Canadian privacy regulators say schools share blame for PowerSchool hack

Two Canadian provincial governments on Monday released investigative findings which laid significant blame for the massive PowerSchool data leak with the school systems whose students’ and teachers’ data was exposed.

The Ontario and Alberta information and privacy commissioners’ reports fault the school systems for several missteps, including not putting privacy and security related provisions in their contracts with the education software firm and failing to “effectively monitor and oversee” PowerSchool’s security guardrails, particularly in regard to multifactor authentication. 

The PowerSchool hacker breached the company’s data systems by exploiting a lack of multifactor authentication requirements, which are considered standard security protocol.

A Massachusetts college student broke into PowerSchool’s systems in December, obtaining data belonging to more than 62 million students and 9 million teachers. In Toronto alone, data belonging to students going back to 1985 was leaked, including special education and disciplinary records.

The investigative reports found other flaws in how schools dealt with PowerSchool, including the fact that they did not limit remote access to their student information systems by PowerSchool support personnel “for only as long as necessary to address specific technical issues,” according to a press release from the Ontario commissioner. 

Schools also did not have appropriate breach response plans ready to go, the press release said.

The regulators issued several recommendations including that schools:

  • Review and when necessary renegotiate agreements with PowerSchool to feature more robust privacy and security provisions
  • Put systems in place to more effectively oversee PowerSchool’s security program
  • Limit remote access to their student information systems 
  • Implement plans for better breach responses in the future
Get more insights with the

Recorded Future

Intelligence Cloud.

Learn more.

No previous article

No new articles

Suzanne Smalley

Suzanne Smalley

is a reporter covering privacy, disinformation and cybersecurity policy for The Record. She was previously a cybersecurity reporter at CyberScoop and Reuters. Earlier in her career Suzanne covered the Boston Police Department for the Boston Globe and two presidential campaign cycles for Newsweek. She lives in Washington with her husband and three children.

 

Total
0
Shares
Previous Post

Hackers Actively Exploiting 7-Zip Symbolic Link–Based RCE Vulnerability (CVE-2025-11001)

Next Post

TamperedChef Malware Spreads via Fake Software Installers in Ongoing Global Campaign

Related Posts

Researchers Warn RondoDox Botnet is Weaponizing Over 50 Flaws Across 30+ Vendors

Malware campaigns distributing the RondoDox botnet have expanded their targeting focus to exploit more than 50 vulnerabilities across over 30 vendors. The activity, described as akin to an "exploit shotgun" approach, has singled out a wide range of internet-exposed infrastructure, including routers, digital video recorders (DVRs), network video recorders (NVRs), CCTV systems, web servers, and
Read More

CometJacking: One Click Can Turn Perplexity’s Comet AI Browser Into a Data Thief

Cybersecurity researchers have disclosed details of a new attack called CometJacking targeting Perplexity's agentic AI browser Comet by embedding malicious prompts within a seemingly innocuous link to siphon sensitive data, including from connected services, like email and calendar. The sneaky prompt injection attack plays out in the form of a malicious link that, when clicked, triggers the
Read More