Publication Date
| In 2026 | 0 |
| Since 2025 | 17 |
| Since 2022 (last 5 years) | 172 |
| Since 2017 (last 10 years) | 758 |
| Since 2007 (last 20 years) | 1870 |
Descriptor
Source
Author
| Goldhaber, Dan | 12 |
| Jenkins, Davis | 8 |
| Theobald, Roddy | 8 |
| Prinsloo, Paul | 7 |
| Smith, Nancy | 7 |
| Fink, John | 6 |
| Flores, Merced, Comp. | 6 |
| Kugle, Cherry | 6 |
| Schwartz, Amy Ellen | 6 |
| Spencer-Aders, Cathy | 6 |
| Chen, Xinyin | 5 |
| More ▼ | |
Publication Type
Education Level
Audience
| Practitioners | 301 |
| Administrators | 145 |
| Teachers | 103 |
| Policymakers | 89 |
| Parents | 49 |
| Researchers | 36 |
| Students | 25 |
| Counselors | 20 |
| Support Staff | 12 |
| Community | 6 |
| Media Staff | 2 |
| More ▼ | |
Location
| California | 142 |
| Texas | 93 |
| Florida | 70 |
| North Carolina | 57 |
| Canada | 55 |
| New York | 47 |
| Australia | 44 |
| Washington | 44 |
| United Kingdom | 43 |
| Illinois | 41 |
| Oregon | 40 |
| More ▼ | |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
| Meets WWC Standards without Reservations | 4 |
| Meets WWC Standards with or without Reservations | 11 |
| Does not meet standards | 11 |
Webster, Sally – CAUSE/EFFECT, 1989
The 1989 computer "worm" resulted in some needed attention to computer security. Academic computing has the goal of integrating computing into the fabric of teaching, learning, and research, and must be relatively open. Ways to raise awareness of ethical and social issues are described. (MLW)
Descriptors: Computer Software, Confidential Records, Ethics, Higher Education
Stufft, Derry L. – Principal, 1989
All too often, school administrators are not prepared to handle unexpected foster children enrollments. Because of communication breakdowns, important information is not passed along, and children can be left in educational limbo. A well-stated policy and a simple information checklist could rectify this situation. Includes 18 references. (MLH)
Descriptors: Cooperation, Elementary Education, Foster Children, School Policy
Peer reviewedPanepinto, Joe – Telematics and Informatics, 1995
Examines recent findings that could influence the use of e-mail on university campuses. National privacy legislation and the inviolability of student records are discussed. It is concluded that more effective safeguards are necessary, and that the current steps are inadequate for the protection of students' rights. (Author/LRW)
Descriptors: Computer Security, Confidential Records, Electronic Mail, Federal Legislation
Peer reviewedMinner, Sam; And Others – Intervention in School and Clinic, 1990
This paper reviews several approaches used by special education teachers in collecting and maintaining pupil performance data. Techniques using work samples, graphs and charts, and audio or videotapes are discussed. A three-stage data maintenance system is outlined, and blank forms for recording student data are included for reproduction and use.…
Descriptors: Academic Records, Data Collection, Disabilities, Elementary Secondary Education
Peer reviewedKeefe, Charlotte Hendrick – TEACHING Exceptional Children, 1995
A portfolio assessment system is suggested to bind quantitative and qualitative data together to produce a broader reflection of the learning of special education students. The value of portfolios in communicating skills and talents and in reflecting growth is described, along with the importance of student involvement in the process. (JDD)
Descriptors: Disabilities, Elementary Secondary Education, Evaluation Methods, Portfolios (Background Materials)
Peer reviewedAult, Ruth L. – Teaching of Psychology, 1993
Argues students have misconceptions about whether they may see letters of recommendation if they do not value their right of access. Reports students incorrectly believe they may view letters of recommendation if they are not accepted and that they can see the letter before it is sent. Recommends faculty who write letters of recommendation should…
Descriptors: Confidential Records, Confidentiality, Disclosure, Graduate Study
Peer reviewedEssex, Nathan L. – Clearing House, 2000
Discusses key provisions of the Family Educational Rights and Privacy Act, which protects the confidentiality of student records. Describes 10 errors school personnel may commit in handling student confidentiality records which can invite legal challenges and prove costly from a legal standpoint. (SR)
Descriptors: Confidential Records, Confidentiality, Disclosure, Elementary Secondary Education
Griffin, Richard A.; Fowler, Laura S. – School Business Affairs, 2001
The most overlooked facet of school construction is the dovetailing of permanent construction insurance and technology construction insurance. Advice is provided about technology and technology purchases, highlighting problems associated with costs, copyright infringements, delivery delays, electrical wiring, hardware, student records, vendors,…
Descriptors: Administrative Problems, Educational Technology, Elementary Secondary Education, Insurance
Sauer, Jennifer M.; Peterson, Herbert C. – Business Officer, 2001
Describes efforts at the University of Richmond to streamline services for students, resulting in the renovation of space to include the offices of undergraduate admissions, financial aid, registrar, and bursar. The "one-stop shopping" approach has been praised by staff and students alike. (EV)
Descriptors: Centralization, College Buildings, Educational Facilities Improvement, Records Management
Diffily, Deborah – Texas Child Care, 2000
Discusses the use of anecdotal records to document young children's school behavior and accomplishments. Considers the use of informal records to capture daily events and formal records to document milestone behaviors. (JPB)
Descriptors: Achievement, Child Behavior, Day Care, Observation
McConahay, Mark; Cote, Roland – CAUSE/EFFECT, 1998
The Indiana University Expanded Grade Context Record system generates a student record that includes the elements of a traditional transcript plus additional information that places grades in a broader context, including class grade distribution data and the percentage of majors in the class. The system was developed in response to concerns about…
Descriptors: College Administration, Databases, Grade Inflation, Higher Education
Peer reviewedConard, Linda, Comp. – Student Aid Transcript, 2001
Presents the federal government's general provisions on student financial aid record retention and the Federal Perkins Loan program's procedures for maintaining promissory notes and repayment schedules. (EV)
Descriptors: Federal Aid, Federal Regulation, Higher Education, Laws
Peer reviewedEssex, Nathan L. – Clearing House, 2004
Confidentiality of student educational records is a serious issue. Disclosure of sensitive information in a student's personal file without prior written consent can be legally troublesome, especially when information is transmitted to others who have no legitimate educational interest in the student. Damaging information disclosed to a third…
Descriptors: Libel and Slander, School Personnel, Court Litigation, Confidentiality
Zetlin, Andrea; Weinberg, Lois; Luderer, Jacqueline Wade – Preventing School Failure, 2004
The purpose of this investigation was to document the magnitude of the problem of retrieving school records of highly mobile foster youth residing in one of the largest counties in the nation. Results indicate that it took between 3 weeks to 8 months to track down records and that, for many youths, social workers and case files had inaccurate…
Descriptors: Student Records, Information Retrieval, Student Mobility, Youth
Pohlman, Katherine; Schwab, Nadine – Journal of School Nursing, 2003
This article is a reprint of the National Association of School Nurses' "Issue Brief" on Privacy Standards for Student Health Records. It distinguishes between the Family Education Rights and Privacy Act (FERPA) and the Health Insurance Portability and Accountability Act (HI-PAA), clarifies which of these laws governs the privacy of…
Descriptors: School Nurses, Health Insurance, Privacy, Role

Direct link
