Descriptor
Confidential Records | 7 |
Data Processing | 7 |
Information Systems | 7 |
Databases | 5 |
Confidentiality | 3 |
Disclosure | 3 |
Computer Storage Devices | 2 |
Computers | 2 |
Higher Education | 2 |
Information Storage | 2 |
Privacy | 2 |
More ▼ |
Author
Astin, Alexander W. | 1 |
Boruch, Robert F. | 1 |
Darrow, J. W. | 1 |
Havens, Robert I. | 1 |
Seipp, David J. | 1 |
Seppanen, Loretta J. | 1 |
Slivka, R. T. | 1 |
Publication Type
Reports - Evaluative | 2 |
Guides - Non-Classroom | 1 |
Journal Articles | 1 |
Reference Materials -… | 1 |
Reports - Research | 1 |
Education Level
Audience
Administrators | 1 |
Practitioners | 1 |
Researchers | 1 |
Location
United States | 1 |
Laws, Policies, & Programs
Family Educational Rights and… | 2 |
Privacy Act 1974 | 2 |
Assessments and Surveys
What Works Clearinghouse Rating
Darrow, J. W.; Slivka, R. T. – Rutgers Journal of Computers and the Law, 1976
Both accidental and intentional events may compromise the security of an electronic data processing system. Ways of assessing security needs are surveyed, and measures that can be taken to prevent, detect, and recover from security breaches are described. (Author/LBH)
Descriptors: Computer Storage Devices, Computers, Confidential Records, Data Processing
Astin, Alexander W.; Boruch, Robert F. – 1970
The purpose of this article is to describe a system for protecting the anonymity of subjects in longitudinal research and for maintaining the security of data files. The basic system comes from the American Council on Education Cooperative Institutional Research Program. Data is collected from questionnaires, and converted to magnetic tape.…
Descriptors: Computer Storage Devices, Confidential Records, Data Processing, Databases
Privacy Protection Study Commission, Washington, DC. – 1977
This report of the Privacy Protection Study Commission was prepared in response to a Congressional mandate to study data banks, automatic data processing programs, and information systems of governmental, regional and private organizations to determine standards and procedures in force for the protection of personal information. Recommendations…
Descriptors: Confidential Records, Confidentiality, Data Processing, Databases
Havens, Robert I. – 1969
The purpose of this discussion is to acquaint pupil personnel workers with some of the applications of computer based information processing systems for pupil services and also to consider some of the legal and ethical concerns relative to data processing in counseling and guidance. Some of the uses discussed are: (1) scheduling; (2) student…
Descriptors: Computer Oriented Programs, Computer Science Education, Computers, Confidential Records
Congress of the U.S., Washington, DC. Office of Technology Assessment. – 1993
This report analyzes the implications of computerized medical information and the challenges it brings to individual privacy. The report examines the nature of the privacy interest in health care information and the current state of the law protecting that information; the nature of proposals to computerize health care information and the…
Descriptors: Access to Information, Automation, Computer Networks, Confidential Records
Seipp, David J. – 1975
Concern is growing over the problems of freedom of information, individual right to privacy, and automated recordkeeping systems. As a guide to policy considerations for overview and for detail, this extensive structured bibliography of privacy and disclosure literature adopts a topical scheme, dividing the subject first into governmental and…
Descriptors: Bibliographies, Civil Rights, Computer Science, Confidential Records

Seppanen, Loretta J. – New Directions for Institutional Research, 1995
College and university institutional researchers can use unemployment insurance wage and related files to describe and compare students' workplace status before, during, and after enrollment. However, some issues must be addressed, including data delays, uncovered employment and other work status, confidentiality of records, information…
Descriptors: College Administration, College Students, Computer Uses in Education, Confidential Records