Education

Internet security continues to be an issue

HS journalism: What we know and how much we care are part of the problem

REUTERS
REUTERS

IOWA CITY — From Facebook leaking user data to the Russia investigation, technology scandals have catapulted into the spotlight, raising questions about data security and privacy.

As accessibility to technology becomes increasingly available, the problem only becomes more personal.

One of the most common ways user data is exploited is through targeted advertising, where companies track web activity and create ads promoting specific products or services tailored to that person’s interests. This has incited controversy, as the boundaries regarding the legality of privacy invasion are uncertain.

“While I don’t think that laws and courts have been completely clear on (targeted advertising), that type of data use is not illegal and is in fact Google’s, Facebook’s and the Des Moines Register’s primary business model,” said Iowa City Community School District Director of Technology Adam Kurth. “Whether this type of data collection is problematic or nefarious is in the eye of the beholder; some people feel that their privacy has been violated, while others don’t give it a second thought.”

However, data collection is no longer limited to only targeted advertising. For example, smart-home devices such as the Amazon Alexa and Google Home now are able to listen in on conversations without the user’s knowledge.

“I was recently at a friend’s house who has an Alexa,” said Dale Felton, Senior Information Security Analyst at ACT. “We were talking about a particular Amazon product at night while having dinner. The next day, those products were on his Facebook feed and he got an email saying they found something he might be interested in.

“I heard someone say it best when they said, ‘Why would we pay a lot of money for devices that are constantly listening?’”

ARTICLE CONTINUES BELOW ADVERTISEMENT

Another method of data collection that has grown more controversial in terms of privacy is camera spying, where someone can watch what’s going on through a camera in anyone’s device without the user’s knowledge.

West graduate Molly Erickson, a student in the Chromebook IT Department, has seen this firsthand. She has noticed every Chromebook she has repaired has a piece of tape over the camera.

“Literally everyone does it because people are paranoid about it, and it’s justified,” she said. “I like being secure, and I like feeling safe.”

While the concern over data security has grown, so has the necessity to find a balance between user convenience and privacy.

Erickson believes that among her peers, the issue has become too normalized for any attention to come to it.

“I feel like if you’re using technology, it’s kind of expected that something’s going to happen,” Erickson said. “Not everything can be so secure, so (people) might as well be OK with that. I don’t think anyone cares enough because so many (companies_ do it that you can’t end it.”

Felton agrees the “out of sight, out of mind” ideology has been ingrained not only among everyday citizens, but businesses as well. Having previously worked in the banking IT industry, Felton also has noticed banks would buy cheaper, less secure, devices rather than more secure and expensive devices.

“You see people all the time in airports and coffee shops accessing their bank accounts or other very private data,” he said. “Generally in a public area, the user is not protected and with a few simple programs, someone could be on their device capturing data. It’s definitely more convenient to turn a blind eye to this instead of using a firewall at home or properly setting complex passwords.”

ARTICLE CONTINUES BELOW ADVERTISEMENT

Thank you for signing up for our e-newsletter!

You should start receiving the e-newsletters within a couple days.

Students in the ICCSD District have data being collected through school-monitored services, such as Canvas and Securly. Securly is the content-filtering service on Chromebooks that monitors all student web activity and gives the school district and parents the availability to control students’ web activity. However, this data is not currently used by the district.

“Student email addresses and website visits are collected as part of the primary function of the system ... but ICCSD does not use this data proactively,” Kurth said. “We will pull internet access data at the request of the school administrators, but this does not occur on a regular basis.

“It is worth noting that all companies with whom we share student data are required to be in compliance with FERPA and COPPA laws that protect students’ educational records and online safety. Furthermore, the companies cannot use student data for advertising purposes and cannot sell student data for any purpose.”

Student data also is held within the ACT headquarters located in Iowa City. While this data is heavily protected, Felton noted hacking attempts are frequent.

“There is a very small group of ACT employees that have access to that data,” he said. “In order to get this access, (employees need) to have approval from very upper management.

“We see hacking attempts every single day. We have policies and controls in place to make sure the ‘bad actors’ stay out. Between audits, penetration tests conducted by an outside company, well trained staff and some of the latest tech, we make sure data is only available to those who need it. As long as I’ve been with ACT, I have not heard of a single student data breach.”

Nevertheless, as technology continues to advance, many have made comparisons to George Orwell’s “1984.”

“It’s a really scary prediction when you read (“1984”) and the more you think about it, it’s less of a prediction and more of our reality because everywhere you look there are security cameras, screens and companies can target you ads,” Erickson said. “The government also has watch lists and can track your information online and all that’s there.”

ARTICLE CONTINUES BELOW ADVERTISEMENT

Many have questioned whether the issue stems from the technology user or other parties and who should be responsible for resolving the problem. Both topics of discussion have been under constant deliberation.

“I think it’s a little of both because ... when was the last time someone actually read the terms and conditions? Then also the fact that there isn’t really any government regulation over this issue, and they haven’t done too much about it,” Erickson said. “I really think that people should be more aware of what’s happening with their data and unless we take precautions and be more educated about it, things are going to get worse.”

Many also believe the government needs to assume more responsibility in the regulation and evaluation of data and security.

“I believe that eventually, the Bill of Rights does need to be reevaluated,” Felton said. “The First Amendment was written Dec. 15, 1791. That was about 226 years go. Based on how much tech has changed and how fast it’s growing, how can a bill written 226 years ago still be one-hundred percent relevant?”

Kurth agrees, believing both sides need to be committed to change.

“It’s the role of the lawmakers, the courts and members of the public to establish firm rules with regard to vulnerabilities to ensure the maintenance of a free, democratic society,” Kurth said.

Give us feedback

We value your trust and work hard to provide fair, accurate coverage. If you have found an error or omission in our reporting, tell us here.

Or if you have a story idea we should look into? Tell us here.

Give us feedback

We value your trust and work hard to provide fair, accurate coverage. If you have found an error or omission in our reporting, tell us here.

Or if you have a story idea we should look into? Tell us here.