NotesFAQContact Us
Collection
Advanced
Search Tips
Publication Date
In 20250
Since 20240
Since 2021 (last 5 years)0
Since 2016 (last 10 years)0
Since 2006 (last 20 years)11
Assessments and Surveys
What Works Clearinghouse Rating
Showing 1 to 15 of 24 results Save | Export
Peer reviewed Peer reviewed
Direct linkDirect link
Patton, Madeline – Community College Journal, 2015
Data breach prevention is a battle, rarely plain and never simple. For higher education institutions, the Sisyphean aspects of the task are more complex than for industry and business. Two-year colleges have payrolls and vendor contracts like those enterprises. They also have public record and student confidentiality requirements. Colleges must…
Descriptors: Disclosure, Computer Security, Confidential Records, Confidentiality
Sawchuk, Stephen – Education Week, 2012
As the movement to overhaul teacher evaluation marches onward, an emerging question is splitting the swath of advocates who support the new tools used to gauge teacher performance: Who should get access to the resulting information? Supporters of typing teacher evaluations to student performance differ over whether individuals' results should be…
Descriptors: Teacher Evaluation, Access to Information, Disclosure, Legal Responsibility
Schmidt, Peter – Chronicle of Higher Education, 2012
The author reports on a legal battle over oral-history records housed at Boston College that casts light on how little legal weight pledges of confidentiality to research subjects actually have. As a federal court weighs whether to let the federal government seize, and hand over to British authorities, the college's records of confidential…
Descriptors: Academic Freedom, Confidentiality, Court Litigation, Foreign Countries
Alawneh, John – School Business Affairs, 2012
Whenever thousands of users need to connect seamlessly to a vast number of online resources, identity management (IDM) becomes a critical capability. Although several products on the market can deliver a robust identity management solution, there is no one-size-fits-all. Identity management requires business processes and a supporting…
Descriptors: Access to Information, Automation, Information Networks, Information Policy
Levinson-Waldman, Rachel; O'Neil, Robert – Trusteeship, 2012
In an era of demands for greater accountability in higher education, an increasingly polarized political environment, and scandals such as that at Penn State, access to information is becoming everyone's business, affecting public and independent institutions alike. Although Freedom of Information Act (FOIA) demands are often annoying or…
Descriptors: Higher Education, Access to Information, Governance, Governing Boards
Steketee, Amy M. – District Administration, 2012
The nature of school security has changed dramatically over the last decade. Schools employ various measures, from metal detectors to identification badges to drug testing, to promote the safety and security of staff and students. One of the increasingly prevalent measures is the use of security cameras. In fact, the U.S. Department of Education…
Descriptors: School Security, School Districts, School Administration, Central Office Administrators
Peer reviewed Peer reviewed
Direct linkDirect link
Bradley, Loretta J.; Hendricks, Bret; Kabell, Douglas R. – Family Journal: Counseling and Therapy for Couples and Families, 2011
In an era of increased need and expectation for confidentiality, the counseling record of the deceased client challenges confidentiality. Using ethical codes and legal mandates, the authors explore whether the counseling record of a deceased client should be released when the client's will and the client's counseling records are silent on this…
Descriptors: Confidentiality, Ethics, Compliance (Legal), Legal Problems
Parry, Marc – Chronicle of Higher Education, 2012
Colleges share many things on Twitter, but one topic can be risky to broach: the reading habits of library patrons. Patrons' privacy is precious to most librarians. Yet new Web services thrive on collecting and sharing the very information that has long been protected. This points to an emerging tension as libraries embrace digital services.…
Descriptors: Academic Libraries, Internet, Reading Habits, Influence of Technology
Peer reviewed Peer reviewed
Direct linkDirect link
McClanahan, Kitty – Bulletin of Science, Technology & Society, 2008
Electronic information is a vital but complex component in the modern health care system, fueling ongoing efforts to develop a universal electronic health record infrastructure. This innovation creates a substantial tension between two desirable values: the increased quality and utility of patient medical records and the protection of the privacy…
Descriptors: Medical Services, Medical Education, Privacy, Confidential Records
Peer reviewed Peer reviewed
Direct linkDirect link
Baker, Thomas R. – New Directions for Student Services, 2008
This chapter describes the relationship between federal student privacy laws and state privacy laws, and identifies the changes in the federal law over the last ten years affecting disclosure to parents of college students. Recent litigation on health emergencies is outlined and the limited rights of college students not yet eighteen years of age…
Descriptors: College Students, Access to Information, Privacy, Information Policy
Seelig, Richard – Exceptional Parent, 2006
Fernando Viesca has a 24-year-old son who suffers from Angelman Syndrome, a little known chromosomal disorder that has left him with significant functional deficiencies. When Nando lived at home, his father took care of him full time, thus alleviating any worries about medical care. However, now that Nando lives in a group home, his father is no…
Descriptors: Developmental Disabilities, Information Technology, Access to Information, Case Records
Blum, Debra E. – Chronicle of Higher Education, 1990
Institutions letting tenure candidates look at their review files report that openness boosts faculty morale and instills confidence that tenure decisions are fair. (MSE)
Descriptors: Access to Information, College Faculty, Confidential Records, Decision Making
Nicklin, Julie L. – Chronicle of Higher Education, 1997
Increasingly, in response to donor concerns, college fund raisers are purging from their files donor information that is not directly related to gifts and may be sensitive if released under subpoena for probate court or open-records laws. In some cases, the reduction in information makes fund raising more difficult. (MSE)
Descriptors: Access to Information, Confidential Records, Confidentiality, Donors
Peer reviewed Peer reviewed
Rapaport, Edmund; Samuelson, Per – Government Publications Review, 1991
Discusses record keeping and the preservation of archival materials for research purposes in Sweden. Concerns of privacy and confidentiality are addressed, the Swedish principle of access to public materials is described, the use of archival material for statistical research is discussed, and methods for balancing privacy and record keeping are…
Descriptors: Access to Information, Archives, Confidential Records, Foreign Countries
Peer reviewed Peer reviewed
Robbin, Alice – Journal of Government Information, 2001
Chronicles public opinion, politics, and law and policy on privacy and confidentiality and their consequences for access by the social research community to government administrative and statistical records. Discusses the political environment, the decennial census long form, media coverage, and fears about the accumulation of personal information…
Descriptors: Access to Information, Confidential Records, Government Publications, Literature Reviews
Previous Page | Next Page ยป
Pages: 1  |  2