NotesFAQContact Us
Collection
Advanced
Search Tips
What Works Clearinghouse Rating
Showing 2,116 to 2,130 of 3,392 results Save | Export
Peer reviewed Peer reviewed
Bortnick, Jane – Journal of the American Society for Information Science, 1985
Three aspects of transborder data flow debate (privacy protection, national and cultural sovereignty, economic development) provide illustrations of effect that national concerns have on formulation of international information policies. Development of information policies by national governments and the impacts these have on…
Descriptors: Economic Development, Foreign Countries, Global Approach, Information Networks
Peer reviewed Peer reviewed
Nuwer, Henry – Journalism Educator, 1986
Laments the "open office door" policy advertised in journalism department brochures and catalogs, arguing that students must learn protocol and the chain of command, and that faculty members cannot maintain teaching and scholarly efficiency in the face of countless informal interruptions from students "dropping in" for informal…
Descriptors: Higher Education, Journalism Education, Privacy, Teacher Attitudes
Updating School Board Policies, 1973
In 1973, the Department of Health Education and Welfare released advisory committee recommendations that could change the recordkeeping policies of schools and other public and private institutions. Discusses the committee's findings and their implications for the future. (JF)
Descriptors: Automation, Computers, Confidentiality, Federal Legislation
Updating School Board Policies, 1973
Provides safeguard requirements for administrative personal data systems which were drafted by the HEW Secretary's Advisory Committee on Automated Personal Data Systems. (JF)
Descriptors: Automation, Computers, Confidentiality, Federal Legislation
Rasmussen, Pat – Communication: Journalism Education Today (C:JET), 1980
Analyzes how privacy laws affect the student journalist. (RL)
Descriptors: Journalism Education, Laws, News Reporting, Privacy
Peer reviewed Peer reviewed
White, Peter – International Library Review, 1980
Explores the nature of privacy with regard to information about the individual and reviews governmental legislation affecting confidentiality in the United States, the United Kingdom, Canada, and Australia, focusing particularly on the role of computers and the library. (FM)
Descriptors: Computers, Confidential Records, Confidentiality, Legislation
Peer reviewed Peer reviewed
Perloff, Evelyn; Perloff, Judith K. – New Directions for Program Evaluation, 1980
Twenty-three journal articles on program evaluations were surveyed for incidence of four unethical practices: withholding purpose or mere existence of an evaluation from participants; exposure to stress; invasion of privacy; and denial of program benefits to control groups. Few violations were apparent. (CP)
Descriptors: Control Groups, Ethics, Experimental Groups, Privacy
Peer reviewed Peer reviewed
Lee, Laurie Thomas – New Jersey Journal of Communication, 1996
States that lawsuits are being filed that challenge anonymity and freedom of speech in cyberspace--is there a right to online anonymity? Examines the debate and issues associated with anonymous communications in cyberspace. Explores the "right of informational privacy" as it pertains to anonymity. Suggests some regulatory approaches for…
Descriptors: Freedom of Information, Freedom of Speech, Internet, Legal Problems
Peer reviewed Peer reviewed
Scaraglino, Pietrina – Journal of College and University Law, 2003
Identifies and summarizes key provisions of the privacy regulations of the Health Insurance Portability and Accountability Act of 1996 (HIPAA). Suggests approaches a university can take to achieve compliance with those provisions, and discusses issues raised by the privacy regulations that are of particular relevance to the academic community. (EV)
Descriptors: Compliance (Legal), Confidential Records, Disclosure, Federal Legislation
Foster, Andrea L. – Chronicle of Higher Education, 2002
Describes how student activism has prompted a number of colleges to begin phasing out their use of Social Security numbers in databases. (EV)
Descriptors: Activism, College Students, Confidential Records, Higher Education
Peer reviewed Peer reviewed
Flaherty, David H. – Government Information Quarterly, 1988
Considers the advent of surveillance societies--(i.e.,) societies where integrated surveillance of individuals is possible through various automated databases--with examples drawn from Canada and Sweden. Legislative efforts to regulate such developments and the role of data protection agencies are discussed. (13 references) (MES)
Descriptors: Databases, Foreign Countries, Futures (of Society), Information Technology
Pritchard-Schoch, Teresa – Database, 1995
Examines developments among public record information providers, including a shift from file acquisition to entire company acquisition. Highlights include a table of remote access to public records by state; pricing information; privacy issues; and information about the three main companies offering access to public records: LEXIS, CDB Infotek,…
Descriptors: Access to Information, Corporations, Mergers, Online Systems
Peer reviewed Peer reviewed
Hosman, Lawrence A.; Siltanen, Susan A. – Communication Quarterly, 1995
Finds that relationship intimacy interacts with privacy violation types to affect the likelihood of using certain interaction control strategies. Shows that the need for not neighboring interacted with type of privacy invasion to affect the likelihood of using expression of negative arousal strategies. (SR)
Descriptors: Communication Research, Higher Education, Interpersonal Communication, Interpersonal Relationship
Kilian, Crawford – TECHNOS, 1994
Discusses online communication, including privacy issues, electronic bulletin board systems, attitudes and habits from other types of communication, the proper register for online communication, training students, and teachers as moderators. (LRW)
Descriptors: Communication (Thought Transfer), Electronic Mail, Online Systems, Privacy
Peer reviewed Peer reviewed
Hendrix, Dennis H. – Journal of Mental Health Counseling, 1991
Presents four possible alternatives for handling intrafamily confidentiality, and evaluates the alternatives in accordance with Kitchener's ethical principles. Concludes that confidentiality exists for the benefit of the client, and when that benefit ceases to exist or is overridden by other factors, alternatives to absolute confidentiality must…
Descriptors: Children, Confidentiality, Counselor Role, Disclosure
Pages: 1  |  ...  |  138  |  139  |  140  |  141  |  142  |  143  |  144  |  145  |  146  |  ...  |  227