NotesFAQContact Us
Collection
Advanced
Search Tips
What Works Clearinghouse Rating
Showing 3,331 to 3,345 of 3,386 results Save | Export
American Library Association, Chicago, IL. Office of Intellectual Freedom. – 1996
This manual is designed to help librarians anticipate and resist censorship of library materials, how to handle complaints, and how to write legislators effectively. Part I, "Library Bill of Rights," and Part II, "Protecting the Freedom to Read," present the text and historical development of the American Library Association's…
Descriptors: Access to Information, Accessibility (for Disabled), Activism, Censorship
Van Dyke, Jon M.; Sakurai, Melvin M. – 1992
The Fourth Amendment protects an individual's justified expectations of privacy against unreasonable government intrusions; however, reasonable intrusions are allowed when legitimate governmental interests are served. This volume is intended to provide guidelines for school administrators on how to conduct searches and seizures in a manner…
Descriptors: Administrator Guides, Administrator Responsibility, Check Lists, Constitutional Law
Seaman, Scott – 1994
Issues concerning the confidentiality of library-patron records in the age of electronics are explored. Confidentiality of patron records is a relatively new concept for libraries and was first introduced in the 1938 Code of Ethics of the American Library Association (ALA). Librarians have worked on a state-by-state basis to protect library…
Descriptors: Codes of Ethics, Confidential Records, Confidentiality, Data
Peer reviewed Peer reviewed
Direct linkDirect link
Wilson, John K. – Thought & Action, 2005
College campuses around the country reacted to the September 11, 2001, terrorist acts with rallies, vigils, discussions, and a wide range of debates about the causes and cures for terrorism. Yet the story told about academia in the media was often quite different. Conservatives claimed that the reaction to 9/11 in academia was another example of…
Descriptors: Academic Freedom, Freedom of Speech, Higher Education, Terrorism
Solomon, Gary
After years of neglect, rural community mental health is becoming a legitimate area of specialization. Although the number of problems readily visible in rural mental health may appear to be inordinate, probabilities are that the difficulties found in rural locales are quantitatively no different than those found in non-rural areas. The…
Descriptors: Community Health Services, Community Support, Confidentiality, Delivery Systems
Kolman, Anita Sue – 1978
The paper discusses a study of self-disclosure patterns of 29 college men and 35 college women. The purpose of the study was to determine the extent to which college students confided in their best male friend, best female friend, mother, and father about attitudes and opinions, tastes and interests, work and studies, money, personality, and body.…
Descriptors: College Students, Comparative Analysis, Data Analysis, Females
Office of Postsecondary Education, Washington DC. Student Financial Assistance Programs. – 1998
The manual contains the texts of all federal regulations concerning federal student financial aid programs, many of which are authorized by Title IV of the Higher Education Act of 1965, as amended, as of December 31, 1997. An introductory section gives guidance in reading and understanding the regulations; the relationship of law to regulation;…
Descriptors: Accrediting Agencies, Agency Role, Compliance (Legal), Confidential Records
Gillis, R. Peter; Whitemarsh, Judith – 1999
This study provides suggestions and best practices for superintendents, Freedom of Information and Protection of Privacy (FOIPP) coordinators and school information technologists in dealing with the impact of Alberta's FOIPP Act on the application of information technologies within their organizations. The study explores the relationship between…
Descriptors: Access to Information, Check Lists, Computer Security, Computer Uses in Education
Raney, Mardell – TECHNOS, 1997
This interview with Esther Dyson, who is president and owner of EDventure Holdings which focuses on emerging information technology worldwide, discusses personal responsibility for technology; government's role; content ownership and intellectual property; Internet development; education and computers; parents' role in education; teacher…
Descriptors: Access to Computers, Access to Information, Artificial Intelligence, Censorship
Peer reviewed Peer reviewed
Hernon, Peter; McClure, Charles R. – Annual Review of Information Science and Technology (ARIST), 1993
Provides an overview of U.S. federal information policy and its treatment of electronic information resources. Highlights include government publications; electronic government information; main providers of government information, including the Government Printing Office; the Freedom of Information Act; public access and use; information…
Descriptors: Access to Information, Computer Networks, Copyrights, Databases
Peer reviewed Peer reviewed
Direct linkDirect link
Hentea, Mariana; Dhillon, Harpal S.; Dhillon, Manpreet – Journal of Information Technology Education, 2006
Despite a variety of Information Security Assurance (ISA) curricula and diverse educational models, universities often fail to provide their graduates with skills demanded by employers. There is a big discrepancy between the levels of skills expected by employers and those the graduates have after completing their studies. The authors compare the…
Descriptors: Models, Job Skills, Educational Objectives, Relevance (Education)
Rossow, Lawrence F.; Stefkovich, Jacqueline A. – 1995
Search and seizure in the public schools has long been a problem for both school authorities and law-enforcement officers. Students have also been known to have been deprived of their constitutional rights. Much of the problem stems from a lack of clarity in the application of the Fourth Amendment to the school setting. This monograph was written…
Descriptors: Civil Rights, Compliance (Legal), Constitutional Law, Court Litigation
Federal Interagency Committee on Education, Washington, DC. – 1978
Information is provided in this guide to assist educational institutions in bringing their catalogs and other informational materials into compliance with federal laws and regulations. It summarizes applicable laws and regulations and includes the names and mailing addresses of the agencies responsible for administering these laws, regulations,…
Descriptors: Colleges, Compliance (Legal), Consumer Protection, Directories
Hammond, Edward H., Ed.; Shaffer, Robert H., Ed. – 1978
Legal aspects of the administration of student services are examined from various viewpoints in the 10 chapters of this monograph. In light of the increasing number of legal cases affecting student development work in higher education, it is suggested that approaches different from those of the traditional student personnel relationship are…
Descriptors: Ancillary Services, Civil Liberties, Civil Rights Legislation, College Administration
Peer reviewed Peer reviewed
Direct linkDirect link
Qayoumi, Mohammad H.; Woody, Carol – EDUCAUSE Quarterly, 2005
Good information security does not just happen--and often does not happen at all. Resources are always in short supply, and there are always other needs that seem more pressing. Why? Because information security is hard to define, the required tasks are unclear, and the work never seems to be finished. However, the loss to the organization can be…
Descriptors: Confidentiality, Computer Security, Risk, Privacy
Pages: 1  |  ...  |  216  |  217  |  218  |  219  |  220  |  221  |  222  |  223  |  224  |  225  |  226