NotesFAQContact Us
Collection
Advanced
Search Tips
What Works Clearinghouse Rating
Showing 2,806 to 2,820 of 3,386 results Save | Export
Peer reviewed Peer reviewed
Knowles, Leslie P. – Art Therapy: Journal of the American Art Therapy Association, 1996
Questions whether the American Art Therapy Association (AATA) has given adequate attention to the potential long-term and damaging effects on a child by publicly exhibiting their art produced in therapy. Ethics, confidentiality, authenticity, and censorship of client art are examined. Suggests that AATA should adopt guidelines to protect the…
Descriptors: Art Expression, Art Therapy, Childrens Art, Codes of Ethics
Peer reviewed Peer reviewed
Stefkovich, Jacqueline A. – Journal for a Just and Caring Education, 1996
In recent years, public school students have been searched with metal detectors and occasionally sniffed by dogs or strip searched. Their lockers and bookbags have been searched, and their urine has been tested for drugs--all in the name of school safety. This article explores the legal ramifications of such searches and calls for a critical…
Descriptors: Court Litigation, Drug Use Testing, Elementary Secondary Education, Legal Problems
Uhler, Scott F.; And Others – Illinois Libraries, 1996
Examines liability issues and Internet use--specifically e-mail--that libraries should be aware of. Discusses confidentiality and employer review; how federal laws, statutory limitations, and Illinois State Constitution and statutes affect employer e-mail monitoring; invasion of privacy; and the Freedom of Information Act. Offers procedural and…
Descriptors: Confidentiality, Electronic Mail, Employer Employee Relationship, Employment Practices
Peer reviewed Peer reviewed
Hamilton, Malcolm C. – CUPA Journal, 1996
Electronic mail is a rich communications medium, but it also presents problems of privacy and efficient use of time. If electronic mail is to be the communication medium of choice in the workplace, it is incumbent on responsible managers and human resources professionals to establish guidelines for its appropriate and productive use. Examples from…
Descriptors: Administrative Policy, Business Administration, Efficiency, Electronic Mail
Jacob, M. E. L. – Library Hi Tech News, 1996
Discusses proceedings of the 1996 ASIS (American Society for Information Science) annual meeting in Baltimore (Maryland), including chaos theory; electronic universities; distance education; intellectual property, including information privacy on the Internet; the need for leadership in libraries and information centers; information warfare and…
Descriptors: Access to Information, Chaos Theory, Conferences, Distance Education
McNamee, Mike – Currents, 1990
Information--who your prospects are, what they're interested in, who can best reach them, and what they're capable of giving--is the key to big gifts to institutions of higher education. Prospect research means digging into the personal and financial backgrounds of your donors. Professionals offer advice for drawing up ethical research and privacy…
Descriptors: Alumni, Codes of Ethics, Confidential Records, Donors
Peer reviewed Peer reviewed
McGuire, John M.; And Others – Journal of Counseling & Development, 1994
Assessed 30 adolescent clients' perceptions of the limits of confidentiality, as well as their privacy demands during counseling. Participants' viewed vignettes of confidentiality issues and recorded their preferences and expectations of counselor actions. Results suggest that adolescents generally want higher levels of confidentiality than they…
Descriptors: Adolescents, Alcohol Abuse, Attitudes, Confidentiality
Online Libraries and Microcomputers, 1995
A characterization of the following major legal and political issues surrounding the Internet provides a framework for the future development of the Internet and cyberspace: free speech (libel); intellectual property rights (copyright); jurisdictional questions; and privacy. (AEF)
Descriptors: Copyrights, Freedom of Speech, Futures (of Society), Information Networks
Peer reviewed Peer reviewed
Hitch, Leslie P. – T.H.E. Journal, 1993
Describes two courses offered in the Graduate Program in Communications Management at Simmons College (Massachusetts)--"Emerging Communications Technologies" and "An Historical Perspective on Privacy, Technology and Ethics." Topics addressed include appropriate applications of technology, whether or not technology enhances…
Descriptors: Appropriate Technology, Communications, Course Content, Course Descriptions
McKinney, Joseph R. – West's Education Law Quarterly, 1994
Examines state and federal court decisions from 1985 to 1993 involving students' claims that their constitutional rights were violated by school officials who conducted searches without reasonable suspicion. Discusses what constitutes reasonable suspicion, information provided by student informants, and outcomes of the cases. (MLF)
Descriptors: Court Litigation, Elementary Secondary Education, Privacy, Public Schools
Peer reviewed Peer reviewed
Rees, Warren; And Others – Journal of the American Society for Information Science, 1991
The ability to collect, store, retrieve, and combine information in computerized databases has magnified the potential for misuse of information. Laws have begun to deal with these new threats by expanding rights of privacy, copyright, misrepresentation, products liability, and defamation. Laws regarding computerized databases are certain to…
Descriptors: Copyrights, Delivery Systems, Information Centers, Information Dissemination
Russo, Charles J. – School Business Affairs, 1998
The Supreme Court's decision in "Reno," striking down major portions of the Communications Decency Act of 1996, pits the need to protect children from inappropriate material against the need to maintain free Internet access by adults. Highlights major points in the holding and discusses the meaning of "Reno" for educators. (MLF)
Descriptors: Board of Education Policy, Court Litigation, Elementary Secondary Education, Federal Courts
Eakman, B. K. – Crisis in Education, 1998
Today's school tests and surveys collect a wide variety of personality and opinion data on student proclivities, social attitudes, and parent-inculcated world views. Personality testing poses a threat to family privacy and students' future employability. Nearly anyone can access personal and sensitive student information and use it to target…
Descriptors: Data Collection, Elementary Secondary Education, Freedom of Information, National Competency Tests
Peer reviewed Peer reviewed
Finkelman, Paul – Update on Law-Related Education, 1999
Compares the impeachment proceedings in the trials of Andrew Johnson, Richard Nixon, and Bill Clinton. Categorizes an impeachable offense as one that threatens the safety of the country, either as treason or bribery. Asserts that President Clinton did not violate the Constitution and therefore should not have been impeached. (CMK)
Descriptors: Constitutional Law, Court Litigation, Evidence (Legal), Government (Administrative Body)
Peer reviewed Peer reviewed
Holstein, James A.; Gubrium, Jaber F. – Journal of Marriage and the Family, 1995
Addresses the increasing deprivatization of family life by presenting a constructivist approach to family studies that views the family as a social object constituted through interpretive practice. Documents how family images and meanings are rationalized, public accomplishments, and views the family as part of local culture and the result of…
Descriptors: Cultural Context, Cultural Influences, Ethnology, Family (Sociological Unit)
Pages: 1  |  ...  |  184  |  185  |  186  |  187  |  188  |  189  |  190  |  191  |  192  |  ...  |  226