Publication Date
In 2025 | 0 |
Since 2024 | 1 |
Since 2021 (last 5 years) | 1 |
Since 2016 (last 10 years) | 2 |
Since 2006 (last 20 years) | 3 |
Descriptor
Privacy | 27 |
Higher Education | 9 |
Confidential Records | 6 |
Elementary Secondary Education | 6 |
Ethics | 6 |
Access to Information | 5 |
Information Technology | 5 |
Legal Problems | 5 |
State Legislation | 5 |
Civil Liberties | 4 |
Civil Rights | 4 |
More ▼ |
Source
Author
Ault, Ruth L. | 1 |
Biemiller, Lawrence | 1 |
Colman, Sue | 1 |
Cranman, Kevin A. | 1 |
Falsone, Anne Marie | 1 |
Fisher, Kim N. | 1 |
Gillis, R. Peter | 1 |
Gluckman, Ivan | 1 |
Koerner, Thomas, Jr. | 1 |
Ledvinka, James | 1 |
Lee, Joan | 1 |
More ▼ |
Publication Type
Education Level
Early Childhood Education | 3 |
Preschool Education | 3 |
Elementary Education | 1 |
Elementary Secondary Education | 1 |
Grade 1 | 1 |
Grade 2 | 1 |
Grade 3 | 1 |
Kindergarten | 1 |
Primary Education | 1 |
Audience
Practitioners | 27 |
Administrators | 9 |
Teachers | 6 |
Media Staff | 4 |
Counselors | 2 |
Policymakers | 2 |
Researchers | 1 |
Students | 1 |
Support Staff | 1 |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Office of Educational Technology, US Department of Education, 2024
The U.S. Department of Education is committed to supporting innovative advances in educational technology to improve teaching and learning across the nation's education systems and to support educators as they incorporate emerging technology into their learning communities. Artificial Intelligence (AI) in education is a complex and rapidly…
Descriptors: Equal Education, Artificial Intelligence, Computer Software, Technology Integration
Lee, Joan – Office of Educational Technology, US Department of Education, 2016
Recognizing the growth of technology use in early learning settings, the U.S. Department of Education and U.S. Department of Health and Human Services collaborated in the development of the "Early Learning and Educational Technology Policy Brief" to promote developmentally appropriate use of technology in homes and early learning…
Descriptors: Early Childhood Education, Preschool Education, Primary Education, Young Children
Ross, Ruth Herron; Roberts-Pacchione, Beth – Corwin, 2011
Research shows that a child's social and behavioral skills affect the development of cognitive and physical abilities. Set students on a path to success and have fun doing it with this activity-packed second edition of "Wanna Play". The authors provide hundreds of activities that help children learn how to behave appropriately and make friends.…
Descriptors: Direct Instruction, Behavior Problems, Early Intervention, Interpersonal Relationship
Ware, Willis H. – EDUCOM, 1984
Computer security and computer privacy issues are discussed. Among the areas addressed are technical and human security threats, security and privacy issues for information in electronic mail systems, the need for a national commission to examine these issues, and security/privacy issues relevant to colleges and universities. (JN)
Descriptors: Computer Science, Higher Education, Information Systems, Privacy

Falsone, Anne Marie – Journal of Library Administration, 1986
Traces the events that led to the passage of Colorado's Confidentiality of Library Records Law. The growing national trend to protect patron records is also discussed, and practical suggestions for librarians to use in dealing with privacy laws are provided. (EM)
Descriptors: Compliance (Legal), Confidential Records, Disclosure, Intellectual Freedom

Ault, Ruth L. – Teaching of Psychology, 1993
Argues students have misconceptions about whether they may see letters of recommendation if they do not value their right of access. Reports students incorrectly believe they may view letters of recommendation if they are not accepted and that they can see the letter before it is sent. Recommends faculty who write letters of recommendation should…
Descriptors: Confidential Records, Confidentiality, Disclosure, Graduate Study

Ledvinka, James – Journal of Library Administration, 1986
Reviews the laws governing access to employee records including the U.S. Constitution, especially the Fourth and Fifth Amendments of the Bill of Rights; the National Labor Relations Act; the Privacy Act of 1974; state privacy statutes; and common-law privacy protections from court opinions. Recommendations for management actions are included. (EM)
Descriptors: Compliance (Legal), Confidential Records, Court Litigation, Disclosure
Sendor, Benjamin – American School Board Journal, 1987
Discusses two recent court cases highlighting the legal pitfalls facing mandatory drug testing programs for teachers and students. In both cases, the courts contended that blanket testing policies violated Fourth Amendment protection from unreasonable search and seizure. Testing of individual teachers and students (under reasonable suspicion) may…
Descriptors: Courts, Drug Abuse, Drug Use, Elementary Secondary Education

Million, Angela C.; Fisher, Kim N. – Journal of Academic Librarianship, 1986
Cites the importance of having a state law, knowing what it says, and having a library policy statement regarding the confidentiality of patron records. Discussion covers writing and implementing a policy, the role of automation, existing laws, library records defined, exceptions to confidentiality, and legal liability. Thirty-seven references are…
Descriptors: Confidential Records, Confidentiality, Ethics, Legal Problems
Koerner, Thomas, Jr. – Legal Memorandum, 1988
In the last few years a variety of questions have arisen in the school context concerning the legal rights of persons seeking to record conversations. Guidance concerning the law governing these situations is based on the following conclusions: (1) neither the common law nor any federal law generally prohibits the tape recording of conversations…
Descriptors: Audiotape Recorders, Audiotape Recordings, Court Litigation, Elementary Secondary Education

Young, D. Parker – NACADA Journal, 1984
The increasing number of court decisions dealing with classroom and academic matters attests to the growing judicial sensitivity to students' rights in academic affairs. The advisors' job falls within this academic affairs arena, and they must understand legal issues. (MLW)
Descriptors: Academic Advising, Contracts, Due Process, Higher Education
Philips, Stephen P.; Summers, Joseph V. – American School Board Journal, 1987
Discusses a "silent menace" in school computer rooms--the potential misuse of databases containing student directories, teacher salary information, test scores, and other data. Describes administrative computer uses and possible abuses, including invasion of privacy, false correlations between data sets, and manipulation of data for questionable…
Descriptors: Achievement Tests, Boards of Education, Computer Uses in Education, Data Interpretation

Lynch, Clifford A. – Library Hi Tech, 1997
Reviews traditional issues surrounding authorization and authentication in an organization-centered framework and introduces new interorganizational issues that dominate networked information environment. Describes three major approaches to authentication and authorization for the interorganizational environment and discusses the following…
Descriptors: Change, Computer Mediated Communication, Computer Networks, Information Networks

Wiehe, Cathie – Social Studies Review, 1983
Siamese baseball is used to introduce secondary government students to a study of authority, justice, responsibility, and privacy. The thematic/conceptual approach to the course is outlined. (RM)
Descriptors: Citizenship Education, Citizenship Responsibility, Civics, Concept Teaching
Colman, Sue – Australian Universities' Review, 1997
Issues of privacy, anonymity, and computer security emerging with advancing information technology are outlined, and implications for universities are discussed. Emphasis is on the Australian context and on Australian government and international initiatives concerning privacy. Sensitive information categories are identified, and measures…
Descriptors: Access to Information, College Administration, Computer Security, Confidentiality
Previous Page | Next Page ยป
Pages: 1 | 2