Publication Date
In 2025 | 0 |
Since 2024 | 0 |
Since 2021 (last 5 years) | 1 |
Since 2016 (last 10 years) | 6 |
Since 2006 (last 20 years) | 10 |
Descriptor
Source
Author
Boninger, Faith | 3 |
Molnar, Alex | 3 |
Capo, Berta | 1 |
Frost, Dale | 1 |
Gentz, Susan | 1 |
Karp, Jason | 1 |
McDermott, Maureen | 1 |
Mendez, Gabriela | 1 |
Panagiotis Panagiotidis | 1 |
Patrick, Susan | 1 |
Reeves, Jennifer | 1 |
More ▼ |
Publication Type
Reports - Descriptive | 6 |
Guides - Non-Classroom | 2 |
Journal Articles | 2 |
Reports - Evaluative | 2 |
Reports - Research | 1 |
Education Level
Elementary Secondary Education | 4 |
Postsecondary Education | 2 |
Higher Education | 1 |
Audience
Policymakers | 2 |
Administrators | 1 |
Location
Louisiana | 1 |
Laws, Policies, & Programs
Family Educational Rights and… | 6 |
Health Insurance Portability… | 1 |
No Child Left Behind Act 2001 | 1 |
Privacy Act 1974 | 1 |
Assessments and Surveys
What Works Clearinghouse Rating
Panagiotis Panagiotidis – European Journal of Education (EJED), 2022
New technological developments, such as 5G networks, smart and interconnected devices, and the development of the Internet of Things (IoT), lead to a new reality in which the secure flow of data is non-negotiable. In this new reality, blockchain technology can play a crucial role, as it has the ability to provide the necessary background for the…
Descriptors: Second Language Learning, Second Language Instruction, Telecommunications, Handheld Devices
McDermott, Maureen; Reeves, Jennifer; Mendez, Gabriela; Capo, Berta; Karp, Jason – Distance Learning, 2019
A data breach occurs when a cyberhacker physically gains access to files on a computer or remotely bypasses a network's security system, gaining access to data, and stealing sensitive information. Remote network security breaches are a common method for taking sensitive information from companies. The confidential information can then be sold on…
Descriptors: Computer Security, Information Security, Privacy, Computer Software
Louisiana Department of Education, 2018
Data is a crucial component in educational success. It gives educators the power to address student needs, study what strategies work, and make necessary changes so that every student has the greatest opportunity. Today, educators, parents, and students have access to more data than ever before and have access to more technology tools to…
Descriptors: Information Management, Privacy, Student Records, Standards
Boninger, Faith; Molnar, Alex – National Education Policy Center, 2020
The COVID-19 pandemic has given the entire country a crash course in virtual education and digital education platforms. School leaders have been forced to consider a set of very imperfect options as they struggle to reopen their schools. This three-brief collection identifies key issues for school leaders to consider before adopting a digital…
Descriptors: Educational Technology, Technology Uses in Education, COVID-19, Pandemics
Privacy Technical Assistance Center, 2014
Today's classrooms increasingly employ on-demand delivery of personalized content, virtual forums for interacting with other students and teachers, and a wealth of other interactive technologies that help foster and enhance the learning process. Online forums help teachers share lesson plans; social media help students collaborate across…
Descriptors: Privacy, Information Security, Online Systems, Internet
Molnar, Alex; Boninger, Faith – National Education Policy Center, 2015
Computer technology has made it possible to aggregate, collate, analyze, and store massive amounts of information about students. School districts and private companies that sell their services to the education market now regularly collect such information, raising significant issues about the privacy rights of students. Most school districts lack…
Descriptors: Privacy, Information Security, Data, Student Records
Data Quality Campaign, 2014
This table identifies and briefly describes the following federal policies that safeguard and protect the confidentiality of personal information: (1) Family Educational Rights and Privacy Act (FERPA); (2) Protection of Pupil Rights Amendment (PPRA); (3) Health Insurance Portability and Accountability Act (HIPAA); (4) Children's Online Privacy…
Descriptors: Privacy, Laws, Information Security, Federal Legislation
National School Boards Association, 2014
The Cloud's presence in both personal and professional lives has happened so quickly. In fact, many of the educational tools employed by teachers and district offices operate through an Internet connection only. The advantages of Cloud-based platforms and learning tools are obvious--ease, convenience, 24/7 accessibility, less staff time…
Descriptors: Internet, Computer Software, Computers, Users (Information)
Boninger, Faith; Molnar, Alex – Commercialism in Education Research Unit, 2016
Digital technologies used by marketers continue to evolve. Sophisticated and personalized, they help ensure that today's children and adolescents are constantly connected and available to advertisers wherever they may roam. Moreover, because digital technologies enable extensive personalization, they amplify opportunities for marketers to take…
Descriptors: Privacy, Information Security, Student Records, Data Collection
Patrick, Susan; Worthen, Maria; Frost, Dale; Gentz, Susan – iNACOL, 2016
The Every Student Succeeds Act (ESSA), enacted in December 2015, presents a historic opportunity for the United States to begin to transform K-12 education toward personalized, student-centered learning. Across the country, state leaders are shifting from a focus on compliance toward continuous improvement and systemic change, in order to support…
Descriptors: Educational Legislation, Federal Legislation, State Policy, Educational Policy