NotesFAQContact Us
Collection
Advanced
Search Tips
What Works Clearinghouse Rating
Showing 3,331 to 3,345 of 3,392 results Save | Export
Katsh, Ethan – 1983
A 4-day simulation activity encourages high school students to confront issues of law and journalism through exploration of seven legal issues: prior restraint, access to courts, rights of reply, libel, privacy, confidential sources, and use of stolen documents. The kit contains all materials needed for the simulation, including a director's…
Descriptors: Constitutional History, Constitutional Law, Due Process, Freedom of Speech
Relyea, Harold C.; Halchin, L. Elaine; Hogue, Henry B.; Agnew, Grace; Martin, Mairead; Schottlaender, Brian E. C.; Jackson, Mary E. – Bowker Annual Library and Book Trade Almanac, 2003
Theses five reports address five special issues: the effects of the September 11 attacks on information management, including homeland security, Web site information removal, scientific and technical information, and privacy concerns; federal policy for electronic government information; digital rights management and libraries; library Web portal…
Descriptors: Annual Reports, Computer Software, Electronic Libraries, Employment Projections
Peer reviewed Peer reviewed
Tesch, Bonnie; And Others – Academic Medicine, 1993
A telephone survey of 42 medical schools in areas of high, medium, and low incidence of human immunodeficiency virus (HIV) investigated school policies concerning prevention and reporting of HIV infection, confidentiality, screening, limiting clinical activities, counseling, vaccination, prophylactic drug administration, and disability and health…
Descriptors: Acquired Immune Deficiency Syndrome, Administrative Policy, Clinical Experience, Counseling Services
Peer reviewed Peer reviewed
Direct linkDirect link
Trinkaus-Randall, Gregor – Journal of Archival Organization, 2005
In October 2001, Congress passed the USA PATRIOT Act to strengthen the ability of the U.S. government to combat terrorism. Unfortunately, some sections of the Act strike at core values and practices of libraries and archives, especially in the areas of record keeping, privacy, confidentiality, security, and access to the collections. This article…
Descriptors: Federal Legislation, National Security, Archives, Confidentiality
Peer reviewed Peer reviewed
Direct linkDirect link
Duran, Bonnie; Oetzel, John; Lucero, Julie; Jiang, Yizhou; Novins, Douglas K.; Manson, Spero; Beals, Janette – Journal of Consulting and Clinical Psychology, 2005
The purpose of this study was to identify factors associated with 4 clusters of obstacles (self-reliance, privacy issues, quality of care, and communication and trust) to mental health and substance abuse treatment in 3 treatment sectors for residents of 3 reservations in the United States. Participants (N = 3,084) disclosed whether they had…
Descriptors: Drug Abuse, Emotional Disturbances, Health Services, Privacy
Peer reviewed Peer reviewed
Direct linkDirect link
Sicilia, Miguel-Angel – Journal of Information Technology Education, 2005
Personalization technology has become an important topic in e-commerce, fostered by the emergence of the relationship-marketing paradigm. But teaching e-commerce personalization technology is a challenging task, since it requires a balance between marketing and management and technical implementation issues that must be calibrated according to the…
Descriptors: Models, Business, Hypermedia, Marketing
American Library Association, Chicago, IL. Office of Intellectual Freedom. – 1996
This manual is designed to help librarians anticipate and resist censorship of library materials, how to handle complaints, and how to write legislators effectively. Part I, "Library Bill of Rights," and Part II, "Protecting the Freedom to Read," present the text and historical development of the American Library Association's…
Descriptors: Access to Information, Accessibility (for Disabled), Activism, Censorship
Van Dyke, Jon M.; Sakurai, Melvin M. – 1992
The Fourth Amendment protects an individual's justified expectations of privacy against unreasonable government intrusions; however, reasonable intrusions are allowed when legitimate governmental interests are served. This volume is intended to provide guidelines for school administrators on how to conduct searches and seizures in a manner…
Descriptors: Administrator Guides, Administrator Responsibility, Check Lists, Constitutional Law
Seaman, Scott – 1994
Issues concerning the confidentiality of library-patron records in the age of electronics are explored. Confidentiality of patron records is a relatively new concept for libraries and was first introduced in the 1938 Code of Ethics of the American Library Association (ALA). Librarians have worked on a state-by-state basis to protect library…
Descriptors: Codes of Ethics, Confidential Records, Confidentiality, Data
Peer reviewed Peer reviewed
Direct linkDirect link
Wilson, John K. – Thought & Action, 2005
College campuses around the country reacted to the September 11, 2001, terrorist acts with rallies, vigils, discussions, and a wide range of debates about the causes and cures for terrorism. Yet the story told about academia in the media was often quite different. Conservatives claimed that the reaction to 9/11 in academia was another example of…
Descriptors: Academic Freedom, Freedom of Speech, Higher Education, Terrorism
Solomon, Gary
After years of neglect, rural community mental health is becoming a legitimate area of specialization. Although the number of problems readily visible in rural mental health may appear to be inordinate, probabilities are that the difficulties found in rural locales are quantitatively no different than those found in non-rural areas. The…
Descriptors: Community Health Services, Community Support, Confidentiality, Delivery Systems
Kolman, Anita Sue – 1978
The paper discusses a study of self-disclosure patterns of 29 college men and 35 college women. The purpose of the study was to determine the extent to which college students confided in their best male friend, best female friend, mother, and father about attitudes and opinions, tastes and interests, work and studies, money, personality, and body.…
Descriptors: College Students, Comparative Analysis, Data Analysis, Females
Office of Postsecondary Education, Washington DC. Student Financial Assistance Programs. – 1998
The manual contains the texts of all federal regulations concerning federal student financial aid programs, many of which are authorized by Title IV of the Higher Education Act of 1965, as amended, as of December 31, 1997. An introductory section gives guidance in reading and understanding the regulations; the relationship of law to regulation;…
Descriptors: Accrediting Agencies, Agency Role, Compliance (Legal), Confidential Records
Gillis, R. Peter; Whitemarsh, Judith – 1999
This study provides suggestions and best practices for superintendents, Freedom of Information and Protection of Privacy (FOIPP) coordinators and school information technologists in dealing with the impact of Alberta's FOIPP Act on the application of information technologies within their organizations. The study explores the relationship between…
Descriptors: Access to Information, Check Lists, Computer Security, Computer Uses in Education
Raney, Mardell – TECHNOS, 1997
This interview with Esther Dyson, who is president and owner of EDventure Holdings which focuses on emerging information technology worldwide, discusses personal responsibility for technology; government's role; content ownership and intellectual property; Internet development; education and computers; parents' role in education; teacher…
Descriptors: Access to Computers, Access to Information, Artificial Intelligence, Censorship
Pages: 1  |  ...  |  217  |  218  |  219  |  220  |  221  |  222  |  223  |  224  |  225  |  226  |  227