Remove Communication Remove Confidentiality Remove Reading
article thumbnail

From Reflection to Transformation: Embedding Antiracism into Everyday Practice

k12 Digest

School leaders can support this safety by co-creating group agreements that promote active listening, confidentiality, and respectful participation. When staff feel secure in their learning community, they are more likely to reflect honestly on their beliefs and biases. Who is left out? Are we reinforcing or disrupting inequity?

article thumbnail

From Reflection to Transformation: Embedding Antiracism into Everyday Practice

k12 Digest

School leaders can support this safety by co-creating group agreements that promote active listening, confidentiality, and respectful participation. When staff feel secure in their learning community, they are more likely to reflect honestly on their beliefs and biases. Who is left out? Are we reinforcing or disrupting inequity?

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

Summer Phishing Trip

Edtech IRL

Someone receives an email from someone they already communicated with. Exfiltrate Sensitive Data Once inside, threat actors can quietly dig through emails, create mail flow or forwarding rules, download confidential documents, and pull sensitive data stored across Microsoft 365. So what have these looked like?

article thumbnail

Vivi and Headspace Partner to Bring Mindfulness to K-12 Classrooms

eSchool News

MELBOURNE – Vivi , the leading classroom communication and collaboration platform built exclusively for education, today announced an exciting new and unique partnership with Headspace, a global leader in mindfulness and meditation, with a goal of improving social-emotional health for all students. Learn more at headspace.com/educators.

article thumbnail

5 Internet Safety Tips for Teachers

Ask a Tech Teacher

This could expose confidential student data, compromise work communications, and even jeopardize the safety of those around you. Phishing Attacks Fraudsters frequently use misleading emails, phone calls, SMSs, social media DMs, and other digital channels to deceive victims and extract confidential information.

Internet 167
article thumbnail

6 Ways Teacher-authors Protect Their Online Privacy

Ask a Tech Teacher

Its end-to-end encryption means no one sees your messages except who you choose, not even Signal, and is considered the gold standard of communication privacy. If you read spy novels, they often use Signal for their communication. Use Signal instead. It might be a code sent to your phone or an Authenticator app.

Teachers 158
article thumbnail

The Unintentional Ways Schools Might Be Violating FERPA, and How They Can Stay Vigilant

Edsurge

But if the principal reads a report about that same incident, she can’t talk about it publicly. Rooker explains that this is because what the principal read was an education record, which FERPA protects. The teacher who saw the incident in-person can speak about it because FERPA is not a confidentiality law.