Publication Date
In 2025 | 0 |
Since 2024 | 0 |
Since 2021 (last 5 years) | 2 |
Since 2016 (last 10 years) | 2 |
Since 2006 (last 20 years) | 10 |
Descriptor
Computer Security | 11 |
Student Records | 11 |
Higher Education | 10 |
Privacy | 6 |
Confidential Records | 5 |
Information Security | 5 |
Colleges | 4 |
Compliance (Legal) | 4 |
Computer Software | 4 |
College Administration | 3 |
Confidentiality | 3 |
More ▼ |
Source
Chronicle of Higher Education | 3 |
EDUCAUSE Review | 3 |
Change: The Magazine of… | 1 |
Community College Journal | 1 |
EDUCAUSE | 1 |
EDUCAUSE Quarterly | 1 |
International Journal of… | 1 |
Author
Adler, M. Peter | 1 |
Brooks, D. Christopher | 1 |
Corn, Michael | 1 |
Fields, Cheryl | 1 |
Foster, Andrea | 1 |
Foster, Andrea L. | 1 |
Guernsey, Lisa | 1 |
Kabata, Victor | 1 |
Kelly, Brian | 1 |
Lavagnino, Merri Beth | 1 |
McCormack, Mark | 1 |
More ▼ |
Publication Type
Journal Articles | 10 |
Reports - Descriptive | 8 |
Opinion Papers | 2 |
Reports - Research | 2 |
Guides - Non-Classroom | 1 |
Education Level
Higher Education | 11 |
Postsecondary Education | 7 |
Two Year Colleges | 1 |
Audience
Support Staff | 1 |
Location
Australia | 1 |
Canada | 1 |
Connecticut | 1 |
Illinois | 1 |
Kansas | 1 |
New York | 1 |
Rhode Island | 1 |
United Arab Emirates (Abu… | 1 |
United States | 1 |
Virginia | 1 |
Laws, Policies, & Programs
Family Educational Rights and… | 2 |
Social Security | 1 |
Assessments and Surveys
What Works Clearinghouse Rating
Kabata, Victor – International Journal of E-Learning & Distance Education, 2022
This paper sought to establish the extent to which users' legitimate rights are safeguarded in Learning Management Systems (LMS); specifically, on the Blackboard system used for teaching at Sorbonne University, Abu Dhabi (SUAD). First, the users' legitimate rights that required protection were identified. Second, the security and privacy…
Descriptors: Foreign Countries, Integrated Learning Systems, Higher Education, Computer Security
Kelly, Brian; McCormack, Mark; Reeves, Jamie; Brooks, D. Christopher; O'Brien, John – EDUCAUSE, 2021
In 2021, EDUCAUSE is publishing a second edition of the "Horizon Report." With this inaugural issue of the Information Security edition of the "Horizon Report," EDUCAUSE has sought to expand their series of Teaching and Learning "Horizon Reports" to focus on a new area of critical importance to the future of higher…
Descriptors: Information Security, Higher Education, Educational Trends, COVID-19
Patton, Madeline – Community College Journal, 2015
Data breach prevention is a battle, rarely plain and never simple. For higher education institutions, the Sisyphean aspects of the task are more complex than for industry and business. Two-year colleges have payrolls and vendor contracts like those enterprises. They also have public record and student confidentiality requirements. Colleges must…
Descriptors: Disclosure, Computer Security, Confidential Records, Confidentiality
Lavagnino, Merri Beth – EDUCAUSE Review, 2013
Why is Information Privacy the focus of the January-February 2013 issue of "EDUCAUSE Review" and "EDUCAUSE Review Online"? Results from the 2012 annual survey of the International Association of Privacy Professionals (IAPP) indicate that "meeting regulatory compliance requirements continues to be the top perceived driver…
Descriptors: Privacy, Information Policy, Information Security, Higher Education
Corn, Michael; Rosenthal, Jane – EDUCAUSE Review, 2013
Where does privacy belong in the college/university ecosystem, and what should its relationship be with security and compliance? Are the three areas best kept separate and distinct? Should there be some overlap? Or would a single office, officer, and/or reporting line enable a big picture of the whole? This article examines several of the campus…
Descriptors: Privacy, Compliance (Legal), Campuses, Strategic Planning
Foster, Andrea – Chronicle of Higher Education, 2008
At least 18 colleges are scrambling to inform tens of thousands of students that they are at risk of having their identities stolen after SunGard, a leading software vendor, reported that a laptop owned by one of its consultants was stolen. The extent of the problem is still unknown, though many of the campuses that have been identified are in…
Descriptors: Computer Software, Confidential Records, Student Records, Computer Security
Foster, Andrea L. – Chronicle of Higher Education, 2008
Patrick A. Grant was stolen in April. A thief walked away with a laptop containing the University of Virginia biochemist's name and Social Security number, as well as those of more than 7,000 other professors, staff members, and students. The machine belonged to a university employee who had taken it off campus--and then it was simply taken. The…
Descriptors: Computer Software, Computers, Computer Security, Crime
Guernsey, Lisa – Chronicle of Higher Education, 2008
Colleges capture a slew of highly sensitive information on everyone on campus. While chief privacy officer has become a recognized title in the corporate world, higher education seems slow to pick up on the trend--a reluctance that could represent either head-in-the-sand thinking or fiscally prudent avoidance of bureaucratic bloat. This article…
Descriptors: Higher Education, Information Management, Information Policy, Confidential Records
Adler, M. Peter – EDUCAUSE Review, 2006
The increased number of government-mandated and private contractual information security requirements in recent years has caused higher education security professionals to view information security as another aspect of regulatory or contractual compliance. The existence of fines, penalties, or loss (including bad publicity) has also increased the…
Descriptors: Higher Education, Publicity, Computer Security, Colleges

Fields, Cheryl – Change: The Magazine of Higher Learning, 2005
Another topic involving privacy has attracted considerable attention in recent months--the "student unit record" issue. The U.S. Department of Education concluded in March that it would be feasible to help address lawmakers' concerns about accountability in higher education by constructing a database capable of tracking students from institution…
Descriptors: Student Records, Information Management, Higher Education, Federal Government
Nixon, Andrea – EDUCAUSE Quarterly, 2006
For years computer viruses have threatened productive use of personal computers, challenging users and support providers to prevent and recover from viral attacks. Now another type of computing malady has begun to enter popular consciousness: spyware. Typically, analyses of spyware focus on technical issues or provide pointers to resources for…
Descriptors: Laws, Compliance (Legal), Computer Security, Computers