logo
NC bill would require community colleges to share student info with some parents

NC bill would require community colleges to share student info with some parents

Yahoo20-03-2025

The NC Community College System offices in downtown Raleigh. (Photo: Google maps)
When 17-year-old Leon Gu died by suicide in 2020, his parents were shocked to learn they had been in the dark about an academic integrity issue he was facing at Wake Tech Community College, where he was dually enrolled. Dual enrollment allows high school students to take college courses for credit.
Leon ended his life days after receiving a letter from the community college about an academic violation that jeopardized his acceptance to Duke University.
Now, Leon's parents are advocating for a new bill in the North Carolina legislature to require community colleges to provide parents of minors with automatic access to their children's educational records. These records, which include information such as grades, attendance, and disciplinary records, are currently not automatically shared with parents.
Leon's mother, Lusia Li, said she only learned about the circumstances surrounding her son's death from a police detective. 'I was devastated, wondering why we as his parents were never informed,' Li said, fighting back tears as she testified on Wednesday before the state House Committee on Higher Education.
Dubbed 'Leon's Law,' the measure is designed to ensure parents of high school students taking college courses can provide guidance and intervene before small problems escalate.
Under current policy, parents are not automatically informed of their child's academic performance or disciplinary matters. 'This lack of communication can leave minors navigating serious academic challenges alone without the support they need,' state Rep. Ya Liu (D-Wake), a primary sponsor of the bill.
The legislation would require that community colleges grant parents access to their child's records if the student is under 18 and a dependent, as defined by the Internal Revenue Code. Parents could opt out of receiving the information.
Supporters say the change is a commonsense step to protect vulnerable students as they navigate the transition to higher education. The meeting drew emotional testimony from Leon Gu's family and other community members who knew him. They described as a gifted and dedicated student involved in music, sports, and volunteering.
Lawmakers are hopeful the measure can prevent similar tragedies. 'This is a small but vital step to protect students and keep families informed,' said Rep. Liu. 'We are grateful to the Li family for turning their grief into advocacy that will impact thousands of students.'
An amended version of the bill was approved, and the measure was forwarded to the House Judiciary 3 Committee. If enacted into law, it would become effective in the 2025-2026 academic year and will affect over 600,000 dual enrollment students in the state every year.

Orange background

Try Our AI Features

Explore what Daily8 AI can do for you:

Comments

No comments yet...

Related Articles

Hackers are using a modified Salesforce app to trick employees and extort companies, Google says
Hackers are using a modified Salesforce app to trick employees and extort companies, Google says

CNN

timean hour ago

  • CNN

Hackers are using a modified Salesforce app to trick employees and extort companies, Google says

Hackers are tricking employees at companies in Europe and the Americas into installing a modified version of a Salesforce-related app, allowing the hackers to steal reams of data, gain access to other corporate cloud services and extort those companies, Google said on Wednesday. The hackers – tracked by the Google Threat Intelligence Group as UNC6040 – have 'proven particularly effective at tricking employees' into installing a modified version of Salesforce's Data Loader, a proprietary tool used to bulk import data into Salesforce environments, the researchers said. The hackers use voice calls to trick employees into visiting a purported Salesforce connected app setup page to approve the unauthorized, modified version of the app, created by the hackers to emulate Data Loader. If the employee installs the app, the hackers gain 'significant capabilities to access, query, and exfiltrate sensitive information directly from the compromised Salesforce customer environments,' the researchers said. The access also frequently gives the hackers the ability to move throughout a customer's network, enabling attacks on other cloud services and internal corporate networks. Technical infrastructure tied to the campaign shares characteristics with suspected ties to the broader and loosely organized ecosystem known as 'The Com,' known for small, disparate groups engaging in cybercriminal and sometimes violent activity, the researchers said. A Google spokesperson told Reuters that roughly 20 organizations have been affected by the UNC6040 campaign, which has been observed over the past several months. A subset of those organizations had data successfully exfiltrated, the spokesperson said. A Salesforce spokesperson told Reuters in an email that 'there's no indication the issue described stems from any vulnerability inherent in our platform.' The spokesperson said the voice calls used to trick employees 'are targeted social engineering scams designed to exploit gaps in individual users' cybersecurity awareness and best practices.' The spokesperson declined to share the specific number of affected customers, but said that Salesforce was 'aware of only a small subset of affected customers,' and said it was 'not a widespread issue.' Salesforce warned customers of voice phishing, or 'vishing,' attacks and of hackers abusing malicious, modified versions of Data Loader in a March 2025 blog post.

Hackers are using a modified Salesforce app to trick employees and extort companies, Google says
Hackers are using a modified Salesforce app to trick employees and extort companies, Google says

CNN

timean hour ago

  • CNN

Hackers are using a modified Salesforce app to trick employees and extort companies, Google says

Hackers are tricking employees at companies in Europe and the Americas into installing a modified version of a Salesforce-related app, allowing the hackers to steal reams of data, gain access to other corporate cloud services and extort those companies, Google said on Wednesday. The hackers – tracked by the Google Threat Intelligence Group as UNC6040 – have 'proven particularly effective at tricking employees' into installing a modified version of Salesforce's Data Loader, a proprietary tool used to bulk import data into Salesforce environments, the researchers said. The hackers use voice calls to trick employees into visiting a purported Salesforce connected app setup page to approve the unauthorized, modified version of the app, created by the hackers to emulate Data Loader. If the employee installs the app, the hackers gain 'significant capabilities to access, query, and exfiltrate sensitive information directly from the compromised Salesforce customer environments,' the researchers said. The access also frequently gives the hackers the ability to move throughout a customer's network, enabling attacks on other cloud services and internal corporate networks. Technical infrastructure tied to the campaign shares characteristics with suspected ties to the broader and loosely organized ecosystem known as 'The Com,' known for small, disparate groups engaging in cybercriminal and sometimes violent activity, the researchers said. A Google spokesperson told Reuters that roughly 20 organizations have been affected by the UNC6040 campaign, which has been observed over the past several months. A subset of those organizations had data successfully exfiltrated, the spokesperson said. A Salesforce spokesperson told Reuters in an email that 'there's no indication the issue described stems from any vulnerability inherent in our platform.' The spokesperson said the voice calls used to trick employees 'are targeted social engineering scams designed to exploit gaps in individual users' cybersecurity awareness and best practices.' The spokesperson declined to share the specific number of affected customers, but said that Salesforce was 'aware of only a small subset of affected customers,' and said it was 'not a widespread issue.' Salesforce warned customers of voice phishing, or 'vishing,' attacks and of hackers abusing malicious, modified versions of Data Loader in a March 2025 blog post.

Hackers are using a modified Salesforce app to trick employees and extort companies, Google says
Hackers are using a modified Salesforce app to trick employees and extort companies, Google says

CNN

timean hour ago

  • CNN

Hackers are using a modified Salesforce app to trick employees and extort companies, Google says

Hackers are tricking employees at companies in Europe and the Americas into installing a modified version of a Salesforce-related app, allowing the hackers to steal reams of data, gain access to other corporate cloud services and extort those companies, Google said on Wednesday. The hackers – tracked by the Google Threat Intelligence Group as UNC6040 – have 'proven particularly effective at tricking employees' into installing a modified version of Salesforce's Data Loader, a proprietary tool used to bulk import data into Salesforce environments, the researchers said. The hackers use voice calls to trick employees into visiting a purported Salesforce connected app setup page to approve the unauthorized, modified version of the app, created by the hackers to emulate Data Loader. If the employee installs the app, the hackers gain 'significant capabilities to access, query, and exfiltrate sensitive information directly from the compromised Salesforce customer environments,' the researchers said. The access also frequently gives the hackers the ability to move throughout a customer's network, enabling attacks on other cloud services and internal corporate networks. Technical infrastructure tied to the campaign shares characteristics with suspected ties to the broader and loosely organized ecosystem known as 'The Com,' known for small, disparate groups engaging in cybercriminal and sometimes violent activity, the researchers said. A Google spokesperson told Reuters that roughly 20 organizations have been affected by the UNC6040 campaign, which has been observed over the past several months. A subset of those organizations had data successfully exfiltrated, the spokesperson said. A Salesforce spokesperson told Reuters in an email that 'there's no indication the issue described stems from any vulnerability inherent in our platform.' The spokesperson said the voice calls used to trick employees 'are targeted social engineering scams designed to exploit gaps in individual users' cybersecurity awareness and best practices.' The spokesperson declined to share the specific number of affected customers, but said that Salesforce was 'aware of only a small subset of affected customers,' and said it was 'not a widespread issue.' Salesforce warned customers of voice phishing, or 'vishing,' attacks and of hackers abusing malicious, modified versions of Data Loader in a March 2025 blog post.

DOWNLOAD THE APP

Get Started Now: Download the App

Ready to dive into the world of global news and events? Download our app today from your preferred app store and start exploring.
app-storeplay-store