NotesFAQContact Us
Collection
Advanced
Search Tips
Showing all 4 results Save | Export
Peer reviewed Peer reviewed
Direct linkDirect link
Buckman, Joel; Gold, Stephanie – College and University, 2012
This article outlines privacy and data security compliance issues facing postsecondary education institutions when they utilize cloud computing and concludes with a practical list of do's and dont's. Cloud computing does not change an institution's privacy and data security obligations. It does involve reliance on a third party, which requires an…
Descriptors: Higher Education, Computers, Information Security, Privacy
Diaz, Veronica – Journal of Asynchronous Learning Networks, 2011
The number of instructional offerings in higher education that are online, blended, or web-enhanced, including courses and programs, continues to grow exponentially. Alongside the growth of e-learning, higher education has witnessed the explosion of cloud-based or Web 2.0 technologies, a term that refers to the vast array of socially oriented,…
Descriptors: Electronic Learning, Higher Education, Faculty Development, Federal Legislation
Gladden, R. Matthew, Comp.; Vivolo-Kantor, Alana M., Comp.; Hamburger, Merle E., Comp.; Lumpkin, Corey D., Comp. – Centers for Disease Control and Prevention, 2014
Bullying is one type of violence that threatens a youth's well-being in schools and neighborhoods. The impacts of bullying are felt by individuals, families, schools, and society and may result in youths feeling powerless, intimidated, and humiliated by the aggressive acts of other youth(s). This document is designed as a tool to help…
Descriptors: Public Health, Bullying, Aggression, Prevention
Anderson, John A. – 1996
Information Technology (IT) personnel in higher education requirement at Mary Washington College, Virginia. The goal of the creativity, promote freedom of speech, support research and investigation, and provide information access globally, while demonstrating proper use and protection of the data of which they are in charge. This paper addresses…
Descriptors: Codes of Ethics, Computer Networks, Computer Security, Confidentiality