Publication Date
| In 2026 | 0 |
| Since 2025 | 167 |
| Since 2022 (last 5 years) | 600 |
| Since 2017 (last 10 years) | 1229 |
| Since 2007 (last 20 years) | 2104 |
Descriptor
Source
Author
Publication Type
Education Level
Audience
| Practitioners | 125 |
| Policymakers | 95 |
| Teachers | 87 |
| Administrators | 81 |
| Researchers | 33 |
| Parents | 31 |
| Media Staff | 27 |
| Students | 25 |
| Counselors | 17 |
| Community | 5 |
| Support Staff | 5 |
| More ▼ | |
Location
| United States | 80 |
| Australia | 79 |
| Canada | 79 |
| United Kingdom | 62 |
| California | 61 |
| Turkey | 38 |
| China | 31 |
| Pennsylvania | 28 |
| Texas | 27 |
| Florida | 26 |
| North Carolina | 24 |
| More ▼ | |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Trubow, George B. – 1978
Policies and issues associated with the privacy and security of criminal history information are presented. The first chapter discusses general concepts regarding privacy and security of criminal justice information, including definitions of basic terms, considerations of interests requiring attention when developing policy, relevance of fair…
Descriptors: Civil Rights, Criminal Law, Criminals, Information Storage
Boruch, Robert F.; Cecil, Joseph S. – 1978
This paper examines the effects of Privacy laws on the conduct of legitimate social research. The report focuses on national legislation dealing with individual privacy, in particular the Privacy Act of 1974, and considers several new statutes which concern the privacy of participants in research. A large portion of the paper discusses (1)…
Descriptors: Confidential Records, Confidentiality, Data, Data Collection
Archer, Richard L.; And Others – 1980
Recent attempts to clear up the controversy over when and why receipt of an intimate self-disclosure leads to attraction in a first encounter have called attention to the possible role of the perceiver's own disclosure. To investigate the influence of the perceiver's own disclosure on attraction to a disclosing stimulus person, female subjects…
Descriptors: Behavior Patterns, Behavioral Science Research, Communication (Thought Transfer), Confidentiality
Everett, Cindy J. B. – 1980
The foundations of the public's right to know what the government is doing and the limitations placed on that right are explored in this paper. The role of the press in furthering the people's right to know is also discussed. Sections in the paper deal with the following topics: (1) general and historical thought on the right to know; (2) the…
Descriptors: Civil Liberties, Court Litigation, Disclosure, Federal Courts
Larsen, Kent S., Ed. – 1975
Materials in this resource document were compiled for use in a Washington seminar directed to the interests of state and local government to develop strategies for privacy protection. Included are the texts of issue papers and supporting documents in the following subject areas: (1) criminal justice information; (2) public employee records; (3)…
Descriptors: Computers, Conference Reports, Confidentiality, Consumer Protection
National School Boards Association, Waterford, CT. Educational Policies Service. – 1972
This report of policy samples is the 17th in a continuing series of kit-booklets issued to help school boards develop written policies in key subject areas. The intent in providing samples is to encourage thinking in policy terms; and to provide working papers to be edited, modified, or adapted to meet local requirements. Policy samples herein…
Descriptors: Board of Education Policy, Confidential Records, Confidentiality, Guidelines
Peer reviewedSteinbach, Sheldon Elliot – Educational Record, 1976
A new bill, H. R. 1984, a comprehensive legislative approach to privacy issues, would regulate the uses and sources, retention, storage, and handling of personal information in private industry--including colleges and universities. The author explores the issues applicable to higher education and makes proposals that reflect its concerns.…
Descriptors: Administrator Attitudes, Civil Liberties, Confidential Records, Constitutional Law
Peer reviewedSolomon, Warren; Birkes, Keith – Social Education, 1979
Discusses assumptions underlying human need for privacy. Provides case studies and teaching strategies related to privacy, constitutional principles, legal cases, and decision making. Strategies include role playing, class discussion, writing, and art projects. (KC)
Descriptors: Citizenship, Civil Liberties, Class Activities, Constitutional Law
Peer reviewedBerg, John L. – Social Education, 1978
Discusses ways in which children can be harmed by information collected and analyzed by schools and identifies ways in which the Family Educational Rights and Privacy Act has enabled parents to participate in the education of their children. (Author/DB)
Descriptors: Data Collection, Educational Legislation, Educational Responsibility, Elementary Secondary Education
Peer reviewedClark, Todd – Social Education, 1978
Discusses data collection ability of modern technological societies and evaluates the extent to which this ability constitutes an invasion of privacy and freedom. Maintains that social studies teachers have a special responsibility to help students understand pressing social problems such as invasions of indivudual freedom. (Author/DB)
Descriptors: Data Collection, Educational Problems, Educational Responsibility, Elementary Secondary Education
Peer reviewedGibelman, Margaret; Grant, Stuart – Child Welfare, 1978
Reports results of a national survey on the use of computerized central registry systems as in child protective services, the perceived advantages and disadvantages of such systems and the extent to which protections have been established against potential abuse of individual civil rights. A need for further study of central registries is…
Descriptors: Child Abuse, Child Welfare, Civil Liberties, Data Processing
Peer reviewedMcGough, Kris – Social Education, 1978
Presents a parent's perspective that educational research projects in the public schools are potentially dangerous to children because of the risks of invasion of privacy, overtesting, labeling, and disruption of routine. (AV)
Descriptors: Civil Liberties, Educational Policy, Educational Research, Elementary Secondary Education
Peer reviewedSchtaken, Steven N. – Journal of College and University Law, 1977
Areas of privacy protection provided by FERPA are discussed and related to: coverage of institutions; former students; admissions records and letters of recommendation; exclusion of private records, law enforcement records, and employment records from education records; student access to records; challenges to information in records; disclosure;…
Descriptors: Civil Liberties, Compliance (Legal), Disclosure, Federal Legislation
Peer reviewedGarbarino, James – Child Welfare, 1977
Discusses patterns of child abuse, the role of privacy, and the dangers of family isolation which permits child abuse when stress and parental instability are present. Decries trend away from "instrusive kinship and neighborhood networks," and calls for support for abuse-monitoring systems. (BF)
Descriptors: Child Abuse, Child Advocacy, Child Welfare, Family Problems
Peer reviewedSmith, Joyce D.; Shaffer, David R. – Social Behavior and Personality, 1986
Female subjects high in private self-consciousness provided more assistance to a person in need than did subjects low on this attribute. "High-private" subjects were less helpful if they were also high in public self-consciousness. Self-reported altruism, reliably predicted the helping behavior of subjects high as opposed to low in…
Descriptors: Altruism, College Students, Females, Helping Relationship


