Publication Date
| In 2026 | 0 |
| Since 2025 | 0 |
| Since 2022 (last 5 years) | 1 |
| Since 2017 (last 10 years) | 1 |
| Since 2007 (last 20 years) | 6 |
Descriptor
| Data | 7 |
| Legal Responsibility | 7 |
| Information Technology | 4 |
| Privacy | 4 |
| Compliance (Legal) | 3 |
| Laws | 3 |
| Student Records | 3 |
| Best Practices | 2 |
| Computer Software | 2 |
| Confidential Records | 2 |
| Confidentiality | 2 |
| More ▼ | |
Source
| EDUCAUSE Quarterly | 2 |
| Distance Education | 1 |
| Guilford Publications | 1 |
| Journal of Cybersecurity… | 1 |
| PRO-ED, Inc. | 1 |
| Privacy Technical Assistance… | 1 |
Author
Publication Type
| Journal Articles | 4 |
| Reports - Descriptive | 3 |
| Books | 2 |
| Reports - Evaluative | 2 |
| Collected Works - General | 1 |
| Guides - Non-Classroom | 1 |
| Opinion Papers | 1 |
Education Level
| Higher Education | 3 |
| Elementary Secondary Education | 2 |
| Postsecondary Education | 2 |
Location
| Australia | 1 |
| South Africa | 1 |
Laws, Policies, & Programs
| Family Educational Rights and… | 2 |
| Individuals with Disabilities… | 1 |
Assessments and Surveys
What Works Clearinghouse Rating
Suvineetha Herath; Haywood Gelman; Lisa Mckee – Journal of Cybersecurity Education, Research and Practice, 2023
In today's data-sharing paradigm, personal data has become a valuable resource that intensifies the risk of unauthorized access and data breach. Increased data mining techniques used to analyze big data have posed significant risks to data security and privacy. Consequently, data breaches are a significant threat to individual privacy. Privacy is…
Descriptors: Information Security, Privacy, Data, Standards
Singh, Divya; Ramutsheli, Mashamaite Peterlia – Distance Education, 2016
Personal information is among the most significant assets for businesses today, and clear transactional rules are becoming increasingly important. Organizations, including universities, are charged with more responsibility than ever to protect the personal information used during the course of their business, specifically student data. The paper…
Descriptors: Foreign Countries, Higher Education, Comparative Analysis, Database Management Systems
Privacy Technical Assistance Center, 2014
Educational agencies and institutions increasingly collect and maintain large amounts of data about students in order to provide educational services. Some data, like students' transcript information, may need to be preserved indefinitely. Other student information will need to be preserved for a prescribed period of time to comply with legal or…
Descriptors: Best Practices, Information Management, Information Security, Data
Erford, Bradley T., Ed. – PRO-ED, Inc., 2016
"Professional School Counseling" is a comprehensive, single source for information about the critical issues facing school counselors today. This third edition of the Handbook integrates and expands on the changes brought about by the ASCA National Model. Revisions to each chapter reflect the influence of the model. Several new chapters…
Descriptors: School Counseling, Teaching Guides, Educational Theories, Educational Practices
Merrell, Kenneth W.; Ervin, Ruth A.; Peacock, Gretchen Gimpel – Guilford Publications, 2011
A leading introductory text, this authoritative volume comprehensively describes the school psychologist's role in promoting positive academic, behavioral, and emotional outcomes for all students. The book emphasizes a problem-solving-based, data-driven approach to practice in today's diverse schools. It grounds the reader in the concepts and…
Descriptors: Evidence, Vignettes, Response to Intervention, School Psychology
Hannon, Charles – EDUCAUSE Quarterly, 2008
Faculty have a great deal of control over their lectures, lecture notes, and slides. This article discusses a coming wave of recording devices and other classroom technologies--this time wielded by the students--which will test this control and force serious conversations about how to best help students learn, what it means to own an idea, and…
Descriptors: Instructional Materials, Intellectual Property, Notetaking, Technology Uses in Education
Nixon, Andrea – EDUCAUSE Quarterly, 2006
For years computer viruses have threatened productive use of personal computers, challenging users and support providers to prevent and recover from viral attacks. Now another type of computing malady has begun to enter popular consciousness: spyware. Typically, analyses of spyware focus on technical issues or provide pointers to resources for…
Descriptors: Laws, Compliance (Legal), Computer Security, Computers

Peer reviewed
Direct link
