Publication Date
In 2025 | 0 |
Since 2024 | 0 |
Since 2021 (last 5 years) | 2 |
Since 2016 (last 10 years) | 2 |
Since 2006 (last 20 years) | 2 |
Descriptor
Computer Security | 3 |
Federal Government | 3 |
COVID-19 | 2 |
Educational Legislation | 2 |
Elementary Secondary Education | 2 |
Federal Legislation | 2 |
Government Role | 2 |
Information Security | 2 |
Pandemics | 2 |
Privacy | 2 |
Public Agencies | 2 |
More ▼ |
Author
Marinos, Nick | 1 |
Publication Type
Reports - Evaluative | 2 |
Legal/Legislative/Regulatory… | 1 |
Numerical/Quantitative Data | 1 |
Reports - Research | 1 |
Education Level
Elementary Secondary Education | 2 |
Higher Education | 1 |
Postsecondary Education | 1 |
Audience
Policymakers | 3 |
Location
Laws, Policies, & Programs
Coronavirus Aid Relief and… | 1 |
Elementary and Secondary… | 1 |
Family Educational Rights and… | 1 |
Assessments and Surveys
What Works Clearinghouse Rating
Office of Inspector General, US Department of Education, 2021
The Inspector General Act of 1978 (Public Law 95-452), as amended, requires that the Inspector General report semiannually to the Congress on the activities of the Office of Inspector General (OIG) during the 6-month periods ending March 31 and September 30. This Semiannual Report presents the activities and accomplishments of the U.S. Department…
Descriptors: Federal Legislation, Federal Government, Public Agencies, Federal Aid
Marinos, Nick – US Government Accountability Office, 2021
When the COVID-19 pandemic forced the closure of schools across the nation, many K-12 schools moved from in-person to remote education, increasing their dependence on IT and making them potentially more vulnerable to cyberattacks. Education Facilities, including K-12 schools, is one of the nation's critical infrastructure subsectors. Several…
Descriptors: COVID-19, Pandemics, School Closing, Online Courses
Congress of the U.S., Washington, DC. Office of Technology Assessment. – 1994
The use of information networks for business and government is expanding enormously. Government use of networks features prominently in plans to make government more efficient, effective, and responsive. But the transformation brought about by the networking also raises new concerns for the security and privacy of networked information. This…
Descriptors: Access to Information, Computer Networks, Computer Security, Cryptography