When no parent opted out or called about a Florida school district scanning students' irises, why didn't that raise a red flag with anyone in the Polk Country school system? If you sent a letter to parents stating that you were planning to scan the irises of their children, of students who are also minors, and not one single parent called for more information about the “Eye Swipe Nano” program, and not one single parent chose to opt their child out, wouldn’t that strike you as exceedingly strange?That scenario is too strange for me to accept as I would definitely be one of the parents calling with a bunch of geeky questions, like how long will the data be stored? How is the iris scan data secured? What third parties have access to the data about minors? But school officials found nothing suspicious about no parents calling or opting out of iris scans at three different public Polk County, Florida, schools – Bethune Academy (K-5), Daniel Jenkins Academy (grades 6-12), and Davenport School of the Arts (K-5, middle, and high school). The fact that no parent contacted the school should have raised a red flashing alert to at least one person in the Polk County school system.The reason no parent complained, opted out, or asked for more information was because parents did not receive the letter until after the scans had happened. As a pilot security program to be tested on about 17 school buses, Polk County schools allowed Stanley Convergent Security Solutions to scan students’ irises. Parents were alerted in a letter sent “on Friday, May 24, although the letters were dated for delivery the day before. The letters stated that the scanning program would begin on May 20, and allow for students to opt out. However, all students were scanned before any letters were sent home.”The Eyelock iris identity management system would scan the child’s iris as he or she got on or off the school bus, and then text the parents with that information. The video says this system is not vulnerable to iris spoofing. Rob Davis, senior director of support services for Polk County Schools, said, “There’s not a day that goes by that we don’t have a parent that is frantic about, ‘hey my child was supposed to be home by three o’clock, and I just got off work. It’s five o’clock and they’re nowhere to be found’.” After parents found out their children had been scanned without them being notified, it hit the fan. Davis said all iris data collected has since been destroyed. But one parent on Facebook brought up some good points. If parents received the letter on Friday after the school officials had gone home, and it was a long weekend with Monday being Memorial Day holiday, “when exactly did this program get suspended?” The program wasn’t the problem. “It’s the invasion of my family’s Constitutional right to privacy that is the problem, as well as the school allowing a private company access to my child without my consent or permission. This is stolen information, and we cannot retrieve it.”Another parent told The Ledger, “These people sent out an opt-out form to watch the presidential address, but they can’t notify the parents of children when they are acquiring extremely personal information about minors? Companies that house this type of information are notorious for selling the data to other companies or even turning it over to the government. This is all a bit ‘Big Brother’ and parents should be quite disturbed.” An apology letter has since been sent out to parents. Davis told Fox 5, “I’ll take full responsibility for it.” Yet, according to Michelle Malkin, Davis blamed a secretary who had a “medical emergency” for the “mistake” of the notification letters not being sent out to parents on May 17.Davis believes tracking the students’ movements via their iris is a great idea. He said, “Within seconds, we could tell parents, ‘Yes, they got on bus No. 0750. They got on the bus at the high school at 2:05; they arrived at their bus stop at 2:45.” Davis added that the only information “connected to a student’s iris number would be their name, identification number, bus number and eventually, parents’ contact information.”In fact, Davis hopes the school district goes ahead with the pilot program at the start of next year. Next time, the parents will receive the letter and have time to opt out. “This was never supposed to be forced on anyone,” he explained. “It was an option for parents.”Next time, however, the school district will surely not be so silly as to think not one single parent will object.Like this? Here’s more posts:Journalist threatened, warned not to write about face-recognition at Statue of LibertyGoogle to Microsoft on Windows Phone 8 YouTube app blocking ads: Cease and desistSkype accounts easily hijacked via Skype Support, warns hackerMicrosoft: What are people really asking for when they ask for a Start button?U.S. government is ‘biggest buyer’ of zero-day vulnerabilities, report claimsReporters threatened with CFAA, labeled hackers for finding security holeGoogle gives user data to FBI, rejects face recognition for GlassFormer FBI agent: All phone calls recorded, no digital communication secureWill Chinese hackers launch re-tread attacks into surveillance databases?Comedian Rob Schneider stars as Google Docs in Microsoft Office 365 videosPrivacy and penny-pinching points of view about Xbox OneGoogle’s patent for email snooping? Microsoft offers your boss email spying powers nowFight for your privacy or lose it, says Eric SchmidtFollow me on Twitter @PrivacyFanatic Related content news Dow Jones watchlist of high-risk businesses, people found on unsecured database A Dow Jones watchlist of 2.4 million at-risk businesses, politicians, and individuals was left unprotected on public cloud server. By Ms. Smith Feb 28, 2019 4 mins Data Breach Hacking Security news Ransomware attacks hit Florida ISP, Australian cardiology group Ransomware attacks might be on the decline, but that doesn't mean we don't have new victims. A Florida ISP and an Australian cardiology group were hit recently. By Ms. Smith Feb 27, 2019 4 mins Ransomware Security news Bare-metal cloud servers vulnerable to Cloudborne flaw Researchers warn that firmware backdoors planted on bare-metal cloud servers could later be exploited to brick a different customer’s server, to steal their data, or for ransomware attacks. By Ms. Smith Feb 26, 2019 3 mins Cloud Computing Security news Meet the man-in-the-room attack: Hackers can invisibly eavesdrop on Bigscreen VR users Flaws in Bigscreen could allow 'invisible Peeping Tom' hackers to eavesdrop on Bigscreen VR users, to discreetly deliver malware payloads, to completely control victims' computers and even to start a worm infection spreading through VR By Ms. Smith Feb 21, 2019 4 mins Hacking Vulnerabilities Security Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe