{"title":"高等教育中的FERPA合规","authors":"H. Dunn","doi":"10.1145/2670739.2670740","DOIUrl":null,"url":null,"abstract":"This paper considers some of the issues institutions of higher education may face in attempting to comply with the requirements of FERPA. The ramifications of the law will be considered in light of its nearly 40-year history as well as application to the modern higher education environment. Relevant legal cases will be examined to provide an understanding of the law in practice. Finally, the law will be considered in light of technological advancements.","PeriodicalId":331424,"journal":{"name":"Proceedings of the 2014 Information Security Curriculum Development Conference","volume":"13 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2014-10-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"FERPA compliance in higher education\",\"authors\":\"H. Dunn\",\"doi\":\"10.1145/2670739.2670740\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"This paper considers some of the issues institutions of higher education may face in attempting to comply with the requirements of FERPA. The ramifications of the law will be considered in light of its nearly 40-year history as well as application to the modern higher education environment. Relevant legal cases will be examined to provide an understanding of the law in practice. Finally, the law will be considered in light of technological advancements.\",\"PeriodicalId\":331424,\"journal\":{\"name\":\"Proceedings of the 2014 Information Security Curriculum Development Conference\",\"volume\":\"13 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2014-10-11\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Proceedings of the 2014 Information Security Curriculum Development Conference\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1145/2670739.2670740\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Proceedings of the 2014 Information Security Curriculum Development Conference","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1145/2670739.2670740","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
This paper considers some of the issues institutions of higher education may face in attempting to comply with the requirements of FERPA. The ramifications of the law will be considered in light of its nearly 40-year history as well as application to the modern higher education environment. Relevant legal cases will be examined to provide an understanding of the law in practice. Finally, the law will be considered in light of technological advancements.