Publication Date
| In 2026 | 0 |
| Since 2025 | 167 |
| Since 2022 (last 5 years) | 600 |
| Since 2017 (last 10 years) | 1229 |
| Since 2007 (last 20 years) | 2104 |
Descriptor
Source
Author
Publication Type
Education Level
Audience
| Practitioners | 125 |
| Policymakers | 95 |
| Teachers | 87 |
| Administrators | 81 |
| Researchers | 33 |
| Parents | 31 |
| Media Staff | 27 |
| Students | 25 |
| Counselors | 17 |
| Community | 5 |
| Support Staff | 5 |
| More ▼ | |
Location
| United States | 80 |
| Australia | 79 |
| Canada | 79 |
| United Kingdom | 62 |
| California | 61 |
| Turkey | 38 |
| China | 31 |
| Pennsylvania | 28 |
| Texas | 27 |
| Florida | 26 |
| North Carolina | 24 |
| More ▼ | |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Peer reviewedVidmar, Neil; Flaherty, David H. – Journal of Communication, 1985
Surveyed attitudes toward the importance of privacy, seriousness of various privacy invasions, organizations that are trusted or mistrusted, etc. Concluded, among other findings, that most respondents were wary of possible invasions of privacy by the government but preferred government regulation of data collection by private businesses to…
Descriptors: Adults, Attitudes, Business, Cable Television
Flygare, Thomas J. – Phi Delta Kappan, 1986
A recent Supreme Court decision on a First Amendment case involving a teacher in Texas illustrates how teachers' and other public employees' rights to freedom of speech face serious erosion. The problem is deciding whether grievances fall into the protected area of "public concern" or the unprotected area of a "purely private…
Descriptors: Confidentiality, Court Litigation, Elementary Secondary Education, Government Employees
Peer reviewedRotegard, Lisa L.; And Others – Mental Retardation, 1983
Court rulings and legislation are cited in a discussion of institutionalized mentally retarded persons' rights to privacy. The authors emphasize the need to restructure job responsibilities and/or descriptions to ensure appropriate resident-staff relations for dressing, bathing, toileting, and other private activities. (CL)
Descriptors: Civil Rights, Court Litigation, Federal Legislation, Hygiene
Ficklen, Ellen – American School Board Journal, 1985
The pros and cons of financial disclosure laws of varying strictness and their effects on school board members are discussed. Recent trends are noted and a tabulation is provided of the statutory requirements concerning disclosure of personal finances and campaign contributions in all 50 states and the District of Columbia. (PGD)
Descriptors: Boards of Education, Elementary Secondary Education, Legal Responsibility, Privacy
Peer reviewedMarx, Gary T.; Reichman, Nancy – American Behavioral Scientist, 1984
Computers make possible a variety of investigative and enforcement techniques. However, the technology of systematic data searching is subject to at least six sources of error, e.g., incorrectly entered data, none of which can be completely eliminated. Thus, a thought police as envisioned by Orwell remains a technological fiction. (RM)
Descriptors: Civil Liberties, Computers, Confidentiality, Disclosure
Peer reviewedSenter, Joy – Educational Forum, 1981
Examines educational tasks in general computing, including computer-assisted instruction, computer-managed instruction, word processing, secretarial and business applications, time sharing, and networking to larger computers. (CT)
Descriptors: Computer Assisted Instruction, Computer Managed Instruction, Computer Programs, Copyrights
Baer, Richard A., Jr. – Principal, 1982
Notes that both liberals and conservatives have criticized values clarification courses on the grounds that they assume only one correct position regarding values: ethical relativism. Maintains that values clarification fails to live up to its own claims of openness and neutrality. (Author/JM)
Descriptors: Elementary Secondary Education, Ethical Instruction, Moral Values, Privacy
Peer reviewedWhitlatch, Jo Bell – RQ, 1979
Reviews recent federal publications on government information, particularly in the area of general informational services, public access to government information and privacy issues, coordination of government information systems, and congressional information needs. (Author)
Descriptors: Annotated Bibliographies, Federal Government, Government Publications, Guides
Dern, Daniel P. – Online, 1997
Online users leave traces that others can find and use. Provides an overview of where and how users leave traces and what users can do to protect their privacy. Discusses Internet accounts; special files ("signature,""plan,""project,""file,""finger,""whois," and "vacation");…
Descriptors: Computer Networks, Electronic Mail, Online Systems, Privacy
Peer reviewedSidbury, Benjamin F. – Journal of College and University Law, 2003
Discusses the U.S. Supreme Court's opinion in Gonzaga University v. Doe, where the Supreme Court held that a person whose records were disclosed has no right to sue the institution for its violation of the Family Educational Rights and Privacy Act of 1974 (FERPA). Explores the decision's ramifications for higher education, including applicable…
Descriptors: Confidential Records, Court Litigation, Disclosure, Higher Education
Peer reviewedO'Donnell, Margaret L. – Journal of College and University Law, 2003
Discusses the history of the Family Educational Rights and Privacy Act (FERPA), the Falvo and Gonzaga U.S. Supreme Court cases, and how universities might rethink FERPA in light of digital records. A discussion of Professor Lawrence Lessig's book "Code and Other Laws of Cyberspace" is used as a framework for discussing institutional…
Descriptors: Confidential Records, Court Litigation, Disclosure, Higher Education
Jenkinson, Edward – American School Board Journal, 1989
Teachers should examine classroom questions, assignments, and activities to determine if any of them actually violate rights of student and family privacy. Lists an example of classroom questions that signal possible invasion of privacy, and guidelines for invasion of privacy charges. (MLF)
Descriptors: Elementary Secondary Education, Politics of Education, Privacy, Student Journals
Curran, Robert F. – CAUSE/EFFECT, 1989
Some of the laws, rules, and principles related to student privacy, especially as they relate to the electronic era, are described. Some of the key elements of the Buckley Amendment are detailed and the ethical implications are discussed. (Author/MLW)
Descriptors: College Students, Computers, Confidentiality, Higher Education
Peer reviewedPerlman, Gail L. – Social Work, 1988
Discusses the increasing legal regulation of social workers' professional obligation to client confidentiality which means that social workers no longer can rely solely on an ethical commitment to maintaining client privacy. Contends social workers must learn to read and interpret applicable statutes and court decisions both for protection of…
Descriptors: Client Characteristics (Human Services), Compliance (Legal), Confidentiality, Ethics
Estabrook, Leigh S. – Library Journal, 1996
Examines libraries' policies of keeping patron records private and confidential. Addresses the idea that libraries use their automated systems to retain and use patron data to develop and improve library services. Describes uses of patron data that can help libraries develop targeted services to users to better meet their information needs. (JMV)
Descriptors: Confidential Records, Improvement, Library Automation, Library Policy


