Publication Date
In 2025 | 0 |
Since 2024 | 0 |
Since 2021 (last 5 years) | 0 |
Since 2016 (last 10 years) | 0 |
Since 2006 (last 20 years) | 1 |
Descriptor
Data Collection | 3 |
Privacy | 3 |
Databases | 2 |
Ethics | 2 |
Laws | 2 |
Access to Information | 1 |
Administrator Responsibility | 1 |
Best Practices | 1 |
Civil Liberties | 1 |
Computer Networks | 1 |
Confidential Records | 1 |
More ▼ |
Author
Rubin, Michael Rogers | 2 |
Publication Type
Journal Articles | 2 |
Opinion Papers | 2 |
Reports - Descriptive | 2 |
Guides - Non-Classroom | 1 |
Information Analyses | 1 |
Education Level
Elementary Secondary Education | 1 |
Audience
Media Staff | 3 |
Administrators | 2 |
Practitioners | 2 |
Laws, Policies, & Programs
Family Educational Rights and… | 1 |
Assessments and Surveys
What Works Clearinghouse Rating
National Forum on Education Statistics, 2010
Each and every day, educators collect and use data about students, staff, and schools. Some of these data originate in individual student and staff records that are confidential or otherwise sensitive. And even those data that are a matter of public record, such as aggregate school enrollment, need to be accessed, presented, and used in an…
Descriptors: Data, Data Collection, Student Records, Information Utilization

Rubin, Michael Rogers – Library Hi Tech, 1988
The second of three articles on abusive data collection and usage practices and their effect on personal privacy, discusses the evolution of data protection laws worldwide, and compares the scope, major provisions, and enforcement components of the laws. A chronology of key events in the regulation of computer databanks in included. (1 reference)…
Descriptors: Data Collection, Databases, Foreign Countries, Global Approach

Rubin, Michael Rogers – Library Hi Tech, 1987
Describes the development and current uses of computerized databases of information about individuals by the government and private agencies, especially credit bureaus, and discusses three major categories of abusive information practices that threaten personal privacy: information collection, information dissemination, and information management…
Descriptors: Civil Liberties, Computer Networks, Confidential Records, Credit (Finance)