Publication Date
| In 2026 | 0 |
| Since 2025 | 173 |
| Since 2022 (last 5 years) | 606 |
| Since 2017 (last 10 years) | 1235 |
| Since 2007 (last 20 years) | 2110 |
Descriptor
Source
Author
Publication Type
Education Level
Audience
| Practitioners | 125 |
| Policymakers | 95 |
| Teachers | 88 |
| Administrators | 81 |
| Researchers | 33 |
| Parents | 31 |
| Media Staff | 27 |
| Students | 25 |
| Counselors | 17 |
| Community | 5 |
| Support Staff | 5 |
| More ▼ | |
Location
| United States | 80 |
| Australia | 79 |
| Canada | 79 |
| United Kingdom | 62 |
| California | 61 |
| Turkey | 38 |
| China | 31 |
| Pennsylvania | 28 |
| Texas | 27 |
| Florida | 26 |
| North Carolina | 24 |
| More ▼ | |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Overbeck, Wayne – Community College Journalist, 1990
Reviews controversies that have arisen at two California community colleges because campus newspapers were accused of violating the Buckley Amendment by publishing reports that student leaders were ineligible to hold their offices based on confidential academic records. Summarizes the Buckley Amendment and various court decisions related to…
Descriptors: Community Colleges, Confidential Records, Court Litigation, Disclosure
Peer reviewedCampbell, Richard; Reeves, Jimmie L. – Critical Studies in Mass Communication, 1989
Interprets four news stories about Joyce Brown, a homeless women who, against her will, was institutionalized by the city of New York. Examines how television news marks boundaries between the marginal and the mainstream, between a major socioeconomic problem demanding collective engagement and a personal problem requiring private remedy. (MS)
Descriptors: Discourse Analysis, Homeless People, Mass Media Role, Media Research
Peer reviewedMhlaba, Sondlo Leonard – Government Information Quarterly, 1995
Discusses origins of Transborder Data Flows (TDFs) as an international problem in the early 1970s. Shows how technological development in telecommunications and networks has made regulation more complex and urgent. Recommends the internationalization of the Key Escrowed Encryption System (KEES) and the development of broad international TDF…
Descriptors: Coding, Computer Security, Copyrights, Information Transfer
Peer reviewedJohnston, Sue; Hedemann, Maree – Educational Review, 1994
A case study of a teacher committee collaborating on development of school policy illuminates such barriers to teacher collaboration and school-based management as time constraints and lack of inservice support. A major difficulty is that the culture of teaching is based on privacy and individualism. (SK)
Descriptors: Curriculum Development, Educational Cooperation, Foreign Countries, Individualism
Leatherman, Courtney – Chronicle of Higher Education, 1995
After accepting the presidency of the College of Wooster (Ohio), a highly-qualified and respected woman withdrew the day before taking office in the wake of rumors about a long-term relationship with another woman. Concern within the college community about the situation centers on two issues: homophobia and privacy for administrators. (MSE)
Descriptors: Administrator Characteristics, Administrator Role, Administrator Selection, College Presidents
Peer reviewedPanepinto, Joe – Telematics and Informatics, 1995
Examines recent findings that could influence the use of e-mail on university campuses. National privacy legislation and the inviolability of student records are discussed. It is concluded that more effective safeguards are necessary, and that the current steps are inadequate for the protection of students' rights. (Author/LRW)
Descriptors: Computer Security, Confidential Records, Electronic Mail, Federal Legislation
Mazur, Joan M. – School Business Affairs, 1995
As schools merge onto the information highway, districts must address their liability associated with Internet access. Schools need a practical policy supporting high access to global educational resources while limiting district liability. USENET provides easy access to controversial and pornographic materials. This article outlines federal…
Descriptors: Computer Networks, Elementary Secondary Education, Freedom of Information, Legal Responsibility
Peer reviewedWilkes, Adeline W.; Grant, Susan Marie – RQ, 1995
Gives a historical explanation of library confidentiality policies and procedures and reviews notable invasions of patron privacy through use of library records by the Federal Bureau of Investigation and the Internal Revenue Service. Also reports on a study that examined patron confidentiality policies in Texas academic library reference…
Descriptors: Academic Libraries, Confidential Records, Confidentiality, Librarians
Peer reviewedHalachmi, Arie – Public Personnel Management, 1992
The dysfunctions associated with artificial workgroups require attention to the social context of work. Complex issues of safety and security related to information technology may necessitate a new classification of experts, information rangers, with policing and investigative authority. (SK)
Descriptors: Information Technology, Interprofessional Relationship, Morale, Occupational Safety and Health
Wilson, A. P.; Bishard, Thomas G. – American School Board Journal, 1994
Interviews with 12 Kansas school executives and questionnaire data received from 49 board presidents and 72 superintendents disclosed that the majority had perceived the occurrence of communications that violated employees' privacy. Training, ethical awareness, and a well-written policy are part of the solution. A model policy is provided to guide…
Descriptors: Boards of Education, Confidentiality, Elementary Secondary Education, Interpersonal Relationship
Peer reviewedSweet, Jill D. – American Indian Culture and Research Journal, 1991
The Pueblo Indians have developed creative and assertive techniques for interacting with tourists that help the Pueblo cope with the pressures of tourist contact, fortify their cultural boundaries, and exercise control over potentially uncomfortable situations. Secrecy and community regulations are examined in relation to host/guest dynamics and…
Descriptors: American Indian Culture, American Indians, Community Control, Cultural Background
Peer reviewedAmerican Psychologist, 1991
Summarizes the contents of the 54 articles of the UN Convention on the Rights of the Child. The articles define the freedoms and rights of children and prescribe standards for their protection and nurturing. (DM)
Descriptors: Adoption, Child Abuse, Children, Civil Liberties
Peer reviewedKatz, James E.; Graveman, Richard F. – Telematics and Informatics, 1991
Discussion of the right to privacy of communications focuses on privacy expectations within a National Research and Education Network (NREN). Highlights include privacy needs in scientific and education communications; academic and research networks; network security and privacy concerns; protection strategies; and consequences of privacy…
Descriptors: Access to Information, Computer Networks, Higher Education, Privacy
Peer reviewedAult, Ruth L. – Teaching of Psychology, 1993
Argues students have misconceptions about whether they may see letters of recommendation if they do not value their right of access. Reports students incorrectly believe they may view letters of recommendation if they are not accepted and that they can see the letter before it is sent. Recommends faculty who write letters of recommendation should…
Descriptors: Confidential Records, Confidentiality, Disclosure, Graduate Study
Payton, Tammy – Library Talk, 1999
Suggests classroom pen pals as a good Internet activity for elementary school students. Highlights include Web sites that host pen-pal information; visiting schools; Web sites; educational listservs; safety tips to discuss before sending e-mail; and suggested topics and activities. (LRW)
Descriptors: Class Activities, Computer Uses in Education, Electronic Mail, Elementary Education


