Publication Date
In 2025 | 2 |
Since 2024 | 2 |
Since 2021 (last 5 years) | 2 |
Since 2016 (last 10 years) | 5 |
Since 2006 (last 20 years) | 24 |
Descriptor
Confidential Records | 171 |
Disclosure | 171 |
Privacy | 97 |
Confidentiality | 74 |
Higher Education | 54 |
Student Records | 54 |
Federal Legislation | 48 |
Court Litigation | 43 |
Student Rights | 37 |
Elementary Secondary Education | 28 |
Compliance (Legal) | 25 |
More ▼ |
Source
Author
Publication Type
Education Level
Higher Education | 8 |
Elementary Secondary Education | 4 |
Postsecondary Education | 4 |
Adult Education | 2 |
Elementary Education | 1 |
Two Year Colleges | 1 |
Audience
Practitioners | 24 |
Administrators | 13 |
Teachers | 5 |
Media Staff | 4 |
Policymakers | 2 |
Community | 1 |
Counselors | 1 |
Parents | 1 |
Researchers | 1 |
Students | 1 |
Location
Canada | 5 |
New York | 3 |
Oregon | 3 |
United States | 3 |
Iowa | 2 |
Australia | 1 |
California | 1 |
Colorado | 1 |
Florida | 1 |
Ghana | 1 |
Ireland | 1 |
More ▼ |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Sonia Ranieri; Michela Zambelli; Laura Ferrari; Semira Tagliabue; Rosa Rosnati; David Brodzinsky – International Journal of Behavioral Development, 2025
This study investigates the psychometric properties of the Adoption Communication Openness (ACO) Scale. Following a multi-informant approach, the study considered four versions of the ACO Scale to assess the child's perception of adoption communication openness with both mother and father and the mother's and father's perceptions of communication…
Descriptors: Foreign Countries, Adoption, Adolescents, Parents
Vanessa Miller – Educational Researcher, 2025
The surveillance and securitization of schools has transformed over the last decade to include predictive analytics and algorithms. In Florida, for example, the Pasco Sheriff's Office used school record data sets to identify and monitor youth they believed were "destined for a life of crime." Yet the extent of big data policing as a…
Descriptors: Elementary Secondary Education, Student Rights, Student Records, Confidential Records
Hewitt, Rachel; Natzler, Michael – Higher Education Policy Institute, 2019
Higher education institutions collect and hold huge amounts of data on students, whether for regulatory purposes or to gather information about students' experiences. In this report we explore students views on data security, learning analytics and the information universities hold and share on students' health and wellbeing. [This report was…
Descriptors: Information Security, Student Attitudes, Young Adults, Learning Analytics
Amponsah, Emmanuel B.; Boateng, Peter Agyekum; Onuoha, Luke N. – Journal of Education and Practice, 2016
This paper examined ways by which nonconformity to confidentiality among accounting academics could lead to increased-recruitment-and-legal-costs to their employing universities in Ghana that offered accounting degree programmes. With a cross-sectional design, data collected from 1,225 accountants analysed via Cronbach's alpha,…
Descriptors: Foreign Countries, College Faculty, Accounting, Confidentiality
Davenport, Robin G. – Journal of College Student Psychotherapy, 2017
The formation of integrated centers on college campuses that combine health services and counseling provide clear advantages for students. There is currently no "best practices" model that informs integrated centers' operational procedures. The "continuity of care" requirement of medical providers can conflict with the strict…
Descriptors: Counseling Services, Campuses, Patients, Informed Consent
Patton, Madeline – Community College Journal, 2015
Data breach prevention is a battle, rarely plain and never simple. For higher education institutions, the Sisyphean aspects of the task are more complex than for industry and business. Two-year colleges have payrolls and vendor contracts like those enterprises. They also have public record and student confidentiality requirements. Colleges must…
Descriptors: Disclosure, Computer Security, Confidential Records, Confidentiality
Freedman, Gordon – Policy Futures in Education, 2014
The information giants, Google being the largest, trade every day and build high-valuation mega-opolies on the back of very personal information without including their sources of value with any tangible return for their investment of exclusive data. The time has come to ask the question whether the grand bargain of "cool tools" in…
Descriptors: Information Policy, Confidential Records, Confidentiality, Electronic Libraries
Sawchuk, Stephen – Education Week, 2012
As the movement to overhaul teacher evaluation marches onward, an emerging question is splitting the swath of advocates who support the new tools used to gauge teacher performance: Who should get access to the resulting information? Supporters of typing teacher evaluations to student performance differ over whether individuals' results should be…
Descriptors: Teacher Evaluation, Access to Information, Disclosure, Legal Responsibility
Levinson-Waldman, Rachel; O'Neil, Robert – Trusteeship, 2012
In an era of demands for greater accountability in higher education, an increasingly polarized political environment, and scandals such as that at Penn State, access to information is becoming everyone's business, affecting public and independent institutions alike. Although Freedom of Information Act (FOIA) demands are often annoying or…
Descriptors: Higher Education, Access to Information, Governance, Governing Boards
Veltsos, Jennifer R. – Business Communication Quarterly, 2012
Forty-six states require organizations to notify users when personally identifiable information has been exposed or when the organization's data security measures have been breached. This article describes a qualitative document analysis of 13 data breach notification templates from state and federal agencies. The results confirm much of the…
Descriptors: Information Security, Compliance (Legal), Disclosure, Models
Bradley, Loretta J.; Hendricks, Bret; Kabell, Douglas R. – Family Journal: Counseling and Therapy for Couples and Families, 2011
In an era of increased need and expectation for confidentiality, the counseling record of the deceased client challenges confidentiality. Using ethical codes and legal mandates, the authors explore whether the counseling record of a deceased client should be released when the client's will and the client's counseling records are silent on this…
Descriptors: Confidentiality, Ethics, Compliance (Legal), Legal Problems
Hanafin, Joan; O'Donoghue, Tom; Flynn, Marie; Shevlin, Michael – Educational Studies, 2010
Privacy has been defined as "the protective buffer within which people can avoid another party's taking something from them, keeping watch over them, or entering into their lives in a way that is both unwelcome and undesirable". It is a premise of this paper that such a position needs to be taken very seriously in contemporary society,…
Descriptors: Educational Practices, Elementary Education, Privacy, Childrens Rights
Data Quality Campaign, 2011
Under security breach response laws, businesses--and sometimes state and governmental agencies--are required to inform individuals when the security, confidentiality or integrity of their personal information has been compromised. This resource provides a state-by-state analysis of security breach response laws. [The Data Quality Campaign has…
Descriptors: State Legislation, Federal Legislation, Laws, Information Security
Parry, Marc – Chronicle of Higher Education, 2012
Colleges share many things on Twitter, but one topic can be risky to broach: the reading habits of library patrons. Patrons' privacy is precious to most librarians. Yet new Web services thrive on collecting and sharing the very information that has long been protected. This points to an emerging tension as libraries embrace digital services.…
Descriptors: Academic Libraries, Internet, Reading Habits, Influence of Technology
Soler, Mark; Breglio, Amy – Abell Foundation, 2010
Any analysis of confidentiality laws begins with a discussion of the interests involved. Children and families involved in the juvenile justice system have important interests in keeping their records confidential, yet, at the same time, when youth under the care or custody of state or local agencies commit violent crimes, or are the victims of…
Descriptors: At Risk Students, Confidential Records, Confidentiality, Juvenile Justice