How Public School Websites Capture Student Data and Ways to Stop It

A large part of protecting data is minimizing who has access to it. You might already know that when we visit websites it contains tracking software, which uses scripts to embed computer code onto your browser. In turn, it’s like your digital shadow, following you around the internet. The same applies to public school websites, where students’ data is up for sale.

Why Do They Collect Student Data?

The New York Times reports of a study conducted by Douglas Levin, an expert on educational technology. During his study, he discovered that some public school websites had as many as 22 trackers on them. In fact, when he reviewed websites from a wide range of 159 public schools, he found all but one of them contained tracking tools.

First, it’s important to understand the tracking tools. Some are designed to optimize the school’s website by logging page visits, broken page links, and more. This data is invaluable as it can help whoever designed that website to fix the problems to make it more user-friendly.

Unfortunately, this is only one part of the equation. Another aspect is behavioral targeting; this is where a website embeds cookies on your browser to follow you around. It collects this data then sells it to a third-party. A common example of this is shopping on Amazon for a specific product, then seeing that item advertised on another website later. It’s kind of creepy but that’s only the tip of the iceberg.

See when websites collect student data, they sell them to third-parties who can do what they want with it. They can repackage it and sell it to someone else. In a study done by Fordham University’s Center on Law and Information Policy, it found that student lists are available to purchase on the basis of a variety of factors including religion, lifestyle, and more. That’s super creepy.

Meanwhile, the New York Times reports third-parties could embed the website with trackers the school doesn’t know about. Therefore, what started as a simple tool expands into a funnel whereby many people could have access to student data easily. And this exposure does nothing to protect your security.

How Do I Stop It?

The goal is to create layers that make it harder for websites to track you. Anti-spyware software is a great avenue to go since it prevents malicious advertising from embedding code into your browser.  Malwarebytes have some excellent products to help you in this regard.

Along with shielding yourself and your children from advertisers, it can also protect your data. Keep in mind it isn’t uncommon for malicious advertising to contain malware. This is where you receive a pop-up ad or email prompting you to click a link, and if you comply, your device’s files could be at stake.

If this ever happens to you, rest assured we can help. Our team at SalvageData knows how to extract your files even from a corrupted device. Moreover, you’ll find our services to be fast, secure, and affordable. Contact us today to learn more!

Share
Bogdan Glushko

CEO at SalvageData Recovery, Bogdan Glushko has over 18 years of experience in high-security data recovery. Over the years, he's been able to help restore data after logical errors, physical failures, or even ransomware attacks, for individuals, businesses, and government agencies alike.

Share
Published by
Bogdan Glushko

Recent Posts

How To Use iPad Recovery Mode

Recovery mode is a crucial feature for troubleshooting and restoring an iPad when it encounters…

1 week ago

How to Prevent Overwriting Files: Best Practices

Whether you’re a professional juggling important work documents or an individual cherishing irreplaceable memories, safeguarding…

2 weeks ago

External Hard Drive Not Showing Up On Windows – Solved

It's not uncommon to encounter issues where an external drive is not showing up on…

3 weeks ago

How to Fix a Corrupted iPhone Backup

When restoring your iPhone from a backup, you may discover it is corrupted or incomplete.…

1 month ago

Backup and Remote Wiping Procedures

Backup and remote wiping procedures are two critical components of data security and management for…

1 month ago

Common VMware Issues and Troubleshooting Solutions

VMware is a leading virtualization and cloud computing software provider. Its core technology allows multiple…

1 month ago