NotesFAQContact Us
Collection
Advanced
Search Tips
Showing all 10 results Save | Export
Abilock, Rigele; Abilock, Debbie – Knowledge Quest, 2016
In April 2015, U.S. House Representatives Luke Messer and Jared Polis introduced the bipartisan Student Digital Privacy and Parental Rights Act of 2015, designed to significantly restrict how online education vendors can exploit the personal data of students who use their products. For some, the bill does not go far enough. It is evident that…
Descriptors: Privacy, Parent Rights, Federal Legislation, Safety
Boninger, Faith; Molnar, Alex – Commercialism in Education Research Unit, 2016
Digital technologies used by marketers continue to evolve. Sophisticated and personalized, they help ensure that today's children and adolescents are constantly connected and available to advertisers wherever they may roam. Moreover, because digital technologies enable extensive personalization, they amplify opportunities for marketers to take…
Descriptors: Privacy, Information Security, Student Records, Data Collection
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Molnar, Alex; Boninger, Faith – National Education Policy Center, 2015
Computer technology has made it possible to aggregate, collate, analyze, and store massive amounts of information about students. School districts and private companies that sell their services to the education market now regularly collect such information, raising significant issues about the privacy rights of students. Most school districts lack…
Descriptors: Privacy, Information Security, Data, Student Records
Data Quality Campaign, 2014
This table identifies and briefly describes the following federal policies that safeguard and protect the confidentiality of personal information: (1) Family Educational Rights and Privacy Act (FERPA); (2) Protection of Pupil Rights Amendment (PPRA); (3) Health Insurance Portability and Accountability Act (HIPAA); (4) Children's Online Privacy…
Descriptors: Privacy, Laws, Information Security, Federal Legislation
Privacy Technical Assistance Center, 2014
Today's classrooms increasingly employ on-demand delivery of personalized content, virtual forums for interacting with other students and teachers, and a wealth of other interactive technologies that help foster and enhance the learning process. Online forums help teachers share lesson plans; social media help students collaborate across…
Descriptors: Privacy, Information Security, Online Systems, Internet
Peer reviewed Peer reviewed
Direct linkDirect link
Buckman, Joel; Gold, Stephanie – College and University, 2012
This article outlines privacy and data security compliance issues facing postsecondary education institutions when they utilize cloud computing and concludes with a practical list of do's and dont's. Cloud computing does not change an institution's privacy and data security obligations. It does involve reliance on a third party, which requires an…
Descriptors: Higher Education, Computers, Information Security, Privacy
Diaz, Veronica – Journal of Asynchronous Learning Networks, 2011
The number of instructional offerings in higher education that are online, blended, or web-enhanced, including courses and programs, continues to grow exponentially. Alongside the growth of e-learning, higher education has witnessed the explosion of cloud-based or Web 2.0 technologies, a term that refers to the vast array of socially oriented,…
Descriptors: Electronic Learning, Higher Education, Faculty Development, Federal Legislation
Adams, Helen R. – School Library Journal, 2011
Every day in school libraries nationwide, students' privacy rights are under attack, but many principals, teachers, parents, and community members do not know much about these rights. Even though school librarians are among the strongest proponents of privacy, the subject is rarely discussed, probably because state and federal laws can be…
Descriptors: Privacy, Student Rights, Student Records, School Libraries
Peer reviewed Peer reviewed
Direct linkDirect link
Trappler, Thomas J. – EDUCAUSE Quarterly, 2010
Much recent discussion has focused on the pros and cons of cloud computing. Some institutions are attracted to cloud computing benefits such as rapid deployment, flexible scalability, and low initial start-up cost, while others are concerned about cloud computing risks such as those related to data location, level of service, and security…
Descriptors: Foreign Countries, Risk, Vendors, Best Practices
Peer reviewed Peer reviewed
Direct linkDirect link
McConahay, Mark; Hanson, Karen; West, Ann; Woodbeck, Dean – College and University, 2009
On every college and university campus, common themes weave throughout identity and access management (IAM) and its relationship to Family Educational Rights and Privacy Act (FERPA). Institutions approach IAM differently as there is not a one-size-fits-all solution. Nevertheless, all face common elements. Over the past few years, a number of…
Descriptors: Student Records, Information Management, Privacy, Information Systems