NotesFAQContact Us
Collection
Advanced
Search Tips
Assessments and Surveys
What Works Clearinghouse Rating
Showing 1 to 15 of 20 results Save | Export
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Kabata, Victor – International Journal of E-Learning & Distance Education, 2022
This paper sought to establish the extent to which users' legitimate rights are safeguarded in Learning Management Systems (LMS); specifically, on the Blackboard system used for teaching at Sorbonne University, Abu Dhabi (SUAD). First, the users' legitimate rights that required protection were identified. Second, the security and privacy…
Descriptors: Foreign Countries, Integrated Learning Systems, Higher Education, Computer Security
Peer reviewed Peer reviewed
Direct linkDirect link
Paige Kowalski – State Education Standard, 2024
Everyone who uses student information has a responsibility to maintain students' privacy and the security of their data. Ensuring student data privacy is about so much more than complying with the Family Educational Rights and Privacy Act (FERPA). While privacy must be top of mind when thinking about collecting and using personally identifiable…
Descriptors: State Boards of Education, State Agencies, Public Education, Privacy
Readiness and Emergency Management for Schools Technical Assistance Center (REMS), 2022
This Information Technology Specialist Resource List provides resources on understanding the role of information technology specialists in supporting school safety before, during, and after an emergency. Resources are organized into the following categories: (1) Cybersecurity and Cyber Safety Considerations for Schools and Districts; (2)…
Descriptors: Information Technology, Specialists, Role, School Safety
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Richardson, Michael D.; Lemoine, Pamela A.; Stephens, Walter E.; Waller, Robert E. – Educational Planning, 2020
Cybersecurity has emerged as one of the most critical issues confronting schools in the 21st century. Computer security is an essential instrument for protecting children, but K-12 schools are considered one of the most attractive targets for data privacy crimes often due to the less-than-effective cybersecurity practices in schools. The human…
Descriptors: Elementary Secondary Education, Computer Security, Information Security, Privacy
Czuprynski, Christine N. – National School Boards Association, 2019
"Data security" describes the protections in place to prevent unauthorized access to or acquisition of personal student and staff information. A school district's data security measures might include keeping student and staff personal data in locked filing cabinets, and limiting access to those filing cabinets to people within the school…
Descriptors: Elementary Secondary Education, Boards of Education, Data, Information Security
Peer reviewed Peer reviewed
Direct linkDirect link
McDermott, Maureen; Reeves, Jennifer; Mendez, Gabriela; Capo, Berta; Karp, Jason – Distance Learning, 2019
A data breach occurs when a cyberhacker physically gains access to files on a computer or remotely bypasses a network's security system, gaining access to data, and stealing sensitive information. Remote network security breaches are a common method for taking sensitive information from companies. The confidential information can then be sold on…
Descriptors: Computer Security, Information Security, Privacy, Computer Software
Marinos, Nick – US Government Accountability Office, 2021
When the COVID-19 pandemic forced the closure of schools across the nation, many K-12 schools moved from in-person to remote education, increasing their dependence on IT and making them potentially more vulnerable to cyberattacks. Education Facilities, including K-12 schools, is one of the nation's critical infrastructure subsectors. Several…
Descriptors: COVID-19, Pandemics, School Closing, Online Courses
Peer reviewed Peer reviewed
Direct linkDirect link
Pruitt, Kobie – State Education Standard, 2016
Just as adults' personal lives and data are increasingly inhabiting online spaces, so are students. While this shift brings many benefits and the possibility of learning tailored to individual students' needs, it is also brings new challenges. Students create an electronic trail of information that creates an obvious concern: How can they enjoy…
Descriptors: Student Records, Safety, Computer Security, Information Security
Abilock, Rigele; Abilock, Debbie – Knowledge Quest, 2016
In April 2015, U.S. House Representatives Luke Messer and Jared Polis introduced the bipartisan Student Digital Privacy and Parental Rights Act of 2015, designed to significantly restrict how online education vendors can exploit the personal data of students who use their products. For some, the bill does not go far enough. It is evident that…
Descriptors: Privacy, Parent Rights, Federal Legislation, Safety
Office of Educational Technology, US Department of Education, 2023
This guide is designed to provide important resources and recommendations to support teacher implementation of digital learning. Digital learning is defined as "any instructional practice that effectively uses technology to strengthen a student's learning experience and encompasses a wide spectrum of tools and practices." This guide will…
Descriptors: Teaching Guides, Teaching Methods, Technology Uses in Education, Learning Experience
Office of Educational Technology, US Department of Education, 2020
Technology, when used appropriately, can empower learning, engage and motivate students, and help make learning interactive. Students can benefit from educational technology because it can personalize instruction and adapt to their strengths and weaknesses. Today's digital tools and resources support and enhance learning at home and in the…
Descriptors: Educational Technology, Technology Uses in Education, Online Courses, Teaching Methods
Office of Educational Technology, US Department of Education, 2020
This guide is the Spanish version of the "Parent and Family Digital Learning Guide". Technology, when used appropriately, can empower learning, engage and motivate students, and help make learning interactive. Students can benefit from educational technology because it can personalize instruction and adapt to their strengths and…
Descriptors: Educational Technology, Technology Uses in Education, Online Courses, Teaching Methods
Peer reviewed Peer reviewed
Direct linkDirect link
Patton, Madeline – Community College Journal, 2015
Data breach prevention is a battle, rarely plain and never simple. For higher education institutions, the Sisyphean aspects of the task are more complex than for industry and business. Two-year colleges have payrolls and vendor contracts like those enterprises. They also have public record and student confidentiality requirements. Colleges must…
Descriptors: Disclosure, Computer Security, Confidential Records, Confidentiality
US House of Representatives, 2015
This paper presents the first joint hearing of the Subcommittee on Cybersecurity, Infrastructure Protection, and Security Technologies of the Committee on Homeland Security and the Subcommittee on Early Childhood, Elementary, and Secondary Education of the Committee on Education and the Workforce. The subcommittees met to examine data collection…
Descriptors: Privacy, Data Analysis, Information Security, Computer Security
Peer reviewed Peer reviewed
Direct linkDirect link
Hipsky, Shellie; Younes, Wiam – International Journal of Information and Communication Technology Education, 2015
In a time when discussions about information privacy dominate the media, research on Cybersafety education reveals that K-12 teachers and staff are concerned about information privacy in schools and they seek to learn more about the protection of their students' and own personal information online. Privacy topics are typically introduced to the…
Descriptors: Elementary School Teachers, Secondary School Teachers, Teacher Attitudes, Privacy
Previous Page | Next Page »
Pages: 1  |  2