<html>
<head>
<meta http-equiv="Content-Type" content="text/html; charset=Windows-1252">
<style type="text/css" style="display:none;"> P {margin-top:0;margin-bottom:0;} </style>
</head>
<body dir="ltr">
<div class="elementToProof" style="font-family: Calibri, Helvetica, sans-serif; font-size: 12pt; color: rgb(0, 0, 0);">
We're meeting a week from today to draft out our spring LLC agenda, and could certainly include this as a topic! Might it make sense to have this be librarian (or eLearning) led, and invite our librarians to participate as we did with sessions during our last
 meeting?</div>
<div class="elementToProof" style="font-family: Calibri, Helvetica, sans-serif; font-size: 12pt; color: rgb(0, 0, 0);">
<br>
</div>
<div id="Signature" class="elementToProof">
<div style="font-family: Calibri, Arial, Helvetica, sans-serif, serif, EmojiFont; font-size: 12pt; color: rgb(0, 0, 0);">
<span style="background-color: rgb(255, 255, 255);">Thank you,</span></div>
<div style="background-color: rgb(255, 255, 255); margin: 0px;">
<div style="text-align: left; background-color: rgb(255, 255, 255); margin: 0px; font-family: Calibri, Arial, Helvetica, sans-serif, serif, EmojiFont; font-size: 12pt; color: rgb(0, 0, 0);">
<span style="background-color: rgb(255, 255, 255);"><b><br>
</b></span></div>
<div style="background-color: rgb(255, 255, 255); margin: 0px;">
<div style="text-align: left; font-family: Calibri, Arial, Helvetica, sans-serif, serif, EmojiFont; font-size: 12pt; color: rgb(0, 0, 0);">
<span style="background-color: rgb(255, 255, 255);"><b>Jeannie Henkle, <a href="https://ischool.uw.edu/programs/mlis/what-is-library-science" target="_blank" title="Original URL: https://ischool.uw.edu/programs/mlis/what-is-library-science. Click or tap if you trust this link." rel="noopener noreferrer" data-auth="Verified" data-linkindex="1" style="margin: 0px;">
MLIS</a></b></span></div>
<div style="background-color: rgb(255, 255, 255); margin: 0px;"></div>
<div style="text-align: left; background-color: rgb(255, 255, 255); margin: 0px; font-family: Calibri, Arial, Helvetica, sans-serif, serif, EmojiFont; font-size: 12pt; color: rgb(0, 0, 0);">
Director of Libraries & Learning Support Services</div>
<div style="text-align: left; background-color: rgb(255, 255, 255); margin: 0px; font-family: Calibri, Arial, Helvetica, sans-serif, serif, EmojiFont; font-size: 12pt; color: rgb(0, 0, 0);">
Wenatchee Valley College</div>
<div style="text-align: left; background-color: rgb(255, 255, 255); margin: 0px; font-family: Calibri, Arial, Helvetica, sans-serif, serif, EmojiFont; font-size: 12pt; color: rgb(0, 0, 0);">
Phone: (509) 682-6718</div>
<div style="text-align: left; background-color: rgb(255, 255, 255); margin: 0px; font-family: Calibri, Helvetica, sans-serif, serif, EmojiFont; font-size: 11pt; color: black;">
<span style="background-color: rgb(255, 255, 255);">(she/her/hers pronouns)</span></div>
<div style="text-align: left; background-color: rgb(255, 255, 255); margin: 0px; font-family: Calibri, Helvetica, sans-serif, serif, EmojiFont; font-size: 11pt; color: black;">
<span style="background-color: rgb(255, 255, 255);"><br>
</span></div>
</div>
<div style="text-align: left; background-color: rgb(255, 255, 255); margin: 0px;">
<span style="font-family: Calibri, Arial, Helvetica, sans-serif, serif, EmojiFont; font-size: 14.6667px; color: rgb(32, 31, 30); background-color: rgb(255, 255, 255);"><b>currently re-reading:
</b></span><span style="font-family: Calibri, sans-serif; font-size: 11pt; color: rgb(70, 120, 134); background-color: rgb(255, 255, 255); line-height: 20.7px;"><b><i><a href="https://www.goodreads.com/book/show/28502000-fahrenheit-451" target="_blank" class="HyperlinkV2 SCXO222824150 BCX0" rel="noreferrer noopener" style="color: rgb(70, 120, 134); margin: 0px; background-color: rgb(255, 255, 255); text-align: left;">Fahrenheit
 451</a></i></b></span><span style="font-family: Calibri, Arial, Helvetica, sans-serif, serif, EmojiFont; font-size: 14.6667px; color: rgb(32, 31, 30); background-color: rgb(255, 255, 255);">, by Ray Bradbury</span></div>
</div>
</div>
<div id="appendonsend"></div>
<hr style="display:inline-block;width:98%" tabindex="-1">
<div id="divRplyFwdMsg" dir="ltr"><font face="Calibri, sans-serif" style="font-size:11pt" color="#000000"><b>From:</b> LIBRARYDIR <librarydir-bounces@lists.ctc.edu> on behalf of Howard Fuller via LIBRARYDIR <librarydir@lists.ctc.edu><br>
<b>Sent:</b> Friday, March 7, 2025 12:05 PM<br>
<b>To:</b> WACTC Library Directors <librarydir@lists.ctc.edu><br>
<b>Cc:</b> Howard Fuller <hfuller@whatcom.edu><br>
<b>Subject:</b> Re: [LIBRARYDIR] [EXTERNAL] Privacy, Technology, and Instructure Handout</font>
<div> </div>
</div>
<div>
<div>So interesting.</div>
<div>It might be prudent to also look at our own state government data breaches and leaks.</div>
<div><br>
</div>
<div>...and what action, if any, are we looking to take with this information? Or is this only 'informational?' </div>
<div><br>
</div>
<div>Howard </div>
<br>
<hr tabindex="-1" style="display:inline-block; width:98%">
<div id="x_divRplyFwdMsg" dir="ltr"><font face="Calibri, sans-serif" color="#000000" style="font-size:11pt"><b>From:</b> LIBRARYDIR <librarydir-bounces@lists.ctc.edu> on behalf of Julie Nurse via LIBRARYDIR <librarydir@lists.ctc.edu><br>
<b>Sent:</b> Friday, March 7, 2025 11:51 AM<br>
<b>To:</b> WACTC Library Directors <librarydir@lists.ctc.edu><br>
<b>Cc:</b> Julie Nurse <julie.nurse@centralia.edu><br>
<b>Subject:</b> Re: [LIBRARYDIR] [EXTERNAL] Privacy, Technology, and Instructure Handout</font>
<div> </div>
</div>
<div>
<p><font face="verdana" color="red" size="4"><strong>CAUTION: This email originated from outside your organization. Exercise caution when opening attachments or clicking links, especially from unknown senders.<br>
</strong><br>
</font><br>
<br>
<br>
</p>
<meta name="Generator" content="Microsoft Word 15 (filtered medium)">
<style>
<!--
@font-face
        {font-family:Wingdings}
@font-face
        {font-family:"Cambria Math"}
@font-face
        {font-family:Calibri}
@font-face
        {font-family:Aptos}
p.x_x_MsoNormal, li.x_x_MsoNormal, div.x_x_MsoNormal
        {margin:0in;
        font-size:12.0pt;
        font-family:"Aptos",sans-serif}
a:link, span.x_x_MsoHyperlink
        {color:blue;
        text-decoration:underline}
span.x_x_EmailStyle22
        {font-family:"Aptos",sans-serif;
        color:windowtext}
.x_x_MsoChpDefault
        {font-size:10.0pt}
@page WordSection1
        {margin:1.0in 1.0in 1.0in 1.0in}
ol
        {margin-bottom:0in}
ul
        {margin-bottom:0in}
-->
</style>Hi
 Erica,
<div dir="auto"><br>
</div>
<div dir="auto">I am deeply concerned. Could we add this to our spring LLC agenda?</div>
<div dir="auto"><br>
</div>
<div dir="auto">Thanks,</div>
<div dir="auto">Julie</div>
<div dir="auto"><br>
</div>
<div dir="auto">
<p class="x_x_MsoNormal" style="height:auto"><span style="color:rgb(31,56,100)">Julie Nurse</span></p>
<p class="x_x_MsoNormal" style="height:auto"><span style="color:rgb(31,56,100)">Dean of Library, Testing, and Teaching & Learning</span></p>
<p class="x_x_MsoNormal" style="height:auto"><span style="color:rgb(31,56,100)">Centralia College</span></p>
<p class="x_x_MsoNormal" style="height:auto"><span style="color:rgb(31,56,100)"><a href="tel:360.623.8567">360.623.8567</a></span></p>
<p class="x_x_MsoNormal"><span style="color:#1F3864"><a href="mailto:julie.nurse@centralia.edu" style="height:auto"><span style="color:rgb(5,99,193)">julie.nurse@centralia.edu</span></a></span></p>
</div>
<div><br>
</div>
<div><br>
</div>
<div>-------- Original message --------</div>
<div>From: "Coe, Erica via LIBRARYDIR" <librarydir@lists.ctc.edu> </div>
<div>Date: 3/7/25 9:13 AM (GMT-08:00) </div>
<div>To: WACTC Library Directors <librarydir@lists.ctc.edu> </div>
<div>Cc: "Coe, Erica" <ecoe@olympic.edu> </div>
<div>Subject: [EXTERNAL][LIBRARYDIR] Privacy, Technology, and Instructure Handout
</div>
<div><br>
</div>
<div>
<table border="0" cellspacing="0" cellpadding="0" align="left" width="100%">
<tbody>
<tr>
<td style="background:#ffb900; padding:5pt 2pt 5pt 2pt"></td>
<td width="100%" cellpadding="7px 6px 7px 15px" style="background:#fff8e5; padding:5pt 4pt 5pt 12pt; word-wrap:break-word">
<div style="color:#222222"><span style="color:#222; font-weight:bold">Caution:</span> This email originated from outside of Centralia College. Do not click links or open attachments unless you recognize the sender and know the content is safe.
</div>
</td>
</tr>
</tbody>
</table>
<br>
<div>
<div class="x_x_WordSection1">
<p class="x_x_MsoNormal">Hello all,</p>
<p class="x_x_MsoNormal"> </p>
<p class="x_x_MsoNormal">One of my librarians, Amanda Cain has been researching concerns about student data that is collected by various tools – pasted below.  The memory of LexisNexis sharing information with ICE was partially what spurred this investigation.
</p>
<p class="x_x_MsoNormal"> </p>
<p class="x_x_MsoNormal">I especially want to note concerns about Canvas since Instructure has been
<span style="color:#003891"><a href="https://urldefense.com/v3/__https://www.prnewswire.com/news-releases/kkr-and-dragoneer-complete-acquisition-of-instructure-302304632.html__;!!CVJAgw2XxpAa!nWshr5_-e9fh0SDRjPEseZU5O3AO1VevMDT_Tu39VSz8962Un_7xaE7XpEP0R7YD1yvrjN-3r6pGPnlaZcrzZJPH$" target="_blank"><span style="color:#003891">acquired
 by investment funds managed by KKR</span></a></span><span style="color:black">, a global investment firm. “KKR is a global private equity firm known for its serial
</span><u><span style="color:#467886"><a href="https://urldefense.com/v3/__https://www.justice.gov/archives/opa/pr/justice-department-sues-kkr-serial-violations-federal-premerger-review-law__;!!CVJAgw2XxpAa!nWshr5_-e9fh0SDRjPEseZU5O3AO1VevMDT_Tu39VSz8962Un_7xaE7XpEP0R7YD1yvrjN-3r6pGPnlaZQ3rXpTB$" target="_blank"><span style="color:#467886">anti-trust
 violations</span></a></span></u><span style="color:black"> and long history of asset-stripping company buyouts, most recently of
</span><u><span style="color:#467886"><a href="https://urldefense.com/v3/__https://www.warren.senate.gov/newsroom/press-releases/warren-wyden-sanders-murray-blast-private-equity-giant-kkr-for-grossly-substandard-care-and-unsafe-living-conditions-in-group-homes-for-people-with-intellectual-and-developmental-disabilities__;!!CVJAgw2XxpAa!nWshr5_-e9fh0SDRjPEseZU5O3AO1VevMDT_Tu39VSz8962Un_7xaE7XpEP0R7YD1yvrjN-3r6pGPnlaZW34vg46$" target="_blank"><span style="color:#467886">group
 homes for people with developmental disabilities</span></a></span></u><span style="color:black">. They primarily invest in oil and gas projects and have a
</span><u><span style="color:#467886"><a href="https://urldefense.com/v3/__https://peclimaterisks.org/kkr-greenwashing/__;!!CVJAgw2XxpAa!nWshr5_-e9fh0SDRjPEseZU5O3AO1VevMDT_Tu39VSz8962Un_7xaE7XpEP0R7YD1yvrjN-3r6pGPnlaZd8CV7DP$" target="_blank"><span style="color:#467886">pattern</span></a></span></u><span style="color:black">
 of repeated environmental violations, failure to obtain community consent, and a lack of accountable business practices in low-income communities. They also invest in private prisons.”</span></p>
<p class="x_x_MsoNormal"> </p>
<p class="x_x_MsoNormal">If there’s interest, maybe we can add this to a future LLC meeting for discussion.
</p>
<p class="x_x_MsoNormal"><span style="font-size:11.0pt"> </span></p>
<p class="x_x_MsoNormal"><span style="">Thanks,</span><span style="font-size:11.0pt"></span></p>
<p class="x_x_MsoNormal"><span style="">Erica</span></p>
<p class="x_x_MsoNormal"><span style=""> </span></p>
<p class="x_x_MsoNormal"><span style="">-------------------------------------------------------------</span></p>
<p class="x_x_MsoNormal"><span style="">Erica Coe (<i>she, her, hers</i>)</span></p>
<p class="x_x_MsoNormal"><span style="">Dean of Libraries, Tutoring, and College Success</span></p>
<p class="x_x_MsoNormal"><span style="">Olympic College </span></p>
<p class="x_x_MsoNormal"><span style="font-size:11.0pt"> </span></p>
<p class="x_x_MsoNormal">---------------------------------------------------------</p>
<div>
<p class="x_x_MsoNormal"><span style="color:black"> </span></p>
</div>
<div>
<p class="x_x_MsoNormal"><b><span style="color:black">Privacy and Technology Resources
</span></b></p>
<p class="x_x_MsoNormal">Amanda Cain, OC library faculty</p>
</div>
<div style="margin-bottom:8.0pt">
<p class="x_x_MsoNormal"><span style="color:black"> </span></p>
</div>
<div style="margin-bottom:8.0pt; white-space:pre-wrap">
<p class="x_x_MsoNormal"><b><span style="color:black">Facts </span></b><span style="color:black"></span></p>
</div>
<div style="margin-bottom:8.0pt; white-space:pre-wrap">
<p class="x_x_MsoNormal"><span style="color:black">FERPA is over 50 years old. It does not reflect the
</span><u><span style="color:#467886"><a href="https://urldefense.com/v3/__https://www.the74million.org/article/50-years-after-ferpas-passage-ed-privacy-law-needs-an-update-for-the-ai-era/__;!!CVJAgw2XxpAa!nWshr5_-e9fh0SDRjPEseZU5O3AO1VevMDT_Tu39VSz8962Un_7xaE7XpEP0R7YD1yvrjN-3r6pGPnlaZUMTkYgP$" target="_blank"><span style="color:#467886">current
 types of information contained in student records</span></a></span></u><span style="color:black">; it does not address third parties; and it does not acknowledge the extent to which ed tech vendors are integrated into students’ daily lives. According to some
 of the following reports and articles, collection and sale of students’ data happens on a large scale. Notably, Instructure (Canvas) was recently acquired by KKR, a private equity firm long investigated for its asset-stripping company buyouts. </span></p>
</div>
<div style="margin-bottom:8.0pt; white-space:pre-wrap">
<p class="x_x_MsoNormal"><b><span style="color:black">K12 </span></b><span style="color:black"></span></p>
</div>
<div style="margin-bottom:8.0pt; white-space:pre-wrap">
<p class="x_x_MsoNormal"><span style="color:black">Data is collected on tens of millions of students before they get to college, and results in risk-scoring algorithms being attached to them. Data is disproportionately collected on, and ads are targeted disproportionately
 to African American and Native American students in school settings. </span></p>
</div>
<div style="margin-bottom:8.0pt; white-space:pre-wrap">
<p class="x_x_MsoNormal"><u><span style="color:#467886"><a href="https://urldefense.com/v3/__https://themarkup.org/machine-learning/2022/01/11/this-private-equity-firm-is-amassing-companies-that-collect-data-on-americas-children__;!!CVJAgw2XxpAa!nWshr5_-e9fh0SDRjPEseZU5O3AO1VevMDT_Tu39VSz8962Un_7xaE7XpEP0R7YD1yvrjN-3r6pGPnlaZUHBA6AH$" target="_blank"><span style="color:#467886">This
 Private Equity Firm Is Amassing Companies That Collect Data on America’s Children, January 11, 2022</span></a></span></u><span style="color:black"> </span></p>
</div>
<div style="margin-bottom:8.0pt; white-space:pre-wrap">
<p class="x_x_MsoNormal"><span style="color:black">“We found that the companies, collectively, gather... data about students’ citizenship status, religious affiliation, school disciplinary records, medical diagnoses, what speed they read and type at, the full
 text of answers they give on tests, the pictures they draw for assignments, whether they live in a two-parent household, whether they’ve used drugs, been the victim of a crime, or expressed interest in LGBTQ+ groups, among hundreds of other data points.” </span></p>
</div>
<div style="margin-bottom:8.0pt; white-space:pre-wrap">
<p class="x_x_MsoNormal"><u><span style="color:#467886"><a href="https://urldefense.com/v3/__https://internetsafetylabs.org/wp-content/uploads/2022/12/2022-k12-edtech-safety-benchmark-national-findings-part-1.pdf__;!!CVJAgw2XxpAa!nWshr5_-e9fh0SDRjPEseZU5O3AO1VevMDT_Tu39VSz8962Un_7xaE7XpEP0R7YD1yvrjN-3r6pGPnlaZdF3f2Av$" target="_blank"><span style="color:#467886">K12
 Edtech Safety Benchmark: National Findings – Part 1,</span></a></span></u><u><span style="color:black"> 2022</span></u><span style="color:black"> </span></p>
</div>
<div style="margin-bottom:8.0pt; white-space:pre-wrap">
<p class="x_x_MsoNormal"><span style="color:black">Most--96%--of edtech apps used by K12 students “are unsafe for students.” “Apps and technology that expose personal information about children and their families to technology providers, third-party marketers,
 advertisers and often the internet at large are not adequately safe for children...Data is forever... mental health information gleaned from a child’s innocent use of a mental health tracker can become a problem in later years as a teen or an adult.” </span></p>
</div>
<div style="margin-bottom:8.0pt; white-space:pre-wrap">
<p class="x_x_MsoNormal"><u><span style="color:#467886"><a href="https://urldefense.com/v3/__https://www.globenewswire.com/news-release/2024/02/06/2824551/0/en/Significant-K-12-EdTech-Safety-Disparities-Discovered-Among-Marginalized-Demographics-in-New-Internet-Safety-Labs-Report.html__;!!CVJAgw2XxpAa!nWshr5_-e9fh0SDRjPEseZU5O3AO1VevMDT_Tu39VSz8962Un_7xaE7XpEP0R7YD1yvrjN-3r6pGPnlaZYnJ1vQy$" target="_blank"><span style="color:#467886">Significant
 K-12 EdTech Safety Disparities Discovered Among Marginalized Demographics in New Internet Safety Labs Report</span></a></span></u><span style="color:black">, February 2024 </span></p>
</div>
<div style="margin-bottom:8.0pt; white-space:pre-wrap">
<p class="x_x_MsoNormal"><span style="color:black">“Schools in the lowest income segment ($20K-$39K) and schools with majority race American Indian/Native Alaskan (National Center for Education Statistics categories) have the lowest technology vetting of all
 demographics and have the highest average percentage of apps with ads or behavioral ads.” </span></p>
</div>
<div style="margin-bottom:8.0pt; white-space:pre-wrap">
<p class="x_x_MsoNormal"><b><span style="color:black">Higher Ed </span></b><span style="color:black"></span></p>
</div>
<div style="margin-bottom:8.0pt; white-space:pre-wrap">
<p class="x_x_MsoNormal"><u><span style="color:#467886"><a href="https://urldefense.com/v3/__https://privacyrights.org/resources/paying-twice-learn-how-higher-education-students-may-be-forced-sacrifice-privacy-digital__;!!CVJAgw2XxpAa!nWshr5_-e9fh0SDRjPEseZU5O3AO1VevMDT_Tu39VSz8962Un_7xaE7XpEP0R7YD1yvrjN-3r6pGPnlaZUDv7AG1$" target="_blank"><span style="color:#467886">Paying
 Twice to Learn: How Higher Education Students May Be Forced to Sacrifice Privacy for Digital Learning Tools,</span></a></span></u><span style="color:black"> November 2024 </span></p>
</div>
<p class="x_x_MsoNormal"><span style="color:black">Report Key Takeaways:  </span></p>
<p class="x_x_MsoNormal" style="margin-left:.5in; text-indent:0in"><span style="font-size:10.0pt; font-family:Symbol; color:black"><span style="mso-list:Ignore">·<span style="font:7.0pt "Times New Roman"">                    
</span></span></span><span style="color:black">Limited Protections: Higher education students are often required to use and pay for access to digital instructional materials, yet they have extremely limited access to data privacy rights and protections. Federal
 law has not kept pace with technology, and relevant state laws focus on K-12 students or rely on consent–an element notably absent in this context.  </span></p>
<p class="x_x_MsoNormal" style="margin-left:.5in; text-indent:0in"><span style="font-size:10.0pt; font-family:Symbol; color:black"><span style="mso-list:Ignore">·<span style="font:7.0pt "Times New Roman"">                    
</span></span></span><span style="color:black">Lack of Transparency: The data privacy practices surrounding digital instructional materials in higher education are largely opaque. Neither students nor instructors have a clear understanding of how personal data
 is collected, used, stored, or shared. Companies rarely provide clear information in public policies, and institutions are not required to make vetting processes readily available for review. Inconsistent  </span></p>
<p class="x_x_MsoNormal" style="margin-left:.5in; text-indent:0in"><span style="font-size:10.0pt; font-family:Symbol; color:black"><span style="mso-list:Ignore">·<span style="font:7.0pt "Times New Roman"">                    
</span></span></span><span style="color:black">Policies and Practices: There appears to be no data protection standard or accepted best practices in place across educational institutions or companies providing digital instructional materials. Even the existence
 of contracts between institutions and providers varies. Data practices and privacy protections seem to be largely left to the ed-tech companies’ discretion.  </span></p>
<p class="x_x_MsoNormal" style="margin-left:.5in; text-indent:0in"><span style="font-size:10.0pt; font-family:Symbol; color:black"><span style="mso-list:Ignore">·<span style="font:7.0pt "Times New Roman"">                    
</span></span></span><span style="color:black">Significant Room for Improvement: Higher education institutions and ed-tech companies have substantial opportunities to better protect students’ data. This could involve adopting state or federal legal requirements,
 implementing institution- or system-wide contracting and review practices, and obtaining clear commitments from companies to protect student data. <br>
 </span></p>
<div style="margin-bottom:8.0pt; white-space:pre-wrap">
<p class="x_x_MsoNormal"><u><span style="color:#467886"><a href="https://urldefense.com/v3/__https://www.lawfaremedia.org/article/the-vulnerability-and-protection-of-student-data__;!!CVJAgw2XxpAa!nWshr5_-e9fh0SDRjPEseZU5O3AO1VevMDT_Tu39VSz8962Un_7xaE7XpEP0R7YD1yvrjN-3r6pGPnlaZRQkYhRo$" target="_blank"><span style="color:#467886">The
 Vulnerability and Protection of Student Data</span></a></span></u><span style="color:black">, December 2023 </span></p>
</div>
<div style="margin-bottom:8.0pt; white-space:pre-wrap">
<p class="x_x_MsoNormal"><span style="color:black">“Data brokers...pose significant risks to American students. Despite assertions that they are not acting as consumer reporting agencies (which are companies that calculate credit scores), data brokers report
 student data for student loans (without the consent of the students in question), which can be purchased and used in the future (also without students’ consent) for credit reports and employment background checks. Data collected by these companies is often
 inaccurate, which could inflict financial harm in a number of ways, including lawsuits regarding credit discrimination and the potential for restricted employment opportunities.” </span></p>
</div>
<div style="margin-bottom:8.0pt; white-space:pre-wrap">
<p class="x_x_MsoNormal"><u><span style="color:#467886"><a href="https://urldefense.com/v3/__https://dl.acm.org/doi/full/10.1145/3613904.3642116__;!!CVJAgw2XxpAa!nWshr5_-e9fh0SDRjPEseZU5O3AO1VevMDT_Tu39VSz8962Un_7xaE7XpEP0R7YD1yvrjN-3r6pGPnlaZYchwTCl$" target="_blank"><span style="color:#467886">Deepfakes,
 Phrenology, Surveillance, and More! A Taxonomy of AI Privacy Risks</span></a></span></u><span style="color:black">, May 2024  </span></p>
</div>
<div style="margin-bottom:8.0pt; white-space:pre-wrap">
<p class="x_x_MsoNormal"><span style="color:black">“In approximately 93% of the cases we analyzed, the unique capabilities and data requirements of the AI technologies involved in the incident either created a new type of privacy risk, or exacerbated a known
 risk.” </span></p>
</div>
<div style="margin-bottom:8.0pt; white-space:pre-wrap">
<p class="x_x_MsoNormal"><u><span style="color:#467886"><a href="https://urldefense.com/v3/__https://conpro23.ieee-security.org/papers/schmidt-conpro23.pdf__;!!CVJAgw2XxpAa!nWshr5_-e9fh0SDRjPEseZU5O3AO1VevMDT_Tu39VSz8962Un_7xaE7XpEP0R7YD1yvrjN-3r6pGPnlaZTYGSv7n$" target="_blank"><span style="color:#467886">“Wow,
 I hope not?!”: Instructor Use of LMS Data and Knowledge of LMS Privacy Practices</span></a></span></u><span style="color:black">, IEEE, 2023  </span></p>
</div>
<div style="margin-bottom:8.0pt; white-space:pre-wrap">
<p class="x_x_MsoNormal"><span style="color:black">“Anonymized data... allow for easy de-anonymization and the loss of personal data and privacy...Additionally, this risk should be weighed when considering that some of the data available in the dataset include
 potential information about students’ disability accommodations. Such data, anonymized or not, create the potential for technology-enabled discrimination, based on students’ disability status.” </span></p>
</div>
<div style="margin-bottom:8.0pt; white-space:pre-wrap">
<p class="x_x_MsoNormal"><u><span style="color:#467886"><a href="https://urldefense.com/v3/__https://conpro23.ieee-security.org/papers/schmidt-conpro23.pdf__;!!CVJAgw2XxpAa!nWshr5_-e9fh0SDRjPEseZU5O3AO1VevMDT_Tu39VSz8962Un_7xaE7XpEP0R7YD1yvrjN-3r6pGPnlaZTYGSv7n$" target="_blank"><span style="color:#467886">Behind
 the Platforms: Safeguarding intellectual property rights and academic freedom in Higher Education, April 2024</span></a></span></u><span style="color:black">  </span></p>
</div>
<div style="margin-bottom:8.0pt; white-space:pre-wrap">
<p class="x_x_MsoNormal"><span style="color:black">“Issues of academic IP and academic freedom in digital education are fragmented, with no sector-wide standards or rules, and minimal guidance for institutions on these matters when engaging in licensing or
 procurement of digital education services, or staff when engaging in sector discussions/negotiations.” </span></p>
</div>
<div style="margin-bottom:8.0pt; white-space:pre-wrap">
<p class="x_x_MsoNormal"><u><span style="color:#467886"><a href="https://urldefense.com/v3/__https://papers.ssrn.com/sol3/papers.cfm?abstract_id=4733203__;!!CVJAgw2XxpAa!nWshr5_-e9fh0SDRjPEseZU5O3AO1VevMDT_Tu39VSz8962Un_7xaE7XpEP0R7YD1yvrjN-3r6pGPnlaZX1ayECF$" target="_blank"><span style="color:#467886">Sins
 of omission: Critical informatics perspectives on privacy in e-learning systems in higher education,</span></a></span></u><span style="color:black"> 2021. </span></p>
</div>
<div style="margin-bottom:8.0pt; white-space:pre-wrap">
<p class="x_x_MsoNormal"><span style="color:black">“Language in contracts between the university and the vendors around FERPA compliance suggested that the university misses opportunities to inform students and instructors of the ways their data can and will
 be used by vendors, neglects gathering meaningful consent from students and instructors, and allows vendors the legal loopholes to collect and store student data with impunity.”  </span></p>
</div>
<div style="margin-bottom:8.0pt; white-space:pre-wrap">
<p class="x_x_MsoNormal"><u><span style="color:#467886"><a href="https://urldefense.com/v3/__https://www.forbes.com/sites/rayravaglia/2024/11/19/instructure-is-ready-to-lead-the-next-evolution-in-learning/__;!!CVJAgw2XxpAa!nWshr5_-e9fh0SDRjPEseZU5O3AO1VevMDT_Tu39VSz8962Un_7xaE7XpEP0R7YD1yvrjN-3r6pGPnlaZfgX3bDV$" target="_blank"><span style="color:#467886">Instructure
 Is Ready To Lead The Next Evolution In Learning,</span></a></span></u><span style="color:black"> Forbes, November 2024 </span></p>
</div>
<div style="margin-bottom:8.0pt; white-space:pre-wrap">
<p class="x_x_MsoNormal"><span style="color:black">This press release arguably confirms warnings in the above reports. KKR is a global private equity firm known for its serial
</span><u><span style="color:#467886"><a href="https://urldefense.com/v3/__https://www.justice.gov/archives/opa/pr/justice-department-sues-kkr-serial-violations-federal-premerger-review-law__;!!CVJAgw2XxpAa!nWshr5_-e9fh0SDRjPEseZU5O3AO1VevMDT_Tu39VSz8962Un_7xaE7XpEP0R7YD1yvrjN-3r6pGPnlaZQ3rXpTB$" target="_blank"><span style="color:#467886">anti-trust
 violations</span></a></span></u><span style="color:black"> and long history of asset-stripping company buyouts, most recently of
</span><u><span style="color:#467886"><a href="https://urldefense.com/v3/__https://www.warren.senate.gov/newsroom/press-releases/warren-wyden-sanders-murray-blast-private-equity-giant-kkr-for-grossly-substandard-care-and-unsafe-living-conditions-in-group-homes-for-people-with-intellectual-and-developmental-disabilities__;!!CVJAgw2XxpAa!nWshr5_-e9fh0SDRjPEseZU5O3AO1VevMDT_Tu39VSz8962Un_7xaE7XpEP0R7YD1yvrjN-3r6pGPnlaZW34vg46$" target="_blank"><span style="color:#467886">group
 homes for people with developmental disabilities</span></a></span></u><span style="color:black">. They primarily invest in oil and gas projects and have a
</span><u><span style="color:#467886"><a href="https://urldefense.com/v3/__https://peclimaterisks.org/kkr-greenwashing/__;!!CVJAgw2XxpAa!nWshr5_-e9fh0SDRjPEseZU5O3AO1VevMDT_Tu39VSz8962Un_7xaE7XpEP0R7YD1yvrjN-3r6pGPnlaZd8CV7DP$" target="_blank"><span style="color:#467886">pattern</span></a></span></u><span style="color:black">
 of repeated environmental violations, failure to obtain community consent, and a lack of accountable business practices in low-income communities. They also invest in private prisons. </span></p>
</div>
<div style="margin-bottom:8.0pt; white-space:pre-wrap">
<p class="x_x_MsoNormal"><i><span style="color:black">“Instructure Holdings, Inc., a leader in learning management systems (LMS), has entered an exciting new chapter with its </span></i><i><span style="color:#003891"><a href="https://urldefense.com/v3/__https://www.prnewswire.com/news-releases/kkr-and-dragoneer-complete-acquisition-of-instructure-302304632.html__;!!CVJAgw2XxpAa!nWshr5_-e9fh0SDRjPEseZU5O3AO1VevMDT_Tu39VSz8962Un_7xaE7XpEP0R7YD1yvrjN-3r6pGPnlaZcrzZJPH$" target="_blank"><span style="color:#003891">acquisition
 by investment funds managed by KKR</span></a></span></i><i><span style="color:black">, a global investment firm, and Dragoneer, a growth-oriented investor. The deal, valued at $4.8 billion, marks a turning point in Instructure’s journey to transform education
 on a global scale. “Having KKR’s support will help us double down on core markets, scale our global reach at a faster pace, and unlock new opportunities.” ... This means analyzing the entire transcript of activities within the LMS, providing a dynamic, data-driven
 view of student progress rather than just seeing signposts of where students have been and what they have taken away. Things become more potent by moving away from a particular student’s traversal of a specific course to looking at large aggregations of students
 traversing similar courses. This is why Instructure’s acquisition of Parchment, a company specializing in</span></i><span style="color:black">
<i>credential and transcript management, is so significant. By combining Parchment’s expertise with Canvas data, Instructure can connect learning outcomes to skills, degrees, and career readiness. As this data grows in scale, AI can identify patterns and insights
 that would be impossible to discern otherwise—capturing hard skills, soft skills, teamwork capabilities, and more... Beyond improved insights into the relationships of knowledge, skills, and outcomes, the integration of Canvas with Parchment should lead to
 a better version of the transcript itself, one that captures more than just the aggregated results of assignments but the full transcript of the rich performance data a student generates during a course. This would shine light not only on the knowledge acquired
 and skills measured on course assignments but also on the knowledge and skills demonstrated during the assignments themselves and the evolution of the knowledge and skills across the duration of the course and throughout the student’s entire career.”
</i> </span></p>
</div>
<div style="margin-bottom:8.0pt; white-space:pre-wrap">
<p class="x_x_MsoNormal"><b><span style="color:black">How do I...? </span></b><span style="color:black"></span></p>
</div>
<div style="margin-bottom:8.0pt; white-space:pre-wrap">
<p class="x_x_MsoNormal"><u><span style="color:#467886"><a href="https://urldefense.com/v3/__https://community.canvaslms.com/t5/Privacy-Articles/Instructure-s-Third-Party-Processing-Guide/ta-p/606339__;!!CVJAgw2XxpAa!nWshr5_-e9fh0SDRjPEseZU5O3AO1VevMDT_Tu39VSz8962Un_7xaE7XpEP0R7YD1yvrjN-3r6pGPnlaZWL2H9nx$" target="_blank"><span style="color:#467886">Instructure's
 Third-Party Processing Guide</span></a></span></u><span style="color:black">  </span></p>
</div>
<div style="margin-bottom:8.0pt; white-space:pre-wrap">
<p class="x_x_MsoNormal"><span style="color:black">Lists over 30 pages of third-party vendors. </span></p>
</div>
<div style="margin-bottom:8.0pt; white-space:pre-wrap">
<p class="x_x_MsoNormal"><u><span style="color:#467886"><a href="https://urldefense.com/v3/__https://community.canvaslms.com/t5/Canvas-Student-ePortfolios/How-do-I-change-my-privacy-settings-in-Canvas-Student/ta-p/1369__;!!CVJAgw2XxpAa!nWshr5_-e9fh0SDRjPEseZU5O3AO1VevMDT_Tu39VSz8962Un_7xaE7XpEP0R7YD1yvrjN-3r6pGPnlaZQPucsyG$" target="_blank"><span style="color:#467886">How
 do I change my privacy settings in Canvas Student ePortfolios?</span></a></span></u><span style="color:black"> </span></p>
</div>
<div style="margin-bottom:8.0pt; white-space:pre-wrap">
<p class="x_x_MsoNormal"><u><span style="color:#467886"><a href="https://urldefense.com/v3/__https://themarkup.org/the-breakdown/2023/08/03/how-to-quickly-get-to-the-important-truth-inside-any-privacy-policy__;!!CVJAgw2XxpAa!nWshr5_-e9fh0SDRjPEseZU5O3AO1VevMDT_Tu39VSz8962Un_7xaE7XpEP0R7YD1yvrjN-3r6pGPnlaZdxRi8Hi$" target="_blank"><span style="color:#467886">How
 to Quickly Get to the Important Truth Inside Any Privacy Policy,</span></a></span></u><span style="color:black"> August 3, 2023 </span></p>
</div>
<div style="margin-bottom:8.0pt; white-space:pre-wrap">
<p class="x_x_MsoNormal"><b><span style="color:black">Recommended Listening </span></b><span style="color:black"></span></p>
</div>
<div style="margin-bottom:8.0pt; white-space:pre-wrap">
<p class="x_x_MsoNormal"><u><span style="color:black">“</span></u><u><span style="color:#467886"><a href="https://urldefense.com/v3/__https://doctorow.medium.com/https-pluralistic-net-2025-02-26-ursula-franklin-enshittification-eh-403038a49634__;!!CVJAgw2XxpAa!nWshr5_-e9fh0SDRjPEseZU5O3AO1VevMDT_Tu39VSz8962Un_7xaE7XpEP0R7YD1yvrjN-3r6pGPnlaZZAiSZt7$" target="_blank"><span style="color:#467886">With
 Great Power Came No Responsibility,” Cory Doctorow Lecture at U Toronto, February 2025</span></a></span></u><span style="color:black"> </span></p>
</div>
<div style="margin-bottom:8.0pt; white-space:pre-wrap">
<p class="x_x_MsoNormal"><span style="color:black">This colorful lecture illustrates how data-broker activity plays out in nurses’ lives. </span></p>
</div>
<div style="margin-bottom:8.0pt; white-space:pre-wrap">
<p class="x_x_MsoNormal"><span style="color:black">“A January 2025 report from Groundwork Collective documents how increasingly nurses in the USA are hired through gig apps — “Uber for nurses” — so nurses never know from one day to the next whether they’re
 going to work, or how much they’ll get paid. There’s something high-tech going on here with those nurses’ wages. These nursing apps — a cartel of three companies, Shiftkey, Shiftmed and Carerev — can play all kinds of games with labor pricing. Before Shiftkey
 offers a nurse a shift, it purchases that worker’s credit history from a data-broker. Specifically, it pays to find out how much credit-card debt the nurse is carrying, and whether it is overdue. The more desperate the nurse’s financial straits are, the lower
 the wage on offer.” </span></p>
</div>
<div style="margin-bottom:8.0pt; white-space:pre-wrap">
<p class="x_x_MsoNormal"><b><span style="color:black"> </span></b><span style="color:black"></span></p>
</div>
<div>
<p class="x_x_MsoNormal"><span style="color:black"> </span></p>
</div>
<div id="x_x_Signature">
<div id="x_x_divtagdefaultwrapper">
<p><span style="font-family:"Calibri",sans-serif; color:black"> </span></p>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</body>
</html>