacy and security, as well as the transparent use of data.
4. A school system executive leader is identified as the person responsible for development and implementation of data privacy and security policies and practices.
5. School system leaders provide transparent, updated and accessible communications regarding the collection, management and use of student data to their community.
6. School system leaders ensure adequate resources are available to meet data privacy and security needs.
Classroom
1. Teachers implement a curriculum to promote student information literacy, digital citizenship and Internet safety.
2. Teachers are aware of and regularly use the school system’s established process for vetting and procuring online services.
3. Teachers model appropriate use and protection of student data for their students.
4. Teacher communications to parents include clear information about the collection, use and protection of student data.
2. Teachers are aware of and regularly use the school system’s established process for vetting and procuring online services.
3. Teachers model appropriate use and protection of student data for their students.
4. Teacher communications to parents include clear information about the collection, use and protection of student data.
Data Security
1. The school system website includes its data privacy and security policies and practices which are updated as-needed, but at least on an annual basis.
2. The school system data privacy and security procedures includes information about data retention periods for student records, data transmission technical protocols, data at-rest and methods and controls limiting access to electronic data.
3. The school system has enforceable policies regarding storage of data on local computers, mobile devices, storage devices and cloud file-sharing and storage services.
4. The school system utilizes a documented, role-based process when granting access rights to educators, staff, and contractors to data and technology systems.
5. The school system has a process in place to communicate data incidents to appropriate stakeholders, in accordance with state law and school system policies.
6. The school system has a business continuity and disaster recovery plan which is verified and tested on an established, regular basis.
7. The school system performs an audit of data privacy and security practices on an established, regular basis.
2. The school system data privacy and security procedures includes information about data retention periods for student records, data transmission technical protocols, data at-rest and methods and controls limiting access to electronic data.
3. The school system has enforceable policies regarding storage of data on local computers, mobile devices, storage devices and cloud file-sharing and storage services.
4. The school system utilizes a documented, role-based process when granting access rights to educators, staff, and contractors to data and technology systems.
5. The school system has a process in place to communicate data incidents to appropriate stakeholders, in accordance with state law and school system policies.
6. The school system has a business continuity and disaster recovery plan which is verified and tested on an established, regular basis.
7. The school system performs an audit of data privacy and security practices on an established, regular basis.
Business
1. The school system has implemented a process for vetting online services for data privacy and security.
2. The school system regularly educates its employees about the importance of, and expectations for, the use of the established vetting process for online services.
3 The school system implements contract language and data sharing agreements addressing student data privacy and data security.
4. The school system ensures that all business processes associated with student data include enforceable data privacy and security requirements.
2. The school system regularly educates its employees about the importance of, and expectations for, the use of the established vetting process for online services.
3 The school system implements contract language and data sharing agreements addressing student data privacy and data security.
4. The school system ensures that all business processes associated with student data include enforceable data privacy and security requirements.
Data Privacy
1. The school system website includes its data privacy and security policies and practices which are updated as-needed, but at least on an annual basis.
2. The school system data privacy and security procedures includes information about data retention periods for student records, data transmission technical protocols, data at-rest and methods and controls limiting access to electronic data.
3. The school system has enforceable policies regarding storage of data on local computers, mobile devices, storage devices and cloud file-sharing and storage services.
4. The school system utilizes a documented, role-based process when granting access rights to educators, staff, and contractors to data and technology systems.
5. The school system has a process in place to communicate data incidents to appropriate stakeholders, in accordance with state law and school system policies.
6. The school system has a business continuity and disaster recovery plan which is verified and tested on an established, regular basis.
7. The school system performs an audit of data privacy and security practices on an established, regular basis.
2. The school system data privacy and security procedures includes information about data retention periods for student records, data transmission technical protocols, data at-rest and methods and controls limiting access to electronic data.
3. The school system has enforceable policies regarding storage of data on local computers, mobile devices, storage devices and cloud file-sharing and storage services.
4. The school system utilizes a documented, role-based process when granting access rights to educators, staff, and contractors to data and technology systems.
5. The school system has a process in place to communicate data incidents to appropriate stakeholders, in accordance with state law and school system policies.
6. The school system has a business continuity and disaster recovery plan which is verified and tested on an established, regular basis.
7. The school system performs an audit of data privacy and security practices on an established, regular basis.