Publication Date
| In 2026 | 0 |
| Since 2025 | 167 |
| Since 2022 (last 5 years) | 600 |
| Since 2017 (last 10 years) | 1229 |
| Since 2007 (last 20 years) | 2104 |
Descriptor
Source
Author
Publication Type
Education Level
Audience
| Practitioners | 125 |
| Policymakers | 95 |
| Teachers | 87 |
| Administrators | 81 |
| Researchers | 33 |
| Parents | 31 |
| Media Staff | 27 |
| Students | 25 |
| Counselors | 17 |
| Community | 5 |
| Support Staff | 5 |
| More ▼ | |
Location
| United States | 80 |
| Australia | 79 |
| Canada | 79 |
| United Kingdom | 62 |
| California | 61 |
| Turkey | 38 |
| China | 31 |
| Pennsylvania | 28 |
| Texas | 27 |
| Florida | 26 |
| North Carolina | 24 |
| More ▼ | |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Peer reviewedHildreth, Gladys J.; Hoyt, Carolyn D. – Journal of Home Economics, 1981
Explores the broad meaning of the term "privacy" and focuses on ways teachers and parents can help create social and physical settings whereby young children can live and work as free-functioning individuals. (CT)
Descriptors: Childhood Needs, Family Environment, Parent Responsibility, Privacy
Peer reviewedHarris, Thomas L. – Journal for Specialists in Group Work, 1980
Examined the relationship between willingness to self-disclose in a group and trust. Participants with high trust levels were more willing to self-disclose than participants with low trust levels. (Author)
Descriptors: Counselors, Credibility, Group Dynamics, Peer Groups
Peer reviewedMcGuire, Joseph P.; Leak, Gary K. – Journal of Clinical Psychology, 1980
Prior theory and research have suggested that self-disclosure may have a curvilinear relationship with psychological disturbance. The present study investigated this hypothesis. Results offer partial support for the hypothesis and add substantially to the external validity of prior research. (Author)
Descriptors: Criminals, Emotional Disturbances, Males, Personality Assessment
Linowes, David F. – Personnel Administrator, 1980
Discusses the results of a survey of the policies companies have adopted to protect confidential employee data and the findings of the U.S. Privacy Protection Study Commission. (Author/IRT)
Descriptors: Confidential Records, Confidentiality, Employees, Organizations (Groups)
Adams, David L. – Scholastic Editor, 1980
Explains in basic terms legal principles that form the bases for libel and invasion of privacy--all of which should be known to those involved in the process of publishing or broadcast of student media. (HOD)
Descriptors: Accountability, Freedom of Speech, Legal Responsibility, Privacy
Burkoff, John M. – Oregon Law Review, 1979
Highlights some areas of Fourth Amendment doctrinal inconsistencies in Supreme Court decisions and recommends how these inconsistencies can and should be resolved. Available from School of Law, University of Oregon, Eugene, Oregon 97403. (Author/IRT)
Descriptors: Civil Liberties, Constitutional Law, Privacy, Search and Seizure
Peer reviewedFreese, Jan – Journal of Communication, 1979
Argues that the flow of data within and across national borders involves problems that need to be regulated by law. Calls for international cooperation to insure that society is protected from abuses of data flow. (PD)
Descriptors: Information Dissemination, Information Networks, International Law, International Relations
Peer reviewedCreim, William B. – Southern California Law Review, 1979
The Buckley Amendment limits the right of access to letters of recommendation only to admitted students and allows schools to request that applicants sign a waiver of their access rights. Statutory amendment is the best way to correct this "catch 22" situation. Available from The Law Center, University of Southern California, University…
Descriptors: Admission (School), College Applicants, Confidential Records, Higher Education
Peer reviewedGannon-Leary, Pat – Electronic Library, 1997
As a result of litigation, a number of companies have written policies declaring the right to monitor employee electronic communication. Discusses reasons why employers monitor employee e-mail, the prevalence of monitoring in universities, use and ethics policy statements, and bills of rights statements protecting employee privacy. (PEN)
Descriptors: Electronic Mail, Ethics, Higher Education, Information Policy
Peer reviewedBushong, Sara – Teacher Librarian, 2002
Presents general statistical findings of Internet use by children, discusses the recent Children's Online Privacy Protection Act (COPPA), and summarizes online child safety considerations. Considers filtering and includes current resources for parents and children. (Author/LRW)
Descriptors: Children, Federal Legislation, Internet, Parent Participation
Peer reviewedBanja, John D.; Higgins, Patricia – Journal of Head Trauma Rehabilitation, 1989
The article examines the usefulness of videotaping therapeutic sessions in rehabilitation settings and provides suggestions for rehabilitation professionals contemplating videotaping in light of the patient's legal and ethical right to privacy. (Author/DB)
Descriptors: Civil Rights, Disabilities, Ethics, Legal Problems
Peer reviewedWoodward, Beverly – Advancing the Consumer Interest, 1996
Information technology poses a threat to confidentiality of medical records. The number of parties claiming a need to know is increasing, but unrestricted access can lead to improper disclosure. Making health records semipublic may affect when and how people choose to obtain medical services. (SK)
Descriptors: Access to Information, Confidentiality, Databases, Medical Services
Peer reviewedKennedy, Michael J. – Mental Retardation, 1994
An individual with a disability complains that under the blanket term "disabled" individual needs and rights are not respected, privacy is invaded, people are always being evaluated but never asked to evaluate services they receive, and everything must be part of a "program" rather than just part of daily life. (JDD)
Descriptors: Disabilities, Evaluation, Independent Living, Individualized Programs
Peer reviewedGovernment Information Quarterly, 1992
The increased use of computer matching to detect fraud and abuse in government programs has led to concerns for the privacy of personal information. Reviews the use of matching programs and regulations in Canada, the United States, and the European Community, and suggests policy changes. (80 references) (LAE)
Descriptors: Confidential Records, Federal Regulation, Foreign Countries, Information Technology
Flanders, Bruce – American Libraries, 1991
Discusses issues involved in the creation of the National Research and Education Network (NREN). Telecommunications technology is described; support from industry and libraries is discussed; and problems with NREN are raised, including equal access to computerized information, privacy issues, and protection of First Amendment rights. (LRW)
Descriptors: Access to Information, Computer Networks, Library Networks, Privacy


