Governance and compliance

The teacher explains digital safety and accessibility practices to a child seated at a desk, while a secure storage locker containing tablets and assistive devices stands nearby.When schools introduce assistive technology (AT), they also assume important responsibilities for safety, security, and data protection. Assistive technologies often process personal information, connect to digital services, and involve valuable equipment that must be protected from misuse, theft, or harm.

Schools must therefore consider:

  • Protection of learner data
  • Cybersecurity and digital safety
  • Physical protection of devices
  • Safe online learning environments
  • Responsible use of digital technologies

These responsibilities are especially important because learners with disabilities may face increased risks related to privacy violations, exclusion, online harm, or exploitation. Here’s an overview of key principles related to assistive technology safety and security, but local legislation, institutional policies, and official guidance should always be consulted for specific implementation requirements.

The African Union – Malabo Convention

Many African countries have introduced data protection laws in recent years, but implementation remains challenging due to broad security exemptions, limited resources, and weakly independent data protection authorities.

Stronger enforcement, adoption of the African Union Malabo Convention, and better collaboration between governments, civil society, and privacy professionals are essential to ensure that digital transformation improves both security and citizens’ rights. The Malabo Convention shares several principles with the European Union’s General Data Protection Regulation (GDPR).

The convention encourages member states to:

  • Protect personal data
  • Strengthen cybersecurity
  • Prevent cybercrime
  • Promote trust in digital services

For schools and educational institutions, the practical message is clear: learner data is sensitive and must be handled carefully, responsibly, and securely.

Sensitive personal data

Assistive technologies may process highly sensitive personal information such as:

  • Medical information
  • Disability-related assessments
  • Hearing or vision test results
  • Biometric information
  • Eye-tracking data
  • Learning profiles and support plans

The classical and still valid principle of information security is the CIA triad: ensuring the confidentiality, integrity, and availability of information. Sensitive personal data requires stronger protection than ordinary educational information, which means that schools should ensure that:

  • Data collection is limited to what is necessary
  • Access is restricted to authorized individuals
  • Data is stored securely
  • Information is not shared unnecessarily

Data residency and storage

Schools should always understand where learner data is physically stored.

For example, important questions for suppliers include:

  • Where are the servers located?
  • Is the data stored inside the country or region?
  • Who has access to the data?
  • What security protections are used?

Some governments and institutions may require that learner data remain within national or approved regional systems. Unclear answers from suppliers may indicate potential risks.

Purpose, limitation, and responsible data use

Learner data should only be used for the purpose it was originally collected, which means:

  • Supporting learning
  • Providing accessibility features
  • Enabling participation

Assistive technology providers should not use learner data for:

  • Advertising
  • Commercial profiling
  • Unrelated product development
  • Unauthorized data sharing

Clear agreements about data use should be included in procurement contracts and institutional policies.

The right to be forgotten

Schools should also consider whether learner data can be permanently deleted when it is no longer needed, for example:

  • When a learner graduates
  • When the learner leaves the institution
  • When the technology is no longer used

Suppliers should provide clear procedures for deleting records and removing personal information from their systems.

Cyber security in educational settings

Cyber security issues can cause major disruption to teaching, research, finances, and reputation. However, effective protection requires strong incident response, continuous training, and a clear cyber security culture across the whole institution.

Many schools may have limited technical infrastructure or IT support, so it is also important to select technologies that are secure by design.

Schools should prefer technologies that:

  • Encrypt data automatically
  • Receive regular updates
  • Provide secure default settings
  • Require minimal technical configuration

Complex systems that rely heavily on manual security management may create additional risks in low-resource environments. The effective approach combines leadership, technical measures, and awareness to reduce risks and protect staff and students.

Physical security of devices

Assistive technologies such as tablets, laptops, Braille devices, and communication tools can be expensive and vulnerable to theft or damage, which means a requirement for physical protection such as:

  • Asset tagging or engraving
  • Lockable storage cabinets
  • Signed usage logs
  • Secure charging stations
  • Remote lock or remote wipe capabilities

Schools should also plan for:

  • Safe transportation
  • Device tracking
  • Repair and replacement procedures

Learner safety and online protection

Safety is not only about protecting devices and data. It is also about protecting learners while using digital technologies. Children and young people with disabilities may face increased risks related to:

  • Online bullying
  • Harassment
  • Exploitation
  • Grooming
  • Unsafe online content

Schools should create safe and supportive digital learning environments.

Safe digital learning environments

For younger learners and vulnerable users, schools may prefer systems that provide controlled and moderated access to digital content, such as:

  • Restricted educational platforms
  • Safe search settings
  • Content filtering
  • Limited access to external applications

Schools should also ensure that:

  • Learners know how to report problems
  • Teachers can recognize signs of online distress
  • Families understand basic digital safety practices

Building awareness and digital citizenship skills is an important part of inclusive and safe technology use.

Balancing accessibility and security

Security measures should never create unnecessary accessibility barriers.

Here are a few examples:

  • Security tools should remain accessible to screen readers
  • Authentication systems should consider diverse user needs
  • Safety procedures should support independent participation

Inclusive security means designing systems that are both safe and accessible.

Checklist and practices

Data protection:

  • Treat learner information as sensitive personal data
  • Limit data collection to the necessary information
  • Store learner data securely
  • Ensure data can be deleted when no longer needed
  • Include clear data protection requirements in contracts

Procurement and suppliers:

  • Ask suppliers where data is stored
  • Verify security and privacy practices
  • Prefer technologies with built-in encryption and automatic updates
  • Avoid unnecessary data collection and tracking
  • Require clear after-sales and security support

Cybersecurity:

  • Use secure-by-design technologies
  • Keep systems updated regularly
  • Use strong passwords and access controls
  • Minimize complicated manual security settings
  • Train staff on basic cybersecurity practices

Physical security:

  • Use asset tags or engravings
  • Store devices securely
  • Maintain usage and inventory logs
  • Plan for theft, damage, and repairs
  • Use remote lock or wipe features when available

Learner safety:

  • Use safe search and content filters
  • Support moderated and age-appropriate learning environments
  • Teach digital safety and responsible online behavior
  • Encourage reporting of online problems
  • Recognize signs of cyberbullying or online distress

Remember:

  • Accessibility, privacy, and security must work together
  • Learner safety includes both digital and physical environments
  • Data should only be used for educational and accessibility purposes
  • Inclusive technologies should also support inclusive security practices
  • Strong planning and awareness reduce long-term risks

Links and references