Publication Date
In 2025 | 0 |
Since 2024 | 0 |
Since 2021 (last 5 years) | 1 |
Since 2016 (last 10 years) | 2 |
Since 2006 (last 20 years) | 6 |
Descriptor
Information Technology | 11 |
Legal Responsibility | 11 |
Privacy | 11 |
Compliance (Legal) | 4 |
Confidentiality | 4 |
Data | 4 |
Higher Education | 4 |
Information Systems | 3 |
Laws | 3 |
Student Records | 3 |
Best Practices | 2 |
More ▼ |
Source
Author
Austin, Lisa M. | 1 |
Chartrand, Robert Lee | 1 |
Desai, Mayur S. | 1 |
Hart, Jeff | 1 |
Haywood Gelman | 1 |
Hodges, Marjorie W. | 1 |
Lisa Mckee | 1 |
Lynch, Clifford A. | 1 |
Nixon, Andrea | 1 |
Petersen, Rodney J. | 1 |
Qayoumi, Mohammad H. | 1 |
More ▼ |
Publication Type
Journal Articles | 9 |
Reports - Descriptive | 5 |
Opinion Papers | 3 |
Legal/Legislative/Regulatory… | 2 |
Reports - Evaluative | 2 |
Information Analyses | 1 |
Education Level
Higher Education | 3 |
Postsecondary Education | 3 |
Adult Education | 1 |
Audience
Media Staff | 1 |
Practitioners | 1 |
Location
Australia | 1 |
Canada | 1 |
South Africa | 1 |
Laws, Policies, & Programs
Family Educational Rights and… | 2 |
Assessments and Surveys
What Works Clearinghouse Rating
Suvineetha Herath; Haywood Gelman; Lisa Mckee – Journal of Cybersecurity Education, Research and Practice, 2023
In today's data-sharing paradigm, personal data has become a valuable resource that intensifies the risk of unauthorized access and data breach. Increased data mining techniques used to analyze big data have posed significant risks to data security and privacy. Consequently, data breaches are a significant threat to individual privacy. Privacy is…
Descriptors: Information Security, Privacy, Data, Standards
Privacy Technical Assistance Center, 2014
Educational agencies and institutions increasingly collect and maintain large amounts of data about students in order to provide educational services. Some data, like students' transcript information, may need to be preserved indefinitely. Other student information will need to be preserved for a prescribed period of time to comply with legal or…
Descriptors: Best Practices, Information Management, Information Security, Data
Singh, Divya; Ramutsheli, Mashamaite Peterlia – Distance Education, 2016
Personal information is among the most significant assets for businesses today, and clear transactional rules are becoming increasingly important. Organizations, including universities, are charged with more responsibility than ever to protect the personal information used during the course of their business, specifically student data. The paper…
Descriptors: Foreign Countries, Higher Education, Comparative Analysis, Database Management Systems
Austin, Lisa M. – Bulletin of Science, Technology & Society, 2010
Contemporary privacy debates regarding new technologies often define privacy in terms of control over personal information such that the privacy "problem" is a lack of control and the privacy "solution" is increased control. This article questions the control-paradigm by pointing to its parallels with earlier debates in the…
Descriptors: Information Technology, Privacy, Legal Responsibility, Social Networks
Desai, Mayur S.; Hart, Jeff; Richards, Thomas C. – Journal of Instructional Psychology, 2009
E-mail is mandatory tool of communications any business to survive in the 21st century. It is imperative that Information technology (IT) managers monitor and make sure that the e-mail systems are used properly. In order to organize a systematic process for proper use of email an administrator must have an input into the development of appropriate…
Descriptors: Electronic Mail, Information Technology, Administrators, Administrator Attitudes
Chartrand, Robert Lee – 1989
During the past 12 years, encompassing the 95th through the 100th Congresses, hundreds of bills and resolutions have been introduced and debated that were concerned with information policy, related programs, and the ways in which advanced information technologies (computers, telecommunications, microform systems, video and audio devices) are…
Descriptors: Archives, Confidentiality, Federal Legislation, Information Services

Rees, Warren; And Others – Journal of the American Society for Information Science, 1991
The ability to collect, store, retrieve, and combine information in computerized databases has magnified the potential for misuse of information. Laws have begun to deal with these new threats by expanding rights of privacy, copyright, misrepresentation, products liability, and defamation. Laws regarding computerized databases are certain to…
Descriptors: Copyrights, Delivery Systems, Information Centers, Information Dissemination

Lynch, Clifford A. – Library Hi Tech, 1997
Reviews traditional issues surrounding authorization and authentication in an organization-centered framework and introduces new interorganizational issues that dominate networked information environment. Describes three major approaches to authentication and authorization for the interorganizational environment and discusses the following…
Descriptors: Change, Computer Mediated Communication, Computer Networks, Information Networks

Petersen, Rodney J.; Hodges, Marjorie W. – New Directions for Student Services, 1997
Summarizes legal issues that pertain to the uses of information technology on campuses. Highlights privacy, freedom of expression, and intellectual property rights. Argues that understanding these legal and ethical issues is necessary in developing an appropriate campus policy. Provides guidance for developing a campus technology policy. (RJM)
Descriptors: Civil Liberties, Computer Uses in Education, Disclosure, Ethics
Nixon, Andrea – EDUCAUSE Quarterly, 2006
For years computer viruses have threatened productive use of personal computers, challenging users and support providers to prevent and recover from viral attacks. Now another type of computing malady has begun to enter popular consciousness: spyware. Typically, analyses of spyware focus on technical issues or provide pointers to resources for…
Descriptors: Laws, Compliance (Legal), Computer Security, Computers
Qayoumi, Mohammad H.; Woody, Carol – EDUCAUSE Quarterly, 2005
Good information security does not just happen--and often does not happen at all. Resources are always in short supply, and there are always other needs that seem more pressing. Why? Because information security is hard to define, the required tasks are unclear, and the work never seems to be finished. However, the loss to the organization can be…
Descriptors: Confidentiality, Computer Security, Risk, Privacy