Publication Date
| In 2026 | 0 |
| Since 2025 | 167 |
| Since 2022 (last 5 years) | 600 |
| Since 2017 (last 10 years) | 1229 |
| Since 2007 (last 20 years) | 2104 |
Descriptor
Source
Author
Publication Type
Education Level
Audience
| Practitioners | 125 |
| Policymakers | 95 |
| Teachers | 87 |
| Administrators | 81 |
| Researchers | 33 |
| Parents | 31 |
| Media Staff | 27 |
| Students | 25 |
| Counselors | 17 |
| Community | 5 |
| Support Staff | 5 |
| More ▼ | |
Location
| United States | 80 |
| Australia | 79 |
| Canada | 79 |
| United Kingdom | 62 |
| California | 61 |
| Turkey | 38 |
| China | 31 |
| Pennsylvania | 28 |
| Texas | 27 |
| Florida | 26 |
| North Carolina | 24 |
| More ▼ | |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
2002
The Law Division of the proceedings contains the following 8 papers: "Trademarks and the First Amendment: The Anatomy of a Conflict" (Retha J. Martin); "Exit Polls and Other Bad Habits: An Analysis of First Amendment Considerations Concerning Policy Recommendations to Control or Prohibit Media Election Forecasts" (Niels…
Descriptors: Comparative Analysis, Copyrights, Court Litigation, Foreign Countries
Belair, Robert R. – 1997
In 1982, a national report examining law and policy for juvenile justice records concluded that the public's faith in the potential for rehabilitating juvenile offenders had eroded. To understand better the nature of juvenile crime, it was suggested that data surrounding this issue be systematically collected. Some of that information effort is…
Descriptors: Adolescents, Civil Law, Correctional Rehabilitation, Delinquency
American Library Association Video/Library Video Network, Towson, MD. – 1997
This 30-minute videotape takes an in-depth look at World Wide Web business transactions, potential risks, client privacy and security issues by asking businesses and consumers how they do business on the Internet. Also featured in the program is advice about choosing a secure password, the use of credit cards for Web purchasing and a review of…
Descriptors: Business, Computer Oriented Programs, Computer Security, Computer Use
Sargent, Jack; Kirby, Erika; Harter, Lynn M. – 1998
The boundary metaphor has been used successfully over the past two decades to explain and predict how individuals manage the tensions between the need to self-disclose and the need for privacy within interpersonal relationships. This paper explores the history of Communication Boundary Management Theories and presents suggestions for modifying the…
Descriptors: Communication Research, Communication Skills, Interpersonal Communication, Interpersonal Relationship
Hedberg, Betsy – 2002
Based on George Orwell's novel "1984," this lesson plan presents activities designed to help students understand that the historical context of the novel is based on the mood and political climate of 1949 Europe; the society Orwell created and modern society in the United States have similarities and differences; and modern privacy issues and the…
Descriptors: Civil Liberties, Class Activities, English Instruction, Language Arts
Peer reviewedClague, Monique Weston – Catholic University Law Review, 1979
Examines the possibility of legal challenges to minimum competency tests on the grounds that they violate freedom of expression (including the right to remain silent), privacy, and substantive due process guarantees. Available from the Catholic University Law Review, Catholic University of America School of Law, Room 1 Washington, D.C. 20064; sc…
Descriptors: Constitutional Law, Court Litigation, Due Process, Freedom of Speech
Cohen, Robert N. – California Western Law Review, 1978
In Tarasoff v. Regents of the University of California the court ruled that a psychotherapist is obliged to warn third persons of threats made against them during therapy. Substantive background of this legislation; the nature of the psychotherapeutic relationship, confidentiality, and patients' rights; and the Lanterman-Petris-Short Act are…
Descriptors: Confidential Records, Confidentiality, Court Doctrine, Court Litigation
Peer reviewedLautsch, John C. – Journal of College and University Law, 1978
The proliferation of computer processing applications on college campuses has created new legal risks for higher education institutions. The history of computer use on campuses, an overview of computer law, and a discussion of the role of the university attorney are presented. (SF)
Descriptors: Computers, Contracts, Copyrights, Data Processing
Child, Barbara – Akron Law Review, 1975
In State v. Koome, the Washington Supreme Court has striken that state's statute regarding parental consent for a minor's abortion. Implications of the finding for a minor's right to due process, equal protection, and privacy are discussed. (LBH)
Descriptors: Abortions, Adolescents, Constitutional Law, Court Litigation
Peer reviewedConnealy, Cathleen A. – UMKC Law Review, 1976
The first amendment, privacy, and due process rights of public employees are reviewed and many legal uncertainties and their effect on the public employees are noted. Special emphasis is on the first amendment and due process, since these are areas where the most challenges have taken place. (LBH)
Descriptors: Civil Liberties, Constitutional Law, Court Litigation, Due Process
Peer reviewedSwan, Peter N. – North Carolina Law Review, 1976
Various tort principles through which information misuse claims can be analyzed and resolved are examined. It is demonstrated that non-tort law approaches, especially statutory remedies, are often possible. Existing legislative solutions are discussed, and a proposed model statute is developed. Available from: the School of Law, University of…
Descriptors: Confidential Records, Criminal Law, Federal Legislation, Justice
Peer reviewedMetivier-Carreiro, Karen A.; LaFollette, Marcel C. – Science Communication, 1997
Examines aspects of cyberspace policy: Internet content and expectations; privacy: medical information and data collected by the government; and the regulation of offensive material: the Communications Decency Act, Internet filters, and the American Library Association's proactive great Web sites for children. Suggests that even "child…
Descriptors: Access to Information, Censorship, Children, Disadvantaged Youth
Our Children, 1998
Parents must describe and reinforce the importance of truthfulness, responsibility, and respect when their children use the Internet. The paper presents potential situations that could arise and discusses issues related to the law online, copyrighted materials, copying or distributing software, privacy, hacking, and obscenity. A sidebar offers…
Descriptors: Children, Copyrights, Electronic Mail, Elementary Secondary Education
Peer reviewedSchweiker-Marra, Karyn E.; Broglie, Mary; Plumer, Elizabeth – English Journal, 1997
Presents three articles that examine, through the classroom experiences of the authors, important issues of ownership, authorship, and privacy in process writing classrooms: (1) "Use of Students' Writing as Models in the Classroom" (Karyn E. Schweiker-Marra); (2) Privacy Issues Regarding Workshops" (Mary Broglie); and (3)…
Descriptors: Elementary Secondary Education, Higher Education, Ownership, Privacy
Peer reviewedJournal of Law and Education, 1996
The Supreme Court, in "Vernonia School District 47J versus Acton," ruled that a school district's policy authorizing random urinalysis drug testing of student-athletes did not violate the Fourth Amendment. Discusses the decision and why such a policy is permissible under the Fourth Amendment's prohibition against unreasonable searches…
Descriptors: Athletes, Court Litigation, Drug Use Testing, Extramural Athletics


