Publication Date
In 2025 | 0 |
Since 2024 | 2 |
Since 2021 (last 5 years) | 2 |
Since 2016 (last 10 years) | 4 |
Since 2006 (last 20 years) | 9 |
Descriptor
Source
Author
Anderson, Alicia | 1 |
Chris Reykdal, Contributor | 1 |
Evo Popof | 1 |
Franz, Dana Pomykal | 1 |
Frolick, Mark N. | 1 |
Huber, Joe | 1 |
Jackson, Robert | 1 |
Keith Lee | 1 |
Miller, Beth | 1 |
Miller, Nicole C. | 1 |
Mills, Lane B. | 1 |
More ▼ |
Publication Type
Reports - Descriptive | 15 |
Journal Articles | 10 |
Guides - General | 1 |
Opinion Papers | 1 |
Education Level
Higher Education | 5 |
Elementary Secondary Education | 4 |
Postsecondary Education | 4 |
Elementary Education | 1 |
Middle Schools | 1 |
Secondary Education | 1 |
Location
Alabama | 1 |
Arizona | 1 |
Arkansas | 1 |
Florida | 1 |
Georgia | 1 |
Indiana | 1 |
Louisiana | 1 |
Michigan | 1 |
Mississippi | 1 |
Nevada | 1 |
North Carolina | 1 |
More ▼ |
Laws, Policies, & Programs
Family Educational Rights and… | 1 |
Higher Education Act 1965 | 1 |
Assessments and Surveys
What Works Clearinghouse Rating
Paige Kowalski – State Education Standard, 2024
Everyone who uses student information has a responsibility to maintain students' privacy and the security of their data. Ensuring student data privacy is about so much more than complying with the Family Educational Rights and Privacy Act (FERPA). While privacy must be top of mind when thinking about collecting and using personally identifiable…
Descriptors: State Boards of Education, State Agencies, Public Education, Privacy
Keith Lee; Evo Popof; Chris Reykdal, Contributor – State Educational Technology Directors Association, 2024
The 2023-24 school year was a big year for educational technology. As the world of educational technology has evolved, so has SETDA's State EdTech Trends Survey. This year's survey and report feature new questions (which will likely become recurring questions) and some changes to old questions to reflect the mainstreaming of AI in K-12 education.…
Descriptors: Educational Technology, Educational Trends, Technology Uses in Education, Artificial Intelligence
Readiness and Emergency Management for Schools Technical Assistance Center (REMS), 2020
The onset of COVID-19 has dramatically increased the usage of digital learning formats by education agencies across the nation and shifted the learning environment to "school at home." Since students are online more, they are vulnerable to more threats. Cyber safety is critical and is a shared responsibility of students, parents, and…
Descriptors: COVID-19, Pandemics, Educational Technology, Technology Uses in Education
Miller, Beth – Knowledge Quest, 2016
This article addresses the question of what app or website is appropriate for teachers to use for classroom instruction. While most school districts have safety policies related to the Children's Internet Protection Act (CIPA) and the Children's Online Privacy Protection Act (COPPA) implemented by means of software and district firewalls, this…
Descriptors: Computer Oriented Programs, Web Sites, Computer Uses in Education, Computer Security
National Council on Measurement in Education, 2012
Testing and data integrity on statewide assessments is defined as the establishment of a comprehensive set of policies and procedures for: (1) the proper preparation of students; (2) the management and administration of the test(s) that will lead to accurate and appropriate reporting of assessment results; and (3) maintaining the security of…
Descriptors: State Programs, Integrity, Testing, Test Preparation
Foundation for Excellence in Education (ExcelinEd), 2014
A full year of progress in advancing education reform across America is documented in each of the Foundation for Excellence in Education's Annual Reports. The illustrated pages of the 2014 report, provide data-rich updates on Excellence in Education's work to advance student-centered policies in more than 40 states, all aimed at improving learning…
Descriptors: Educational Change, Educational Quality, Excellence in Education, Student Centered Learning
Miller, Nicole C.; Thompson, Nicole L.; Franz, Dana Pomykal – Middle School Journal (J3), 2009
Schools should be proactive rather than reactive to issues of technology safety, and this requires careful planning and policy implementation. In this article, the authors provide information and recommendations that will help middle grades educators, students, and parents to safely and successfully manage the many technologies they encounter and…
Descriptors: Middle Schools, Middle School Students, Early Adolescents, Educational Technology
Huber, Joe – Library Media Connection, 2005
Desktop security is the foundation of your overall security plan in K-12 education. National Educational Technology Standards (NETS) mainly states that students at all grade levels should know to make changes in the default settings for the operating system and its applications.
Descriptors: Elementary Secondary Education, Educational Technology, Educational Policy, Computer Security

Jackson, Robert; Frolick, Mark N. – Educause Quarterly, 2003
Studied a server security breach at the University of Memphis, Tennessee, to highlight personnel roles, detection of the compromised server, policy enforcement, forensics, and the proactive search for other servers threatened in the same way. (SLD)
Descriptors: Computer Security, Computer Uses in Education, Crime, Educational Policy
Mills, Lane B. – School Administrator, 2005
Lane Mills, assistant superintendent for accountability and technology for Wilson County Schools, in North Carolina, describes the process of reviewing and updating technology policies in her home school district. While technology policies and procedures should be tailored to each district's needs and level of technology use, some basic policies…
Descriptors: Educational Technology, School Districts, Web Sites, Educational Policy
WCET, 2008
Much attention has been focused on the accountability, student learning outcomes, transfer of credit, and illegal file sharing provisions of the two related bills that have moved through the U.S. Senate and the House of Representatives to amend and extend the provisions of the 1965 Higher Education Act (S. 1642 and H.R. 4137). One of the…
Descriptors: Higher Education, Educational Technology, Distance Education, Integrity
von Munkwitz-Smith, Jeff; West, Ann – College and University, 2004
Navigating the multiple processes for accessing ever-multiplying campus information systems can be a daunting task for students, faculty, and staff. This article provides a brief overview of Identity and Access Management Services. The authors review key characteristics and components of this new information architecture and address the issue of…
Descriptors: Access to Information, Identification, Information Technology, Educational Policy
Anderson, Alicia – EDUCAUSE Quarterly, 2006
No university seems immune to cyber attacks. For many universities, such events have served as wake-up calls to develop a comprehensive information security and privacy strategy. This is no simple task, however. It involves balancing a culture of openness with a need for security and privacy. Security and privacy are not the same, and the…
Descriptors: School Security, Colleges, Privacy, Computer Security
Oxley, Alan – EDUCAUSE Quarterly, 2005
It is difficult to estimate the costs of not writing thorough IT policy. Misuse of IT resources, whether through ignorance or malice, costs money, as do court cases that can result from abuse. Furthermore, a poor university accreditation report caused in part by poor policy documents will likely have an adverse impact on student enrollment. There…
Descriptors: Ethics, Privacy, Foreign Countries, Information Technology
Qayoumi, Mohammad H.; Woody, Carol – EDUCAUSE Quarterly, 2005
Good information security does not just happen--and often does not happen at all. Resources are always in short supply, and there are always other needs that seem more pressing. Why? Because information security is hard to define, the required tasks are unclear, and the work never seems to be finished. However, the loss to the organization can be…
Descriptors: Confidentiality, Computer Security, Risk, Privacy