NotesFAQContact Us
Collection
Advanced
Search Tips
What Works Clearinghouse Rating
Showing 2,296 to 2,310 of 3,396 results Save | Export
Peer reviewed Peer reviewed
Petras, Richard T. – Mathematics Teacher, 2001
Introduces RSA, one of the most popular public-key cryptosystems that is used to protect the privacy of computer users. Describes the mathematical foundation of public key cryptography. (KHR)
Descriptors: Cryptography, Curriculum Development, Internet, Mathematical Applications
Foster, Andrea L. – Chronicle of Higher Education, 2003
Describes why a new law requiring California colleges to warn people of security breaches involving their computerized personal data has administrators worried about both cost and liability. (EV)
Descriptors: Compliance (Legal), Computer Security, Disclosure, Higher Education
Wallace, Richard C. – School Administrator, 1990
Although no school leader likes media coverage of sensitive issues, handling them forthrightly and candidly benefits everyone. The three major facets of an effective media campaign include realistic expectations of the media, personalizing media relations, and controlling both access and message. (MLH)
Descriptors: Administrator Responsibility, Elementary Secondary Education, Expectation, Journalism
Peer reviewed Peer reviewed
Cooper, Stephen – New Jersey Journal of Communication, 1995
States that the right of the public to know and the right of the individual to privacy are inherently in conflict. Examines the relationship between privacy law and the press. Observes that conditions with the birth of new electronic media are similar to those of a century ago, when two lawyers sued for relief from aggressive journalists. (PA)
Descriptors: Conflict, Court Litigation, Freedom of Information, Freedom of Speech
Smoot, Oliver – EDUCOM Review, 1994
Examines the relationship between the National Information Infrastructure (NII) and the new General Agreement on Tariffs and Trade. Topics discussed include the reduction or elimination of tariffs on NII products; protection of copyrighted works; unresolved trade issues, including the European telecommunications market; standards; and privacy and…
Descriptors: Computer Networks, Copyrights, Foreign Countries, Information Networks
Peer reviewed Peer reviewed
Srinivasan, Srinija – Government Information Quarterly, 1992
Discussion of individual rights and privacy in Japan focuses on the Privacy Protection Act, which acknowledges the threat posed by government databases to the individual's right of privacy. Characteristics of the Japanese legal system are described, origins of privacy in Japanese law are examined, and privacy and government databases are…
Descriptors: Access to Information, Civil Liberties, Cultural Traits, Databases
Peer reviewed Peer reviewed
Zirkel, Perry A. – Journal of Law and Education, 2000
In the April 1999 issue of this journal, Michael Ferraraccio argues that the justifications advanced for using metal detectors in schools are not sufficiently compelling to outweigh students' Fourth Amendment privacy rights. In the accompanying Counterpoint, Robert Johnson cites lower court cases to support the constitutionality of their used on a…
Descriptors: Court Litigation, Elementary Secondary Education, Privacy, Public Schools
Zirkel, Perry A. – Principal, 2000
In a federal case involving a vice-principal's pat-down search of middle-school students in a cafeteria (for a missing pizza knife), the court upheld the search, saying it was relatively unintrusive and met "TLO's" reasonable-suspicion standards. Principals need reasonable justification for searching a group. (Contains 18 references.)…
Descriptors: Administrator Responsibility, Court Litigation, Middle Schools, Principals
Peer reviewed Peer reviewed
Smith, Martha – Library Trends, 2001
Explains the concept of global information justice and describes it as an ethical ideal, as an organizing principle for a model for analysis, and as a direction for policy making. Discusses the use of new technologies; access to technology; ownership; privacy; security; community; and the Universal Declaration of Human Rights. (Author/LRW)
Descriptors: Computer Security, Ethics, Global Approach, Intellectual Property
Peer reviewed Peer reviewed
Kupritz, Virginia W. – Journal of Industrial Teacher Education, 2000
Develops a model for privacy regulation in workplaces that identifies three elements: environmental mechanisms (physical elements of workspaces), behavioral mechanisms (overt and cognitive behaviors expressing territoriality or adaptation), and social mechanisms (organizational policy and social supports for individual and group privacy. (Contains…
Descriptors: Behavior Patterns, Employment Practices, Interpersonal Relationship, Organizational Development
Lifto, Don – American School Board Journal, 2001
Increasing numbers of school employees are stumbling and/or crashing and burning on the Internet superhighway. Employees should understand that their e-mail and Internet accounts are not really theirs or private, since their employer pays for access for work purposes. Storing, sending, or forwarding inappropriate messages is verboten. (MLH)
Descriptors: Electronic Mail, Elementary Secondary Education, Employee Responsibility, Ethics
Van Horn, Royal – Phi Delta Kappan, 2000
Peeping software takes several forms and can be used on a network or to monitor a certain computer. E-Mail Plus, for example, hides inside a computer and sends exact copies of incoming or outgoing e-mail anywhere. School staff with monitored computers should demand e-mail privacy. (MLH)
Descriptors: Computer Software, Electronic Mail, Elementary Secondary Education, Internet
Baskin, Joy Surratt; Surratt, Jim – School Administrator, 2001
Citing new provisions of Family Educational Rights and Privacy Act, discusses legal limitations and exceptions to posting personally identifiable student information on a school district's Web site. (PKP)
Descriptors: Elementary Secondary Education, Privacy, School Law, State Legislation
Peer reviewed Peer reviewed
Direct linkDirect link
Somerville, Margaret A. – Canadian Journal on Aging, 2004
There are at present two inconsistencies with respect to the sharing of personal health information (PHI) among health care professionals caring for a patient whom the information concerns. First, there is an inconsistency between what is in theory the ethics and law governing the confidentiality and privacy of this information--it may only be…
Descriptors: Patients, Confidentiality, Ethics, Privacy
Friedman, Stan, Sr. – Library Journal, 2004
This article describes the results of the 19th annual Computers in Libraries Conference in Washington, DC on March 10-12, 2004. The conference peered into the future, drew lessons from the past, and ran like clockwork. Program chair Jane Dysart and her organizing committee are by now old hands, bringing together three keynote addresses, 100…
Descriptors: Information Technology, Internet, Privacy, Libraries
Pages: 1  |  ...  |  150  |  151  |  152  |  153  |  154  |  155  |  156  |  157  |  158  |  ...  |  227