Audience Landing Page

This section houses all guidance documents, training materials, policy letters and other resources dedicated to protecting student privacy.  To narrow the list of documents below, use the drop down menus to select the type of resource, the topic and/or the audience and click the ‘apply’ button.  An updated list of resources will then be displayed below.

Guidance and Best Practices

PTAC Teacher Training Focus Groups Report

The Privacy Technical Assistance Center (PTAC) conducted a series of focus groups to gain insight into teachers’ needs for training on student privacy and the Family Educational Rights and Privacy Act (FERPA). This report documents the findings of these focus groups, as well as recommendations on how to develop new student privacy and FERPA training for teachers.

Guidance and Best Practices

FERPA General Guidance for Parents (En Español)

This compliation of letters and guidance documents provides parents with general information about the Family Educational Rights and Privacy Act (FERPA). This document is a compilation and update of various letters and guidance documents previously issued that respond to a variety of questions about FERPA.  This is the spanish translation.

Guidance and Best Practices

Model Notice for Directory Information (En Espanol)

This document is a template notice for notifying parents and eligible students (students over 18 years of age or attending a school beyond the high school level) about the type of information from student’s education records, designated by a School District as “directory information,” that schools may disclose without consent, unless advised to the contrary.  This version is the Spanish translation.

Guidance and Best Practices

W 2 Phishing Scam

Important Internal Revenue Service (IRS) guidance highlighting ongoing phishing attacks against K-12 schools and school districts. These attacks are targeting HR and critical business functions within organizations to access the Personally Identifiable Information (PII) from the W-2 forms of employees and, in some cases, extracting fraudulent payments from their victims. This document contains a summary of the attacks, tactics of the attackers, potential ramifications and links to the official IRS guidance.