Publication Date
| In 2026 | 0 |
| Since 2025 | 0 |
| Since 2022 (last 5 years) | 2 |
| Since 2017 (last 10 years) | 5 |
| Since 2007 (last 20 years) | 7 |
Descriptor
Source
Author
| Azar, Alex M., II | 1 |
| Chan, Victor K. Y. | 1 |
| DeVos, Betsy | 1 |
| Ferencz, Susan K. | 1 |
| Fey, Gil-Patricia | 1 |
| Goldsmith, C. W. | 1 |
| Greenleaf, Graham | 1 |
| Haywood Gelman | 1 |
| Johnson, Deborah G. | 1 |
| Levine, Elliott | 1 |
| Lisa Mckee | 1 |
| More ▼ | |
Publication Type
| Reports - Evaluative | 21 |
| Journal Articles | 19 |
| Legal/Legislative/Regulatory… | 6 |
| Opinion Papers | 3 |
| Reports - Descriptive | 2 |
| Information Analyses | 1 |
| Speeches/Meeting Papers | 1 |
Education Level
| Higher Education | 4 |
| Postsecondary Education | 3 |
| Elementary Secondary Education | 2 |
| Early Childhood Education | 1 |
| Elementary Education | 1 |
| Kindergarten | 1 |
| Primary Education | 1 |
Audience
| Administrators | 3 |
| Practitioners | 2 |
| Parents | 1 |
| Teachers | 1 |
Location
| Australia | 2 |
| California (San Jose) | 1 |
| European Union | 1 |
| Macau | 1 |
| Pennsylvania | 1 |
| United Kingdom | 1 |
| United States | 1 |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Suvineetha Herath; Haywood Gelman; Lisa Mckee – Journal of Cybersecurity Education, Research and Practice, 2023
In today's data-sharing paradigm, personal data has become a valuable resource that intensifies the risk of unauthorized access and data breach. Increased data mining techniques used to analyze big data have posed significant risks to data security and privacy. Consequently, data breaches are a significant threat to individual privacy. Privacy is…
Descriptors: Information Security, Privacy, Data, Standards
Chan, Victor K. Y. – International Association for Development of the Information Society, 2023
From the standpoint of a MOOC practitioner (i.e., a MOOC provider) instead of a rigorous comparative law researcher, this article attempts to analyze the potential legal issues and risks underlying instruction via MOOCs and compare these legal issues and risks between the small jurisdiction Macao and such major jurisdictions as the United States,…
Descriptors: MOOCs, Cross Cultural Studies, Laws, Privacy
Marachi, Roxana; Quill, Lawrence – Teaching in Higher Education, 2020
The Canvas Learning Management System (LMS) is used in thousands of universities across the United States and internationally, with a strong and growing presence in K-12 and higher education markets. Analyzing the development of the Canvas LMS, we examine 1) 'frictionless' data transitions that bridge K12, higher education, and workforce data 2)…
Descriptors: Management Systems, Longitudinal Studies, Data Analysis, Higher Education
Reidenberg, Joel R.; Schaub, Florian – Theory and Research in Education, 2018
Education, Big Data, and student privacy are a combustible mix. The improvement of education and the protection of student privacy are key societal values. Big Data and Learning Analytics offer the promise of unlocking insights to improving education through large-scale empirical analysis of data generated from student information and student…
Descriptors: Data Collection, Information Security, Student Records, Privacy
DeVos, Betsy; Nielsen, Kirstjen M.; Azar, Alex M., II; Whitaker, Matthew – US Department of Education, 2018
In response to the February 14, 2018 shooting at Marjory Stoneman Douglas High School in Parkland, Florida, President Donald Trump established the Federal Commission on School Safety to review safety practices and make meaningful and actionable recommendations of best practices to keep students safe. The Commission conducted field visits,…
Descriptors: School Safety, Violence, Prevention, Best Practices
Pullin, Diana – Education Policy Analysis Archives, 2015
Recent efforts to change the teaching profession and teacher preparation include a number of innovations to use portfolio assessment, value added measures (VAM), accountability metrics and other corporate education reform ideas. These approaches may provoke considerable potential legal consequences. Traditional constitutional and civil rights…
Descriptors: Legal Problems, Teacher Evaluation, Preservice Teacher Education, Educational Change
Russo, Charles J. – School Business Affairs, 2009
In the midst of growing controversy over the limits of student expression on the Internet, a federal trial court in Pennsylvania addressed the extent to which education officials can restrict the ability of student teachers and, by extension, teachers and other school employees, to exercise their rights to free speech on Internet social networking…
Descriptors: Student Teachers, Legal Problems, Cooperating Teachers, Internet
Peer reviewedPittman, Joyce; McLaughlin, Brian – Educational Leadership, 2000
Despite the 1998 Children's Online Privacy Act's supposed protections, most web sites still collect personal information and post no privacy statements. Internet-filtering software packages are described and suggestions given for creating a safe environment, dismantling "cookies," informing parents and teachers, and checking…
Descriptors: Elementary Education, Federal Legislation, Internet, Legal Problems
Sultanik, Jeffrey, T. – School Business Affairs, 1997
E-mail has created friction between school districts' proprietary needs and employees' privacy rights. This article examines e-mail law (constitutional, statutory, and common) and issues (employer monitoring, discover problems, admissibility, and attorney-client privilege) and provides policy guidelines. The 1996 Communications Decency Act,…
Descriptors: Electronic Mail, Elementary Secondary Education, Internet, Legal Problems
Splitt, David A. – Executive Educator, 1996
The privacy aspect of e-mail is a touchy subject. "Erased" computer files can easily be restored with simple software. Some public agencies are required to retain backup files on computer data and information. E-mail might also be subject to freedom-of-information access, depending how a "record" or "document" is defined. Also, e-mail exchanges…
Descriptors: Electronic Mail, Elementary Secondary Education, Freedom of Information, Legal Problems
Majestic, Ann L.; And Others – Executive Educator, 1995
Regarding school searches, courts have provided guidelines balancing individual students' rights against the larger school community's rights. Administrators are bound by the Fourth Amendment, which stresses reasonable grounds of suspicion and related circumstances. Strip searches, metal detectors, hidden cameras, and locker searches may meet…
Descriptors: Administrator Responsibility, Court Litigation, Legal Problems, Privacy
Trotter, Andrew – Executive Educator, 1995
Every year, a few administrators mishandle school searches and create spectacles similar to the New Castle, Pennsylvania, incident involving six illegally strip-searched students. Principals using "cops-and-robber" techniques to unearth contraband may not realize the potential for infringing on students' constitutional privacy rights.…
Descriptors: Administrator Responsibility, Court Litigation, Legal Problems, Principals
Levine, Elliott – American School Board Journal, 2001
Sound technology policies can spell the difference between an effective website and an online nightmare. An effective web development policy addresses six key areas: roles and responsibilities, content/educational value, privacy and safety, adherence to copyright laws, technical standards, and use of commercial sites and services. (MLH)
Descriptors: Compliance (Legal), Copyrights, Elementary Secondary Education, Internet
Peer reviewedStefkovich, Jacqueline A. – Journal for a Just and Caring Education, 1996
In recent years, public school students have been searched with metal detectors and occasionally sniffed by dogs or strip searched. Their lockers and bookbags have been searched, and their urine has been tested for drugs--all in the name of school safety. This article explores the legal ramifications of such searches and calls for a critical…
Descriptors: Court Litigation, Drug Use Testing, Elementary Secondary Education, Legal Problems
Fey, Gil-Patricia; Nelson, J. Ron; Roberts, Maura L. – School Administrator, 2000
The practice of identifying violence-prone students via checklists of personal characteristics and behaviors is accompanied by unanswered questions, recognized weaknesses, and serious implementation implications (for special services, suspensions and expulsions, and student rights). Stereotyping, discrimination, and wrongful identification of…
Descriptors: Elementary Secondary Education, Ethics, Identification, Labeling (of Persons)
Previous Page | Next Page ยป
Pages: 1 | 2
Direct link
