Publication Date
| In 2024 | 3 |
| Since 2023 | 6 |
| Since 2020 (last 5 years) | 11 |
| Since 2015 (last 10 years) | 25 |
| Since 2005 (last 20 years) | 94 |
Descriptor
| Confidential Records | 616 |
| Privacy | 230 |
| Confidentiality | 224 |
| Student Records | 207 |
| Higher Education | 190 |
| Disclosure | 169 |
| Federal Legislation | 127 |
| Court Litigation | 109 |
| Student Rights | 92 |
| Legal Responsibility | 91 |
| Elementary Secondary Education | 83 |
| More ▼ | |
Source
Author
Publication Type
Education Level
| Higher Education | 31 |
| Postsecondary Education | 19 |
| Elementary Secondary Education | 18 |
| Adult Education | 10 |
| Elementary Education | 3 |
| Secondary Education | 3 |
| High Schools | 1 |
| Junior High Schools | 1 |
| Two Year Colleges | 1 |
Audience
| Practitioners | 55 |
| Administrators | 34 |
| Policymakers | 11 |
| Teachers | 11 |
| Media Staff | 8 |
| Parents | 6 |
| Researchers | 6 |
| Counselors | 5 |
| Students | 4 |
| Community | 1 |
Location
| Canada | 13 |
| United States | 11 |
| California | 8 |
| New York | 6 |
| Australia | 5 |
| Oregon | 5 |
| United Kingdom | 5 |
| Colorado | 4 |
| Pennsylvania | 4 |
| Arizona | 3 |
| Maryland | 3 |
| More ▼ | |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Togaibaeva, Sholpan S.; Togaibaev, Amir I.; Khanov, Talgat A.; Sikhimbayev, Muratbay R.; Rustemova, Gaukhar R. – International Journal of Environmental and Science Education, 2016
The article considers the analysis of a crime under rule 230 of the Criminal code of the Republic of Kazakhstan (illegal actions in relation to insider information). The authors discuss the concept of insider information, the interpretation to the possibility of its misuse. A brief analysis of the object and the subject of insider information is…
Descriptors: Foreign Countries, Crime, Crime Prevention, Legal Responsibility
Hewitt, Rachel; Natzler, Michael – Higher Education Policy Institute, 2019
Higher education institutions collect and hold huge amounts of data on students, whether for regulatory purposes or to gather information about students' experiences. In this report we explore students views on data security, learning analytics and the information universities hold and share on students' health and wellbeing. [This report was…
Descriptors: Information Security, Student Attitudes, Young Adults, Learning Analytics
Amponsah, Emmanuel B.; Boateng, Peter Agyekum; Onuoha, Luke N. – Journal of Education and Practice, 2016
This paper examined ways by which nonconformity to confidentiality among accounting academics could lead to increased-recruitment-and-legal-costs to their employing universities in Ghana that offered accounting degree programmes. With a cross-sectional design, data collected from 1,225 accountants analysed via Cronbach's alpha,…
Descriptors: Foreign Countries, College Faculty, Accounting, Confidentiality
Oliver, Astrid; Prosser, Eric; Chittenden, Lloyd – Journal of Access Services, 2016
This case study examines patron record privacy and the Family Educational Rights and Privacy Act (FERPA) within a consortial environment. FERPA requirements were examined, as well as college and library policy and procedure. It was determined that information in library patron records is directory information and, under most circumstances, does…
Descriptors: College Libraries, Library Services, Student Records, Privacy
Davenport, Robin G. – Journal of College Student Psychotherapy, 2017
The formation of integrated centers on college campuses that combine health services and counseling provide clear advantages for students. There is currently no "best practices" model that informs integrated centers' operational procedures. The "continuity of care" requirement of medical providers can conflict with the strict…
Descriptors: Counseling Services, Campuses, Patients, Informed Consent
Patton, Madeline – Community College Journal, 2015
Data breach prevention is a battle, rarely plain and never simple. For higher education institutions, the Sisyphean aspects of the task are more complex than for industry and business. Two-year colleges have payrolls and vendor contracts like those enterprises. They also have public record and student confidentiality requirements. Colleges must…
Descriptors: Disclosure, Computer Security, Confidential Records, Confidentiality
Singh, Divya; Ramutsheli, Mashamaite Peterlia – Distance Education, 2016
Personal information is among the most significant assets for businesses today, and clear transactional rules are becoming increasingly important. Organizations, including universities, are charged with more responsibility than ever to protect the personal information used during the course of their business, specifically student data. The paper…
Descriptors: Foreign Countries, Higher Education, Comparative Analysis, Database Management Systems
Freedman, Gordon – Policy Futures in Education, 2014
The information giants, Google being the largest, trade every day and build high-valuation mega-opolies on the back of very personal information without including their sources of value with any tangible return for their investment of exclusive data. The time has come to ask the question whether the grand bargain of "cool tools" in…
Descriptors: Information Policy, Confidential Records, Confidentiality, Electronic Libraries
Federal Trade Commission, 2012
Back to school--an annual ritual that includes buying new notebooks, packing lunches, coordinating transportation, and filling out forms: registration forms, health forms, permission slips, and emergency contact forms, to name a few. Many school forms require personal and, sometimes, sensitive information. In the wrong hands, this information can…
Descriptors: Federal Legislation, Records (Forms), Student Records, Confidential Records
Rubel, Alan; Zhang, Mei – College & Research Libraries, 2015
This is a study of the treatment of library patron privacy in licenses for electronic journals in academic libraries. We begin by distinguishing four facets of privacy and intellectual freedom based on the LIS and philosophical literature. Next, we perform a content analysis of 42 license agreements for electronic journals, focusing on terms for…
Descriptors: Electronic Journals, Electronic Libraries, Electronic Publishing, Online Vendors
Panter, Suzanna L. – Knowledge Quest, 2015
School librarians act as servants of the school community and protectors of students' rights, and it is the ethical duty of school librarians to champion student privacy and resist threats to it. This article addresses the legality of this process based upon the 2007 article "How Does the Family Rights and Privacy Act [FERPA] Affect You"…
Descriptors: School Libraries, Librarians, Library Administration, Library Services
Jobs For the Future, 2015
This brief highlights strategies for strengthening education and employment pathways for youth and adults returning from correctional facilities and notes key questions that new research should answer. It also explores barriers to employment for people with criminal records--whether or not they have been incarcerated--and potential policy…
Descriptors: Reentry Students, Institutionalized Persons, Correctional Institutions, Employment Potential
Sawchuk, Stephen – Education Week, 2012
As the movement to overhaul teacher evaluation marches onward, an emerging question is splitting the swath of advocates who support the new tools used to gauge teacher performance: Who should get access to the resulting information? Supporters of typing teacher evaluations to student performance differ over whether individuals' results should be…
Descriptors: Teacher Evaluation, Access to Information, Disclosure, Legal Responsibility
Cirella, David – Computers in Libraries, 2012
A diverse group, account-based services include a wide variety of sites commonly used by patrons, including online shopping sites, social networks, photo- and video-sharing sites, banking and financial sites, government services, and cloud-based storage. Whether or not a piece of information is obtainable online must be considered when creating…
Descriptors: Literacy, Internet, Social Networks, Library Instruction
Toe, Cleophas Adeodat – ProQuest LLC, 2013
Data security breaches are categorized as loss of information that is entrusted in an organization by its customers, partners, shareholders, and stakeholders. Data breaches are significant risk factors for companies that store, process, and transmit sensitive personal information. Sensitive information is defined as confidential or proprietary…
Descriptors: Information Security, Costs, Corporations, Information Management

Peer reviewed
Direct link
