Publication Date
| In 2026 | 0 |
| Since 2025 | 177 |
| Since 2022 (last 5 years) | 610 |
| Since 2017 (last 10 years) | 1239 |
| Since 2007 (last 20 years) | 2114 |
Descriptor
Source
Author
Publication Type
Education Level
Audience
| Practitioners | 125 |
| Policymakers | 95 |
| Teachers | 88 |
| Administrators | 81 |
| Researchers | 33 |
| Parents | 31 |
| Media Staff | 27 |
| Students | 25 |
| Counselors | 17 |
| Community | 5 |
| Support Staff | 5 |
| More ▼ | |
Location
| United States | 80 |
| Australia | 79 |
| Canada | 79 |
| United Kingdom | 62 |
| California | 61 |
| Turkey | 38 |
| China | 31 |
| Pennsylvania | 28 |
| Texas | 27 |
| Florida | 26 |
| North Carolina | 24 |
| More ▼ | |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Peer reviewedFreese, Jan – Journal of Communication, 1979
Argues that the flow of data within and across national borders involves problems that need to be regulated by law. Calls for international cooperation to insure that society is protected from abuses of data flow. (PD)
Descriptors: Information Dissemination, Information Networks, International Law, International Relations
Peer reviewedCreim, William B. – Southern California Law Review, 1979
The Buckley Amendment limits the right of access to letters of recommendation only to admitted students and allows schools to request that applicants sign a waiver of their access rights. Statutory amendment is the best way to correct this "catch 22" situation. Available from The Law Center, University of Southern California, University…
Descriptors: Admission (School), College Applicants, Confidential Records, Higher Education
Peer reviewedGannon-Leary, Pat – Electronic Library, 1997
As a result of litigation, a number of companies have written policies declaring the right to monitor employee electronic communication. Discusses reasons why employers monitor employee e-mail, the prevalence of monitoring in universities, use and ethics policy statements, and bills of rights statements protecting employee privacy. (PEN)
Descriptors: Electronic Mail, Ethics, Higher Education, Information Policy
Peer reviewedBushong, Sara – Teacher Librarian, 2002
Presents general statistical findings of Internet use by children, discusses the recent Children's Online Privacy Protection Act (COPPA), and summarizes online child safety considerations. Considers filtering and includes current resources for parents and children. (Author/LRW)
Descriptors: Children, Federal Legislation, Internet, Parent Participation
Peer reviewedBanja, John D.; Higgins, Patricia – Journal of Head Trauma Rehabilitation, 1989
The article examines the usefulness of videotaping therapeutic sessions in rehabilitation settings and provides suggestions for rehabilitation professionals contemplating videotaping in light of the patient's legal and ethical right to privacy. (Author/DB)
Descriptors: Civil Rights, Disabilities, Ethics, Legal Problems
Peer reviewedWoodward, Beverly – Advancing the Consumer Interest, 1996
Information technology poses a threat to confidentiality of medical records. The number of parties claiming a need to know is increasing, but unrestricted access can lead to improper disclosure. Making health records semipublic may affect when and how people choose to obtain medical services. (SK)
Descriptors: Access to Information, Confidentiality, Databases, Medical Services
Peer reviewedKennedy, Michael J. – Mental Retardation, 1994
An individual with a disability complains that under the blanket term "disabled" individual needs and rights are not respected, privacy is invaded, people are always being evaluated but never asked to evaluate services they receive, and everything must be part of a "program" rather than just part of daily life. (JDD)
Descriptors: Disabilities, Evaluation, Independent Living, Individualized Programs
Peer reviewedGovernment Information Quarterly, 1992
The increased use of computer matching to detect fraud and abuse in government programs has led to concerns for the privacy of personal information. Reviews the use of matching programs and regulations in Canada, the United States, and the European Community, and suggests policy changes. (80 references) (LAE)
Descriptors: Confidential Records, Federal Regulation, Foreign Countries, Information Technology
Flanders, Bruce – American Libraries, 1991
Discusses issues involved in the creation of the National Research and Education Network (NREN). Telecommunications technology is described; support from industry and libraries is discussed; and problems with NREN are raised, including equal access to computerized information, privacy issues, and protection of First Amendment rights. (LRW)
Descriptors: Access to Information, Computer Networks, Library Networks, Privacy
Peer reviewedVoakes, Paul S. – Journalism and Mass Communication Quarterly, 1998
Contributes to scholarship on journalism law and journalism ethics by probing 42 journalists' decision-making processes in news gathering situations that resulted in lawsuits for invasion of privacy. Indicates that journalists were generally unaware of impending legal trouble; and that legal reasoning takes place in a "total context" of social…
Descriptors: Decision Making, Ethics, Higher Education, Journalism
Peer reviewedFerris, Lori E. – American Journal of Evaluation, 2000
Focuses on ethical and legal issues that arose in the evaluation of abortion services. Discusses the development of decision rules and tradeoffs in dealing with these issues to reach rational and objective decisions. Places the discussion in the context of balancing usefulness and propriety with respect to informed consent and privacy and makes…
Descriptors: Abortions, Decision Making, Ethics, Evaluation Methods
Peer reviewedSamoriski, Jan H.; And Others – Journal of Broadcasting & Electronic Media, 1996
Attempts to clarify the status of e-mail privacy under the Electronic Communications Privacy Act of 1986 (ECPA). Examines current law and the paucity of definitive case law. A review of cases and literature suggests there is a gap in the existing ECPA that allows for potentially abusive electronic monitoring and interception of e-mail,…
Descriptors: Computer Security, Electronic Mail, Information Policy, Laws
Peer reviewedAidman, Amy – Educational Leadership, 2000
The first federal Internet privacy law (the Children's Online Privacy Protection Act) provides safeguards for children by regulating collection of their personal information. Unfortunately, teens are not protected. Legislation is pending to protect children from online marketers such as ZapMe! Interactive technologies require constant vigilance.…
Descriptors: Elementary Secondary Education, Federal Legislation, Internet, Privacy
Dowling-Sendor, Benjamin – American School Board Journal, 2002
Discusses Oklahoma case ("Owasso Independent School District No. 1-001 v. Falvo") wherein the Supreme Court ruled unanimously in February 2002 that peer grading did not violate the Family Education Rights and Privacy Act (FERPA). (PKP)
Descriptors: Court Litigation, Elementary Secondary Education, Grading, Privacy
Peer reviewedFarah, Badie N.; Higby, Mary A. – Journal of Education for Business, 2001
Electronic commerce has intensified conflict between businesses' need to collect data and customers' desire to protect privacy. Web-based privacy tools and legislation could add to the costs of e-commerce and reduce profitability. Business models not based on profiling customers may be needed. (SK)
Descriptors: Business Responsibility, Data Collection, Federal Regulation, Privacy


