Other Resources for Staff Data

Model: Staff Data Sensitivity Levels Matrix

May 15, 2017 | Ventura County Office of Education

Model: Staff Data Sensitivity Levels Matrix

This is a sample matrix for LEA officials who wish to categorize the sensitivity of staff data and determine which staff needs access.

More
Student And Employee Legal Issues Facing Private Educational Institutions: Current Challenges And Strategies For Compliance And Defense

May 14, 2017 | Holland & Knight LLP

Student And Employee Legal Issues Facing Private Educational Institutions: Current Challenges And Strategies For Compliance And Defense

This chapter addresses current trends in student- and employee-related legal issues facing private schools, colleges, and universities. These legal issues generally reflect the more transactional nature of relationships with educational institutions and the more demanding expectations for services. Student concerns about the educational environment have focused on conduct, health, and safety, particularly with regard to […]

More
Privacy and Classroom Video Recordings for Teacher Preparation

May 10, 2017 | American Association of Colleges for Teacher Education

Privacy and Classroom Video Recordings for Teacher Preparation

Leaders from across educator preparation, early childhood, and K-12 schools are developing new and better ways to prepare beginning teachers and assess their readiness to lead today’s diverse classrooms. In doing so, they are coming together to support the use of video to capture examples of practice. These videos provide meaningful evidence of how aspiring […]

More
HEISC Information Security Guide

April 27, 2017 | EDUCAUSE

HEISC Information Security Guide

Campus leaders are grappling with how to effectively manage and understand challenges and issues associated with information security. They also have an interest in knowing how other campuses are handling information security risks and challenges. It’s absolutely critical to gain executive support in order to achieve information security goals and objectives. By using the Guide […]

More