Publication Date
| In 2026 | 0 |
| Since 2025 | 0 |
| Since 2022 (last 5 years) | 0 |
| Since 2017 (last 10 years) | 1 |
| Since 2007 (last 20 years) | 3 |
Descriptor
| Computer Security | 4 |
| Computer Software | 4 |
| Laws | 4 |
| Data | 3 |
| Information Technology | 3 |
| Privacy | 3 |
| Computers | 2 |
| Educational Policy | 2 |
| Student Records | 2 |
| Boards of Education | 1 |
| Case Studies | 1 |
| More ▼ | |
Publication Type
| Dissertations/Theses -… | 2 |
| Guides - Non-Classroom | 1 |
| Journal Articles | 1 |
| Opinion Papers | 1 |
Education Level
| Higher Education | 2 |
| Elementary Secondary Education | 1 |
| Postsecondary Education | 1 |
Audience
| Policymakers | 1 |
Location
Laws, Policies, & Programs
| Family Educational Rights and… | 1 |
Assessments and Surveys
What Works Clearinghouse Rating
Czuprynski, Christine N. – National School Boards Association, 2019
"Data security" describes the protections in place to prevent unauthorized access to or acquisition of personal student and staff information. A school district's data security measures might include keeping student and staff personal data in locked filing cabinets, and limiting access to those filing cabinets to people within the school…
Descriptors: Elementary Secondary Education, Boards of Education, Data, Information Security
Cleveland, Lara L. – ProQuest LLC, 2011
This project explores the way information about law is transformed into organizational policies and practices. Existing literature emphasizes the state and organized professional groups as primary interpreters of the law and as creators of legal implementation strategies in the organizational setting. This case study of university responses to…
Descriptors: Laws, College Environment, Work Environment, Computers
Kim, Richard S. Y. – ProQuest LLC, 2010
The dissertation examines the historical development of surveillance, electronic surveillance, and cyber-surveillance from colonial times in the United States to the present. It presents the surveillance laws, technologies and policies as a balance between national security and privacy. To examine more recent developments, the dissertation…
Descriptors: National Security, Privacy, United States History, Policy Analysis
Nixon, Andrea – EDUCAUSE Quarterly, 2006
For years computer viruses have threatened productive use of personal computers, challenging users and support providers to prevent and recover from viral attacks. Now another type of computing malady has begun to enter popular consciousness: spyware. Typically, analyses of spyware focus on technical issues or provide pointers to resources for…
Descriptors: Laws, Compliance (Legal), Computer Security, Computers

Direct link
Peer reviewed
