REPORT: U.S. State of State of EdTech 2026 – cybersecurity, AI, procurement and teaching & learning

The U.S. State of State of EdTech 2026 “provides insights into the state of K-12 education through the lens of education technology leaders—professionals who play a critical role ensuring technology is safe, reliable, and effective in supporting student learning, teaching, and district operations.” I have taught every age, from preschool to graduate school so I am always interested in what’s going on with education. When it comes to the world of education and technology it feels like so much has changes in the last 20 years and that the pace of change keep quickening. Here are the key findings from the report…

Cybersecurity

Cybersecurity continues to rank as the No. 1 priority for education technology leaders, reflecting the essential role secure digital systems play in modern education. Most districts are actively investing in monitoring, detection, identity protection, and firewall technologies to safeguard networks, data, and learning continuity.

However, nearly two-thirds (65%) identify insufficient cybersecurity staffing and the lack of a dedicated budget as the top barriers to addressing cybersecurity challenges—highlighting the potential for a gap between responsibility and readiness. With increasing cyber insurance costs putting additional strain on budgets and new forms of AI-enabled cyberattacks increasing risks, districts must navigate how to best align funding decisions to keep up with ongoing pressures in the cybersecurity landscape.

Artificial Intelligence (AI)

Districts are making significant progress in establishing guidance for the responsible use of AI. More than three-quarters of districts (79%) report having AI guidelines in place, compared to 57% in 2025, reflecting growing clarity around AI’s role in education. The majority of education technology leaders welcome guidance and recommendations from state education agencies (SEAs) on these AI policies. Nevertheless, the vast majority report they do not want their SEA to issue AI mandates, underscoring the value of local decision making.

In just one year, education technology leaders have become strikingly more optimistic about AI’s potential, nearly doubling their confidence in areas like productivity and personalized learning and showing especially sharp gains in student tutoring and workforce readiness. Productivity gains are seen as the area of greatest impact: a vast percentage (96%) of education technology leaders view AI as having the potential to positively affect education. More than half of districts have AI initiatives that focus on productivity, such as productivity suites for administrators and teachers as well as training in the use of those tools. Fewer districts (41%) have initiatives for instructional platforms to support teaching and learning. More districts (64%) are using AI in operations—a notable jump from the prior year’s 37%.

Procurement

Responses to procurement questions indicate that many districts have established baseline purchasing practices, particularly around product safety. A majority of districts (56%) require vendors to provide information on the safety of their products. Fewer require information on the other key education technology quality indicators—such as evidence based design, inclusivity, usability, and interoperability—pointing to an opportunity to further strengthen and standardize procurement practices.

Regulations for accessibility impact all local education systems, though only 11% of districts regard accessibility as a key priority. As the framework of the Five EdTech Quality Indicators becomes more widely known, and expectations for meeting accessibility requirements are more broadly understood, districts are well-positioned to refine adoption criteria in ways that support high-quality education technology implementation.

Teaching and Learning

Districts continue to demonstrate strong foundational capacity to support education technology. The majority of districts (66%) report adequate staffing for core technical functions such as network administration, application installation, and maintenance as access to digital learning has expanded, with 1:1 implementation at an all-time high.

At the same time, most districts (58%) report they are understaffed when it comes to supporting the technology used for teaching and learning. Strengthening instructional support presents a clear opportunity to maximize the value of education technology investments and reinforce confidence among educators and communities.

Community interest and engagement around instructional technology is high. Nearly two-thirds (64%) of districts report that their communities express moderate to high levels of concern about the technology used for teaching and learning. This finding underscores the importance of clear communication, thoughtful implementation, and ongoing professional support to ensure technology continues to advance teaching and learning goals.

The history of 911 in Minnesota from a 911 telecommunicator

The Department of Public Safety reports on changes to 911 over the years. I just thought it was an interesting look at how 911 has changed over the years, especially for folks who have ubiquitous and reliable cell coverage…

For Mark Lallak, the evolution of 911 is personal. He watched it happen in real time from behind the dispatch console.

When Lallak was working as a 911 telecommunicator in the ’90s, most calls came from landlines. Because the phone numbers were associated with fixed locations, dispatchers had a name and address associated with each phone number. If someone called in, first responders almost always knew where they needed to go.

Then as cell phones emerged, everything changed.

The update happened quickly…

Today, wireless calls are the new norm. In 2025, about 87 percent of 911 calls in Minnesota came from cell phones. People call from cars, boats, trails and countless other places where emergencies happen. It’s much easier to call 911 today than ever before — and that flexibility is a good thing. But it also created new challenges for dispatchers and first responders.

In the early days of cell phone calls to 911, dispatch centers often had to rely on cell tower triangulation to estimate a caller’s location. Dispatchers can’t identify someone based on a cell phone number like they could with landlines. If a caller could not speak, hung up or lost connection, responders might have to search a broad area, often as big as a square mile or more.  …

“Nowadays, when a caller dials 911, the latitude and longitude coordinates from their cell phone are usually shared with the system,” Carlson said. “That information can help responders get to the right place faster.”

While this process works better today than before, there is room for improvement. In some parts of greater Minnesota, calls may still be routed based on cell tower triangulation instead of a caller’s GPS coordinates. That can lead to delays or extra transfers, especially near county borders.

ECN is working to improve the 911 system through Next Generation 911, or NG911. The current network in Minnesota has been in place since 1982 and relies on outdated copper telecommunication lines. In partnership with telecom service providers across the state, ECN is upgrading the network to fiber optic cable. The upgraded system will allow callers to text photos and videos and even share data from unexpected sources like smartwatches and vehicles.

Winona County gets help from the State to combat cyberattack

Detroit Lakes Tribune reports…

Due to the scale and complexity of the incident, Winona County requested cyber protection support from the Minnesota National Guard to ensure continuity of municipal operations.

Gov. Tim Walz on Tuesday issued an executive order providing emergency assistance to Winona County following a cyberattack on Monday, April 6, that disrupted critical systems and digital services. The attack continued into Tuesday, April 7, significantly impairing the county’s ability to deliver vital emergency and municipal services.

“Cyberattacks are an evolving threat that can strike anywhere, at any time,” Walz said in a news release. “Swift coordination between state and local experts matters in these moments. That’s why I am authorizing the National Guard to support Winona County as they work to protect critical systems and maintain essential services.”

Winona County officials have been working around the clock in coordination with Minnesota Information Technology Services, the Minnesota Bureau of Criminal Apprehension, the League of Minnesota Cities, the Federal Bureau of Investigation, and external cybersecurity experts. Due to the scale and complexity of the incident, Winona County requested cyber protection support from the Minnesota National Guard to ensure continuity of municipal operations.

The executive order activating this support takes effect immediately.

EVENT April 7: MN House Committee on 3 bills relates to online privacy and contracts (HF4456, HF4544 & HF3698)

I might not have mentioned all three bills, except they are being heard in the same Commerce Finance and Policy committee meeting...

Tuesday, April 7, 2026 at 8:15 AM

Co-Chair: Rep. Erin Koegel holds the gavelCo-Chair: Rep. Tim O’DriscollLocation: Capitol 120Agenda:

Approval of Minutes – Thursday, March 26th, 2026

HF4456 (Elkins) – Data brokers required to register with the attorney general, account established, enforcement and civil penalties provided, and money appropriated.

HF4544 (Koegel) – License for artificial intelligence independent verification organizations established, advisory council established, rulemaking authorized, and reports required.

HF3698 (Gottfried) – Certain terms in libraries’ electronic book and digital audiobook license agreements or contracts prohibited.
Adjournment

Items may be added, removed, or taken up in any order at the Chair’s discretion.

HANDOUTS: Handouts MUST BE IN PDF FORMAT, have OCR capability, and emailed to the Committee Administrators at samuel.oneill@house.mn.gov and ben.frese@house.mn.gov by 12 p.m. (noon) the business day before the hearing. If you are bringing hard copies, bring 45 copies. Note: submitted written testimony is public and will be included in the official committee record. It may be posted to the committee webpage if received by deadline.

TESTIFYING: Testimony is limited. The number of testifiers and length of time permitted is at the discretion of the chair, and is subject to change. Please plan accordingly. If you would like to testify, please email the Committee Administrators at samuel.oneill@house.mn.gov and ben.frese@house.mn.gov by 12 p.m. (noon) the business day before the hearing.

AMENDMENTS: There is no amendment deadline for the Commerce Finance and Policy Committee. Amendments must be emailed to the Committee Administrators at samuel.oneill@house.mn.gov and ben.frese@house.mn.gov as soon as possible.

Bills:

  • HF3698 (Gottfried) – Certain terms in libraries’ electronic book and digital audiobook license agreements or contracts prohibited.

  • HF4456 (Elkins) – Data brokers required to register with the attorney general, account established, enforcement and civil penalties provided, and money appropriated.

  • HF4544 (Koegel) – License for artificial intelligence independent verification organizations established, advisory council established, rulemaking authorized, and reports required.

Six Reasons Americans Should Care About the Privacy and Security of Their Personal Data Held by the Government

The Center for Technology and Democracy has published a flier on Six Reasons Americans Should Care About the Privacy and Security of Their Personal Data Held by the Government.

The privacy and security of government data can seem abstract and disconnected from our everyday lives. But Center for Democracy & Technology polling results reveal that these issues resonate deeply for millions of Americans and cut across partisan, racial, and regional divides — 74 percent of Americans worry about the personal data that the government has about them. Protecting the privacy and security of personal data held by the government:

Here’s an abridged list of their six reasons:

  1. Limits government surveillance and discrimination by enforcing strong privacy protections. Government agencies are unique in both the extent and sensitivity of the personal data they collect and the power they could wield by using this information. As a result, the United States has several long-standing privacy protections that are aimed at limiting the federal government’s ability to collect, share, and consolidate personal data.
  2. Supports rightful access to public benefits and services by preserving trust in government. A core function of many government agencies is to deliver services and benefits to the American public, part of which entails identifying and removing barriers to accessing these services and benefits. Failing to protect personal data or using it for purposes beyond program administration can result in fewer people accessing benefits and services to which they are legally entitled, resulting in an American public that is more sick, less educated, unhoused, and undernourished, among other negative societal outcomes.
  3. Prevents identity theft and saves taxpayer money by minimizing risks of potential data breaches and other misuses of data.
  4. Enables trust in government agencies to safely use and handle personal data.
  5. Limits government power by safeguarding information from federal overreach.
  6. Maintains individual autonomy by preserving people’s control over their own information. The U.S. Constitution emphasizes the importance of privacy from government intrusion, demonstrating that this country was founded on the basis of protecting individuals from undue government encroachment.

MN students involved with promoting media literacy at the Legislature SF2565

MinnPost reports on a mash up of students involved with civic and technology, specifically students speaking to the legislature about media literacy…

On March 2, [student, Mary] Jensen spoke to lawmakers in support of a proposal to create a “Minnesota Civic Seal,” a graduation credential for students who receive civics instruction in five areas, including media literacy. Students will be expected to complete a community-centered project and reflect on its “measurable civic impact.”

Before she was familiarized with the seal, Jensen experienced the intersection of technology and civics firsthand.

For Jensen, using her voice to advocate had “always been a part of her personality,” but she said there were limited opportunities for civic engagement at her private school, Cretin-Derham Hall High School in St. Paul.

Jensen speaks about youth and social media…

While social media connected Jensen with civic engagement opportunities, her peers were preoccupied with misinformation and cyberbullying.

“A lot of the time people are like, ‘I read this source that said this,’ but that source is just a short Tiktok video clip that they saw,” Jensen said. “And it’s like, ‘You didn’t proofread this. You did not evaluate if the source was correct.’”

She added that problems occur when students don’t apply traditional fact-checking strategies to social media contexts: “if you do [get your news from social media], you should vet that source, too.”

National polling data supports Jensen’s concerns around digital media literacy. Ninety-four percent of teens believe their schools should be required to teach media literacy, according to a 2024 News Literacy Project study. The study also found that only about 40% of teens reported any media literacy instruction.

The article goes on to talk about the specific legislation and how it combines technology and civics in one program…

Sen. Mary Kunesh, DFL-New Brighton, said several media literacy bills in previous years have stalled because of funding concerns. The Civic Seal proposal attempts to address that issue by having the program administered through the YMCA Center for Youth Voice.

The Center will lead the Civic Seal Task Force that the bill proposes, which is composed of students and professionals who will review the Civic Seal guidelines.

With the help of Mike Dean, YMCA Center for Youth Voice director, Jensen and other students created a progress and validity tracking app for Civic Seal participants.

MN Bill Introduced: Requirements for social media platforms related to accounts for minors established HF4138

From the MN House

Commerce Finance and Policy

Co-Chairs: Rep. Tim O’Driscoll (holds gavel), Rep. Erin Koegel
Meeting:

Thursday, March 26, 2026

8:15 AM

Capitol 120

HF 4138 (Scott) Requirements for social media platforms related to accounts for minors established, and enforcement mechanisms for regulations on child social media accounts established.

And documents for meeting:

HF4138 (Scott) – Requirements for social media platforms related to accounts for minors established, and enforcement mechanisms for regulations on child social media accounts established.

FCC Updates Covered List to Include Foreign-Made Consumer Routers, Prohibiting Approval of New Models

This is a little wonkier than I usually go, but a long time ago I worked for a broadband provider and dealt with a lot of routers. The FCC reports...

Today, the Federal Communications Commission updated its Covered List to include all consumer-grade routers produced in foreign countries.  Routers are the boxes in every home that connect computers, phones, and smart devices to the internet.  This followed a determination by a White House-convened Executive Branch interagency body with appropriate national security expertise that such routers “pose unacceptable risks to the national security of the United States or the safety and security of United States persons.”

The Executive Branch determination noted that foreign-produced routers (1) introduce “a supply chain vulnerability that could disrupt the U.S. economy, critical infrastructure, and national defense” and (2) pose “a severe cybersecurity risk that could be leveraged to immediately and severely disrupt U.S. critical infrastructure and directly harm U.S. persons.”

President Trump’s 2025 National Security Strategy stated: “the United States must never be dependent on any outside power for core components—from raw materials to parts to finished products—necessary to the nation’s defense or economy.  We must re-secure our own independent and reliable access to the goods we need to defend ourselves and preserve our way of life.”

Malicious actors have exploited security gaps in foreign-made routers to attack American households, disrupt networks, enable espionage, and facilitate intellectual property theft.  Foreign-made routers were also involved in the Volt, Flax, and Salt Typhoon cyberattacks targeting vital U.S. infrastructure.

The determination included an exemption for routers that the Department of War (DoW) or the Department of Homeland Security (DHS) have granted “Conditional Approval” after finding that such device or devices do not pose such unacceptable risks.  Producers of consumer-grade routers are encouraged to submit an application for Conditional Approval using the guidance attached to the determination.  Applications should be submitted to conditional-approvals@fcc.gov.

As outlined below, today’s action does not impact a consumer’s continued use of routers they previously acquired.  Nor does it prevent retailers from continuing to sell, import, or market router models approved previously through the FCC’s equipment authorization process.  By operation of the FCC’s Covered List rules, the restrictions imposed today apply to new device models.

Chairman Carr issued the following statement:

“I welcome this Executive Branch national security determination, and I am pleased that the FCC has now added foreign-produced routers, which were found to pose an unacceptable national security risk, to the FCC’s Covered List.  Following President Trump’s leadership, the FCC will continue do our part in making sure that U.S. cyberspace, critical infrastructure, and supply chains are safe and secure.”

Additional Background:

 

  • The FCC’s Covered List is a list of communications equipment and services that are deemed to pose an unacceptable risk to the national security of the U.S. or the safety and security of U.S. persons.
  • Under the Secure and Trusted Communications Networks Act, the Commission can update the Covered List only at the direction of national security authorities. In other words, the Commission cannot update this list on its own and is required to implement determinations that are made by our national security agency experts.
  • Equipment on the Covered List (“covered” equipment) is prohibited from getting FCC equipment authorization. Most electronic devices (including consumer-grade routers) require FCC equipment authorization prior to importation, marketing, or sale in the U.S. Covered equipment is banned from receiving new equipment authorizations, preventing new devices from entering the U.S. market.
  • The Cybersecurity and Infrastructure Security Agency encourages organizations to use the Covered List for risk management analysis in their regulatory compliance efforts.
  • Following a similar National Security Determination in December, and a follow-up Determination in January, the FCC recently added the following to the Covered List: “Uncrewed aircraft systems (UAS) and UAS critical components produced in a foreign country†† —except,  (a) UASand UAS critical components included on the Defense Contract Management Agency’s (DCMA’s) Blue UAS Cleared List, until January 1, 2027,#  (b) UAS critical components that qualify as “domestic end products” under the Buy American Standard, 48 CFR 25.101(a), until January 1, 2027; and (c) devices which have been granted a Conditional Approval by DoW or DHS—and all communications and video surveillance equipment and services listed in Section 1709(a)(1) of the FY25 National Defense Authorization Act (Pub. L. 118-159)”.

What does this mean?

  • New devices on the Covered List, such as foreign-made consumer-grade routers, are prohibited from receiving FCC authorization and are therefore prohibited from being imported for use or sale in the U.S. This update to the Covered List does not prohibit the import, sale, or use of any existing device models the FCC previously authorized.
  • This action does not affect any previously-purchased consumer-grade routers. Consumers can continue to use any router they have already lawfully purchased or acquired.
  • Producers of consumer-grade routers that receive Conditional Approval from DoW or DHS can continue to receive FCC equipment authorizations. Interested applicants are encouraged to submit applications to conditional-approvals@fcc.gov

For more information, please see our FAQ page.

 

New MN Bill: extending the Legislative Commission on Cybersecurity HF3860

MN House reports…

Klevorn and Nash from the Committee on State Government Finance and Policy to which was referred:
H. F. No. 3860, A bill for an act relating to state government; extending the Legislative Commission on Cybersecurity; amending Minnesota Statutes 2024, section 3.888, subdivision 7.
Reported the same back with the recommendation that the bill be placed on the General Register.

New MN Bill introduced: A bill extending the Legislative Commission on Cybersecurity HF3860

I am going to try to at least track the bills that get introduced that are at all related to broadband and/or broadband use. I may not follow all closely. Click the bill number for more info and updates:

From them MN House

Bahner, Elkins and Klevorn introduced:

H. F. 3860, A bill for an act relating to state government; extending the Legislative Commission on Cybersecurity; amending Minnesota Statutes 2024, section 3.888, subdivision 7.

Sounds like a counterpart to a new MN Bill introduced: A bill extending the Legislative Commission on Cybersecurity SF3863.

New MN Bill introduced: A bill extending the Legislative Commission on Cybersecurity SF3863

I am going to try to at least track the bills that get introduced that are at all related to broadband and/or broadband use. I may not follow all closely. Click the bill number for more info and updates:

From the MN Senate…

Senators Wiklund, Xiong, and Lucero introduced–
S.F. No. 3863: A bill for an act relating to state government; extending the Legislative Commission on Cybersecurity; amending Minnesota Statutes 2024, section 3.888, subdivision 7.
Referred to the Committee on State and Local Government.

New: MN Report of the Technology Advisory Council: cybersecurity, AI, data sharing and production management

Minnesota has a Technology Advisory Council (TAC). The release an annual report. For someone (like me) who attends all of the MN Broadband Task Force meetings, it’s a next step of sorts of looking to what’s coming toward us and how the state can maximize benefits and minimize risk. Also, from someone who attended the broadband meetings, the discussions happening at the TAC shine a light on the need for ubiquitous broadband. Here’s the executive summary…

Technology shapes how Minnesotans access essential government services — from childcare and healthcare to public safety, licensing, and regulatory oversight. As expectations for speed, security, and transparency rise — and as cyber threats, artificial intelligence, and federal funding uncertainty intensify — Minnesota must modernize in ways that deliver clear public value while protecting privacy, security, and public trust.

The legislature established the TAC in 2021 to provide strategic guidance to MNIT and executive branch agencies on enterprise technology priorities. Drawing on expertise from across the public and private sectors, the TAC helps the state reduce systemic risk, modernize responsibly, and align technology investments with legislative intent and statewide goals. In 2025, the TAC focused on strengthening the enterprise foundations required for effective, accountable government. Building on prior recommendations, the TAC emphasized governance-driven approaches that move Minnesota beyond isolated projects toward durable, scalable capabilities. Across all focus areas, a consistent theme emerged: Lasting public value depends on shared standards, coordinated execution, and sustained investment in people, data, and security. The TAC’s work in 2025 centered on four priority areas:

Advancing responsible artificial intelligence

Minnesota continued to lead in responsible AI adoption by strengthening enterprise governance, shared standards, and workforce readiness. Rather than pursuing AI for its own sake, agencies applied AI to clearly defined use cases that improve efficiency and decision-making while maintaining transparency, auditability, and alignment with Minnesota values.

Reinforcing cybersecurity and operational resilience

In response to an evolving threat landscape — including emerging risks such as quantum computing — and shifting federal support, the TAC prioritized a whole-of-state cybersecurity model. This approach emphasizes shared intelligence, coordinated response, and workforce development to reduce risk and protect critical services across state, local, Tribal Nations, and critical infrastructure partners.

Strengthening data sharing and evidence-based decision-making

The TAC emphasized the need for a coordinated, enterprise approach to data stewardship and sharing. Stronger leadership, clearer legal frameworks, and improved data quality enable agencies to collaborate more effectively, reduce duplication, and deliver faster, more seamless services — while protecting privacy and security.

Modernizing service delivery through product and experience

Recognizing that human-centered services depend on strong product and agile practices, the TAC advanced recommendations to modernize procurement, funding models, leadership engagement, and workforce capacity — shifting government from project completion to sustained value delivery.

The report goes on to provide recommendations for each area.

Worth sharing: That text or email about your “tax refund” is a scam

I suspect that most readers are savvy about how technology can be used to scam folks, but a reminder never hurt and we all might know someone who could also use a reminder – or lesson. Here’s help from the FTC

Tax season is approaching, and if you’re getting a refund, scammers are looking to steal it before you’ve had a chance to claim it. So, before you respond to a text or email about a “tax refund” — especially one that asks you to click a link — know that this could be a scam designed to get your personal information and steal your tax refund.

These scams often start with a text or email that looks like it’s from the IRS or a state tax office saying they’ve “processed” or “approved” your tax refund claim. (Note: that’s not how you find out about a real tax refund.) To “verify your identity” and “send you money,” they ask you to click a link to enter details like your Social Security and bank account numbers — but it’s a phishing scam. If you click and share your info, the scammer might steal your personal information to get your tax refund or even steal your identity to open other accounts.

If you get a message like this:

  • Know that the real IRS and state tax offices won’t reach out by text, email, or on social media to get your information. Only scammers will.
  • Don’t respond or click any links. To check the status of a pending tax refund, never use the link from the message. Instead, visit USA.gov to learn how to find out if you’re really getting a federal or state tax refund.
  • Report and delete the message. Use your phone’s “report junk” option or forward unwanted texts to 7726 (SPAM) and mark unwanted emails as spam or junk. Once you’ve checked it out and reported it, delete the message.

Visit IdentityTheft.gov/steps to learn how to protect yourself before identity theft happens. And if you spot a scam, tell the FTC at ReportFraud.ftc.gov.

New MN Bill introduced: A bill for an act relating to data privacy HF3353

I am going to try to at least track the bills that get introduced that are at all related to broadband and/or broadband use. I may not follow all closely. Click the bill number for more info and updates:

From the MN House:

Freiberg, Bahner and Moller introduced:

HF. 3353,A bill for an act relating to data privacy; expanding personal information protections for judicial officials to state legislators; creating a legislative task force to study personal information protections for government officials; requiring a report; appropriating money; amending Minnesota Statutes 2025 Supplement, sections 480.40, subdivision 1; 480.45, subdivision 2.

Gov. Tim Walz has authorized $1.2 million to Aid St. Paul Cyber Attack Recovery

Gov Tech reports...

Gov. Tim Walz has authorized $1.2 million in state emergency disaster assistance to address a cybersecurity incident that disrupted digital services in St. Paul for several weeks this summer. While most public-facing, Internet-based services were back online within a month, some behind-the-scenes work to shift, recreate or safeguard digital services remains ongoing.

Details on the event…

On July 29, a cyber attack forced the city of St. Paul to shutter most Internet-based services, from public computer terminals at libraries to bill payment services and phone communications. In response, Walz issued an executive order activating cyber-security specialists from the Minnesota National Guard, and the FBI and private consultants quickly became involved.

With a demanded ransom unpaid, cyber-attackers eventually released data from personal files held by St. Paul Parks and Recreation workers onto the Internet, but the files did not involve information from core systems like payroll or licensing, according to the mayor’s office at the time.
A tally of actual costs related to the cyber attack was not immediately available on Wednesday evening, but the 2026 city budget includes more than $1 million in added cybersecurity funding to restore systems and further safeguard digital services.