NotesFAQContact Us
Collection
Advanced
Search Tips
Laws, Policies, & Programs
Family Educational Rights and…18
Individuals with Disabilities…4
Digital Millennium Copyright…2
National School Lunch Act 19461
Assessments and Surveys
What Works Clearinghouse Rating
Showing 1 to 15 of 18 results Save | Export
Marinos, Nick – US Government Accountability Office, 2021
When the COVID-19 pandemic forced the closure of schools across the nation, many K-12 schools moved from in-person to remote education, increasing their dependence on IT and making them potentially more vulnerable to cyberattacks. Education Facilities, including K-12 schools, is one of the nation's critical infrastructure subsectors. Several…
Descriptors: COVID-19, Pandemics, School Closing, Online Courses
Peer reviewed Peer reviewed
Direct linkDirect link
Pruitt, Kobie – State Education Standard, 2016
Just as adults' personal lives and data are increasingly inhabiting online spaces, so are students. While this shift brings many benefits and the possibility of learning tailored to individual students' needs, it is also brings new challenges. Students create an electronic trail of information that creates an obvious concern: How can they enjoy…
Descriptors: Student Records, Safety, Computer Security, Information Security
Abilock, Rigele; Abilock, Debbie – Knowledge Quest, 2016
In April 2015, U.S. House Representatives Luke Messer and Jared Polis introduced the bipartisan Student Digital Privacy and Parental Rights Act of 2015, designed to significantly restrict how online education vendors can exploit the personal data of students who use their products. For some, the bill does not go far enough. It is evident that…
Descriptors: Privacy, Parent Rights, Federal Legislation, Safety
Office of Educational Technology, US Department of Education, 2023
This guide is designed to provide important resources and recommendations to support teacher implementation of digital learning. Digital learning is defined as "any instructional practice that effectively uses technology to strengthen a student's learning experience and encompasses a wide spectrum of tools and practices." This guide will…
Descriptors: Teaching Guides, Teaching Methods, Technology Uses in Education, Learning Experience
Office of Educational Technology, US Department of Education, 2020
Technology, when used appropriately, can empower learning, engage and motivate students, and help make learning interactive. Students can benefit from educational technology because it can personalize instruction and adapt to their strengths and weaknesses. Today's digital tools and resources support and enhance learning at home and in the…
Descriptors: Educational Technology, Technology Uses in Education, Online Courses, Teaching Methods
Office of Educational Technology, US Department of Education, 2020
This guide is the Spanish version of the "Parent and Family Digital Learning Guide". Technology, when used appropriately, can empower learning, engage and motivate students, and help make learning interactive. Students can benefit from educational technology because it can personalize instruction and adapt to their strengths and…
Descriptors: Educational Technology, Technology Uses in Education, Online Courses, Teaching Methods
US House of Representatives, 2015
This paper presents the first joint hearing of the Subcommittee on Cybersecurity, Infrastructure Protection, and Security Technologies of the Committee on Homeland Security and the Subcommittee on Early Childhood, Elementary, and Secondary Education of the Committee on Education and the Workforce. The subcommittees met to examine data collection…
Descriptors: Privacy, Data Analysis, Information Security, Computer Security
Peer reviewed Peer reviewed
Direct linkDirect link
Hipsky, Shellie; Younes, Wiam – International Journal of Information and Communication Technology Education, 2015
In a time when discussions about information privacy dominate the media, research on Cybersafety education reveals that K-12 teachers and staff are concerned about information privacy in schools and they seek to learn more about the protection of their students' and own personal information online. Privacy topics are typically introduced to the…
Descriptors: Elementary School Teachers, Secondary School Teachers, Teacher Attitudes, Privacy
Peer reviewed Peer reviewed
PDF on ERIC Download full text
National Forum on Education Statistics, 2011
This document, "Book Three of Four: Effectively Managing LDS Data," is the third installment of this Forum series of guides on longitudinal data systems (LDS). This third book in the guide series discusses organizational issues aimed at moving the project forward and ensuring that the data are of high quality so that users may leverage…
Descriptors: Information Systems, Information Management, Data, Organization
DeSantis, Nick – Chronicle of Higher Education, 2012
College campuses are hothouses of data, including course schedules, degree requirements, and grades. But much of the information remains spread out across software systems or locked on university servers. Start-up companies want to pry the information loose from campus servers in order to offer personalized services that could transform the…
Descriptors: Higher Education, Campuses, Grades (Scholastic), Scores
Peer reviewed Peer reviewed
Direct linkDirect link
Trappler, Thomas J. – EDUCAUSE Quarterly, 2010
Much recent discussion has focused on the pros and cons of cloud computing. Some institutions are attracted to cloud computing benefits such as rapid deployment, flexible scalability, and low initial start-up cost, while others are concerned about cloud computing risks such as those related to data location, level of service, and security…
Descriptors: Foreign Countries, Risk, Vendors, Best Practices
Peer reviewed Peer reviewed
Direct linkDirect link
Rosenblatt, Joel – EDUCAUSE Quarterly, 2008
Computer security is one of the most complicated and challenging fields in technology today. A security metrics program provides a major benefit: looking at the metrics on a regular basis offers early clues to changes in attack patterns or environmental factors that may require changes in security strategy. The term "security metrics"…
Descriptors: Copyrights, Privacy, Compliance (Legal), Computer Security
Peer reviewed Peer reviewed
Direct linkDirect link
Adler, M. Peter – EDUCAUSE Review, 2006
The increased number of government-mandated and private contractual information security requirements in recent years has caused higher education security professionals to view information security as another aspect of regulatory or contractual compliance. The existence of fines, penalties, or loss (including bad publicity) has also increased the…
Descriptors: Higher Education, Publicity, Computer Security, Colleges
Technology & Learning, 2008
Anytime, anywhere, learning provides opportunities to create digital learning environments for new teaching styles and personalized learning. As part of making sure the program is effective, the safety and security of students and assets are essential--and mandated by law. The Children's Internet Protection Act (CIPA) addresses Internet content…
Descriptors: Internet, Safety, Federal Legislation, Computer Networks
Peer reviewed Peer reviewed
Direct linkDirect link
Bennett, Cedric – EDUCAUSE Quarterly, 2004
The Internet is a remarkable tool and change agent that has been successfully leveraged by colleges and universities to support, enhance, and extend the teaching/learning process; the creation of new knowledge through research; and the increasingly complex business of managing and administrating institutions. Although it supports and even creates…
Descriptors: State Legislation, Change Agents, Computer Security, Resource Allocation
Previous Page | Next Page »
Pages: 1  |  2