Skip to content

Cyberthreats and K-12: EdTech Third Party Risk Management Checklist

June 27, 2023

K-12 school districts across the country continue to be targeted by threat actors looking to steal sensitive personal information. Examples of this can be seen in the recent incidents affecting the Pearland Independent School District in Texas and the Tucson Unified School District in Arizona where learning is disrupted and tens of thousands of students, parents, and district employees’ sensitive personal information, such as Social Security numbers, have been stolen. Years before K-12 school districts became a top target of ransomware gangs, protecting students’ personally identifiable information (PII) was top of mind for several state legislators. Moving above and beyond the requirements of FERPA and COPPA, at least 34 state legislatures between 2014 and 2019 foreshadowed both the potential of EdTech transforming the learning experience and the introduction of new risks. State legislatures acted by introducing a host of student data protection requirements for K-12 school districts and EdTech to address these risks. In its 2022 Annual Report, the non-profit K12 Security Information Exchange (K12 SIX) found that “for the second calendar year running, at least 75 percent of all data breach incidents affecting U.S. public K-12 school districts were the result of security incidents involving school district vendors and other partners… the most significant vector of data breaches impacting education settings – in terms of numbers of individuals affected – are education tech vendors and other trusted non-profit and government partners.”

Third-Party Risk Management — State Statutory Mandates

The state-by-state solutions to mitigate the data privacy and data security risk inherent in EdTech center on a critical strategy that is still effective today: third-party risk management. Indeed, a survey of the 34 state statutory requirements for EdTech in the K-12 space establishes requirements that must make their way into vendor agreements, where EdTech must agree to:

  • Implement administrative, technical, and physical security controls
  • Use limitations (i.e. can use only aggregate, de-identified data outside of “school purpose”)
  • Return/Destroy student PII and education records
  • Do not sell or rent student PII nor create profiles on students
  • Training of vendor personnel with access to student education records and PII, and
  • Establish notification procedures to schools and/or parents in event of unauthorized disclosure (like a data breach).

Additional EdTech Agreement Best Practices

These terms and conditions most often take the form of privacy policies, data sharing agreements (DSA), or data protection addendums (DPA). In addition to the above state-mandated terms, K-12 best practices to keep in mind when reviewing and negotiating these policies, DPAs, and DSAs include:

  • Memorializing legal basis for collection and processing of PII and education records (i.e. designating vendor as a “school official” for FERPA purposes)
  • Establishing ownership and control of the PII and education records as well as the derivative processed data
  • Establishing vendor indemnification of the school district for data breaches and requirements for vendor cooperation and incident response information sharing
  • Cybersecurity insurance requirement and designating the school as an “additionally insured”
  • Work with school IT administrators to set SaaS and other EdTech features and processing activities to limit the collection of sensitive PII data (i.e. SSN, geolocation data etc.)
  • Establish flow-down data protection requirements for vendor subcontractors
  • Onboarding and training on school district privacy and security policies
  • Utilization of vendor risk assessment questionnaires
  • Due diligence review of vendor-written information security programs (“WISP”), incident response plana, business continuity and disaster recovery plans (i.e. backups, alternative operating procedures etc.), independent audit reports (e.g. SOC 2 Type 2), and remediation plans as applicable

Vendors are becoming more adept at responding to these requests and have information readily available for review. While negotiating technical terms and conditions can be daunting, leveraging statutory requirements presents both a justification and an imperative for the parties to work together in the best interest of students.

The views and opinions expressed in the article represent the views of the authors and not necessarily the official view of Clark Hill PLC. Nothing in this article constitutes professional legal advice nor is it intended to be a substitute for professional legal advice.

Subscribe for the latest

Subscribe

Related

Event

Webinar: The Interoperability Wars - Information Blocking, EHR Ecosystems, and the Fight Over Healthcare Data

This webinar will examine the evolving legal and policy landscape surrounding interoperability, including the growing role of litigation, regulatory interpretation, and market dynamics in shaping how electronic health information is accessed and exchanged.

Explore more
Legal Updates

Update: Nasdaq’s Proposed $5 Million MVLS Rule and NYSE American’s Proposed Listing Standard: A Structural Shift for Small-Cap Issuers

As a follow up to our prior article, the Securities and Exchange Commission issued a release extending the period to approve, disapprove, or institute proceedings to determine whether to disapprove the proposed new continued listing standard requiring issuers with a class of securities listed on the Nasdaq Global and Capital Markets tiers to maintain at least $5 million in Market Value of Listed Securities (MVLS) (the “Proposed Nasdaq Rule”) from March 16, 2026 to April 2026.

Explore more
Legal Updates

United States Department of State Announces Expansion of Online Presence Review for Additional Visa Categories Starting March 30, 2026

Starting March 30, 2026, U.S. visa applicants in all A-3, C-3 (domestic worker), G-5, H-3, H-4 dependents of H-3, K-1, K-2, Q, R-1, R-2, S, T, and U classifications will undergo a review of their online presence by the Department of States as part of their visa application processes at U.S. consulates worldwide.

Explore more