Descriptor
Source
Publication Type
Guides - Non-Classroom | 3 |
Reports - Descriptive | 2 |
Reports - Evaluative | 1 |
Education Level
Audience
Practitioners | 4 |
Administrators | 2 |
Community | 1 |
Media Staff | 1 |
Parents | 1 |
Teachers | 1 |
Location
Canada | 4 |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Alberta Dept. of Education, Edmonton. Special Education Branch. – 1996
Schools have expressed a need to know the identity and/or circumstances of young offenders in order to address school safety and security issues, and to provide a collaborative and coordinated case management approach for the rehabilitation of the young person. A framework for the exchange of information between youth justice and school officials…
Descriptors: Adolescents, Confidential Records, Confidentiality, Delinquency
Alberta Dept. of Education, Edmonton. – 1999
The information in this document is based on a study that Alberta Education commissioned on establishing technology systems that are responsive to the requirements of Alberta's Freedom of Information and Protection of Privacy Act (FOIPP). This document provides an overview of key issues and suggested strategies in the following areas: (1)…
Descriptors: Access to Information, Computer Security, Computer Uses in Education, Educational Administration
Gillis, R. Peter; Whitemarsh, Judith – 1999
This study provides suggestions and best practices for superintendents, Freedom of Information and Protection of Privacy (FOIPP) coordinators and school information technologists in dealing with the impact of Alberta's FOIPP Act on the application of information technologies within their organizations. The study explores the relationship between…
Descriptors: Access to Information, Check Lists, Computer Security, Computer Uses in Education
Alberta Dept. of Education, Edmonton. – 1999
This paper provides a snapshot of the computer network security industry and addresses specific issues related to network security in public education. The following topics are covered: (1) security policy, including reasons for establishing a policy, risk assessment, areas to consider, audit tools; (2) workstations, including physical security,…
Descriptors: Check Lists, Computer Networks, Computer Security, Computer Software