<html>
<head>
<meta http-equiv="Content-Type" content="text/html; charset=Windows-1252">
</head>
<body>
<div>So interesting.</div>
<div>It might be prudent to also look at our own state government data breaches and leaks.</div>
<div><br>
</div>
<div>...and what action, if any, are we looking to take with this information? Or is this only 'informational?' </div>
<div><br>
</div>
<div>Howard </div>
<br>
<hr style="display:inline-block;width:98%" tabindex="-1">
<div id="divRplyFwdMsg" dir="ltr"><font face="Calibri, sans-serif" style="font-size:11pt" color="#000000"><b>From:</b> LIBRARYDIR <librarydir-bounces@lists.ctc.edu> on behalf of Julie Nurse via LIBRARYDIR <librarydir@lists.ctc.edu><br>
<b>Sent:</b> Friday, March 7, 2025 11:51 AM<br>
<b>To:</b> WACTC Library Directors <librarydir@lists.ctc.edu><br>
<b>Cc:</b> Julie Nurse <julie.nurse@centralia.edu><br>
<b>Subject:</b> Re: [LIBRARYDIR] [EXTERNAL] Privacy, Technology, and Instructure Handout</font>
<div> </div>
</div>
<div>
<p><font face="verdana" color="red" size="4"><strong>CAUTION: This email originated from outside your organization. Exercise caution when opening attachments or clicking links, especially from unknown senders.<br>
</strong><br>
</font><br>
<br>
<br>
</p>
<meta name="Generator" content="Microsoft Word 15 (filtered medium)">
<style>
<!--
@font-face
        {font-family:Wingdings}
@font-face
        {font-family:"Cambria Math"}
@font-face
        {font-family:Calibri}
@font-face
        {font-family:Aptos}
p.x_MsoNormal, li.x_MsoNormal, div.x_MsoNormal
        {margin:0in;
        font-size:12.0pt;
        font-family:"Aptos",sans-serif}
a:link, span.x_MsoHyperlink
        {color:blue;
        text-decoration:underline}
span.x_EmailStyle22
        {font-family:"Aptos",sans-serif;
        color:windowtext}
.x_MsoChpDefault
        {font-size:10.0pt}
@page WordSection1
        {margin:1.0in 1.0in 1.0in 1.0in}
ol
        {margin-bottom:0in}
ul
        {margin-bottom:0in}
-->
</style>Hi
 Erica,
<div dir="auto"><br>
</div>
<div dir="auto">I am deeply concerned. Could we add this to our spring LLC agenda?</div>
<div dir="auto"><br>
</div>
<div dir="auto">Thanks,</div>
<div dir="auto">Julie</div>
<div dir="auto"><br>
</div>
<div dir="auto">
<p class="x_MsoNormal" style="height:auto"><span style="color:rgb(31,56,100)">Julie Nurse</span></p>
<p class="x_MsoNormal" style="height:auto"><span style="color:rgb(31,56,100)">Dean of Library, Testing, and Teaching & Learning</span></p>
<p class="x_MsoNormal" style="height:auto"><span style="color:rgb(31,56,100)">Centralia College</span></p>
<p class="x_MsoNormal" style="height:auto"><span style="color:rgb(31,56,100)"><a href="tel:360.623.8567">360.623.8567</a></span></p>
<p class="x_MsoNormal"><span style="color:#1F3864"><a href="mailto:julie.nurse@centralia.edu" style="height:auto"><span style="color:rgb(5,99,193)">julie.nurse@centralia.edu</span></a></span></p>
</div>
<div><br>
</div>
<div><br>
</div>
<div>-------- Original message --------</div>
<div>From: "Coe, Erica via LIBRARYDIR" <librarydir@lists.ctc.edu> </div>
<div>Date: 3/7/25 9:13 AM (GMT-08:00) </div>
<div>To: WACTC Library Directors <librarydir@lists.ctc.edu> </div>
<div>Cc: "Coe, Erica" <ecoe@olympic.edu> </div>
<div>Subject: [EXTERNAL][LIBRARYDIR] Privacy, Technology, and Instructure Handout
</div>
<div><br>
</div>
<div>
<table border="0" cellspacing="0" cellpadding="0" align="left" width="100%">
<tbody>
<tr>
<td style="background:#ffb900; padding:5pt 2pt 5pt 2pt"></td>
<td width="100%" cellpadding="7px 6px 7px 15px" style="background:#fff8e5; padding:5pt 4pt 5pt 12pt; word-wrap:break-word">
<div style="color:#222222"><span style="color:#222; font-weight:bold">Caution:</span> This email originated from outside of Centralia College. Do not click links or open attachments unless you recognize the sender and know the content is safe.
</div>
</td>
</tr>
</tbody>
</table>
<br>
<div>
<div class="x_WordSection1">
<p class="x_MsoNormal">Hello all,</p>
<p class="x_MsoNormal"> </p>
<p class="x_MsoNormal">One of my librarians, Amanda Cain has been researching concerns about student data that is collected by various tools – pasted below.  The memory of LexisNexis sharing information with ICE was partially what spurred this investigation.
</p>
<p class="x_MsoNormal"> </p>
<p class="x_MsoNormal">I especially want to note concerns about Canvas since Instructure has been
<span style="color:#003891"><a href="https://www.prnewswire.com/news-releases/kkr-and-dragoneer-complete-acquisition-of-instructure-302304632.html" target="_blank"><span style="color:#003891">acquired by investment funds managed by KKR</span></a></span><span style="color:black">,
 a global investment firm. “KKR is a global private equity firm known for its serial
</span><u><span style="color:#467886"><a href="https://www.justice.gov/archives/opa/pr/justice-department-sues-kkr-serial-violations-federal-premerger-review-law" target="_blank"><span style="color:#467886">anti-trust violations</span></a></span></u><span style="color:black">
 and long history of asset-stripping company buyouts, most recently of </span><u><span style="color:#467886"><a href="https://www.warren.senate.gov/newsroom/press-releases/warren-wyden-sanders-murray-blast-private-equity-giant-kkr-for-grossly-substandard-care-and-unsafe-living-conditions-in-group-homes-for-people-with-intellectual-and-developmental-disabilities" target="_blank"><span style="color:#467886">group
 homes for people with developmental disabilities</span></a></span></u><span style="color:black">. They primarily invest in oil and gas projects and have a
</span><u><span style="color:#467886"><a href="https://peclimaterisks.org/kkr-greenwashing/" target="_blank"><span style="color:#467886">pattern</span></a></span></u><span style="color:black"> of repeated environmental violations, failure to obtain community
 consent, and a lack of accountable business practices in low-income communities. They also invest in private prisons.”</span></p>
<p class="x_MsoNormal"> </p>
<p class="x_MsoNormal">If there’s interest, maybe we can add this to a future LLC meeting for discussion.
</p>
<p class="x_MsoNormal"><span style="font-size:11.0pt"> </span></p>
<p class="x_MsoNormal"><span style="">Thanks,</span><span style="font-size:11.0pt"></span></p>
<p class="x_MsoNormal"><span style="">Erica</span></p>
<p class="x_MsoNormal"><span style=""> </span></p>
<p class="x_MsoNormal"><span style="">-------------------------------------------------------------</span></p>
<p class="x_MsoNormal"><span style="">Erica Coe (<i>she, her, hers</i>)</span></p>
<p class="x_MsoNormal"><span style="">Dean of Libraries, Tutoring, and College Success</span></p>
<p class="x_MsoNormal"><span style="">Olympic College </span></p>
<p class="x_MsoNormal"><span style="font-size:11.0pt"> </span></p>
<p class="x_MsoNormal">---------------------------------------------------------</p>
<div>
<p class="x_MsoNormal"><span style="color:black"> </span></p>
</div>
<div>
<p class="x_MsoNormal"><b><span style="color:black">Privacy and Technology Resources
</span></b></p>
<p class="x_MsoNormal">Amanda Cain, OC library faculty</p>
</div>
<div style="margin-bottom:8.0pt">
<p class="x_MsoNormal"><span style="color:black"> </span></p>
</div>
<div style="margin-bottom:8.0pt; white-space:pre-wrap">
<p class="x_MsoNormal"><b><span style="color:black">Facts </span></b><span style="color:black"></span></p>
</div>
<div style="margin-bottom:8.0pt; white-space:pre-wrap">
<p class="x_MsoNormal"><span style="color:black">FERPA is over 50 years old. It does not reflect the
</span><u><span style="color:#467886"><a href="https://www.the74million.org/article/50-years-after-ferpas-passage-ed-privacy-law-needs-an-update-for-the-ai-era/" target="_blank"><span style="color:#467886">current types of information contained in student records</span></a></span></u><span style="color:black">;
 it does not address third parties; and it does not acknowledge the extent to which ed tech vendors are integrated into students’ daily lives. According to some of the following reports and articles, collection and sale of students’ data happens on a large
 scale. Notably, Instructure (Canvas) was recently acquired by KKR, a private equity firm long investigated for its asset-stripping company buyouts. </span></p>
</div>
<div style="margin-bottom:8.0pt; white-space:pre-wrap">
<p class="x_MsoNormal"><b><span style="color:black">K12 </span></b><span style="color:black"></span></p>
</div>
<div style="margin-bottom:8.0pt; white-space:pre-wrap">
<p class="x_MsoNormal"><span style="color:black">Data is collected on tens of millions of students before they get to college, and results in risk-scoring algorithms being attached to them. Data is disproportionately collected on, and ads are targeted disproportionately
 to African American and Native American students in school settings. </span></p>
</div>
<div style="margin-bottom:8.0pt; white-space:pre-wrap">
<p class="x_MsoNormal"><u><span style="color:#467886"><a href="https://themarkup.org/machine-learning/2022/01/11/this-private-equity-firm-is-amassing-companies-that-collect-data-on-americas-children" target="_blank"><span style="color:#467886">This Private
 Equity Firm Is Amassing Companies That Collect Data on America’s Children, January 11, 2022</span></a></span></u><span style="color:black"> </span></p>
</div>
<div style="margin-bottom:8.0pt; white-space:pre-wrap">
<p class="x_MsoNormal"><span style="color:black">“We found that the companies, collectively, gather... data about students’ citizenship status, religious affiliation, school disciplinary records, medical diagnoses, what speed they read and type at, the full
 text of answers they give on tests, the pictures they draw for assignments, whether they live in a two-parent household, whether they’ve used drugs, been the victim of a crime, or expressed interest in LGBTQ+ groups, among hundreds of other data points.” </span></p>
</div>
<div style="margin-bottom:8.0pt; white-space:pre-wrap">
<p class="x_MsoNormal"><u><span style="color:#467886"><a href="https://internetsafetylabs.org/wp-content/uploads/2022/12/2022-k12-edtech-safety-benchmark-national-findings-part-1.pdf" target="_blank"><span style="color:#467886">K12 Edtech Safety Benchmark:
 National Findings – Part 1,</span></a></span></u><u><span style="color:black"> 2022</span></u><span style="color:black"> </span></p>
</div>
<div style="margin-bottom:8.0pt; white-space:pre-wrap">
<p class="x_MsoNormal"><span style="color:black">Most--96%--of edtech apps used by K12 students “are unsafe for students.” “Apps and technology that expose personal information about children and their families to technology providers, third-party marketers,
 advertisers and often the internet at large are not adequately safe for children...Data is forever... mental health information gleaned from a child’s innocent use of a mental health tracker can become a problem in later years as a teen or an adult.” </span></p>
</div>
<div style="margin-bottom:8.0pt; white-space:pre-wrap">
<p class="x_MsoNormal"><u><span style="color:#467886"><a href="https://www.globenewswire.com/news-release/2024/02/06/2824551/0/en/Significant-K-12-EdTech-Safety-Disparities-Discovered-Among-Marginalized-Demographics-in-New-Internet-Safety-Labs-Report.html" target="_blank"><span style="color:#467886">Significant
 K-12 EdTech Safety Disparities Discovered Among Marginalized Demographics in New Internet Safety Labs Report</span></a></span></u><span style="color:black">, February 2024 </span></p>
</div>
<div style="margin-bottom:8.0pt; white-space:pre-wrap">
<p class="x_MsoNormal"><span style="color:black">“Schools in the lowest income segment ($20K-$39K) and schools with majority race American Indian/Native Alaskan (National Center for Education Statistics categories) have the lowest technology vetting of all
 demographics and have the highest average percentage of apps with ads or behavioral ads.” </span></p>
</div>
<div style="margin-bottom:8.0pt; white-space:pre-wrap">
<p class="x_MsoNormal"><b><span style="color:black">Higher Ed </span></b><span style="color:black"></span></p>
</div>
<div style="margin-bottom:8.0pt; white-space:pre-wrap">
<p class="x_MsoNormal"><u><span style="color:#467886"><a href="https://privacyrights.org/resources/paying-twice-learn-how-higher-education-students-may-be-forced-sacrifice-privacy-digital" target="_blank"><span style="color:#467886">Paying Twice to Learn: How
 Higher Education Students May Be Forced to Sacrifice Privacy for Digital Learning Tools,</span></a></span></u><span style="color:black"> November 2024 </span></p>
</div>
<p class="x_MsoNormal"><span style="color:black">Report Key Takeaways:  </span></p>
<p class="x_MsoNormal" style="margin-left:.5in; text-indent:0in"><span style="font-size:10.0pt; font-family:Symbol; color:black"><span style="mso-list:Ignore">·<span style="font:7.0pt "Times New Roman"">                    
</span></span></span><span style="color:black">Limited Protections: Higher education students are often required to use and pay for access to digital instructional materials, yet they have extremely limited access to data privacy rights and protections. Federal
 law has not kept pace with technology, and relevant state laws focus on K-12 students or rely on consent–an element notably absent in this context.  </span></p>
<p class="x_MsoNormal" style="margin-left:.5in; text-indent:0in"><span style="font-size:10.0pt; font-family:Symbol; color:black"><span style="mso-list:Ignore">·<span style="font:7.0pt "Times New Roman"">                    
</span></span></span><span style="color:black">Lack of Transparency: The data privacy practices surrounding digital instructional materials in higher education are largely opaque. Neither students nor instructors have a clear understanding of how personal data
 is collected, used, stored, or shared. Companies rarely provide clear information in public policies, and institutions are not required to make vetting processes readily available for review. Inconsistent  </span></p>
<p class="x_MsoNormal" style="margin-left:.5in; text-indent:0in"><span style="font-size:10.0pt; font-family:Symbol; color:black"><span style="mso-list:Ignore">·<span style="font:7.0pt "Times New Roman"">                    
</span></span></span><span style="color:black">Policies and Practices: There appears to be no data protection standard or accepted best practices in place across educational institutions or companies providing digital instructional materials. Even the existence
 of contracts between institutions and providers varies. Data practices and privacy protections seem to be largely left to the ed-tech companies’ discretion.  </span></p>
<p class="x_MsoNormal" style="margin-left:.5in; text-indent:0in"><span style="font-size:10.0pt; font-family:Symbol; color:black"><span style="mso-list:Ignore">·<span style="font:7.0pt "Times New Roman"">                    
</span></span></span><span style="color:black">Significant Room for Improvement: Higher education institutions and ed-tech companies have substantial opportunities to better protect students’ data. This could involve adopting state or federal legal requirements,
 implementing institution- or system-wide contracting and review practices, and obtaining clear commitments from companies to protect student data. <br>
 </span></p>
<div style="margin-bottom:8.0pt; white-space:pre-wrap">
<p class="x_MsoNormal"><u><span style="color:#467886"><a href="https://www.lawfaremedia.org/article/the-vulnerability-and-protection-of-student-data" target="_blank"><span style="color:#467886">The Vulnerability and Protection of Student Data</span></a></span></u><span style="color:black">,
 December 2023 </span></p>
</div>
<div style="margin-bottom:8.0pt; white-space:pre-wrap">
<p class="x_MsoNormal"><span style="color:black">“Data brokers...pose significant risks to American students. Despite assertions that they are not acting as consumer reporting agencies (which are companies that calculate credit scores), data brokers report
 student data for student loans (without the consent of the students in question), which can be purchased and used in the future (also without students’ consent) for credit reports and employment background checks. Data collected by these companies is often
 inaccurate, which could inflict financial harm in a number of ways, including lawsuits regarding credit discrimination and the potential for restricted employment opportunities.” </span></p>
</div>
<div style="margin-bottom:8.0pt; white-space:pre-wrap">
<p class="x_MsoNormal"><u><span style="color:#467886"><a href="https://dl.acm.org/doi/full/10.1145/3613904.3642116" target="_blank"><span style="color:#467886">Deepfakes, Phrenology, Surveillance, and More! A Taxonomy of AI Privacy Risks</span></a></span></u><span style="color:black">,
 May 2024  </span></p>
</div>
<div style="margin-bottom:8.0pt; white-space:pre-wrap">
<p class="x_MsoNormal"><span style="color:black">“In approximately 93% of the cases we analyzed, the unique capabilities and data requirements of the AI technologies involved in the incident either created a new type of privacy risk, or exacerbated a known
 risk.” </span></p>
</div>
<div style="margin-bottom:8.0pt; white-space:pre-wrap">
<p class="x_MsoNormal"><u><span style="color:#467886"><a href="https://conpro23.ieee-security.org/papers/schmidt-conpro23.pdf" target="_blank"><span style="color:#467886">“Wow, I hope not?!”: Instructor Use of LMS Data and Knowledge of LMS Privacy Practices</span></a></span></u><span style="color:black">,
 IEEE, 2023  </span></p>
</div>
<div style="margin-bottom:8.0pt; white-space:pre-wrap">
<p class="x_MsoNormal"><span style="color:black">“Anonymized data... allow for easy de-anonymization and the loss of personal data and privacy...Additionally, this risk should be weighed when considering that some of the data available in the dataset include
 potential information about students’ disability accommodations. Such data, anonymized or not, create the potential for technology-enabled discrimination, based on students’ disability status.” </span></p>
</div>
<div style="margin-bottom:8.0pt; white-space:pre-wrap">
<p class="x_MsoNormal"><u><span style="color:#467886"><a href="https://conpro23.ieee-security.org/papers/schmidt-conpro23.pdf" target="_blank"><span style="color:#467886">Behind the Platforms: Safeguarding intellectual property rights and academic freedom in
 Higher Education, April 2024</span></a></span></u><span style="color:black">  </span></p>
</div>
<div style="margin-bottom:8.0pt; white-space:pre-wrap">
<p class="x_MsoNormal"><span style="color:black">“Issues of academic IP and academic freedom in digital education are fragmented, with no sector-wide standards or rules, and minimal guidance for institutions on these matters when engaging in licensing or procurement
 of digital education services, or staff when engaging in sector discussions/negotiations.” </span></p>
</div>
<div style="margin-bottom:8.0pt; white-space:pre-wrap">
<p class="x_MsoNormal"><u><span style="color:#467886"><a href="https://papers.ssrn.com/sol3/papers.cfm?abstract_id=4733203" target="_blank"><span style="color:#467886">Sins of omission: Critical informatics perspectives on privacy in e-learning systems in higher
 education,</span></a></span></u><span style="color:black"> 2021. </span></p>
</div>
<div style="margin-bottom:8.0pt; white-space:pre-wrap">
<p class="x_MsoNormal"><span style="color:black">“Language in contracts between the university and the vendors around FERPA compliance suggested that the university misses opportunities to inform students and instructors of the ways their data can and will
 be used by vendors, neglects gathering meaningful consent from students and instructors, and allows vendors the legal loopholes to collect and store student data with impunity.”  </span></p>
</div>
<div style="margin-bottom:8.0pt; white-space:pre-wrap">
<p class="x_MsoNormal"><u><span style="color:#467886"><a href="https://www.forbes.com/sites/rayravaglia/2024/11/19/instructure-is-ready-to-lead-the-next-evolution-in-learning/" target="_blank"><span style="color:#467886">Instructure Is Ready To Lead The Next
 Evolution In Learning,</span></a></span></u><span style="color:black"> Forbes, November 2024 </span></p>
</div>
<div style="margin-bottom:8.0pt; white-space:pre-wrap">
<p class="x_MsoNormal"><span style="color:black">This press release arguably confirms warnings in the above reports. KKR is a global private equity firm known for its serial
</span><u><span style="color:#467886"><a href="https://www.justice.gov/archives/opa/pr/justice-department-sues-kkr-serial-violations-federal-premerger-review-law" target="_blank"><span style="color:#467886">anti-trust violations</span></a></span></u><span style="color:black">
 and long history of asset-stripping company buyouts, most recently of </span><u><span style="color:#467886"><a href="https://www.warren.senate.gov/newsroom/press-releases/warren-wyden-sanders-murray-blast-private-equity-giant-kkr-for-grossly-substandard-care-and-unsafe-living-conditions-in-group-homes-for-people-with-intellectual-and-developmental-disabilities" target="_blank"><span style="color:#467886">group
 homes for people with developmental disabilities</span></a></span></u><span style="color:black">. They primarily invest in oil and gas projects and have a
</span><u><span style="color:#467886"><a href="https://peclimaterisks.org/kkr-greenwashing/" target="_blank"><span style="color:#467886">pattern</span></a></span></u><span style="color:black"> of repeated environmental violations, failure to obtain community
 consent, and a lack of accountable business practices in low-income communities. They also invest in private prisons. </span></p>
</div>
<div style="margin-bottom:8.0pt; white-space:pre-wrap">
<p class="x_MsoNormal"><i><span style="color:black">“Instructure Holdings, Inc., a leader in learning management systems (LMS), has entered an exciting new chapter with its </span></i><i><span style="color:#003891"><a href="https://www.prnewswire.com/news-releases/kkr-and-dragoneer-complete-acquisition-of-instructure-302304632.html" target="_blank"><span style="color:#003891">acquisition
 by investment funds managed by KKR</span></a></span></i><i><span style="color:black">, a global investment firm, and Dragoneer, a growth-oriented investor. The deal, valued at $4.8 billion, marks a turning point in Instructure’s journey to transform education
 on a global scale. “Having KKR’s support will help us double down on core markets, scale our global reach at a faster pace, and unlock new opportunities.” ... This means analyzing the entire transcript of activities within the LMS, providing a dynamic, data-driven
 view of student progress rather than just seeing signposts of where students have been and what they have taken away. Things become more potent by moving away from a particular student’s traversal of a specific course to looking at large aggregations of students
 traversing similar courses. This is why Instructure’s acquisition of Parchment, a company specializing in</span></i><span style="color:black">
<i>credential and transcript management, is so significant. By combining Parchment’s expertise with Canvas data, Instructure can connect learning outcomes to skills, degrees, and career readiness. As this data grows in scale, AI can identify patterns and insights
 that would be impossible to discern otherwise—capturing hard skills, soft skills, teamwork capabilities, and more... Beyond improved insights into the relationships of knowledge, skills, and outcomes, the integration of Canvas with Parchment should lead to
 a better version of the transcript itself, one that captures more than just the aggregated results of assignments but the full transcript of the rich performance data a student generates during a course. This would shine light not only on the knowledge acquired
 and skills measured on course assignments but also on the knowledge and skills demonstrated during the assignments themselves and the evolution of the knowledge and skills across the duration of the course and throughout the student’s entire career.”
</i> </span></p>
</div>
<div style="margin-bottom:8.0pt; white-space:pre-wrap">
<p class="x_MsoNormal"><b><span style="color:black">How do I...? </span></b><span style="color:black"></span></p>
</div>
<div style="margin-bottom:8.0pt; white-space:pre-wrap">
<p class="x_MsoNormal"><u><span style="color:#467886"><a href="https://community.canvaslms.com/t5/Privacy-Articles/Instructure-s-Third-Party-Processing-Guide/ta-p/606339" target="_blank"><span style="color:#467886">Instructure's Third-Party Processing Guide</span></a></span></u><span style="color:black">
  </span></p>
</div>
<div style="margin-bottom:8.0pt; white-space:pre-wrap">
<p class="x_MsoNormal"><span style="color:black">Lists over 30 pages of third-party vendors. </span></p>
</div>
<div style="margin-bottom:8.0pt; white-space:pre-wrap">
<p class="x_MsoNormal"><u><span style="color:#467886"><a href="https://community.canvaslms.com/t5/Canvas-Student-ePortfolios/How-do-I-change-my-privacy-settings-in-Canvas-Student/ta-p/1369" target="_blank"><span style="color:#467886">How do I change my privacy
 settings in Canvas Student ePortfolios?</span></a></span></u><span style="color:black"> </span></p>
</div>
<div style="margin-bottom:8.0pt; white-space:pre-wrap">
<p class="x_MsoNormal"><u><span style="color:#467886"><a href="https://themarkup.org/the-breakdown/2023/08/03/how-to-quickly-get-to-the-important-truth-inside-any-privacy-policy" target="_blank"><span style="color:#467886">How to Quickly Get to the Important
 Truth Inside Any Privacy Policy,</span></a></span></u><span style="color:black"> August 3, 2023 </span></p>
</div>
<div style="margin-bottom:8.0pt; white-space:pre-wrap">
<p class="x_MsoNormal"><b><span style="color:black">Recommended Listening </span></b><span style="color:black"></span></p>
</div>
<div style="margin-bottom:8.0pt; white-space:pre-wrap">
<p class="x_MsoNormal"><u><span style="color:black">“</span></u><u><span style="color:#467886"><a href="https://doctorow.medium.com/https-pluralistic-net-2025-02-26-ursula-franklin-enshittification-eh-403038a49634" target="_blank"><span style="color:#467886">With
 Great Power Came No Responsibility,” Cory Doctorow Lecture at U Toronto, February 2025</span></a></span></u><span style="color:black"> </span></p>
</div>
<div style="margin-bottom:8.0pt; white-space:pre-wrap">
<p class="x_MsoNormal"><span style="color:black">This colorful lecture illustrates how data-broker activity plays out in nurses’ lives. </span></p>
</div>
<div style="margin-bottom:8.0pt; white-space:pre-wrap">
<p class="x_MsoNormal"><span style="color:black">“A January 2025 report from Groundwork Collective documents how increasingly nurses in the USA are hired through gig apps — “Uber for nurses” — so nurses never know from one day to the next whether they’re going
 to work, or how much they’ll get paid. There’s something high-tech going on here with those nurses’ wages. These nursing apps — a cartel of three companies, Shiftkey, Shiftmed and Carerev — can play all kinds of games with labor pricing. Before Shiftkey offers
 a nurse a shift, it purchases that worker’s credit history from a data-broker. Specifically, it pays to find out how much credit-card debt the nurse is carrying, and whether it is overdue. The more desperate the nurse’s financial straits are, the lower the
 wage on offer.” </span></p>
</div>
<div style="margin-bottom:8.0pt; white-space:pre-wrap">
<p class="x_MsoNormal"><b><span style="color:black"> </span></b><span style="color:black"></span></p>
</div>
<div>
<p class="x_MsoNormal"><span style="color:black"> </span></p>
</div>
<div id="x_Signature">
<div id="x_divtagdefaultwrapper">
<p><span style="font-family:"Calibri",sans-serif; color:black"> </span></p>
</div>
</div>
</div>
</div>
</div>
</div>
</body>
</html>