Campus Links

Cybersecurity and Data Privacy

Data Privacy PolicyGoose Creek CISD has taken action to ensure that all student data is handled securely and in compliance with all state and federal legislation. Through rigorous processes and high standards of compliance, our goal is to not only abide to state and federal law, but to provide students, parents, and our community with the resources and information needed to protect student privacy. This is accomplished by a process of continual improvement of security practices. The district employees the principle of least privilege and role based security to ensure that data is only accessed by those that have a legitimate educational purpose. A multi-layered defense is also employed to ensure that your data remains protected. As the technology landscape is constantly changing, these processes are reviewed at least annually to make sure they are still relevant and provide strong protection. In an effort to achieve these goals, the Goose Creek CISD Technology Department seeks to implement the following programs:

 

  • Trusted Learning Environment Seal Program - The CoSN Trusted Learning Environment (TLE) Seal program is the nation’s only data privacy framework for school systems, focused on building a culture of trust and transparency. The TLE Seal was developed by CoSN in collaboration with a diverse group of 28 school system leaders nationwide and with support from AASA, The School Superintendents Association, the Association of School Business Officials International (ASBO) and ASCD. School systems that meet the program requirements will earn the TLE Seal, signifying their commitment to student data privacy to their community. TLE Seal recipients also commit to continuous examination and demonstrable future advancement of their privacy practices.

    CoSN has awarded the Trusted Learning Environment (TLE) Seal to Goose Creek Consolidated Independent School District (GCCISD) in 2022 and 2024. The TLE Seal is a prestigious national distinction that school districts earn for demonstrating a commitment to protecting student data through modern, rigorous policies and practices.

    TLE Seal thru August 2026


  • Texas Cybersecurity Framework - The Texas Cybersecurity Framework is a self-assessment to determine cybersecurity risks. While local governments and K-12 organizations are not required to submit a Cybersecurity Plan to the State, using the framework helps to align security goals and practices with other government entities and institutions of Higher Education across the State of Texas.

 

The district uses data to support a variety of processes throughout the district including supporting student learning, evaluating teachers, improving instructional and operational practices, and complying with various state and federal requirements. For more information on who uses student data, see this infographic.


GCCISD uses many applications to encourage learning through innovation. See this page for more information on approved/denied applications and the process for requesting a free or paid app.

 

Website Privacy Policy: Goose Creek Consolidated Independent School District (Goose Creek CISD or GCCISD) is committed to respecting and protecting your privacy as a visitor to our websites. This includes the Here, We Grow Giants site. We will only collect, store and use your personal information for defined purposes. Goose Creek CISD values accountability and transparency at all levels including ensuring that student data privacy and security are a top priority. For more information on what data is collected as well as records management, see the Data Governance tab.

Student Data Collection and Security Fact Sheet

Employee Data Privacy Handbook

Data Governance Guidelines

Software FAQ

* Handbooks, procedures and guidelines are reviewed at least annually to provide updates that align with changes in laws/regulations and the constantly changing technology landscape. 

 

Sharing Data with Vendors/Third-Parties

Goose Creek CISD takes the privacy of both student and staff data very seriously. Before procuring services or contracting with a third-party, a security risk assessment is performed. Much like a credit score is used in the lending process, a security risk score can reveal risks that a company would present and the likelihood they would suffer a data breach or other security incident. Goose Creek continuously monitors these third-parties in order to manage any risk that may occur and take appropriate proactive measures to keep district data secure. Secondly, if data will be shared with a vendor/third-party, a signed Data Privacy Agreement MUST be in place before a contract is signed. The current Data Privacy Agreement in use is the TX_NDPA_v1r6.

 

Records Management Board Policies

CPC (LEGAL) - OFFICE MANAGEMENT: RECORDS MANAGEMENT

CPC (LOCAL) - OFFICE MANAGEMENT: RECORDS MANAGEMENT

FL (LEGAL) - STUDENT RECORDS

FL (LOCAL) - STUDENT RECORDS

*Board Policy is reviewed regularly to ensure that they align with all current laws and regulations.

GCCISD Resources

 

For Teachers

Make sure you identify which students have restrictions on what their personal information and pictures can and cannot be used for by running the following report.

Scam Of The Week: A Phishing Net for Your Paycheck
10/22/2025

In this week’s scam, you receive an email that appears to be from your organization’s human resources (HR) department. The email seems to be related to your compensation and benefits, and contains a link for you to click so that you can log in to your HR portal to find out more information. If you click the link, you’ll be taken to a login page.


However, the email you received is actually a phishing scam, and the login page is a fake page created by cybercriminals to trick you into entering your user information. If you enter your user credentials, scammers will steal this information and use it to log in to your organization’s real HR portal. Once the cybercriminals have gained access to your profile, they change your direct deposit information so that your paychecks will be sent directly to their bank accounts!


Follow these tips to avoid falling victim to this phishing scam:


  • Be cautious of any unexpected or urgent emails, even if they appear to be from HR. Scammers use fear and a sense of urgency to trick you into acting without thinking.
  • Never click links in an email to log into your work accounts. Instead, open a new window and log in to the official website.
  • Always follow your organization's procedures for reporting suspected phishing emails. Quick action helps protect your colleagues and your organization from cyberattacks.

Security Tips - Keeping Your Passwords Squeaky Clean
10/15/2025

Did you know that the average person uses the same three to seven passwords to log in to over 170 online accounts? In addition to being reused, these passwords are often weak and can be easily guessed by cybercriminals. If cybercriminals guess these passwords, they could access the majority of their victim’s online accounts. Even worse, the victim may not know that their password has been compromised for several months or years. To keep your passwords squeaky clean and safe from cybercriminals, follow the tips below:


Create Strong Passwords

Creating strong passwords helps prevent cybercriminals from gaining access to your online accounts. Your passwords should be as long, complex, and random as possible. While many websites only require passwords to be eight characters long, we recommend making your password at least 12 characters long. You should also include a combination of lowercase and uppercase letters, numbers, and symbols in your password. To keep your accounts extra safe, you can use password phrases, or passphrases. However, when you create your password or passphrase, make sure that you don’t use any personal information that a cybercriminal could guess.


Don’t Reuse Passwords

Reusing passwords for your online accounts may be convenient, but it’s also risky. If you reuse passwords, you could be at risk of having multiple accounts compromised at once. If a cybercriminal guesses your password, they could access multiple accounts instead of just one account. Cybercriminals can also sell passwords or make them available online. Creating a unique password for each online account reduces the risk if one of your passwords is compromised.


Use a Password Manager

You’re probably wondering how you are supposed to remember long, complex passwords for all of your online accounts. The answer is a password manager. You can use password managers to securely store all of your passwords. Instead of having to remember passwords for every online account, you only have to remember one password for your password manager. In addition to storing your passwords, many password managers can also generate passwords for you based on specific criteria.


Use Multi-Factor Authentication

You can also use multi-factor authentication (MFA) to secure your online accounts, if available. MFA requires multiple forms of authentication, such as a password and a code from your smartphone or a USB smart key. By requiring you to use multiple forms of authentication, cybercriminals will have a harder time gaining access to your account, even if your password is compromised.


Nobody wants cybercriminals to guess their passwords. To keep your passwords squeaky clean and safe, remember to create strong passwords, avoid reusing passwords, and use a password manager or MFA, if possible.


Security Tips - Video Game Scams
10/08/2025

Video games are a popular pastime for people across the world. Even if you've never played video games, you’ve probably heard of games like Legend of Zelda, Minecraft, FIFA, or Call of Duty. Cybercriminals are taking advantage of the growing popularity of video games by creating scams to steal your sensitive information.


Free Downloads May Contain Malware

Cybercriminals post free downloads of popular video games to lure you in. If you download the file, it may contain malicious files in addition to the game. Most commonly, cybercriminals use malware that allows them to download additional malware on your device without you knowing. Then, they can use this malware to monitor your computer activity and steal your sensitive information, such as your bank information or login credentials.


Cybercriminals Sell Your Digital Items

Downloads aren’t the only way cybercriminals may be targeting you. Many video games allow you to use real money to buy digital credits, which are referred to as “in-game currency.” You can exchange in-game currency for special game items. Cybercriminals target players with high-value items and use techniques such as phishing emails to try to steal your login credentials. If cybercriminals obtain your login credentials, they can send your in-game items to their own accounts. Then, they can auction and sell your items to other players.


What Can I Do to Stay Safe?

Don’t fall for video game scams! Follow the tips below to stay safe:

  • Never download files from an unverified source. A file that looks legitimate and runs properly can still contain malware.
  • Always think before you click. Cyberattacks are designed to catch you off guard and trigger you to click impulsively so cybercriminals can obtain your sensitive information.
  • Enable multi-factor authentication (MFA) on your accounts when available. MFA adds a layer of security by requiring that you provide additional verification to log in to your account.

Scam Of The Week: This Isn’t Your Pal, It's a Phish
10/01/2025

In this week’s scam, cybercriminals are using a clever trick that makes their phishing emails seem more real than ever. You receive an email from a real PayPal email address. The email contains an invoice for a large purchase you did not make, and a phone number for you to call if you want to dispute the charge. Even though the email comes from a real PayPal email address, this is actually a scam.


Cybercriminals create a PayPal account and use it to send you a fake payment invoice. The email you receive is real, but the invoice is not, and if you call the phone number in the email, you will not be connected to PayPal's support team. Instead, your call will be answered by a cybercriminal who will pretend to work for PayPal support. They will try to trick you into giving them your credit card information for a "refund," or trick you into paying a fee to fix your account!

Follow these tips to avoid falling for this phishing scam:


  • If you receive an unexpected PayPal invoice, log in to your account on the official website or app to verify if it is legitimate.
  • Remember to be wary of unusual emails, even if they come from what appears to be a genuine email address. Be suspicious of any unexpected bill or urgent request for money.
  • Don’t call the phone number listed in a suspicious email. If you have any questions or concerns, always use the official customer support number on the organization's real website.

Privacy & Security Discussion Topic Ideas


Phishing Emails
- Have you noticed any phishing emails to share with others? What clues did you notice that made you aware that it was not legitimate? How should these emails be reported? Should general SPAM be reported as Phishing?

Social Engineering
- Have you received phone calls using social engineering techniques trying to get you to give information to someone that you do not know? What did you do to verify their identity before sharing information?

Current Events
- What are some recent cyber attacks or data breaches in K-12 from news sources? How we can better be prepared to prevent a similar attack at Goose Creek CISD?
- What recent cybersecurity/data privacy news have you seen and how could it impact us?
- What are upcoming/recent laws or regulations around privacy and cybersecurity that would impact Goose Creek CISD?

Applications & 3rd Party Systems
- Have you used a new app, program, or website lately? Did you make sure you knew what data is being collected/transmitted and if it is being protected? How did you verify?
- Why is it important to vet our applications for security, privacy, or content concerns?
- Thinking about using a new app? Discuss the vetting process and assign someone to submit it for review.

Data Privacy Webpage
- What data do you collect on students? Review the Data Fact Sheet.
- Review resources on Data Privacy site

Data Breach Notice
- If you became aware of a potential data breach, who would you notify?
- What is the role of the District's cybersecurity coordinator? Who is this at Goose Creek CISD?

Data Privacy Curriculum
- How are you implementing data privacy in your classrooms?
- How do you integrate the Digital Citizenship Curriculum in your classrooms?
- What discussions have you had with students, parents, teachers, or staff about privacy/security?

Disaster and Recovery
- How do we protect data when in a disaster (fire, flood, hurricane, cyber attack, school shooting, etc)?
- How would we recover from a disaster and is that documented?

Cybersecurity and Privacy Training
- Has everyone completed the required trainings on Cybersecurity and Privacy?
- What is something each person learned from the Texas Cybersecurity training.
- What is Board Policy CQB and why is it important?

Handbooks

Employee Handbook

Student Handbook (English)

Student Handbook (Spanish)

* Handbooks, procedures and guidelines are reviewed at least annually to provide updates that align with changes in laws/regulations and the constantly changing technology landscape. 

 

Board Policy

CQB - Cybersecurity

*Board Policy is reviewed regularly to ensure that they align with all current laws and regulations.

 

Laws/Regulations

FERPA - Family Education Rights and Privacy Act

PPRA - Protection of Pupil Rights Amendment

COPPA - Children's Online Privacy Protection Act

CIPA - Children's Internet Protection Act

 

GCCISD Resources

Employee Data Privacy Handbook

Third-Party Data Privacy Video

Agenda Discussion Topics

Security Access Procedure

GCCISD Digital Safety

Digital Citizenship Curriculum

 

Are you considering an application?

Before you start, review our Software FAQ.

Is the app already approved or denied?

 

You must follow the approval process to request apps for student use. Teachers may research apps they wish to use. Consider the resources below before using a third-party application (website or app). If you feel the app is a good candidate, please follow the approval process listed below or on the Ed Tech webpage.

  1. First ask yourself these questions:
    Checklist for Choosing Tools Worth Your (and Your Students') Time
    Educational App Evaluation Checklist

  2. Second make sure you understand how the data is being used. To protect student data as well as the security of other district systems, you need to understand the importance of App Vetting. Things to look at are the privacy policy, is the data encrypted, can you request deletion of data, is the data strictly used for educational purposes, is the data protected, is the app appropriate for the targeted age group, etc.
    What is App Vetting and Why is it Important?
    Vetting Apps Across the District (RED FLAGS to watch out for)

 

Vetting Process

iPad App Approval Video HOW-TO

iPad App Approval Process

iPad App Approval Workflow

 

Data Privacy

Educator's Guide to Student Data Privacy

Protecting Student Privacy While Using Online Educational Resources

Privacy Basics - Facebook

Privacy Basics - Twitter

 

Laws, Regulations and Standards

COPPA 101

FERPA 101

ISTE Standards for Modeling Digital Citizenship

 

Ransomware

Ransomware References for IT Staff

Ransomware References for Teachers and School Administrators

Press ENTER key to focus on the active panel