Protect the privacy rights of students

Assignment Help Basic Computer Science
Reference no: EM131312834

APA fortmat - 300 words- references please.

The Family Education Rights and Privacy Act (FERPA) was passed in 1974 to protect the privacy rights of students in higher education institutions. It is appropriate to mention that the motivation for the passage of FERPA was generated by the desire of our legislators to prevent the release of information concerning students (or protect the privacy of the student) to anyone without the consent of the students. It is no coincidence that the FERPA law was passed soon after the minimum age for voting in Federal elections was lowered from 21 to 18 years. Since FERPA affected the conveyance of information about a student's activities at an educational institution without her/his agreement, this law created a code of ethics indirectly. Apart from the publicity associated with some FERPA related litigation, this law remained relatively unnoticed by general public and most of the students.

When FERPA legislation was passed, Information Technology (IT) was still in its infancy. Many privacy related protections/provisions that are embedded in the laws passed during the last twenty five years (e.g., HIPAA) were not included in this law. Phenomena and processes such as identity theft, E-commerce, customized prospect lists, and information security were relatively unknown at that time. In the 1970s, practically all student records were created and stored in the form of paper documents.

As a result of rapid diffusion of IT in the operation and administration of higher education institutions during the last 15 years, business organizations and government agencies are constantly trying to secure information about students, often without the approval of the students involved. In response to this changing scenario, the U.S. Department of Education released its proposed changes in FERPA, in March 2008. These proposed changes were focused on the latitude granted to college officials for determining under what circumstances, and to whom, students' information could be disclosed. This issue became really important after the disclosure of information concerning the mental health of the student responsible for the tragedy at Virginia Tech in April 2007 was made public. It is believed that the disclosure of this mental health information to some appropriate recipients, many months prior to the Virginia Tech episode, could have prevented the loss of life, serious injuries and mental stress caused by the action of one student.

The original FERPA regulations distinguished between "Directory" information", and "Non-directory" information. Directory information, which includes names, addresses, phone numbers, can be made public unless a student opts out of disclosure. Non-directory information, which includes grades and disciplinary history for a student, cannot be disclosed to anyone without explicit approval of the student. With the emergence of threat to privacy in the form of identity theft, as a consequence to the utilization of IT for operation, administration, marketing and promotion by universities/colleges, the Social Security Number and Student ID Number have become very valuable data items for business entities, and cyber criminals. The proposed changes in FERPA will mandate that these two data items be included in the Non-directory information in the context of disclosure.

In the textbook titled "Using Information Technology', there is a reference to FERPA on page 454. On that page a number of relevant web sites have been identified. Please utilize the information available at these web sites and other appropriate web portals,

Please answer the following questions in this discussion conference:

  1. Before you read the introduction to this conference, were you aware of FERPA regulation?
  2. Did you know how FERPA regulations affect your privacy and relationship with your parents/guardians?
  3. In your opinion, what are the ethical implications of FERPA?
  4. Has the rapid proliferation of IT made FERPA more desirable or less desirable in the context of privacy of students?

Reference no: EM131312834

Questions Cloud

Estimate the total cost for the project : Estimate the costs for the resources, and add the costs to the resource information in the Microsoft Project file. Estimate the total cost for the project, using the Microsoft Project budget or cost reports.
Difference between bonds current yield and yield to maturity : Why may a bond's price change simply because of the passage of time?.- What is the difference between a bond's current yield and its yield to maturity?
Implement the sparse life grid adt : minRange(): Returns a 2-tuple (minrow, mincol) that contains the minimum row index and the minimum column index that is currently occupied by a live cell.
What characteristics of a bond affect its reinvestment risk : What assumption is made about reinvestment of cash flows when using the yield to maturity?- What characteristics of a bond affect its reinvestment risk?
Protect the privacy rights of students : The Family Education Rights and Privacy Act (FERPA) was passed in 1974 to protect the privacy rights of students in higher education institutions. It is appropriate to mention that the motivation for the passage of FERPA was generated by the desir..
Explain the applicable pennsylvania law : Explain the applicable Pennsylvania, New Jersey, and New York law regarding the following:The type of employee for whom the restriction is appropriate;the length of time, the geographic range, and the scope of a restrictive employment covenan.
Implementation of the big integer adt : Modify your implementation of the Big Integer ADT from the previous question by adding the assignment combo operators that can be performed on the self and rhsInt big integers.
What type of option does the investor in this bond have : If a bond is putable, what type of option does the investor in this bond have? Suppose a bond has a market price of $90 and has five years remaining to maturity.
Complete the system reference guide for your employer : Identify the quality attributes this system will need for its architecture. Complete the System Reference Guide for your employer, and include an architecture for a new employee website.

Reviews

Write a Review

Basic Computer Science Questions & Answers

  An example of a picture effect for images in powerpoint 2007

An example of a picture effect for images in PowerPoint 2007 would be

  What is the probability p[y] that randomly chosen pea plant

What is the probability P[Y] that a randomly chosen pea plant in the second generation has yellow seeds?

  What is the population of interest

Based on a study of 2121 children between the ages of one and four, researchers at the Medical College of Wisconsin concluded that there was an association between iron de?ciency and the length of time that a child is bottle-fed (Milwaukee Journal..

  What are the critical points other than cost

They have a series of staff that work on different projects in different parts of the country and are looking to provide them with office automation, such as email, word processing and spreadsheet capabilities, as well as online storage for their ..

  Which areas are similar to those covered in the nist

Visit the U.S. Postal Service web site https://about.usps.com/handbooks/as805.pdf. Review the content page for this extensive manual. Compare this program to the (National Institute of Standard Technology) . Which areas are similar to those covered i..

  Computer the value of the given number

Prompt the user for a number and an exponent. Computer the value of the given number (the base) raised to the power of the exponent.

  Design a modular pro-gram

There are three seating categories at a stadium. For a softball game, Class A seats cost $15, Class B seats cost $12, and Class C seats cost $9. Design a modular pro-gram that asks how many tickets for each class of seats were sold, and then dis-p..

  Reference to the normative ethical theories

Part 2 is a new piece of work that should not include material from Part 1. As before, it is a written analysis of a complex ethical problem similar to that which you might encounter in the IT industry.

  Justify why you have included each factor

Suggest four factors that might have significant effects on the initial COCOMO estimate and propose possible values for these factors. Justify why you have included each factor.

  How to use a trigger to accomplish such a deletion

Assume that the Wedgewood Pacific Corporation will allow a row to be deleted from EMPLOYEE if the employee has no project assignments. Explain, in general terms, how to use a trigger to accomplish such a deletion.

  Describe an algorithm for counting the number

In C++ Please: Describe an algorithm for counting the number of left external nodes in a binary tree, using the Binary tree ADT.

  Use a joptionpane to ask the user

Write a Java application which tests the random number generation abilities of Java. Random number generation is explained below.Your application should simulate rolling a pair of dice some number of times.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd