Inappropriate exposure of confidential student records

Control

Periodic automated vulnerability scans of systems, networks and devices