Publication Date
In 2025 | 0 |
Since 2024 | 0 |
Since 2021 (last 5 years) | 0 |
Since 2016 (last 10 years) | 0 |
Since 2006 (last 20 years) | 1 |
Descriptor
Confidential Records | 3 |
Library Policy | 3 |
Library Automation | 2 |
Library Circulation | 2 |
Online Systems | 2 |
Privacy | 2 |
Academic Libraries | 1 |
Compliance (Legal) | 1 |
Confidentiality | 1 |
Data Collection | 1 |
Databases | 1 |
More ▼ |
Source
Journal of Academic… | 3 |
Publication Type
Journal Articles | 3 |
Opinion Papers | 2 |
Reports - Descriptive | 2 |
Reports - Research | 1 |
Education Level
Audience
Media Staff | 1 |
Practitioners | 1 |
Location
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Vaughan, Jason – Journal of Academic Librarianship, 2007
An academic library working group was charged in 2005 to create a records retention schedule and policy applicable to records containing personally identifiable information of library patrons. This group conducted a survey and extensive research, culminating in an adopted library records retention schedule and policy implemented in 2006.
Descriptors: Academic Libraries, Information Management, Library Policy, Confidential Records

Million, Angela C.; Fisher, Kim N. – Journal of Academic Librarianship, 1986
Cites the importance of having a state law, knowing what it says, and having a library policy statement regarding the confidentiality of patron records. Discussion covers writing and implementing a policy, the role of automation, existing laws, library records defined, exceptions to confidentiality, and legal liability. Thirty-seven references are…
Descriptors: Confidential Records, Confidentiality, Ethics, Legal Problems

Fouty, Kathleen G. – Journal of Academic Librarianship, 1993
Examines issues regarding the privacy of information contained in patron databases that have resulted from online circulation systems. Topics discussed include library policies to protect information in patron records; ensuring compliance with policies; limiting the data collected; security authorizations; and creating and modifying patron…
Descriptors: Compliance (Legal), Confidential Records, Data Collection, Databases