NotesFAQContact Us
Collection
Advanced
Search Tips
What Works Clearinghouse Rating
Showing 2,116 to 2,130 of 3,396 results Save | Export
Anderson, David O. – 1980
Speaking on the operating policies and procedures of computer data bases containing information on students, the author divides his remarks into three parts: content decisions, data base security, and user access. He offers nine recommended practices that should increase the data base's usefulness to the user community: (1) the cost of developing…
Descriptors: Confidential Records, Databases, Design Requirements, Guidelines
And Others; Tomeski, Edward A. – Personnel, 1978
As computers continue to play an increasingly greater role in all segments of society, both government and business must begin to more vigorously attack the human-related problems they create before these problems become entrenched and impossible to rectify. (Author)
Descriptors: Civil Liberties, Computer Science, Databases, Personnel Management
Peer reviewed Peer reviewed
Petronio, Sandra; Martin, Judith N. – Journal of Clinical Psychology, 1986
Examined the frequency with which men and women anticipated disclosure of information in four topic areas: parental, achievement, sexual, and global. Findings indicate that men predicted more negative ramifications for all topics than women, while women predicted more positive ramifications than men. (Author/ABB)
Descriptors: Achievement, Negative Attitudes, Privacy, Self Disclosure (Individuals)
AGB Reports, 1985
Boards can reconcile necessary deviations from openness by recognizing the need to balance three public interest values: the public's right to know, the individual's right to privacy, and the institution's obligation to operate effectively. This was the conclusion of an AGB symposium reviewing Harlan Cleveland's book, "The Costs and Benefits…
Descriptors: College Administration, Confidentiality, Governing Boards, Higher Education
Peer reviewed Peer reviewed
Bortnick, Jane – Journal of the American Society for Information Science, 1985
Three aspects of transborder data flow debate (privacy protection, national and cultural sovereignty, economic development) provide illustrations of effect that national concerns have on formulation of international information policies. Development of information policies by national governments and the impacts these have on…
Descriptors: Economic Development, Foreign Countries, Global Approach, Information Networks
Peer reviewed Peer reviewed
Nuwer, Henry – Journalism Educator, 1986
Laments the "open office door" policy advertised in journalism department brochures and catalogs, arguing that students must learn protocol and the chain of command, and that faculty members cannot maintain teaching and scholarly efficiency in the face of countless informal interruptions from students "dropping in" for informal…
Descriptors: Higher Education, Journalism Education, Privacy, Teacher Attitudes
Updating School Board Policies, 1973
In 1973, the Department of Health Education and Welfare released advisory committee recommendations that could change the recordkeeping policies of schools and other public and private institutions. Discusses the committee's findings and their implications for the future. (JF)
Descriptors: Automation, Computers, Confidentiality, Federal Legislation
Updating School Board Policies, 1973
Provides safeguard requirements for administrative personal data systems which were drafted by the HEW Secretary's Advisory Committee on Automated Personal Data Systems. (JF)
Descriptors: Automation, Computers, Confidentiality, Federal Legislation
Rasmussen, Pat – Communication: Journalism Education Today (C:JET), 1980
Analyzes how privacy laws affect the student journalist. (RL)
Descriptors: Journalism Education, Laws, News Reporting, Privacy
Peer reviewed Peer reviewed
White, Peter – International Library Review, 1980
Explores the nature of privacy with regard to information about the individual and reviews governmental legislation affecting confidentiality in the United States, the United Kingdom, Canada, and Australia, focusing particularly on the role of computers and the library. (FM)
Descriptors: Computers, Confidential Records, Confidentiality, Legislation
Peer reviewed Peer reviewed
Perloff, Evelyn; Perloff, Judith K. – New Directions for Program Evaluation, 1980
Twenty-three journal articles on program evaluations were surveyed for incidence of four unethical practices: withholding purpose or mere existence of an evaluation from participants; exposure to stress; invasion of privacy; and denial of program benefits to control groups. Few violations were apparent. (CP)
Descriptors: Control Groups, Ethics, Experimental Groups, Privacy
Peer reviewed Peer reviewed
Lee, Laurie Thomas – New Jersey Journal of Communication, 1996
States that lawsuits are being filed that challenge anonymity and freedom of speech in cyberspace--is there a right to online anonymity? Examines the debate and issues associated with anonymous communications in cyberspace. Explores the "right of informational privacy" as it pertains to anonymity. Suggests some regulatory approaches for…
Descriptors: Freedom of Information, Freedom of Speech, Internet, Legal Problems
Peer reviewed Peer reviewed
Scaraglino, Pietrina – Journal of College and University Law, 2003
Identifies and summarizes key provisions of the privacy regulations of the Health Insurance Portability and Accountability Act of 1996 (HIPAA). Suggests approaches a university can take to achieve compliance with those provisions, and discusses issues raised by the privacy regulations that are of particular relevance to the academic community. (EV)
Descriptors: Compliance (Legal), Confidential Records, Disclosure, Federal Legislation
Foster, Andrea L. – Chronicle of Higher Education, 2002
Describes how student activism has prompted a number of colleges to begin phasing out their use of Social Security numbers in databases. (EV)
Descriptors: Activism, College Students, Confidential Records, Higher Education
Peer reviewed Peer reviewed
Flaherty, David H. – Government Information Quarterly, 1988
Considers the advent of surveillance societies--(i.e.,) societies where integrated surveillance of individuals is possible through various automated databases--with examples drawn from Canada and Sweden. Legislative efforts to regulate such developments and the role of data protection agencies are discussed. (13 references) (MES)
Descriptors: Databases, Foreign Countries, Futures (of Society), Information Technology
Pages: 1  |  ...  |  138  |  139  |  140  |  141  |  142  |  143  |  144  |  145  |  146  |  ...  |  227