Publication Date
| In 2026 | 0 |
| Since 2025 | 167 |
| Since 2022 (last 5 years) | 600 |
| Since 2017 (last 10 years) | 1229 |
| Since 2007 (last 20 years) | 2104 |
Descriptor
Source
Author
Publication Type
Education Level
Audience
| Practitioners | 125 |
| Policymakers | 95 |
| Teachers | 87 |
| Administrators | 81 |
| Researchers | 33 |
| Parents | 31 |
| Media Staff | 27 |
| Students | 25 |
| Counselors | 17 |
| Community | 5 |
| Support Staff | 5 |
| More ▼ | |
Location
| United States | 80 |
| Australia | 79 |
| Canada | 79 |
| United Kingdom | 62 |
| California | 61 |
| Turkey | 38 |
| China | 31 |
| Pennsylvania | 28 |
| Texas | 27 |
| Florida | 26 |
| North Carolina | 24 |
| More ▼ | |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Leatherman, Courtney – Chronicle of Higher Education, 1995
After accepting the presidency of the College of Wooster (Ohio), a highly-qualified and respected woman withdrew the day before taking office in the wake of rumors about a long-term relationship with another woman. Concern within the college community about the situation centers on two issues: homophobia and privacy for administrators. (MSE)
Descriptors: Administrator Characteristics, Administrator Role, Administrator Selection, College Presidents
Peer reviewedPanepinto, Joe – Telematics and Informatics, 1995
Examines recent findings that could influence the use of e-mail on university campuses. National privacy legislation and the inviolability of student records are discussed. It is concluded that more effective safeguards are necessary, and that the current steps are inadequate for the protection of students' rights. (Author/LRW)
Descriptors: Computer Security, Confidential Records, Electronic Mail, Federal Legislation
Mazur, Joan M. – School Business Affairs, 1995
As schools merge onto the information highway, districts must address their liability associated with Internet access. Schools need a practical policy supporting high access to global educational resources while limiting district liability. USENET provides easy access to controversial and pornographic materials. This article outlines federal…
Descriptors: Computer Networks, Elementary Secondary Education, Freedom of Information, Legal Responsibility
Peer reviewedWilkes, Adeline W.; Grant, Susan Marie – RQ, 1995
Gives a historical explanation of library confidentiality policies and procedures and reviews notable invasions of patron privacy through use of library records by the Federal Bureau of Investigation and the Internal Revenue Service. Also reports on a study that examined patron confidentiality policies in Texas academic library reference…
Descriptors: Academic Libraries, Confidential Records, Confidentiality, Librarians
Peer reviewedHalachmi, Arie – Public Personnel Management, 1992
The dysfunctions associated with artificial workgroups require attention to the social context of work. Complex issues of safety and security related to information technology may necessitate a new classification of experts, information rangers, with policing and investigative authority. (SK)
Descriptors: Information Technology, Interprofessional Relationship, Morale, Occupational Safety and Health
Wilson, A. P.; Bishard, Thomas G. – American School Board Journal, 1994
Interviews with 12 Kansas school executives and questionnaire data received from 49 board presidents and 72 superintendents disclosed that the majority had perceived the occurrence of communications that violated employees' privacy. Training, ethical awareness, and a well-written policy are part of the solution. A model policy is provided to guide…
Descriptors: Boards of Education, Confidentiality, Elementary Secondary Education, Interpersonal Relationship
Peer reviewedSweet, Jill D. – American Indian Culture and Research Journal, 1991
The Pueblo Indians have developed creative and assertive techniques for interacting with tourists that help the Pueblo cope with the pressures of tourist contact, fortify their cultural boundaries, and exercise control over potentially uncomfortable situations. Secrecy and community regulations are examined in relation to host/guest dynamics and…
Descriptors: American Indian Culture, American Indians, Community Control, Cultural Background
Peer reviewedAmerican Psychologist, 1991
Summarizes the contents of the 54 articles of the UN Convention on the Rights of the Child. The articles define the freedoms and rights of children and prescribe standards for their protection and nurturing. (DM)
Descriptors: Adoption, Child Abuse, Children, Civil Liberties
Peer reviewedKatz, James E.; Graveman, Richard F. – Telematics and Informatics, 1991
Discussion of the right to privacy of communications focuses on privacy expectations within a National Research and Education Network (NREN). Highlights include privacy needs in scientific and education communications; academic and research networks; network security and privacy concerns; protection strategies; and consequences of privacy…
Descriptors: Access to Information, Computer Networks, Higher Education, Privacy
Peer reviewedAult, Ruth L. – Teaching of Psychology, 1993
Argues students have misconceptions about whether they may see letters of recommendation if they do not value their right of access. Reports students incorrectly believe they may view letters of recommendation if they are not accepted and that they can see the letter before it is sent. Recommends faculty who write letters of recommendation should…
Descriptors: Confidential Records, Confidentiality, Disclosure, Graduate Study
Payton, Tammy – Library Talk, 1999
Suggests classroom pen pals as a good Internet activity for elementary school students. Highlights include Web sites that host pen-pal information; visiting schools; Web sites; educational listservs; safety tips to discuss before sending e-mail; and suggested topics and activities. (LRW)
Descriptors: Class Activities, Computer Uses in Education, Electronic Mail, Elementary Education
Zirkel, Perry A. – Phi Delta Kappan, 1998
A complex case involving a disgruntled ex-employee's invasion of a college president's e-mail system resulted in a decision granting two plaintiffs' motions for summary judgment. This was the first recorded education-related collision on the electronic superhighway. Every educational institution should have a policy and procedure regarding what…
Descriptors: Computer Security, Dismissal (Personnel), Due Process, Electronic Mail
Peer reviewedRymer, Jone – Business Communication Quarterly, 1998
Presents a case study for use in business communication classes to help students understand and learn both the context and the strategies for the communication with business management. Deals with a business problem revolving around issues of appropriate e-mail use and privacy. Includes five assignments. (SR)
Descriptors: Business Communication, Case Method (Teaching Technique), Class Activities, Electronic Mail
Peer reviewedRenger, Ralph; Gotkin, Vicki; Crago, Marjorie; Shisslak, Catherine – American Journal of Evaluation, 1998
Reviews the Family Privacy Protection Act of 1995 and its potential impact on research and evaluation involving minors. Although this legislation was not passed, the issues related to both active and passive parental consent for the participation of minors in research are very much alive. (SLD)
Descriptors: Compliance (Legal), Ethics, Evaluation Methods, Federal Legislation
Peer reviewedStratford, Jean Slemmons; Stratford, Juri – Journal of Government Information, 1998
The United States has taken only piecemeal steps to ensure privacy of personal information. This article examines the U.S. relating to privacy and data protection. It defines privacy and discusses international agreements relating to privacy, federal data protection laws, and narrowly applicable laws. (AEF)
Descriptors: Copyrights, Federal Legislation, Government Publications, Information Networks


