Publication Date
In 2025 | 0 |
Since 2024 | 0 |
Since 2021 (last 5 years) | 1 |
Since 2016 (last 10 years) | 4 |
Since 2006 (last 20 years) | 12 |
Descriptor
Source
ProQuest LLC | 5 |
Center for IDEA Early… | 1 |
Data Quality Campaign | 1 |
EDUCAUSE Review | 1 |
Early Childhood Data… | 1 |
Information Systems Education… | 1 |
National Forum on Education… | 1 |
Research Ethics | 1 |
Author
Publication Type
Reports - Descriptive | 7 |
Dissertations/Theses -… | 5 |
Journal Articles | 3 |
Guides - Non-Classroom | 1 |
Education Level
Higher Education | 3 |
Postsecondary Education | 3 |
Early Childhood Education | 2 |
Preschool Education | 1 |
Audience
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Celedonia, Karen L.; Valenti, Michael W.; Corrales Compagnucci, Marcelo; Lowery Wilson, Michael – Research Ethics, 2021
Community-based mental health care providers (CBMHCPs) are increasingly contacted by external researchers for research study recruitment. Unfortunately, many do not possess the resources or personnel with the skills required to successfully evaluate research proposals for risks. Providing access to clients and client health information can result…
Descriptors: Ethics, Legal Problems, Health Personnel, Recruitment
Lin, Van-Kim; Crowne, Sarah – Early Childhood Data Collaborative, 2020
Home visiting programs typically collect sensitive information about family characteristics, risk factors, and services received. States may choose to integrate these data with other early childhood data to learn more about the reach and effectiveness of the services and supports that families receive. As more states begin to integrate data across…
Descriptors: Home Visits, Privacy, Information Security, Data Collection
Backherms, Dennis A. – ProQuest LLC, 2017
Information technology has become increasingly necessary for competition in the 21st century. The medical industry has taken on a more comprehensive approach by creating and adopting different types of electronic medical records (EMR). Laws and regulations, such as the Health Insurance Portability and Accountability Act (HIPAA) or the Meaningful…
Descriptors: Records (Forms), Information Technology, Physicians, Telecommunications
Johnson, James R. – ProQuest LLC, 2013
The intent of the security standards adopted by the Department of Health and Human Services (DHS) implementing some of the requirements of the Administrative Simplification (AS) subtitle of the Health Insurance Portability and Accountability Act of 1996 (HIPAA) was to improve Federal and private health care programs and to improve the…
Descriptors: Federal Legislation, Health Insurance, Information Security, Nurses
National Forum on Education Statistics, 2016
The National Forum on Education Statistics (Forum) organized the Education Data Privacy Working Group to explore how state and local education agencies (SEAs and LEAs) can support best practices at the school level to protect the confidentiality of student data in day-to-day instructional and administrative tasks. Many of the best practices…
Descriptors: Privacy, Confidentiality, Case Studies, Risk Management
Reis, David W. – ProQuest LLC, 2012
Agile project management is most often examined in relation to software development, while information security frameworks are often examined with respect to certain risk management capabilities rather than in terms of successful implementation approaches. This dissertation extended the study of both Agile project management and information…
Descriptors: Information Security, Federal Legislation, Compliance (Legal), Hospitals
Data Quality Campaign, 2014
This table identifies and briefly describes the following federal policies that safeguard and protect the confidentiality of personal information: (1) Family Educational Rights and Privacy Act (FERPA); (2) Protection of Pupil Rights Amendment (PPRA); (3) Health Insurance Portability and Accountability Act (HIPAA); (4) Children's Online Privacy…
Descriptors: Privacy, Laws, Information Security, Federal Legislation
Chapple, Mike – EDUCAUSE Review, 2013
Colleges and universities should be among the world's leading institutions in the field of data governance. After all, higher education institutions are dedicated to the creation and dissemination of knowledge. Why, then, do those who work in colleges and universities often have so much difficulty corralling information about their own operations…
Descriptors: Data, Governance, Higher Education, Access to Information
Center for IDEA Early Childhood Data Systems (DaSy), 2014
This 2014 document is an adaptation of the 2012 release of "Frequently Asked Questions--Disclosure Avoidance" intended for K-12 audiences. Presented here in the form of responses to frequently asked questions (FAQs) are suggestions intended to provide guidance to IDEA Part C early intervention and Part B 619 preschool special education…
Descriptors: Disabilities, Educational Legislation, Federal Legislation, Equal Education
Thaw, David Bernard – ProQuest LLC, 2011
Current scholarly understanding of information security regulation in the United States is limited. Several competing mechanisms exist, many of which are untested in the courts and before state regulators, and new mechanisms are being proposed on a regular basis. Perhaps of even greater concern, the pace at which technology and threats change far…
Descriptors: Information Security, Federal Legislation, State Legislation, Federal Regulation
AL Faresi, Ahmed – ProQuest LLC, 2011
Current research in health care lacks a systematic investigation to identify and classify various sources of threats to information privacy when sharing health data. Identifying and classifying such threats would enable the development of effective information security risk monitoring and management policies. In this research I put the first step…
Descriptors: Identification, Information Security, Compliance (Legal), Patients
Peslak, Alan R. – Information Systems Education Journal, 2010
One of the most important topics for today's information technology professional is the study of legal and regulatory issues as they relate to privacy and security of personal and business data and identification. This manuscript describes the topics and approach taken by the instructors that focuses on independent research of source documents and…
Descriptors: Privacy, Information Security, Computer Security, Electronic Publishing