NotesFAQContact Us
Collection
Advanced
Search Tips
What Works Clearinghouse Rating
Showing 2,281 to 2,295 of 3,386 results Save | Export
Peer reviewed Peer reviewed
Michigan Law Review, 1978
Concludes that laws prohibiting fornication and cohabitation are unconstitutional. Available from Michigan Law Review, Hutchins Hall, Ann Arbor, MI 48109; single issue $3.50. (Author/IRT)
Descriptors: Civil Liberties, Constitutional Law, Moral Issues, Moral Values
Peer reviewed Peer reviewed
Newborg, Donald L. – Child Welfare, 1979
Provides information on recent decisions in New York courts in cases involving the right of adult adoptees to inspect sealed adoption records. The effect of these decisions is that any change in the right of access to records must be brought about through legislation, not through the courts. (Author/SS)
Descriptors: Adopted Children, Civil Liberties, Confidential Records, Constitutional Law
Office of the Press Secretary of the White House – Telecommunications, 1997
An abbreviated version of a longer policy document on electronic commerce released by the Clinton Administration, this article examines principles and recommendations on tariffs, taxes, electronic payment systems, uniform commercial code for electronic commerce, intellectual property protection, privacy, security, telecommunications infrastructure…
Descriptors: Computer Security, Information Technology, Intellectual Property, Internet
Peer reviewed Peer reviewed
Remley, Theodore P., Jr.; Herlihy, Barbara; Herlihy, Scott B. – Journal of Counseling & Development, 1997
Reviews the rationale that underlies privileged communication in counseling and discusses the nature of privilege. Describes the progress of a Supreme Court decision affecting privileged communication between licensed psychotherapists and their patients. Concludes with a legal analysis of the decision and its implications for counselors. (RJM)
Descriptors: Confidential Records, Confidentiality, Counseling, Counselor Client Relationship
Peer reviewed Peer reviewed
Nucci, Larry – New Directions for Child Development, 1997
A personal area of behavior comprising matters of choice and privacy, and differentiated from convention and moral obligation, is a psychological requirement for the construction of a distinct and bounded self. Accurate investigations of this dynamic require differentiation between cultural ideology and conceptual frames of individuals. (Author)
Descriptors: Children, Context Effect, Cultural Influences, Culture
Peer reviewed Peer reviewed
Lewandowski, Judith L. – Journal of School Violence, 2003
Used data collected by a trend analysis company on 111 Web sites commonly visited by children to identify specific privacy issues faced by children when exploring child-oriented and adult-oriented Web sites. Discusses the complexity of issues raised by the expansion of information technology. (SLD)
Descriptors: Children, Data Collection, Information Technology, Internet
Peer reviewed Peer reviewed
Keating, John J., III; Hafner, Arthur W. – Journal of Academic Librarianship, 2002
Describes business techniques for mass marketing, where information technologies are used to target discrete individuals or groups and promote customer interaction. Considers the applicability of business concepts to academic library service, including uniquely identifying patrons, issues of privacy, focusing on the most valuable library services,…
Descriptors: Academic Libraries, Higher Education, Information Technology, Library Services
Peer reviewed Peer reviewed
Petras, Richard T. – Mathematics Teacher, 2001
Introduces RSA, one of the most popular public-key cryptosystems that is used to protect the privacy of computer users. Describes the mathematical foundation of public key cryptography. (KHR)
Descriptors: Cryptography, Curriculum Development, Internet, Mathematical Applications
Foster, Andrea L. – Chronicle of Higher Education, 2003
Describes why a new law requiring California colleges to warn people of security breaches involving their computerized personal data has administrators worried about both cost and liability. (EV)
Descriptors: Compliance (Legal), Computer Security, Disclosure, Higher Education
Wallace, Richard C. – School Administrator, 1990
Although no school leader likes media coverage of sensitive issues, handling them forthrightly and candidly benefits everyone. The three major facets of an effective media campaign include realistic expectations of the media, personalizing media relations, and controlling both access and message. (MLH)
Descriptors: Administrator Responsibility, Elementary Secondary Education, Expectation, Journalism
Peer reviewed Peer reviewed
Cooper, Stephen – New Jersey Journal of Communication, 1995
States that the right of the public to know and the right of the individual to privacy are inherently in conflict. Examines the relationship between privacy law and the press. Observes that conditions with the birth of new electronic media are similar to those of a century ago, when two lawyers sued for relief from aggressive journalists. (PA)
Descriptors: Conflict, Court Litigation, Freedom of Information, Freedom of Speech
Smoot, Oliver – EDUCOM Review, 1994
Examines the relationship between the National Information Infrastructure (NII) and the new General Agreement on Tariffs and Trade. Topics discussed include the reduction or elimination of tariffs on NII products; protection of copyrighted works; unresolved trade issues, including the European telecommunications market; standards; and privacy and…
Descriptors: Computer Networks, Copyrights, Foreign Countries, Information Networks
Peer reviewed Peer reviewed
Srinivasan, Srinija – Government Information Quarterly, 1992
Discussion of individual rights and privacy in Japan focuses on the Privacy Protection Act, which acknowledges the threat posed by government databases to the individual's right of privacy. Characteristics of the Japanese legal system are described, origins of privacy in Japanese law are examined, and privacy and government databases are…
Descriptors: Access to Information, Civil Liberties, Cultural Traits, Databases
Peer reviewed Peer reviewed
Zirkel, Perry A. – Journal of Law and Education, 2000
In the April 1999 issue of this journal, Michael Ferraraccio argues that the justifications advanced for using metal detectors in schools are not sufficiently compelling to outweigh students' Fourth Amendment privacy rights. In the accompanying Counterpoint, Robert Johnson cites lower court cases to support the constitutionality of their used on a…
Descriptors: Court Litigation, Elementary Secondary Education, Privacy, Public Schools
Zirkel, Perry A. – Principal, 2000
In a federal case involving a vice-principal's pat-down search of middle-school students in a cafeteria (for a missing pizza knife), the court upheld the search, saying it was relatively unintrusive and met "TLO's" reasonable-suspicion standards. Principals need reasonable justification for searching a group. (Contains 18 references.)…
Descriptors: Administrator Responsibility, Court Litigation, Middle Schools, Principals
Pages: 1  |  ...  |  149  |  150  |  151  |  152  |  153  |  154  |  155  |  156  |  157  |  ...  |  226