NotesFAQContact Us
Collection
Advanced
Search Tips
Assessments and Surveys
What Works Clearinghouse Rating
Showing 136 to 150 of 616 results Save | Export
Peer reviewed Peer reviewed
Pietrofesa, John J.; And Others – Journal of Mental Health Counseling, 1990
Reviews background and case histories surrounding legal concept of "duty to warn" and confidentiality limits of counseling. Discusses professional, ethical, and legal responsibilities of mental health counselors and identifies steps to follow for counselors who have to warn potential victims of danger from their clients. (Author/ABL)
Descriptors: Confidential Records, Confidentiality, Counselor Client Relationship, Counselor Role
Foster, Andrea L. – Chronicle of Higher Education, 2001
Describes how as colleges keep more information about students in electronic records, institutions struggle for ways to make sure only the right people gain access. (EV)
Descriptors: Computer Security, Confidential Records, Disclosure, Information Policy
Peer reviewed Peer reviewed
Bigelow, Ralph Emerson – College and University, 1975
Addresses the relation of the social security number to the issue of privacy, examines the attributes of the social security number as an identifier for student records, and suggests alternatives. (Author)
Descriptors: Confidential Records, Higher Education, Recordkeeping, Student Records
Liu, Yung-Ying – 1974
Materials in the Library of Congress (LC) concerned with the topic of privacy and security in computer systems are listed in this "LC Science Tracer Bullet." The guide includes a total of 59 sources: (1) an introductory source; (2) relevant LC subject headings; (3) basic and additional texts; (4) handbooks, encyclopedias, and…
Descriptors: Computers, Confidential Records, Confidentiality, Data Processing
Sullivan, Mary – 1977
This report contains the findings and recommendations of a task force established to develop a comprehensive statement regarding the confidentiality of adoption records and to define the scope of information (background and/or identifying) to be shared with birth parents prior to placement of a child for adoption, adoptive parents at the time of…
Descriptors: Adoption, Attitude Change, Case Records, Children
Kidder, Mary Jane, Comp. – 1971
This compilation of 27 abstracts of documents searched through the ERIC system, Dissertation Abstracts and the journal literature covers the ethics involved in student record keeping and privileged information, together with recent legal decisions affecting the counselor and the counseling relationship. (CJ)
Descriptors: Annotated Bibliographies, Confidential Records, Counselor Role, Court Litigation
Kidder, Mary Jane, Comp. – 1971
This compilation of 27 abstracts of documents searched through the ERIC system, "Dissertation Abstracts" and the journal literature covers the ethics involved in student record keeping and privileged information, together with recent legal decisions affecting the counselor and the counseling relationship. For related documents see ED 061 563-ED…
Descriptors: Annotated Bibliographies, Confidential Records, Counselor Role, Court Litigation
Peer reviewed Peer reviewed
Madsen, Rex E. – Utah Law Review, 1975
The Tenth Circuit Court affirmed that the University of New Mexico must comply with an Equal Employment Opportunity (EEOC) subpoena for personnel records. The author concludes after examining the case that the court's decision will probably not have an enduring effect in defining employee privacy interests and EEOC access to records. (JT)
Descriptors: Confidential Records, Constitutional Law, Court Litigation, Higher Education
Peer reviewed Peer reviewed
Abel, Charles M.; Johnson, H. Wayne – Social Work, 1978
Recent public concern for consumer access to records motivated this study of NASW members to determine existing agency policies on this issue. The majority of respondents indicated that their agencies had a policy, written or unwritten, and that most policies allowed access. (Author)
Descriptors: Administrative Policy, Confidential Records, Records (Forms), Research Projects
Peer reviewed Peer reviewed
Baratz, Joan C.; Churchill, Mae – Social Policy, 1978
Since third party access seems to resist effective control, it may be necessary to restrict the contents of student records to the barest minimum. With the least amount of information being kept, the practice of sharing will be reduced and so will the potential harm to students. (Author)
Descriptors: Confidential Records, Confidentiality, Data Collection, Databases
Peer reviewed Peer reviewed
Falsone, Anne Marie – Journal of Library Administration, 1986
Traces the events that led to the passage of Colorado's Confidentiality of Library Records Law. The growing national trend to protect patron records is also discussed, and practical suggestions for librarians to use in dealing with privacy laws are provided. (EM)
Descriptors: Compliance (Legal), Confidential Records, Disclosure, Intellectual Freedom
Lee, Janis M.; Smith, G. Guy – American Libraries, 1988
A library director describes her experience of safeguarding the confidentiality of the circulation records of a woman who went on a shooting rampage at a shopping mall. The lawyer who represented the library discusses the legal responsibility of public and school libraries concerning confidentiality. (CLB)
Descriptors: Civil Liberties, Confidential Records, Confidentiality, Legal Responsibility
Archer, Chalmers, Jr.; Archer, A. J. Finch – Community, Technical, and Junior College Journal, 1986
Examines the susceptibility of computerized institutional records to security violations by "hackers," wishing to change grades/records or merely demonstrate their ability to access the systems. Points to practices that encourage security abuses and risk confidentiality. Outlines procedures used by Northern Virginia Community College to…
Descriptors: Community Colleges, Computer Oriented Programs, Computers, Confidential Records
Samuels, Dorothy J. – USA Today, 1984
The federal government, credit bureaus, banks, and insurance and telephone companies all maintain files on clients. Once available, the temptation to use information on file is often irresistible. In terms of personal privacy, the most frightening development is the growth of computer-matching programs, where two agencies check each others' files.…
Descriptors: Civil Liberties, Computers, Confidential Records, Data Collection
Peer reviewed Peer reviewed
Gehrke, Charles S. – AEDS Journal, 1973
Discusses ethical, legal, scientific, and technological considerations affecting the confidentiality of information in data systems. (JF)
Descriptors: Computers, Confidential Records, Confidentiality, Data Processing
Pages: 1  |  ...  |  6  |  7  |  8  |  9  |  10  |  11  |  12  |  13  |  14  |  ...  |  42