Course Content
Digital Resources
Softwares and Programs where the main tools and software platforms used in VET are described, including Learning Management Systems (LMS) like Moodle, WordPress plugins such as Tutor LMS or LearnPress, and online meeting platforms like Zoom, Google Meet, and Jitsi. We will explore the key features, use cases, and considerations for choosing between free and paid options. Open Source and Open Access where we analyze the differences between open source software/platforms and open access, highlighting how these options support the sharing of knowledge and accessibility in education differently. The reasons why an institution might prefer one over the other, considering flexibility, cost, and customization, will be discussed. We will define the concept of Creative Commons, explaining how its licenses can be used to share educational resources legally and flexibly, promoting open access and the use of teaching materials.
0/4
Technical compatibilities
Hardware and equipment necessary to effectively access and manage VET platforms, from both the user's and administrator's perspective. This includes computer configurations, audio/video devices, and other essential equipment. We will look further into Software and Programs that enhance the online learning experience, such as collaboration tools, video editing software, and solutions for tests and assessments online.
0/3
Cybersecurity and Data Protection
Privacy and Data Protection in this section we discuss the safeguarding of sensitive information, focusing on legal requirements, ethical handling, and preventive measures against data breaches, by exploring methods to effectively manage and protect personal and institutional data. Cyber Security highlights the importance protecting educational systems from digital threats. It provides an overview of the strategies and technologies necessary to secure networks and devices used in VET environments. We examine common cyber threats and offer practical solutions for preventing unauthorized access and ensuring the continuity of educational operations.
0/3
Technology and Digital Resources

In the digital age, privacy and data protection are paramount in educational settings, requiring strict adherence to international and local data protection laws. This section explores the implementation of General Data Protection Regulation (GDPR) for EU residents, and similar standards globally such as the California Consumer Privacy Act (CCPA) in the U.S.
In educational settings, handling sensitive information – ranging from personal details like names and addresses to financial data such as payment information – poses unique challenges and risks. These can stem from technological vulnerabilities, human error, and inadequate policies, leading to potential data breaches, misuse, or loss.

Types of Data at Risk

  • Personal Data: Includes names, addresses, educational details, and any information that can be used to identify an individual.
  • Financial Data: Consists of bank account details, credit card numbers, transaction history, and other information related to financial transactions.
  • Health Information: In some educational settings, health data of students or staff might be collected, requiring even stricter controls due to its sensitive nature.

Common Vulnerabilities

  • Phishing Attacks: Fraudulent attempts to obtain sensitive data by disguising as a trustworthy entity in an electronic communication. Phishing is often the first step used by cybercriminals to infiltrate systems.
  • Weak Passwords: Simple or reused passwords can be easily cracked by attackers, giving them access to personal and financial data.
  • Outdated Software: Unpatched or outdated systems and applications can have security flaws that hackers exploit to gain unauthorized access.
  • Insider Threats: Misuse of data by employees or staff who have legitimate access but use information inappropriately, either accidentally or maliciously.

Risks and Implications

  • Data Theft: Unauthorized access and theft of personal or financial data can lead to financial fraud or identity theft.
  • Data Loss: Loss of data due to malware attacks, system failures, or accidental deletion can disrupt educational processes and lead to significant downtime.
  • Reputational Damage: Data breaches can damage an institution’s reputation, resulting in decreased trust among students, parents, and staff.
  • Legal and Financial Penalties: Non-compliance with data protection regulations like GDPR and CCPA can result in hefty fines and legal repercussions.

Mitigation Strategies

  • Education and Training: Regular training sessions for staff and students on recognizing phishing emails, secure password practices, and safe internet usage.
  • Data Encryption: Encrypting data both in transit and at rest provides a critical security layer that makes data unreadable without the correct decryption key.
  • Regular Updates and Patch Management: Keeping software and systems up to date to protect against known vulnerabilities.
  • Access Controls: Implementing strict access controls and authentication measures to ensure that only authorized individuals have access to sensitive data.
  • Incident Response Planning: Developing and regularly updating an incident response plan to quickly address and mitigate the effects of a data breach.

Summary

Educational institutions must prioritize privacy and data protection, implementing robust security practices to protect against data theft, loss, and misuse while ensuring compliance with applicable laws. These measures not only safeguard sensitive information but also build a foundation of trust and reliability between the institutions and their stakeholders.

General Data Protection Regulation (GDPR) – Summary

Purpose: To protect the personal data and privacy of EU citizens for transactions that occur within EU member states.

Key Requirements:

  • Consent: Clear consent must be obtained before processing personal data.
  • Right to Access: Individuals have the right to request access to their personal data and information about how this data is processed.
  • Right to Be Forgotten: Individuals can demand the deletion of their personal data.
  • Data Portability: Individuals have the right to obtain and reuse their personal data across different services.
  • Breach Notification: In the event of a data breach, data processors are required to notify their data controllers and customers within 72 hours.

Impact: Affects any entity that stores or processes personal information about EU citizens within EU states, regardless of the company’s location.

California Consumer Privacy Act (CCPA) – Summary

Purpose: To enhance privacy rights and consumer protection for residents of California, USA.

Key Requirements:

  • Disclosure: Businesses must disclose data collection and sharing practices to consumers.
  • Opt-Out: Consumers can opt out of their data being sold to third parties.
  • Access: Consumers have the right to access their personal data, know how it’s being used, and request the deletion of their data.
  • Anti-Discrimination: Businesses cannot discriminate against consumers who exercise their CCPA rights.

Impact: Affects all businesses that serve California residents and meet certain thresholds, such as annual gross revenues over $25 million or those that deal with the personal information of 50,000 or more California residents.

Scroll to Top