<?xml version="1.0" encoding="UTF-8" ?><!-- generator=Zoho Sites --><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><atom:link href="https://www.comet4children.com/blogs/tag/security/feed" rel="self" type="application/rss+xml"/><title>comet4children - Blog #SECURITY</title><description>comet4children - Blog #SECURITY</description><link>https://www.comet4children.com/blogs/tag/security</link><lastBuildDate>Wed, 01 Oct 2025 01:55:24 -0700</lastBuildDate><generator>http://zoho.com/sites/</generator><item><title><![CDATA[Sharing Information To Serve Children]]></title><link>https://www.comet4children.com/blogs/post/Sharing-Information-To-Serve-Children</link><description><![CDATA[<img align="left" hspace="5" src="https://www.comet4children.com/Evolution of COMET.jpg"/>In Community Data Sharing Initiatives - Community Collaboratives - participants share information regarding the children they serve. It is essential to have a clear definition of how the sharing is managed and authorized and which information is shared.]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_9oF-QuMwSJG8Wq8b4XKO8w" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_f3H2kw19TbqgxhmcZY49ew" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_IwmLNUUcRaGgy3XyHhM2tg" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"></style><div data-element-id="elm_cmGKOleEQomkTBxwz_AgJQ" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_cmGKOleEQomkTBxwz_AgJQ"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-align-center " data-editor="true">Community Data Sharing Overview</h2></div>
<div data-element-id="elm_5XIUgvLfSuqwChtjUzbUTA" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_5XIUgvLfSuqwChtjUzbUTA"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-center " data-editor="true"><p style="text-align:left;">The main purpose of community data sharing is to create a community-wide information system that supports interactions with many service providers to deliver a comprehensive, longitudinal perspective on each child, leveraging data and technology to provide better, faster, and continuously improved services. In Community Data Sharing Initiatives - Community Collaboratives - participants share information regarding the children they serve. It is essential to have a clear definition of how the sharing is managed and authorized and which information is shared.&nbsp;</p><p style="text-align:left;"><br></p><p style="text-align:left;">The Backbone Organization (Longitudinal Community Database) of the collaborative is the lead partner organization that is responsible for community agreements on data governance and data sharing, an agreed-upon approach to parent consent, collaborative goals, and the associated data set to be shared. This organization is responsible for Data Management Services: the “scoping” of data access for data sharing partners and users, defining the approach to mapping children between organizations, consent administration, and an approach to managing data quality. [e.g. duplicates]<br></p><ul><li style="text-align:left;">Legal Data Sharing - Community Agreement</li><li style="text-align:left;">Organization &amp; User Scoping&nbsp;</li><li style="text-align:left;">Child-Organization Mapping</li><li style="text-align:left;">Consent Administration</li><li style="text-align:left;">Data Quality</li></ul><p style="text-align:left;"><br></p><p style="text-align:left;">Data Users are partner organizations that are interested in accessing the Data Contributors’ child-related information either in aggregated, de-identified or identifiable format. The leverage the COMET Community Reporter. Commonly, Data Users are also Data Contributors, but not necessarily (e.g.: funding organizations like United Way, County, or City services).<br></p><ul><li style="text-align:left;">Aggregated &amp; De-Identified Community Reports &amp; Exports</li><li style="text-align:left;">Geo-Coded Map Demographics</li><li style="text-align:left;">Data For Program Evaluators</li><li style="text-align:left;">Compare Your Organization To The Community</li><li style="text-align:left;">Identifiable Data Reports &amp; Exports, For Those With Proper Consent</li></ul><p style="text-align:left;"><br></p><p style="text-align:left;"><a href="https://sitebuilder-703884464.zohositescontent.com/zcms/editor/Products/comet-operations" title="COMET Operations" rel="">COMET Operations</a></p><p style="text-align:left;">Data Contributors are partner organizations that directly interact with children and record child-driven information in COMET, or in their own operational database - Pass-thru Data Contributor -- that will be integrated into the data-sharing initiative. Another approach to contributing data is to provide program participation as a Roster Data Contributor through a list of your children (ID, last, first, DOB, gender). Note that contributors &quot;own&quot; the data they contribute in an explicit or implicit agreement of confidentiality [e.g.: Family Educational Rights &amp; Privacy Act (FERPA)] with each child’s parent.</p><p style="text-align:left;"><br></p><p style="text-align:left;">Data Contributors - Collected In COMET</p><ul><li style="text-align:left;">Community Organization Running Programs &amp; Providing Support</li><li style="text-align:left;">Funder Collecting Data From Multiple Service Providers</li><li style="text-align:left;">School District SEL Program</li><li style="text-align:left;">City Sending Data (Pass-Thru)</li></ul><p style="text-align:left;"><br></p><p style="text-align:left;">Data Contributors - Collected External To COMET</p><ul><li style="text-align:left;">Student Information Systems (SIS)</li><li style="text-align:left;">Community-Based Organizations</li><li style="text-align:left;">Government &amp; Heath Systems</li></ul><p style="text-align:left;"><br></p><p style="text-align:left;"><a href="https://www.youtube.com/watch?v=Y4PnqjUD4po" title="Parent Portal" rel="">Parent Portal</a></p><p style="text-align:left;">Parent / Guardian involvement is key to a data-sharing initiative. COMET’s community data sharing solution supports parent approval of the sharing of their child’s data. Recording and leveraging parent consent is fundamental to a data-sharing initiative.&nbsp;</p><ul><li style="text-align:left;">Parents Understand &amp; Control Their Child's Data &amp; Can See Their Child's Information, Including Assessment Results</li><li style="text-align:left;">They Can Provide Input On Their Child &amp; Communicate With Those Who Work With Them</li></ul><p style="text-align:left;"><br></p><p style="text-align:left;">Community Reporting&nbsp;</p><p style="text-align:left;">COMET’s community data sharing solution is powered by our sophisticated reporting application - <a href="https://www.youtube.com/watch?v=JRX_SlABB8Y" title="COMET Community Reporter" rel="">COMET Community Reporter</a>, supporting aggregated and de-identified community reports and exports, geo-coded map demographic visualization, data for program evaluators, community comparison reports, and identifiable data reports and exports.&nbsp;</p><ul><li style="text-align:left;">Aggregated reports: Typically, such reports may pull data from multiple Data Contributors and consolidate / aggregate accordingly. These reports are authorized through the data-sharing agreement between the service provider partners.&nbsp;</li><li style="text-align:left;">De-identified child-level reports or data extraction: Typically, these reports are used for research purposes. Records are de-identified meaning that they do not contain any data element that could identify a child (e.g.: name, ID, etc). These reports are authorized through data-sharing agreements between the service providers.&nbsp;</li><li style="text-align:left;">Identifiable child-level records: It is possible to report on identifiable child data, but this data sharing requires valid parent consent and clear authorization from the Data Contributor.</li></ul><p style="text-align:left;"><br></p><p style="text-align:left;">Only data sharing can enable outcome measurement across organizations. So, if an after-school program and a school want to measure if their collective work has a positive impact on school attendance and academic outcomes, and to determine which programs are effective and to fund, data sharing is essential.</p><p style="text-align:left;"><br></p><p style="text-align:left;">Ideally, every community's child-serving organizations will share data and collaborate to improve common goals; realizing the vision of a comprehensive, longitudinal community database supported through the efforts of Partner Organizations that work together in a Community Data Sharing Initiative in which its children are thriving.</p><p style="text-align:left;"><br></p><p style="text-align:left;"><em>Ready to join a collaborative?&nbsp;</em><a target="_blank" href="https://www.quiz-maker.com/Q6SWXFX"><em>Take our readiness quiz.</em></a></p></div>
</div></div></div></div></div></div> ]]></content:encoded><pubDate>Thu, 18 Feb 2021 20:26:43 +0000</pubDate></item><item><title><![CDATA[Privacy Concerns with Data Sharing for Child Success]]></title><link>https://www.comet4children.com/blogs/post/Privacy-Concerns-with-Data-Sharing-for-Child-Success</link><description><![CDATA[<img align="left" hspace="5" src="https://www.comet4children.com/share.jpg"/>Original Posting 18.09.17 Stating concern for privacy, schools sometimes will not get involved in data sharing with community organizations or initiati ]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_70NzDttOSfaRt672jHQ4OA" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_sooW_2iCTui1dWP9_l-khA" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_VaumLkDbTHq_UV8GsVxCcw" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"></style><div data-element-id="elm_zBrvIaa5RpmzkquXlrBnKQ" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_zBrvIaa5RpmzkquXlrBnKQ"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-center " data-editor="true"><p style="text-align:left;"><span style="font-size:14px;"><span style="color:inherit;text-align:center;">Original Posting 18.09.17</span></span></p><p style="text-align:left;"><span style="font-size:14px;"><br></span></p><p style="text-align:left;"><span style="font-size:14px;">Stating concern for privacy, schools sometimes will not get involved in data sharing with community organizations or initiatives. Although permissible under federal law, the schools struggle with this change – whether from having an insular culture, resistance to change or a fear of increasing liability. The U.S. Department of Education is now providing guidance for how districts can work within the United States’ student-data-privacy law - the Family Educational Rights and Privacy Act (FERPA). They recommend that schools understand that integrated data system implementation is a multistep process. Each of the steps should be justified using the appropriate exception written into FERPA.</span></p><p style="text-align:left;"><span style="font-size:14px;"><br></span></p><p style="text-align:left;font-size:14px;"><em><span>A few helpful concepts:</span></em></p><p style="text-align:left;font-size:14px;"><span style="color:inherit;"></span></p><ul><li style="text-align:left;"><span style="font-size:14px;"><span style="font-weight:700;">&quot;School Official&quot; Exception:&nbsp;</span>A provision that allows a district to share educational records with third parties as part of outsourcing a service that it lacks the capacity to perform itself, such as sharing identifiable records with an integrated data warehouse that links with other administrative data.</span></li><li style="text-align:left;"><span style="font-size:14px;"><span style="font-weight:700;">&quot;Studies&quot; or &quot;Audits and Evaluation&quot; Exceptions:&nbsp;</span>A provision where schools give permission for analysis of de-identified records from the data warehouse by approved researchers. Note that research projects must have an instructional benefit for the schools involved.</span></li><li style="text-align:left;"><span style="font-size:14px;"><span style="font-weight:700;">Data Sharing Agreements:&nbsp;</span>The process must include written agreements that detail all the terms of the relationships. School districts are responsible for protecting the education records they disclose.</span></li><li style="text-align:left;"><span style="font-size:14px;"><span style="font-weight:700;">Parent Consent:&nbsp;</span>&nbsp;Records that have “identifiable” data that allows a child to receive appropriate interventions can’t be shared without parental consent. So if servicing the child to improve outcomes requires sharing of specific child records, a signed parent consent process must be implemented before this data is shared. Under FERPA, if the department is the legal guardian of the child, such as those in foster care or other court-ordered placements, then the department has the right to access their educational records.</span></li><li style="text-align:left;"><span style="font-size:14px;"><span style="font-weight:700;">Security Protocols:&nbsp;</span>Access to the data warehouse should be limited and school districts should generally have no access into individual records with the child’s data in this warehouse. They will receive information that has been aggregated where no child can be identified.&nbsp; This aggregated information is also often shared with other participating organizations and agencies, often with a “Community Report Card” approach as part of a continuous improvement effort.</span></li></ul><p style="text-align:left;"><span style="font-size:14px;"><br></span></p><p style="text-align:left;"><span style="font-size:14px;">Here is a nice checklist from the&nbsp;<a href="https://www2.ed.gov/programs/promiseneighborhoods/datasharingtool.pdf" target="_blank">U.S. Department of Education’s “Data-Sharing Tool Kit for Communities: How to Leverage Community Relationships While Protecting Student Privacy”</a>&nbsp;- a resource full of good tips for school districts.</span></p><p style="text-align:left;"><span style="font-size:14px;"><br></span></p><p style="text-align:left;"><span style="font-weight:700;font-size:14px;">Getting Started: A Quick Checklist for the School</span></p><p style="text-align:left;"><span style="font-weight:700;font-size:14px;"><span style="color:inherit;"></span></span></p><ul><li style="text-align:left;"><span style="font-size:14px;">Establish criteria in the annual notification of FERPA rights about who is a “school official” and what constitutes “legitimate educational interests.”</span></li><li style="text-align:left;"><span style="font-size:14px;">Determine if the disclosure is to a school official who has a legitimate educational interest in the education records.</span></li><li style="text-align:left;"><span style="font-size:14px;">Use reasonable methods to ensure that school officials obtain access to only those education records in which they have a legitimate educational interest.</span></li><li><div style="text-align:left;"><span style="font-size:14px;">If outsourcing school services or functions to a third party, make sure your third party does the following:</span></div><span style="font-size:14px;"><ul><li style="text-align:left;">Performs a service or function for which the school would otherwise use employees</li><li style="text-align:left;">Is under the direct control of the school regarding the use and maintenance of education records</li><li style="text-align:left;">Complies with the PII from education records use and re-disclosure requirements</li></ul></span></li></ul><p style="text-align:left;"><span style="font-weight:700;font-size:14px;"><br></span></p><p style="text-align:left;"><span style="font-size:14px;">COMET is pleased to support a number of communities in their data sharing efforts.&nbsp; Check out our&nbsp;</span><a href="http://comet4children.com/CaseStudies/community-data-sharing" style="font-size:14px;">Community Data Sharing</a><span style="font-size:14px;">&nbsp;resource for more information. If you’re struggling to connect with your local school district,&nbsp;</span><a href="http://comet4children.com/ContactUs" style="font-size:14px;">contact us</a><span style="font-size:14px;">. We have lots of experience working through these data sharing agreements.</span></p></div>
</div></div></div></div></div></div> ]]></content:encoded><pubDate>Tue, 28 Jan 2020 14:37:37 +0000</pubDate></item><item><title><![CDATA[Let's Consider Login Authentication]]></title><link>https://www.comet4children.com/blogs/post/Consider-Login-Authentication</link><description><![CDATA[<img align="left" hspace="5" src="https://www.comet4children.com/superhero-comet.png"/>Original Posting 18.10.17 Have you heard about two-factor authentication (2FA)? Do you know if it already is a part of your life? If you do, what do yo ]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_HoQW6DNcRv-tRuspOPEIYA" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_s5mDv4YZQtSkm3usaRLYsQ" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_tG_taJb6SxmGSRhsswNYjw" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"> [data-element-id="elm_tG_taJb6SxmGSRhsswNYjw"].zpelem-col{ border-radius:1px; } </style><div data-element-id="elm_So9IbQa8Qp-HQrqFGOg_qA" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_So9IbQa8Qp-HQrqFGOg_qA"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-center " data-editor="true"><p style="text-align:left;"><span style="font-size:14px;"><span style="color:inherit;text-align:center;">Original Posting 18.10.17</span></span></p><p style="text-align:left;"><span style="font-size:14px;"><br></span></p><p style="text-align:left;"><span style="font-size:14px;">Have you heard about two-factor authentication (2FA)? Do you know if it already is a part of your life? If you do, what do you think about it? Are you happy about it or do you find it annoying? (And the answers you give might be affected by whether you have been a victim of identity theft.)</span></p><p style="text-align:left;"><span style="font-size:14px;"><br></span></p><p style="text-align:left;"><span style="font-size:14px;"><span style="font-weight:700;">What is 2FA?</span>&nbsp;Personal credentials to access an account can include a personal identification number (PIN), a password, a pattern, an item (security fob, ATM card, smartphone), a biometric (voice print, finger ID, retinal scan). A typical example of single-factor authentication is entering a username and a password. Two-factor authentication adds a second level of authentication to accessing an account. An example of 2FA is requiring a ZIP code when you use your credit card at the gas station.</span></p><p style="text-align:left;"><span style="font-size:14px;"><br></span></p><p style="text-align:left;"><span style="font-size:14px;"><span style="font-weight:700;">So – there is an extra step … that makes me so happy …</span>&nbsp;The organization in charge of account access implements and controls the security of the access. So some companies, suppliers or vendors mandate it, some make it as a configurable option, and others do not have it. And whenever there is an extra step to a process, there will be division as to the value of the step for the account owners. Some willingly do the extra step to protect their account. Others will be annoyed and resent it. (And sometimes they will not be able to login to their own account because they don’t have, or can’t remember the credentials.)</span></p><p style="text-align:left;"><span style="font-size:14px;"><br></span></p><p style="text-align:left;"><span style="font-size:14px;"><span style="font-weight:700;">Will 2FA really keep my account secure?</span>&nbsp;2FA is not a guarantee that accounts will not be accessed by those who should not be accessing them. Hackers, especially with criminal intent, are a clever and committed group. But 2FA is one extra layer of protection beyond a simple login. It does make hacking harder.</span></p><p style="text-align:left;"><span style="font-size:14px;"><br></span></p><p style="text-align:left;"><span style="font-size:14px;"><span style="font-weight:700;">What is the way hackers get through 2FA?</span>&nbsp;Every updated approach to account security faces challenges as hackers work to attack the new methods. It’s regrettable, but it is reality. One way that hackers get into accounts is by exploiting the process of account recovery - where a password reset occurs and 2FA is disabled. Another way is getting the credential item (such as the credit card); another is accessing the digital code used in authenticating credentials. Biometric credentials are more secure, but we all have seen the movies that get “creative” about stealing fingerprints. So with these risks, where possible, it is advisable to use 2FA for login access and a separate 2FA for account recovery.</span></p><p style="text-align:left;"><span style="font-size:14px;"><br></span></p><p><span style="color:inherit;font-size:14px;"></span></p><p style="text-align:left;"><span style="font-size:14px;"><span style="font-weight:700;">2FA is valuable when it provides increased security along with simple usability</span>&nbsp;It is likely that as more organizations implement 2FA for account security, it will be implemented in a “less annoying” way and will be expected by the account owners in order to access account information (just as single-factor authentication is today). And those using 2FA now find that they are used to it - and it is not very difficult to integrate into their approach to account access. (Such as those of us that get a verification code text on our phone when we login to a new device.) And assuredly, as more adoption of 2FA occurs, it will be continuously improved. &quot;Cyber-security is like a game of chess.. Always trying to predict your opponent's next move.&quot; ~ Jason Brundage, Director of COMET Systems Infrastructure&nbsp;<i>COMET security is a critical component of our services – providing continuous system access while protecting customer data. The most stringent technologies, protocols and practices are used in our product development. We are interested in your thoughts on adding two-factor authentication (2FA) to COMET.&nbsp;<a href="https://survey.zohopublic.com/zs/AdB59G" target="_blank">Click here</a>&nbsp;to respond to a quick survey.</i></span></p></div>
</div></div></div></div></div></div> ]]></content:encoded><pubDate>Tue, 28 Jan 2020 14:37:06 +0000</pubDate></item></channel></rss>