Publication Date
In 2025 | 0 |
Since 2024 | 0 |
Since 2021 (last 5 years) | 0 |
Since 2016 (last 10 years) | 0 |
Since 2006 (last 20 years) | 1 |
Descriptor
Compliance (Legal) | 4 |
Computer Security | 4 |
Higher Education | 4 |
Laws | 4 |
Confidential Records | 3 |
Federal Legislation | 3 |
Privacy | 3 |
Records Management | 2 |
State Legislation | 2 |
Academic Freedom | 1 |
College Administration | 1 |
More ▼ |
Publication Type
Journal Articles | 4 |
Reports - Descriptive | 3 |
Opinion Papers | 1 |
Education Level
Higher Education | 1 |
Postsecondary Education | 1 |
Audience
Location
California | 1 |
Laws, Policies, & Programs
Family Educational Rights and… | 1 |
Assessments and Surveys
What Works Clearinghouse Rating
Carnevale, Dan – Chronicle of Higher Education, 2003
Describes how campus administrators are scrambling to follow federal rules that force colleges to comply with a law, the Financial Services Modernization Act, requiring that personal data be protected from computer mishaps. (EV)
Descriptors: Compliance (Legal), Computer Security, Confidential Records, Federal Legislation
Foster, Andrea L. – Chronicle of Higher Education, 2003
Describes why a new law requiring California colleges to warn people of security breaches involving their computerized personal data has administrators worried about both cost and liability. (EV)
Descriptors: Compliance (Legal), Computer Security, Disclosure, Higher Education
Carlson, Scott; Foster, Andrea L. – Chronicle of Higher Education, 2002
Describes how many college officials are confused by the USA Patriot Act, a new anti-terrorism law that may affect campus networks and library records; they believe its provisions could raise privacy and academic freedom issues. (EV)
Descriptors: Academic Freedom, Compliance (Legal), Computer Security, Confidential Records
Nixon, Andrea – EDUCAUSE Quarterly, 2006
For years computer viruses have threatened productive use of personal computers, challenging users and support providers to prevent and recover from viral attacks. Now another type of computing malady has begun to enter popular consciousness: spyware. Typically, analyses of spyware focus on technical issues or provide pointers to resources for…
Descriptors: Laws, Compliance (Legal), Computer Security, Computers