NotesFAQContact Us
Collection
Advanced
Search Tips
Showing all 5 results Save | Export
Peer reviewed Peer reviewed
Direct linkDirect link
McDermott, Maureen; Reeves, Jennifer; Mendez, Gabriela; Capo, Berta; Karp, Jason – Distance Learning, 2019
A data breach occurs when a cyberhacker physically gains access to files on a computer or remotely bypasses a network's security system, gaining access to data, and stealing sensitive information. Remote network security breaches are a common method for taking sensitive information from companies. The confidential information can then be sold on…
Descriptors: Computer Security, Information Security, Privacy, Computer Software
Abilock, Rigele; Abilock, Debbie – Knowledge Quest, 2016
In April 2015, U.S. House Representatives Luke Messer and Jared Polis introduced the bipartisan Student Digital Privacy and Parental Rights Act of 2015, designed to significantly restrict how online education vendors can exploit the personal data of students who use their products. For some, the bill does not go far enough. It is evident that…
Descriptors: Privacy, Parent Rights, Federal Legislation, Safety
Office of Educational Technology, US Department of Education, 2020
Technology, when used appropriately, can empower learning, engage and motivate students, and help make learning interactive. Students can benefit from educational technology because it can personalize instruction and adapt to their strengths and weaknesses. Today's digital tools and resources support and enhance learning at home and in the…
Descriptors: Educational Technology, Technology Uses in Education, Online Courses, Teaching Methods
Office of Educational Technology, US Department of Education, 2020
This guide is the Spanish version of the "Parent and Family Digital Learning Guide". Technology, when used appropriately, can empower learning, engage and motivate students, and help make learning interactive. Students can benefit from educational technology because it can personalize instruction and adapt to their strengths and…
Descriptors: Educational Technology, Technology Uses in Education, Online Courses, Teaching Methods
Foster, Andrea L. – Chronicle of Higher Education, 2008
Patrick A. Grant was stolen in April. A thief walked away with a laptop containing the University of Virginia biochemist's name and Social Security number, as well as those of more than 7,000 other professors, staff members, and students. The machine belonged to a university employee who had taken it off campus--and then it was simply taken. The…
Descriptors: Computer Software, Computers, Computer Security, Crime