Open source policies show commitment to student data privacy

No readers like this yet.
A bubbled in scan sheet

Opensource.com

In the growing hubbub around student data privacy and security, it can be hard for edtech companies to identify concrete steps to demonstrate their commitment to protecting student information. Education tech startup Clever recently made a commitment to transparency by making their privacy policies open source, posting the policy on GitHub so anyone can track changes.

For Clever, the move to post its privacy policy on GitHub was prompted by conversations with edtech privacy advocate Bill Fitzgerald, who has pointed out flawed and vague policies of several edtech companies on his blog, FunnyMonkey.

"When the AFT announced that ShareMyLesson integrated with Clever, I asked some questions about what this meant for teachers and their data, as information was going from one entity to another," Fitzgerald said.

Fitzgerald's questions led the startup to realize that it needed to explain its terms in much clearer language.

"It was boilerplate language, and we wanted to raise the bar," Clever co-founder Dan Carroll said.

Open sourcing its privacy policy prompted the Clever team to make several changes to the terms. The revised version, which Fitzgerald lauds as "significant improvements," strengthen the policies around notifying schools in the case of transferring student information as a result of a merger or acquisition.

"If Clever becomes part of another company, we don't ever want the Clever data to be separated from the Clever service," Carroll said.

"The most important thing around privacy policy is to be transparent—they exist so you can express clearly your intentions and your practices," Carroll said. "You can say you're going to be transparent, but when you make [your privacy policy] open source, [that step] enforces it."

Fitzgerald agrees. "The ability to get an annotated changelog of how policies evolve—this adds a layer of transparency that has never existed in the privacy policy world before."

Carroll hopes the move will encourage educators and parents to reach out to Clever about its privacy policy.

"Before, if you didn't like the terms, you could write a blog post or tweet at us, but those are fragmented conversations," he said. "Now, it's a public forum. It enables us to get feedback and respond to it."

As Carroll sees it, open source policies can change the way individuals engage with student data privacy.

"People often only look to privacy when there's a problem," Carroll said. "With friendly language that you can actually comment on, we want people to look at it proactively."

Carroll also hopes publishing Clever's privacy policy on GitHub will encourage other companies to do the same, and to borrow clear language from each other's policies.

"Making this public and open source legitimizes a practice that's happened for a long time—sharing and borrowing and developing on top of each other," he said. "For an edtech company starting tomorrow, we would encourage them to use Clever's policy as a basis for what they're doing: borrow our terms, as long as you also put them in practice."

Several other companies have also taken recent steps to make privacy policy changes public. After Twitter conversations calling for clearer privacy terms, LearnSprout uploaded its privacy policy to GitHub. Kickboard has committed to posting notifications about changes to its privacy policy on its site.

Carroll warns that open sourcing terms is no panacea for the issues around protecting student data privacy.

"This is not going to solve the problem—we need to change our policies, our practices," he explained, "but this can make the problem more visible and more tangible."

Carroll and Fitzgerald both urge all edtech companies—and companies outside of edtech—to take the time to be transparent about how they handle consumer data. And how much time will it actually take to open source your privacy policy?

"It can be done within half an hour," Fitzgerald said. "And that includes time to make a sandwich."

Reposted with permission from edSurge.com

User profile image.
Charley Locke currently reports for EdSurge. Previously, she taught nonfiction writing to teenagers at GAKKO in Shodoshima, Japan, and at El Centro de Esperanza Infantíl in Oaxaca, Mexico. Charley also worked as a reader at The Paris Review, and would always like to think of herself as a professional reader. She has a B.A. from Yale University, where she studied American literature.

2 Comments

Charley, this is such an interesting article and made me think about this topic in ways I hadn't before. Three cheers for Bill Fitzergerald -- and Clever -- they did exactly what they should be doing.

Open source can actually be a hobby for one and a lot but I'm too spiteful with that brains mortals such person amy grant of Ecuador Colombia perúestos are most are enemies who have damaged technology and many projects I I wanted to be what I can do for you account intruders like this I'm working for people with ability as autism I love you so much zombie climate of these enemies who imprisoned innocently that I have also experience of evil himself just as I was beginning android they did demons for a malicious application to extract personal data steel terminals and two weeks removed because it happens that when I had my first android test for penetraciónlo same benihana intruders hidden in pages that you do not even and envisions that
existed and even after four months later founded ubuntu touch who moved to ubuntu touch only even has always been present in the store of the smartphone oTable this same continues malicious hiding reading methods not fail to have the power to defend themselves with proof penetration and loshundiendo and still being a model which says to take the operating system is completely open source and one of this year is different nosotro innocent wisely same even we are sinking even being familiar with family members and neighbors DVD when removing and one open as a mobile operating system or computer truth that this enemy is betraying one and innocent as the system is clean but when you are going to have them put to him the code we-ness life miserable and you want to catch one systems linens you to do as a hobby project program and even the android them are represented making life impossible as this rule of computer device smartphone this computer As a general rule there are codes and a rocky called Trojans same bios out there you can not enjoy the scenery and it is precisely for that very even are even disguised as police or private detective guard are not all bad but he who does the aserca is the enemy including business owner with Red Hat Enterprise already that has been under the greatest threat to human rights and how to end this is sanctioning this type of person all this technology as a law that is not suitable to have red hat enter prize the most for smartphone this same type of person is dedicated to also I die my son who is selling it are swindlers and criminals who harm the credit No. 2 this same enemy fills the house and the area of ​​contamination electromagnetic what damage to health for better outdoor hobby and oppressive intrusion No.1 must reject this kind of malicious people the phone stores the same computer seasonal such people everything is technology like this so that there true peace that the people enjoy hobby and do hope malicious empires peonage of capitalism as this same enemy what you like is to harm or kill virus dictatorships must save peace sacional these enemies touch all that he is primarily open source security guards here in Latin America Central America because every time you go for a ride in a tragedy and this can not go on many sick people but has many misspellings but

Creative Commons LicenseThis work is licensed under a Creative Commons Attribution-Share Alike 4.0 International License.