{"id":138,"date":"2020-05-21T19:13:56","date_gmt":"2020-05-21T19:13:56","guid":{"rendered":"https:\/\/www.jsums.edu\/cyberawareclone-demo\/?page_id=138"},"modified":"2025-09-23T16:29:12","modified_gmt":"2025-09-23T16:29:12","slug":"ferpa-faqs","status":"publish","type":"page","link":"https:\/\/www.jsums.edu\/jsu-cyber-security\/ferpa-faqs\/","title":{"rendered":"FERPA FAQS"},"content":{"rendered":"<p><strong><span style=\"color: #000080;\">When Does FERPA Rights Begin\/End for a Student? <\/span><\/strong><\/p>\n<p>A student is in attendance as defined by JSU. At JSU this means the student officially completed registration, is enrolled and is attending courses.<\/p>\n<ul>\n<li>Students continue to have FERPA rights even after they have left or graduated from .JSU<\/li>\n<li>Student FERPA Rights are only terminated upon death of the student.<\/li>\n<\/ul>\n<p><span style=\"color: #000080;\"><strong>What if I applied to JSU to become a student but was not admitted?<\/strong><\/span><br \/>\n<b>FERPA Rights Do Not cover <\/b>students who were not admitted to JSU or never attended JSU.<\/p>\n<p><span style=\"color: #000080;\"><strong>Who Has Access to My Education Records?<\/strong><\/span><\/p>\n<ul>\n<li><span style=\"color: #000080;\">Students<\/span> may access their information<\/li>\n<li><span style=\"color: #000080;\">Parents<\/span> who claim the student as a dependent on taxes (must provide proof to registrars office)<\/li>\n<li><span style=\"color: #000080;\">Any party that the students authorizes<\/span> by providing JSU with a\u00a0 written consent form (must include: date, which data\/records to release, recipient\u2019s name &amp; student signature)<\/li>\n<li><span style=\"color: #000080;\">Designated employee of JSU<\/span> may access student data if it is needed to conduct their job duties &amp; who have a \u201clegitimate educational interest\u201d<\/li>\n<\/ul>\n<p><span style=\"color: #000080;\"><strong>What Type of\u00a0 Student Data Does JSU Collect that Must be Protected?<\/strong><\/span><\/p>\n<ul>\n<li>Registration Forms (paper &amp; electronic)<\/li>\n<li>Transcripts<\/li>\n<li>Grades<\/li>\n<li>Schedules<\/li>\n<li>Class Rosters<\/li>\n<li>Documents with student SSN<\/li>\n<li>Any student PII data displayed electronically<\/li>\n<\/ul>\n<p><span style=\"color: #000080;\"><strong>How is this data Shared\/Released?<\/strong><\/span><\/p>\n<p><span style=\"color: #000080;\">Students-<\/span> release ,on paper(mail), online behind a secure web portal (ex. JSU PAWS) by phone, or email listed in JSU student directory, in person(photo of Student ID)<\/p>\n<p><span style=\"color: #000080;\">Colleagues-<\/span> by phone or email only after you have verified who you are talking to and that it is\u00a0 \u201ca legitimate interest\u201d<\/p>\n<p><span style=\"color: #000080;\">3rd party-<\/span> release only upon student request and with a documented written consent (Never release FERPA protected Data at the request of a 3rd party)<\/p>\n","protected":false},"excerpt":{"rendered":"<p>When Does FERPA Rights Begin\/End for a Student? A student is in attendance as defined by JSU. At JSU this means the student officially completed registration, is enrolled and is attending courses. Students continue to have FERPA rights even after they have left or graduated from .JSU Student FERPA Rights are only terminated upon death [&hellip;]<\/p>\n","protected":false},"author":131,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0},"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/www.jsums.edu\/jsu-cyber-security\/wp-json\/wp\/v2\/pages\/138"}],"collection":[{"href":"https:\/\/www.jsums.edu\/jsu-cyber-security\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.jsums.edu\/jsu-cyber-security\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.jsums.edu\/jsu-cyber-security\/wp-json\/wp\/v2\/users\/131"}],"replies":[{"embeddable":true,"href":"https:\/\/www.jsums.edu\/jsu-cyber-security\/wp-json\/wp\/v2\/comments?post=138"}],"version-history":[{"count":6,"href":"https:\/\/www.jsums.edu\/jsu-cyber-security\/wp-json\/wp\/v2\/pages\/138\/revisions"}],"predecessor-version":[{"id":1459,"href":"https:\/\/www.jsums.edu\/jsu-cyber-security\/wp-json\/wp\/v2\/pages\/138\/revisions\/1459"}],"wp:attachment":[{"href":"https:\/\/www.jsums.edu\/jsu-cyber-security\/wp-json\/wp\/v2\/media?parent=138"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}