NotesFAQContact Us
Collection
Advanced
Search Tips
Showing all 5 results Save | Export
Parry, Marc – Chronicle of Higher Education, 2012
Colleges share many things on Twitter, but one topic can be risky to broach: the reading habits of library patrons. Patrons' privacy is precious to most librarians. Yet new Web services thrive on collecting and sharing the very information that has long been protected. This points to an emerging tension as libraries embrace digital services.…
Descriptors: Academic Libraries, Internet, Reading Habits, Influence of Technology
Peer reviewed Peer reviewed
Falsone, Anne Marie – Journal of Library Administration, 1986
Traces the events that led to the passage of Colorado's Confidentiality of Library Records Law. The growing national trend to protect patron records is also discussed, and practical suggestions for librarians to use in dealing with privacy laws are provided. (EM)
Descriptors: Compliance (Legal), Confidential Records, Disclosure, Intellectual Freedom
Peer reviewed Peer reviewed
Schmidt, Richard M., Jr.; Burns, Robert Clifton – Journal of Library Administration, 1986
Uses of the Freedom of Information Act are explained by describing previous court cases. The scope of information, including classified information, is detailed and procedural steps for filing requests are outlined. A recent Supreme Court case which may make access to classified information more difficult is discussed. (EM)
Descriptors: Confidential Records, Court Litigation, Disclosure, Freedom of Information
Sinofsky, Esther R. – 1994
This document examines copyright issues that can be encountered during a production of educational materials. The book is divided into two parts: part 1 discusses sections of the current Copyright Act; part 2 focuses on specific production-related issues. Highlights of part 1 include working definitions; background; what can and cannot be…
Descriptors: Art Products, Copyrights, Disclosure, Drama
Peer reviewed Peer reviewed
Rubin, Michael Rogers – Library Hi Tech, 1987
Describes the development and current uses of computerized databases of information about individuals by the government and private agencies, especially credit bureaus, and discusses three major categories of abusive information practices that threaten personal privacy: information collection, information dissemination, and information management…
Descriptors: Civil Liberties, Computer Networks, Confidential Records, Credit (Finance)