Publication Date
In 2025 | 0 |
Since 2024 | 1 |
Since 2021 (last 5 years) | 2 |
Since 2016 (last 10 years) | 4 |
Since 2006 (last 20 years) | 12 |
Descriptor
Computer Security | 16 |
Federal Legislation | 16 |
Information Technology | 16 |
Privacy | 9 |
Laws | 5 |
Compliance (Legal) | 4 |
Educational Legislation | 4 |
Ethics | 4 |
Information Security | 4 |
Educational Policy | 3 |
Foreign Countries | 3 |
More ▼ |
Source
Author
Publication Type
Journal Articles | 8 |
Reports - Descriptive | 6 |
Reports - Research | 5 |
Dissertations/Theses -… | 2 |
Speeches/Meeting Papers | 2 |
Opinion Papers | 1 |
Reports - Evaluative | 1 |
Education Level
Higher Education | 7 |
Postsecondary Education | 6 |
Elementary Secondary Education | 1 |
Secondary Education | 1 |
Audience
Administrators | 1 |
Policymakers | 1 |
Laws, Policies, & Programs
Digital Millennium Copyright… | 2 |
Family Educational Rights and… | 2 |
First Amendment | 1 |
Health Insurance Portability… | 1 |
Telecommunications Act 1996 | 1 |
Assessments and Surveys
What Works Clearinghouse Rating
Hamisi Mfaume; Margareth Bilinga – Journal of Learning for Development, 2024
The invention of digital ICT devices is one of the most important developments in the history of humankind, and education can greatly benefit from it. However, cyber ethics violations by teachers have become prevalent and are expected to increase unless measures are taken. This study explored education stakeholders' perspectives on ways to promote…
Descriptors: Foreign Countries, Secondary School Teachers, Stakeholders, Computer Security
Office of Inspector General, US Department of Education, 2021
The objective of this audit was to determine whether the U.S. Department of Education's (Department) overall information technology (IT) security programs and practices were effective as they relate to Federal information security requirements. In fiscal year (FY) 2020, the focus of the audit was solely on Departmental Systems. This year the focus…
Descriptors: Public Agencies, Federal Legislation, Educational Legislation, Information Security
Office of Inspector General, US Department of Education, 2020
The objective of this audit was to determine whether the U.S. Department of Education's (Department) overall information technology (IT) security programs and practices were effective as they relate to Federal information security requirements. To answer this objective, the Department's performance was rated in accordance with Fiscal Year (FY)…
Descriptors: Public Agencies, Federal Legislation, Educational Legislation, Information Security
Manzo, Kathleen Kennedy – Education Week, 2010
In its role helping the nation's schools connect to the Internet and other telecommunications services, the "E-rate" has been among the most consistent of federal programs. Funding for the "education rate" program has held at about $2.25 billion a year since it was created under the Telecommunications Act of 1996, and it covers…
Descriptors: Telecommunications, Educational Technology, Internet, Federal Legislation
US Department of Education, 2018
The Department of Education Strategic Plan for Fiscal Years 2018-2022 describes the policy and operational priorities for the agency. The Plan details the Department's strategic goals and objectives over the next four years. The Plan also provides an overview of our Fiscal Year 2018-2019 Agency Priority Goals.
Descriptors: Strategic Planning, Educational Objectives, Elementary Secondary Education, Educational Improvement
McNabb, Lori – Continuing Higher Education Review, 2010
This article discusses the implementation this year of the Department of Education's Higher Education Opportunity Act of 2008 (HEOA), which requires accreditors to ensure that an institution that offers distance or correspondence education has a process in place to establish that a student who registers in a course or program is also the same…
Descriptors: Distance Education, Higher Education, College Students, Identification
Reiss, Jeffrey – ProQuest LLC, 2010
Digital piracy is a problem that may never disappear from society. Through readily available resources such as those found in a university, students will always have access to illegal goods. While piracy is a global phenomenon, an institution's resources combined with the typical college student's lack of funds makes it more lucrative. Students…
Descriptors: Copyrights, Computer Software, Corporations, Ethics
Francisco, James R. – ProQuest LLC, 2010
Health care is one of the most highly regulated industries in the United States. The Health Insurance Portability and Accountability Act of 1996 (HIPAA) mandates the implementation of information systems security to protect the personal information of patients. Properly planned implementations ease the process of introducing new technologies like…
Descriptors: Nurses, Federal Legislation, Nursing, Information Systems
Wilshusen, Gregory C.; Melvin, Valerie C. – US Government Accountability Office, 2009
The Veterans Benefits, Health Care, and Information Technology Act of 2006 authorizes the Secretary of Veterans Affairs to establish an educational assistance program for information security. The Information Security Education Assistance Program is envisioned as a means for the Department of Veterans Affairs (VA) to attract and retain individuals…
Descriptors: Veterans, Public Agencies, Computer Security, Information Technology
Peslak, Alan R. – Information Systems Education Journal, 2010
One of the most important topics for today's information technology professional is the study of legal and regulatory issues as they relate to privacy and security of personal and business data and identification. This manuscript describes the topics and approach taken by the instructors that focuses on independent research of source documents and…
Descriptors: Privacy, Information Security, Computer Security, Electronic Publishing

Broderick, Martha A.; Gibson, Virginia R.; Tarasewich, Peter – Internet Research, 2001
In the United States, electronic signatures recently became as legally binding as printed signatures. Reviews the status of electronic signatures in the United States, and compares it to work done by the United Nations. Summarizes the technology that can be used to implement electronic signatures. Discusses problems and open issues surrounding the…
Descriptors: Computer Security, Federal Legislation, Information Technology, Laws

Phillips, Bruce – Canadian Journal of Information and Library Science, 1995
This lecture by the Privacy Commissioner of Canada addresses issues related to information technology and privacy, including privacy law, government role, surveillance techniques, and security measures to protect the privacy of electronic communications. The text of the question and answer period following the lecture is included. (MES)
Descriptors: Computer Mediated Communication, Computer Security, Federal Legislation, Foreign Countries
National Association of State Universities and Land-Grant Colleges, 2004
This document represents the higher education and library community's guiding public policy agenda on information technology (IT) for the current year. The Higher Education Information Technology (HEIT) Alliance is a coalition of 11 national higher education and library associations, whose members represent a broad array of stakeholders on college…
Descriptors: Telecommunications, Library Associations, Information Technology, Intellectual Property
Karmakar, Nitya L. – 2002
The Internet remains as a wonder for the 21st century and its growth is phenomenon. According to a recent survey, the online population is now about 500 million globally and if this trend continues, it should reach 700 million by the end of 2002. This exponential growth of the Internet has given rise to several security, privacy and ethical…
Descriptors: Computer Security, Ethics, Federal Government, Federal Legislation
Anderson, Alicia – EDUCAUSE Quarterly, 2006
No university seems immune to cyber attacks. For many universities, such events have served as wake-up calls to develop a comprehensive information security and privacy strategy. This is no simple task, however. It involves balancing a culture of openness with a need for security and privacy. Security and privacy are not the same, and the…
Descriptors: School Security, Colleges, Privacy, Computer Security
Previous Page | Next Page ยป
Pages: 1 | 2