Publication Date
| In 2026 | 0 |
| Since 2025 | 0 |
| Since 2022 (last 5 years) | 0 |
| Since 2017 (last 10 years) | 1 |
| Since 2007 (last 20 years) | 4 |
Descriptor
| Computer Networks | 27 |
| Legal Problems | 27 |
| Higher Education | 11 |
| Privacy | 8 |
| Copyrights | 7 |
| Federal Legislation | 6 |
| Information Networks | 6 |
| Freedom of Speech | 5 |
| Information Technology | 5 |
| Intellectual Property | 5 |
| Legal Responsibility | 5 |
| More ▼ | |
Source
Author
Publication Type
Education Level
| Higher Education | 4 |
| Postsecondary Education | 2 |
Audience
| Administrators | 3 |
| Practitioners | 3 |
| Policymakers | 1 |
Location
| Pennsylvania (Pittsburgh) | 1 |
| Virginia | 1 |
Laws, Policies, & Programs
| First Amendment | 2 |
| Copyright Law 1976 | 1 |
| Digital Millennium Copyright… | 1 |
Assessments and Surveys
What Works Clearinghouse Rating
Yang, Samuel C. – Journal of Education for Business, 2019
There is an increasing recognition of cybersecurity's importance to organizations, and business schools are in a unique position to meet industry's demand for cybersecurity professionals. Using MSIS 2016 and National Centers of Academic Excellence Cyber Defense Education standards, the author investigates cybersecurity master's programs in U.S.…
Descriptors: Computer Security, Information Security, Computer Science Education, Masters Programs
Schaffhauser, Dian – Campus Technology, 2012
Putting a CIO and a lawyer together in the same room may give one the start of a pretty decent joke, but it could also save an institution millions of dollars in legal fees. While the IT chief understands the systems that fall under the purview of compliance, the attorney is the go-to pessimist for identifying the "gotcha" elements when it comes…
Descriptors: Legal Problems, Compliance (Legal), Legal Responsibility, Information Technology
Oxley, Alan – EDUCAUSE Quarterly, 2008
How do IT managers protect their staff from working excessively long hours? To begin addressing the problem of overworked staff, IT managers should educate themselves about legal regulations governing time spent at work. Failure to meet such requirements can expose a university to potentially expensive and embarrassing lawsuits. In this article,…
Descriptors: Legal Problems, Information Technology, Working Hours, Computer Networks
Cesarini, Lisa McHugh; Cesarini, Paul – Journal of Technology Studies, 2008
When Lars Ulrich, drummer for the rock group Metallica, testified before Congress about his group's lawsuit against Napster in 2000, many people who followed copyright issues in the music industry were not surprised (Ulrich, 2000). Ever since downloading audio files became as easy as clicking a few buttons on a personal computer, charges of…
Descriptors: Higher Education, Legal Problems, Music, Copyrights
Wilson, David L. – Chronicle of Higher Education, 1995
Legislators in over a dozen states have approved or are considering restrictions on what can be transmitted by computer. Legal scholars feel this could seriously affect network use, and that colleges and universities could face conflicting regulations in a medium transcending legal jurisdictions. Supporters feel the laws are needed to protect…
Descriptors: Censorship, Computer Networks, Freedom of Speech, Higher Education
Peer reviewedBotterbusch, Hope R. – TechTrends, 1995
Reviews copyright issues that were addressed at the InCITE 1995 workshop, including copyright law, fair use guidelines, multimedia issues, copyright policy statements by national professional organizations, legal activities related to the Internet, and multimedia guidelines. (LRW)
Descriptors: Computer Networks, Copyrights, Fair Use (Copyrights), Guidelines
Wilson, David L. – Chronicle of Higher Education, 1995
Many college faculty and students are upset by a Senate measure limiting obscenity on the Internet, feeling it would damage the network and infringe on free speech rights. The current measure seeks to punish individuals distributing items deemed offensive, but generally protects system operators. (MSE)
Descriptors: Computer Networks, Criminal Law, Federal Legislation, Freedom of Speech
Peer reviewedSmith, Stephen A. – Communication Education, 1994
Examines First Amendment, privacy, and intellectual property issues of communication on the Internet. Discusses developments in communications policy related to the proposed communication superhighway. Suggests ways in which communication scholars can secure fundamental legal protections necessary for full, free, and effective communication in the…
Descriptors: Computer Networks, Freedom of Speech, Higher Education, Information Networks
Goode, Joanne; Johnson, Maggie – Online, 1991
Presents a summary of guidelines for the use of electronic mail (e-mail) and examines legal issues and existing law governing electronic communication. The Electronic Communications Privacy Act of 1986 is discussed, lawsuits involving e-mail are described, and the future of e-mail privacy is considered. (11 references) (LRW)
Descriptors: Computer Networks, Court Litigation, Electronic Mail, Federal Legislation
Peer reviewedJohnson, David R.; And Others – West's Education Law Reporter, 1989
Among the protective measures against computer viruses that universities should consider are the following: (1) establishment of policies regarding student and faculty conduct; (2) distribution of information; (3) limitations on access to college computers; (4) establishment of operational safeguards; and (5) creation of an emergency action plan.…
Descriptors: Computer Networks, Computer Software, Emergency Programs, Higher Education
Johnson, David R.; And Others – 1989
Compiled by various members of the higher educational community together with risk managers, computer center managers, and computer industry experts, this report recommends establishing policies on an institutional level to protect colleges and universities from computer viruses and the accompanying liability. Various aspects of the topic are…
Descriptors: Administrative Policy, College Faculty, Colleges, Computer Networks
Dowdy, Earl – 1989
This paper explores questions of institutional responsibility and the potential for legal liability falling on public school institutions as a result of their involvement with computer-networking technology. First, the paper examines the doctrine of sovereign immunity to understand the limits of government responsibility for damages in this…
Descriptors: Computer Networks, Desktop Publishing, Electronic Publishing, Elementary Secondary Education
DeLoughry, Thomas J. – Chronicle of Higher Education, 1993
Exchange of obscene materials on college computer networks is raising free-speech issues and concern about public response. Standards of conduct for computer use by faculty, administrators, and students are under consideration on a number of campuses. Legality of the materials and appropriate use of institutional resources are also issues. (MSE)
Descriptors: Administrative Policy, Behavior Standards, Computer Networks, Constitutional Law
Ferencz, Susan K. – CAUSE/EFFECT, 1997
Considers how civil law might treat claims of defamation arising from computer newsgroup postings. Concludes that newsgroup postings will probably be treated as a hybrid of print and broadcast media, and that newsgroup users will vigorously and aggressively protect freedoms of speech and press. While traditional defenses to defamation charges will…
Descriptors: Civil Law, Computer Networks, Conflict Resolution, Freedom of Speech
Peer reviewedGuidon, Jacques; Pierre, Samuel – Telematics and Informatics, 1995
Discussion of hypertext and hypermedia focuses on its use in the production of interactive and distributed documents. Topics include the World Wide Web; HTML (Hypertext Markup Language); client interfaces; gateways to other computer network protocols; and future considerations, including cultural and linguistic problems, software, legal and…
Descriptors: Computer Interfaces, Computer Networks, Computer Software, Copyrights
Previous Page | Next Page ยป
Pages: 1 | 2
Direct link
