Compliance guide

Student Data Protection

A practical guide to protecting student records, payment data, and safeguarding files, across NZ, UK, and AU regulators.

What "student data" actually covers

The scope is broader than most schools assume:

  • SIS records (student information systems)
  • Payment data (parent fees, school meals)
  • Safeguarding notes and welfare records
  • Photos and CCTV footage
  • Communications (parent-teacher email, WhatsApp groups, virtual classroom recordings)
  • Special educational needs assessments

Each category has different sensitivity and different breach implications.

Regulators by region

  • New Zealand: Privacy Act 2020. Notification to Privacy Commissioner and affected individuals when serious harm is likely.
  • United Kingdom: UK GDPR + Data Protection Act 2018, plus the DfE Cyber Standards. ICO notification within 72 hours.
  • Australia: Privacy Act 1988 + Notifiable Data Breaches scheme. OAIC notification within 30 days for likely-serious harm.

Educational sector also has region-specific safeguarding obligations layered on top.

How AI-native security supports compliance

Three concrete supports:

  • Audit trails: console logs are richer and more queryable than legacy AV reports.
  • Access logs: who accessed what student record, when, from where, auditable on demand.
  • Anti-exfiltration: BlackFog stops data leaving the device, which is the practical mechanism behind most breach scenarios.

Breach response playbook

1. Identify, confirm scope, what was accessed, by whom
2. Contain, isolate affected systems, revoke compromised credentials
3. Assess harm, apply the regulator's "serious harm" test
4. Notify, regulator first (within window), then affected individuals
5. Recover, restore from clean backups, change credentials, monitor for follow-up attempts

KB sits with you through all five steps. We provide the documentation regulators expect.

Frequently asked questions

Do parents need to consent to security monitoring?

Depends on regulator and the nature of monitoring. AI-native security focuses on threats not user behaviour, which sits comfortably within the legitimate-interest basis under most regimes. Transparency notices in your privacy policy cover the obligation.

What counts as a notifiable breach?

Per-region thresholds. UK: any breach posing a risk to data subjects. NZ: serious harm test. AU: likely-serious harm. KB applies the test against the specific incident and produces the regulator-ready notification draft.

How long must breach evidence be retained?

Per-region retention guidance varies. Defensible default: 7 years for breach incident records, longer if litigation is foreseeable. Audit logs from the security console are part of the retention scope.

Want a personalised AI-readiness report?

Three-minute assessment. Your AI-readiness score, gaps, and the AI-native products that close them.