Publication Date
| In 2026 | 0 |
| Since 2025 | 177 |
| Since 2022 (last 5 years) | 610 |
| Since 2017 (last 10 years) | 1239 |
| Since 2007 (last 20 years) | 2114 |
Descriptor
Source
Author
Publication Type
Education Level
Audience
| Practitioners | 125 |
| Policymakers | 95 |
| Teachers | 88 |
| Administrators | 81 |
| Researchers | 33 |
| Parents | 31 |
| Media Staff | 27 |
| Students | 25 |
| Counselors | 17 |
| Community | 5 |
| Support Staff | 5 |
| More ▼ | |
Location
| United States | 80 |
| Australia | 79 |
| Canada | 79 |
| United Kingdom | 62 |
| California | 61 |
| Turkey | 38 |
| China | 31 |
| Pennsylvania | 28 |
| Texas | 27 |
| Florida | 26 |
| North Carolina | 24 |
| More ▼ | |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Peer reviewedPetras, Richard T. – Mathematics Teacher, 2001
Introduces RSA, one of the most popular public-key cryptosystems that is used to protect the privacy of computer users. Describes the mathematical foundation of public key cryptography. (KHR)
Descriptors: Cryptography, Curriculum Development, Internet, Mathematical Applications
Foster, Andrea L. – Chronicle of Higher Education, 2003
Describes why a new law requiring California colleges to warn people of security breaches involving their computerized personal data has administrators worried about both cost and liability. (EV)
Descriptors: Compliance (Legal), Computer Security, Disclosure, Higher Education
Wallace, Richard C. – School Administrator, 1990
Although no school leader likes media coverage of sensitive issues, handling them forthrightly and candidly benefits everyone. The three major facets of an effective media campaign include realistic expectations of the media, personalizing media relations, and controlling both access and message. (MLH)
Descriptors: Administrator Responsibility, Elementary Secondary Education, Expectation, Journalism
Peer reviewedCooper, Stephen – New Jersey Journal of Communication, 1995
States that the right of the public to know and the right of the individual to privacy are inherently in conflict. Examines the relationship between privacy law and the press. Observes that conditions with the birth of new electronic media are similar to those of a century ago, when two lawyers sued for relief from aggressive journalists. (PA)
Descriptors: Conflict, Court Litigation, Freedom of Information, Freedom of Speech
Smoot, Oliver – EDUCOM Review, 1994
Examines the relationship between the National Information Infrastructure (NII) and the new General Agreement on Tariffs and Trade. Topics discussed include the reduction or elimination of tariffs on NII products; protection of copyrighted works; unresolved trade issues, including the European telecommunications market; standards; and privacy and…
Descriptors: Computer Networks, Copyrights, Foreign Countries, Information Networks
Peer reviewedSrinivasan, Srinija – Government Information Quarterly, 1992
Discussion of individual rights and privacy in Japan focuses on the Privacy Protection Act, which acknowledges the threat posed by government databases to the individual's right of privacy. Characteristics of the Japanese legal system are described, origins of privacy in Japanese law are examined, and privacy and government databases are…
Descriptors: Access to Information, Civil Liberties, Cultural Traits, Databases
Peer reviewedZirkel, Perry A. – Journal of Law and Education, 2000
In the April 1999 issue of this journal, Michael Ferraraccio argues that the justifications advanced for using metal detectors in schools are not sufficiently compelling to outweigh students' Fourth Amendment privacy rights. In the accompanying Counterpoint, Robert Johnson cites lower court cases to support the constitutionality of their used on a…
Descriptors: Court Litigation, Elementary Secondary Education, Privacy, Public Schools
Zirkel, Perry A. – Principal, 2000
In a federal case involving a vice-principal's pat-down search of middle-school students in a cafeteria (for a missing pizza knife), the court upheld the search, saying it was relatively unintrusive and met "TLO's" reasonable-suspicion standards. Principals need reasonable justification for searching a group. (Contains 18 references.)…
Descriptors: Administrator Responsibility, Court Litigation, Middle Schools, Principals
Peer reviewedSmith, Martha – Library Trends, 2001
Explains the concept of global information justice and describes it as an ethical ideal, as an organizing principle for a model for analysis, and as a direction for policy making. Discusses the use of new technologies; access to technology; ownership; privacy; security; community; and the Universal Declaration of Human Rights. (Author/LRW)
Descriptors: Computer Security, Ethics, Global Approach, Intellectual Property
Peer reviewedKupritz, Virginia W. – Journal of Industrial Teacher Education, 2000
Develops a model for privacy regulation in workplaces that identifies three elements: environmental mechanisms (physical elements of workspaces), behavioral mechanisms (overt and cognitive behaviors expressing territoriality or adaptation), and social mechanisms (organizational policy and social supports for individual and group privacy. (Contains…
Descriptors: Behavior Patterns, Employment Practices, Interpersonal Relationship, Organizational Development
Lifto, Don – American School Board Journal, 2001
Increasing numbers of school employees are stumbling and/or crashing and burning on the Internet superhighway. Employees should understand that their e-mail and Internet accounts are not really theirs or private, since their employer pays for access for work purposes. Storing, sending, or forwarding inappropriate messages is verboten. (MLH)
Descriptors: Electronic Mail, Elementary Secondary Education, Employee Responsibility, Ethics
Van Horn, Royal – Phi Delta Kappan, 2000
Peeping software takes several forms and can be used on a network or to monitor a certain computer. E-Mail Plus, for example, hides inside a computer and sends exact copies of incoming or outgoing e-mail anywhere. School staff with monitored computers should demand e-mail privacy. (MLH)
Descriptors: Computer Software, Electronic Mail, Elementary Secondary Education, Internet
Baskin, Joy Surratt; Surratt, Jim – School Administrator, 2001
Citing new provisions of Family Educational Rights and Privacy Act, discusses legal limitations and exceptions to posting personally identifiable student information on a school district's Web site. (PKP)
Descriptors: Elementary Secondary Education, Privacy, School Law, State Legislation
Somerville, Margaret A. – Canadian Journal on Aging, 2004
There are at present two inconsistencies with respect to the sharing of personal health information (PHI) among health care professionals caring for a patient whom the information concerns. First, there is an inconsistency between what is in theory the ethics and law governing the confidentiality and privacy of this information--it may only be…
Descriptors: Patients, Confidentiality, Ethics, Privacy
Friedman, Stan, Sr. – Library Journal, 2004
This article describes the results of the 19th annual Computers in Libraries Conference in Washington, DC on March 10-12, 2004. The conference peered into the future, drew lessons from the past, and ran like clockwork. Program chair Jane Dysart and her organizing committee are by now old hands, bringing together three keynote addresses, 100…
Descriptors: Information Technology, Internet, Privacy, Libraries

Direct link
