NotesFAQContact Us
Collection
Advanced
Search Tips
Assessments and Surveys
What Works Clearinghouse Rating
Showing 1 to 15 of 23 results Save | Export
Guanci, Sin R.; Blackburn, Mollie V. – Equity Assistance Center Region III, Midwest and Plains Equity Assistance Center, 2022
The purpose of this "Equity by Design" brief is to aid administrators in protecting sexual and gender minority students from discrimination and harassment. Specifically, this Brief presents Title IX's conceptualizations of sex and harassment to identify who is protected, and from what. Further, it discusses how to navigate backlash…
Descriptors: Educational Legislation, Federal Legislation, Gender Discrimination, Sex Fairness
National Forum on Education Statistics, 2020
The purpose of this document is to provide timely and useful best practice information to help education agencies proactively prepare for, appropriately mitigate, and responsibly recover from a cybersecurity incident. This resource reflects lessons learned by the education community and provides recommendations that will help agencies protect…
Descriptors: Information Security, Computer Security, Confidential Records, Information Management
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Boninger, Faith; Molnar, Alex – National Education Policy Center, 2020
The COVID-19 pandemic has given the entire country a crash course in virtual education and digital education platforms. School leaders have been forced to consider a set of very imperfect options as they struggle to reopen their schools. This three-brief collection identifies key issues for school leaders to consider before adopting a digital…
Descriptors: Educational Technology, Technology Uses in Education, COVID-19, Pandemics
Office of Educational Technology, US Department of Education, 2017
The National Education Technology Plan (NETP) sets a national vision and plan for learning enabled by technology through building on the work of leading education researchers; district, school, and higher education leaders; classroom teachers; developers; entrepreneurs; and nonprofit organizations. The principles and examples provided in this…
Descriptors: Educational Technology, Technology Uses in Education, Educational Legislation, Elementary Secondary Education
Association of Governing Boards of Universities and Colleges, 2015
This is the 13th paper in the Association of Governing Boards (AGB's) series summarizing federal and state public policy issues affecting higher education. Governing boards, institutional and university-system leaders, and senior staffs will find it useful for board discussions and retreats and in formulating institutional responses to these…
Descriptors: Public Policy, Educational Policy, Higher Education, Educational Finance
Foundation for Excellence in Education (ExcelinEd), 2016
Parents expect school districts and schools to keep their children safe while they are in school. That expectation of safety and security also extends to the protection of their children's learning data. Therefore, it is critical that school districts and schools are open and transparent about their student data privacy practices, and that those…
Descriptors: Student Records, Information Security, Privacy, Information Utilization
Federal Student Aid, US Department of Education, 2017
This publication is intended for college financial aid administrators and counselors who help students begin the aid process--filing the Free Application for Federal Student Aid (FAFSA®), verifying information, and making corrections and other changes to the information reported on the FAFSA. In addition to the active index, the following topics…
Descriptors: Federal Aid, Student Financial Aid, College Programs, Federal Programs
Federal Student Aid, US Department of Education, 2016
This publication is intended for financial aid administrators and counselors who help students begin the aid process--filing the Free Application for Federal Student Aid (FAFSA®), verifying information, and making corrections and other changes to the information reported on the FAFSA. The Federal Student Aid Handbook consists of the Application…
Descriptors: Audits (Verification), Citizenship, College Administration, College Programs
Peer reviewed Peer reviewed
PDF on ERIC Download full text
National Forum on Education Statistics, 2010
Each and every day, educators collect and use data about students, staff, and schools. Some of these data originate in individual student and staff records that are confidential or otherwise sensitive. And even those data that are a matter of public record, such as aggregate school enrollment, need to be accessed, presented, and used in an…
Descriptors: Data, Data Collection, Student Records, Information Utilization
Peer reviewed Peer reviewed
Direct linkDirect link
Floyd, Deborah L.; Maslin-Ostrowski, Pat; Hrabak, Michael R. – New Directions for Community Colleges, 2010
A framework for understanding the human side of leadership, especially wounding and leadership struggles, is described with an emphasis on stories of community college presidents. Practical advice and recommendations are offered to better equip aspiring and practicing community college presidents for leadership challenges. A key message is that…
Descriptors: Community Colleges, College Presidents, Crisis Management, Integrity
Shoop, Robert J. – Principal Leadership, 2008
The Family Educational Rights and Privacy Act (FERPA) was passed in 1974 and revised in 1996. This act, also known as the Buckley Amendment, guarantees parents access to their children's education records and limits the disclosure of those records. The revised law regards most information that teachers, school administrators, and education…
Descriptors: Student Records, Privacy, Student Rights, Federal Legislation
Peer reviewed Peer reviewed
Direct linkDirect link
Cate, Fred H. – EDUCAUSE Review, 2006
Colleges and universities face heightened responsibilities. They possess a large volume and variety of sensitive information on a wide range of individuals, and demands for this information are growing. The students that are educated, housed, and/or employed by colleges and universities tend to be in a vulnerable age cohort: eighteen- to…
Descriptors: Young Adults, Privacy, Vocational Education, Higher Education
Peer reviewed Peer reviewed
Falsone, Anne Marie – Journal of Library Administration, 1986
Traces the events that led to the passage of Colorado's Confidentiality of Library Records Law. The growing national trend to protect patron records is also discussed, and practical suggestions for librarians to use in dealing with privacy laws are provided. (EM)
Descriptors: Compliance (Legal), Confidential Records, Disclosure, Intellectual Freedom
Mills, Lane B. – School Administrator, 2004
School district networks are particularly difficult to protect given the diverse types of users, software, equipment and connections that most school districts provide. Vulnerabilities to the security of school district's technology infrastructure can relate to users, data, software, hardware and transmission. This article discusses different…
Descriptors: Educational Technology, School Districts, Computer Security, Privacy
Peer reviewed Peer reviewed
Ledvinka, James – Journal of Library Administration, 1986
Reviews the laws governing access to employee records including the U.S. Constitution, especially the Fourth and Fifth Amendments of the Bill of Rights; the National Labor Relations Act; the Privacy Act of 1974; state privacy statutes; and common-law privacy protections from court opinions. Recommendations for management actions are included. (EM)
Descriptors: Compliance (Legal), Confidential Records, Court Litigation, Disclosure
Previous Page | Next Page »
Pages: 1  |  2