Descriptor
Confidential Records | 8 |
Data Processing | 8 |
Databases | 8 |
Confidentiality | 5 |
Information Systems | 5 |
Computers | 3 |
Information Storage | 3 |
Security | 3 |
Computer Storage Devices | 2 |
Disclosure | 2 |
Information Science | 2 |
More ▼ |
Author
Boruch, Robert F. | 3 |
Astin, Alexander W. | 1 |
Darrow, J. W. | 1 |
Liu, Yung-Ying | 1 |
Seipp, David J. | 1 |
Slivka, R. T. | 1 |
Publication Type
Reference Materials -… | 2 |
Reports - Evaluative | 1 |
Reports - Research | 1 |
Education Level
Audience
Location
United States | 1 |
Laws, Policies, & Programs
Family Educational Rights and… | 2 |
Privacy Act 1974 | 2 |
Assessments and Surveys
What Works Clearinghouse Rating
Liu, Yung-Ying – 1974
Materials in the Library of Congress (LC) concerned with the topic of privacy and security in computer systems are listed in this "LC Science Tracer Bullet." The guide includes a total of 59 sources: (1) an introductory source; (2) relevant LC subject headings; (3) basic and additional texts; (4) handbooks, encyclopedias, and…
Descriptors: Computers, Confidential Records, Confidentiality, Data Processing
Darrow, J. W.; Slivka, R. T. – Rutgers Journal of Computers and the Law, 1976
Both accidental and intentional events may compromise the security of an electronic data processing system. Ways of assessing security needs are surveyed, and measures that can be taken to prevent, detect, and recover from security breaches are described. (Author/LBH)
Descriptors: Computer Storage Devices, Computers, Confidential Records, Data Processing

Boruch, Robert F. – Sociology of Education, 1971
The ACE Data Base is compared to others. Devises for maintenance of confidentiality in data collection, transmission, and analysis are evaluated, as well as administrative and ethical regulations, and computer processing. Recommendations follow. (Author/DB)
Descriptors: Civil Liberties, Computers, Confidential Records, Data Processing
Boruch, Robert F. – 1971
This report examines a series of general models that represent the process of merging records from separate files when it becomes essential to inhibit identifiability of records in at least one of the files. Models are illustrated symbolically by flow diagrams, and examples of each variation are taken from the social sciences. These variations…
Descriptors: Administrative Principles, Confidential Records, Confidentiality, Data Processing
Astin, Alexander W.; Boruch, Robert F. – 1970
The purpose of this article is to describe a system for protecting the anonymity of subjects in longitudinal research and for maintaining the security of data files. The basic system comes from the American Council on Education Cooperative Institutional Research Program. Data is collected from questionnaires, and converted to magnetic tape.…
Descriptors: Computer Storage Devices, Confidential Records, Data Processing, Databases
Privacy Protection Study Commission, Washington, DC. – 1977
This report of the Privacy Protection Study Commission was prepared in response to a Congressional mandate to study data banks, automatic data processing programs, and information systems of governmental, regional and private organizations to determine standards and procedures in force for the protection of personal information. Recommendations…
Descriptors: Confidential Records, Confidentiality, Data Processing, Databases
Congress of the U.S., Washington, DC. Office of Technology Assessment. – 1993
This report analyzes the implications of computerized medical information and the challenges it brings to individual privacy. The report examines the nature of the privacy interest in health care information and the current state of the law protecting that information; the nature of proposals to computerize health care information and the…
Descriptors: Access to Information, Automation, Computer Networks, Confidential Records
Seipp, David J. – 1975
Concern is growing over the problems of freedom of information, individual right to privacy, and automated recordkeeping systems. As a guide to policy considerations for overview and for detail, this extensive structured bibliography of privacy and disclosure literature adopts a topical scheme, dividing the subject first into governmental and…
Descriptors: Bibliographies, Civil Rights, Computer Science, Confidential Records