Publication Date
In 2025 | 0 |
Since 2024 | 0 |
Since 2021 (last 5 years) | 4 |
Since 2016 (last 10 years) | 8 |
Since 2006 (last 20 years) | 16 |
Descriptor
Source
Author
Baratz, Joan C. | 1 |
Behymer, Joseph | 1 |
Capo, Berta | 1 |
Chittenden, Lloyd | 1 |
Churchill, Mae | 1 |
Culbertson, Anna | 1 |
Fields, Cheryl | 1 |
Glenn, David | 1 |
Hanson, Karen | 1 |
Hodges, Jaret | 1 |
Juarez, Reina | 1 |
More ▼ |
Publication Type
Journal Articles | 11 |
Reports - Descriptive | 8 |
Reports - Evaluative | 6 |
Opinion Papers | 3 |
Reports - Research | 2 |
Guides - General | 1 |
Guides - Non-Classroom | 1 |
Education Level
Higher Education | 8 |
Postsecondary Education | 8 |
Elementary Secondary Education | 6 |
Early Childhood Education | 2 |
Elementary Education | 1 |
High Schools | 1 |
Middle Schools | 1 |
Preschool Education | 1 |
Secondary Education | 1 |
Location
Florida | 3 |
California | 2 |
California (San Diego) | 2 |
Colorado | 2 |
Kentucky | 2 |
Missouri | 2 |
Texas | 2 |
California (Los Angeles) | 1 |
Hawaii | 1 |
Illinois | 1 |
Indiana | 1 |
More ▼ |
Laws, Policies, & Programs
Family Educational Rights and… | 8 |
Every Student Succeeds Act… | 1 |
Health Insurance Portability… | 1 |
Individuals with Disabilities… | 1 |
Individuals with Disabilities… | 1 |
No Child Left Behind Act 2001 | 1 |
Assessments and Surveys
Florida Comprehensive… | 1 |
What Works Clearinghouse Rating
Rory McGreal – International Journal of E-Learning & Distance Education, 2023
Micro-credentials can provide easily accessible and transparent evidence of skills or knowledge that have been certified by an authority, based on small units of learning. The recognition and transfer of credits is becoming essential, as an increasing number of students are studying at different institutions, often at the same time, online or in…
Descriptors: Microcredentials, Information Storage, Databases, Technology Uses in Education
Matthieu Tenzing Cisel – International Review of Research in Open and Distributed Learning, 2023
Due notably to the emergence of massive open online courses (MOOCs), stakeholders in online education have amassed extensive databases on learners throughout the past decade. Administrators of online course platforms, for instance, possess a broad spectrum of information about their users. This information spans from users' areas of interest to…
Descriptors: MOOCs, Ethics, Risk, Databases
Culbertson, Anna; Lanthorne, Amanda – Across the Disciplines, 2021
This article considers ethical issues of consent and privacy during each phase of archival stewardship. The authors examine flaws in traditional archival theory that contribute to oppression and silencing and highlight unique collections and practices at San Diego State University that begin to set the 21st century archive apart. We focus on…
Descriptors: Praxis, Informed Consent, Privacy, Ethics
Reeves, J. Jeffery; Longhurst, Christopher A.; San Miguel, Stacie J.; Juarez, Reina; Behymer, Joseph; Ramotar, Kevin M.; Maysent, Patricia; Scioscia, Angela L.; Millen, Marlene – Journal of American College Health, 2022
Objective: To detail the implementation, benefits and challenges of onboarding campus-based health services onto a health system's electronic health record. Participants: UC San Diego Student Health and Well-Being offers medical services to over 39,000 students. UC San Diego Health is an academic medical center. Methods: 20 workstreams and 9…
Descriptors: College Students, School Health Services, COVID-19, Pandemics
Hodges, Jaret – Journal of Advanced Academics, 2020
State databases offer researchers the opportunity to conduct research using data collected by states. These databases contain financial, demographic, and accountability data. Accessing and acquiring data from these repositories, though, can offer challenges to scholars interested in conducting research. This brief describes the type of data…
Descriptors: Data Collection, Data Use, Educational Research, Gifted Education
McDermott, Maureen; Reeves, Jennifer; Mendez, Gabriela; Capo, Berta; Karp, Jason – Distance Learning, 2019
A data breach occurs when a cyberhacker physically gains access to files on a computer or remotely bypasses a network's security system, gaining access to data, and stealing sensitive information. Remote network security breaches are a common method for taking sensitive information from companies. The confidential information can then be sold on…
Descriptors: Computer Security, Information Security, Privacy, Computer Software
Perry, Angela – Project on Student Debt, 2019
California has long been a national and global leader in developing and maintaining quality higher education options, as well as in providing financial aid and consumer protections for Californians who access that education. However, although California's colleges and the state government do collect, receive, and report a great deal of data, these…
Descriptors: Education Work Relationship, Access to Information, Wages, Data Collection
Oliver, Astrid; Prosser, Eric; Chittenden, Lloyd – Journal of Access Services, 2016
This case study examines patron record privacy and the Family Educational Rights and Privacy Act (FERPA) within a consortial environment. FERPA requirements were examined, as well as college and library policy and procedure. It was determined that information in library patron records is directory information and, under most circumstances, does…
Descriptors: College Libraries, Library Services, Student Records, Privacy
Data Quality Campaign, 2014
Teachers have access to information about the students in their classrooms each year, but schools and districts often cannot provide teachers with longitudinal data (or data linked over time). Given resource constraints in schools and districts, states are best positioned to ensure that teachers have secure access to their students' longitudinal…
Descriptors: Student Records, Privacy, Student Mobility, Access to Information
Center for IDEA Early Childhood Data Systems (DaSy), 2014
This 2014 document is an adaptation of the 2012 release of "Data Sharing Agreement Checklist" intended for K-12 audiences. Presented as a checklist, the document summarizes the requirements for the written agreements under the audit or evaluation exception that is specified in FERPA and that also applies to the IDEA for Part C early…
Descriptors: Shared Resources and Services, Check Lists, Early Intervention, Federal Legislation
Data Quality Campaign, 2011
As state policymakers implement statewide longitudinal data systems that collect, store, link and share student-level data, it is critical that they understand applicable privacy and data security standards and laws designed to ensure the privacy, security, and confidentiality of that data. To help state policymakers navigate this complex legal…
Descriptors: State Policy, Data Collection, Databases, Student Records
Glenn, David – Chronicle of Higher Education, 2008
Last month several news organizations reported on the emergence of "fusion centers"--vast data clearinghouses, operated by state law-enforcement agencies, that can instantly call up key personal information on anyone: telephone numbers, insurance records, family ties, and much more. Architects of the fusion centers say they are a…
Descriptors: Databases, Privacy, Student Records, Federal Legislation
McConahay, Mark; Hanson, Karen; West, Ann; Woodbeck, Dean – College and University, 2009
On every college and university campus, common themes weave throughout identity and access management (IAM) and its relationship to Family Educational Rights and Privacy Act (FERPA). Institutions approach IAM differently as there is not a one-size-fits-all solution. Nevertheless, all face common elements. Over the past few years, a number of…
Descriptors: Student Records, Information Management, Privacy, Information Systems
Data Quality Campaign, 2012
While states have made tremendous progress building the capacity to collect longitudinal data, developing the systems and practices to tap into P-20W data remains a nascent effort in most states. This primer aims to provide policymakers with information and recommendations to propel states' progress toward using P-20W data to prepare…
Descriptors: Information Dissemination, Knowledge Economy, State Policy, Information Systems

Baratz, Joan C.; Churchill, Mae – Social Policy, 1978
Since third party access seems to resist effective control, it may be necessary to restrict the contents of student records to the barest minimum. With the least amount of information being kept, the practice of sharing will be reduced and so will the potential harm to students. (Author)
Descriptors: Confidential Records, Confidentiality, Data Collection, Databases
Previous Page | Next Page ยป
Pages: 1 | 2