NotesFAQContact Us
Collection
Advanced
Search Tips
What Works Clearinghouse Rating
Showing 2,281 to 2,295 of 3,396 results Save | Export
Bedno, Jane Higgins – Currents, 1985
Copyright, trademark, libel, privacy, and contract laws are continuing to grow in complexity. In the case of a dispute, the main questions center on the damage done and the motives behind the publication. Four categories discussed include: authorship, ownership, honor, and privacy. (MLW)
Descriptors: Authors, Copyrights, Court Litigation, Higher Education
Kirby, M. D. – Rutgers Journal of Computers and the Law, 1976
The impact of computer information and the intrusive machinery of surveillance is examined and the need demonstrated for the law to afford individuals in Australian society new means of protecting their privacy. (Author/LBH)
Descriptors: Civil Liberties, Computers, Confidentiality, Federal Legislation
Simon, Mark – 2003
The 1964 Wilderness Act was legislated to protect and maintain a portion of the nation's remaining wild areas as they were during pre-settlement times. In part, the intent was to provide the opportunity for primitive forms of recreation in surroundings where wilderness can be experienced on its own terms. However, overuse and related resource…
Descriptors: Attitude Change, Camping, Experiential Learning, Land Use
Peer reviewed Peer reviewed
Atwater, Tony – Journalism Quarterly, 1983
Argues that while the Privacy Protection Act of 1980 appears to reverse the "Zurcher v. Stanford Daily" decision, loopholes may permit some newsroom searches. (FL)
Descriptors: Court Litigation, Due Process, Freedom of Speech, Journalism
Lascell, David M.; Devane, Mary Ann K. – New Directions for Institutional Advancement, 1982
The decision whether to publish information concerning a given person in institutional public relations efforts must go well beyond consideration of the information's usefulness in the immediate context. Damage to another's reputation or invasion of privacy is both unethical and costly. (MSE)
Descriptors: Ethics, Higher Education, Information Dissemination, Legal Responsibility
Peer reviewed Peer reviewed
McGuire, Patricia – Update on Law-Related Education, 1980
Case studies for secondary school students based on recent federal cases focus on the extent to which a student's right to privacy may be diminished by the school environment. Decisions have been based on the school offical acting in the place of parents and as a state agent. Discussion questions are included. (KC)
Descriptors: Case Studies, Civil Rights, Educational Environment, Privacy
Peer reviewed Peer reviewed
Webb, Stephen D. – Social Behavior and Personality, 1978
Examines the supposition that insufficient privacy is stressful to the individual. Data were obtained from urban centers in New Zealand. Findings support the hypothesis that a percieved lack of privacy is associated with psychosomatic stress. The relationship is specified by measures of stress and sex of respondents. (Author)
Descriptors: Adults, Foreign Countries, Perception, Privacy
Peer reviewed Peer reviewed
McLuhan, Marshall; Powers, Bruce – Journal of Communication, 1981
Describes some of the problems for the individual inherent in the rapidly expanding computerized field of credit and banking. Proposes that electronic fund transfer systems could virtually replace the use of cash. Warns that while such systems offer wide advantages to business, they threaten the individual's privacy. (JMF)
Descriptors: Automation, Banking, Civil Liberties, Computers
Peer reviewed Peer reviewed
Michigan Law Review, 1978
Concludes that laws prohibiting fornication and cohabitation are unconstitutional. Available from Michigan Law Review, Hutchins Hall, Ann Arbor, MI 48109; single issue $3.50. (Author/IRT)
Descriptors: Civil Liberties, Constitutional Law, Moral Issues, Moral Values
Peer reviewed Peer reviewed
Newborg, Donald L. – Child Welfare, 1979
Provides information on recent decisions in New York courts in cases involving the right of adult adoptees to inspect sealed adoption records. The effect of these decisions is that any change in the right of access to records must be brought about through legislation, not through the courts. (Author/SS)
Descriptors: Adopted Children, Civil Liberties, Confidential Records, Constitutional Law
Office of the Press Secretary of the White House – Telecommunications, 1997
An abbreviated version of a longer policy document on electronic commerce released by the Clinton Administration, this article examines principles and recommendations on tariffs, taxes, electronic payment systems, uniform commercial code for electronic commerce, intellectual property protection, privacy, security, telecommunications infrastructure…
Descriptors: Computer Security, Information Technology, Intellectual Property, Internet
Peer reviewed Peer reviewed
Remley, Theodore P., Jr.; Herlihy, Barbara; Herlihy, Scott B. – Journal of Counseling & Development, 1997
Reviews the rationale that underlies privileged communication in counseling and discusses the nature of privilege. Describes the progress of a Supreme Court decision affecting privileged communication between licensed psychotherapists and their patients. Concludes with a legal analysis of the decision and its implications for counselors. (RJM)
Descriptors: Confidential Records, Confidentiality, Counseling, Counselor Client Relationship
Peer reviewed Peer reviewed
Nucci, Larry – New Directions for Child Development, 1997
A personal area of behavior comprising matters of choice and privacy, and differentiated from convention and moral obligation, is a psychological requirement for the construction of a distinct and bounded self. Accurate investigations of this dynamic require differentiation between cultural ideology and conceptual frames of individuals. (Author)
Descriptors: Children, Context Effect, Cultural Influences, Culture
Peer reviewed Peer reviewed
Lewandowski, Judith L. – Journal of School Violence, 2003
Used data collected by a trend analysis company on 111 Web sites commonly visited by children to identify specific privacy issues faced by children when exploring child-oriented and adult-oriented Web sites. Discusses the complexity of issues raised by the expansion of information technology. (SLD)
Descriptors: Children, Data Collection, Information Technology, Internet
Peer reviewed Peer reviewed
Keating, John J., III; Hafner, Arthur W. – Journal of Academic Librarianship, 2002
Describes business techniques for mass marketing, where information technologies are used to target discrete individuals or groups and promote customer interaction. Considers the applicability of business concepts to academic library service, including uniquely identifying patrons, issues of privacy, focusing on the most valuable library services,…
Descriptors: Academic Libraries, Higher Education, Information Technology, Library Services
Pages: 1  |  ...  |  149  |  150  |  151  |  152  |  153  |  154  |  155  |  156  |  157  |  ...  |  227