Publication Date
| In 2026 | 0 |
| Since 2025 | 177 |
| Since 2022 (last 5 years) | 610 |
| Since 2017 (last 10 years) | 1239 |
| Since 2007 (last 20 years) | 2114 |
Descriptor
Source
Author
Publication Type
Education Level
Audience
| Practitioners | 125 |
| Policymakers | 95 |
| Teachers | 88 |
| Administrators | 81 |
| Researchers | 33 |
| Parents | 31 |
| Media Staff | 27 |
| Students | 25 |
| Counselors | 17 |
| Community | 5 |
| Support Staff | 5 |
| More ▼ | |
Location
| United States | 80 |
| Australia | 79 |
| Canada | 79 |
| United Kingdom | 62 |
| California | 61 |
| Turkey | 38 |
| China | 31 |
| Pennsylvania | 28 |
| Texas | 27 |
| Florida | 26 |
| North Carolina | 24 |
| More ▼ | |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Bowers, Stacey L. – Journal of Academic Librarianship, 2006
This paper summarizes the history of privacy as it relates to library records. It commences with a discussion of how the concept of privacy first originated through case law and follows the concept of privacy as it has affected library records through current day and the "USA PATRIOT Act."
Descriptors: Privacy, Libraries, Library Services, Library Policy
Cumper, Peter – Sex Education: Sexuality, Society and Learning, 2004
The Human Rights Act 1998 is the most significant British statute to have been passed in the last decade. It has already been the catalyst for a series of high profile cases, ranging from the privacy rights of celebrities ("Douglas v Hello!" [2001] QB 967) to the Home Secretary's sentencing powers in murder cases ("R (Anderson) v…
Descriptors: Office Occupations, Civil Rights, Sex Education, Court Litigation
Corn, Michael – EDUCAUSE Quarterly, 2007
Many security professionals choose the career because of an interest in the technology of security. Few realize the degree to which a contemporary security office interacts with law enforcement agencies (LEAs) such as the FBI and state, local, and campus police. As the field of information security has matured, the language of risk management is…
Descriptors: Trust (Psychology), School Security, Police, Risk Management
Rager, Kathleen B. – International Journal of Qualitative Studies in Education (QSE), 2007
This article reports the findings from a secondary analysis of the data from two qualitative studies conducted by the researcher regarding the self-directed learning experiences of prostate and breast cancer patients. Of interest were possible differences in the descriptions of the participants' experiences that appear to relate to gender.…
Descriptors: Patients, Geographic Location, Cancer, Qualitative Research
Data Quality Campaign, 2010
To address key policy and programmatic questions and help improve student and system performance, states must work to link data across the early childhood, postsecondary and workforce (P-20/workforce) spectrum and share this information with appropriate stakeholders. This issue brief highlights current efforts in California, Florida, Indiana, and…
Descriptors: Stakeholders, State Programs, Program Descriptions, Education Work Relationship
Amos, Jason, Ed. – Alliance for Excellent Education, 2008
"Straight A's: Public Education Policy and Progress" is a biweekly newsletter that focuses on education news and events both in Washington, DC and around the country. The following articles are included in this issue: (1) "Improving the Distribution of Teachers in Low-Performing High Schools": Alliance Brief and Event Examine…
Descriptors: Teacher Effectiveness, Graduation Rate, Minority Groups, Public Education
Firestone, Charles M., Ed.; Schement, Jorge Reina, Ed. – 1995
This book is an attempt to express rudimentary "first principles" in the application of democratic values to some of the most pressing issues inherent in the advent of a new information society. Its purpose is not to advance any particular political slant, but rather, to incorporate a balance of democratic values--libertarian,…
Descriptors: Civil Liberties, Communication (Thought Transfer), Copyrights, Democratic Values
Acker, Stephen R. – 1983
Interactive cable television systems take advantage of the ability of coaxial cables to transmit information in two directions. QUBE in Columbus, Ohio, and Project Ida in Canada use cable's interactive ability to provide a variety of services. QUBE allows electronic "town meetings" and provides access to stock quotes, newspaper…
Descriptors: Cable Television, Federal Regulation, Futures (of Society), Mass Media Effects
Walsh, Frank – 1988
This monograph synthesizes the laws and regulations that form the basis of the right to representation in the court of public opinion by all who would seek to influence public and private decisions. It expresses the framework of human and social values that underlie this constitutional freedom and that give public relations and other management…
Descriptors: Advertising, Copyrights, Financial Services, Freedom of Information
Mundt, Whitney R. – 1980
Canon 35 of the American Bar Association's Canons of Judicial Ethics is an advisory ban on cameras and news equipment in courtrooms. In 1978, the Louisiana Supreme Court authorized a one-year pilot project on electronic coverage of court proceedings. The authorization set forth certain technical requirements concerning the nature and placement of…
Descriptors: Court Doctrine, Court Litigation, Ethics, Freedom of Speech
American Association of School Personnel Administrators, Seven Hills, OH. – 1980
Determining acceptable practices in maintaining personnel files is a pertinent issue for school personnel administrators today. Recognizing this, the Georgia Association of School Personnel Administrators accepted the study of this topic as a committee assignment from the American Association of School Personnel Administrators. A survey instrument…
Descriptors: Confidential Records, Disclosure, Elementary Secondary Education, National Surveys
Cullen, Mike – 1975
In the face of more sophisticated data collection technology, California voters have demonstrated an increasing concern about their own privacy. In response, Assemblyman Cullen has proposed a bill to the state legislature which would require anyone opening an automated information system to send notice to the Secretary of State. This notice would…
Descriptors: Confidentiality, Data Collection, Data Processing, Information Processing
Hellman, J. J. – 1970
The report is presented in two parts. The first examines the social and technical implications of information systems vis a vis the individual's ability to control the dissemination of information about himself. It is argued that information systems must incorporate certain properties in their initial design in order to safeguard man's…
Descriptors: Computers, Data Processing, Information Dissemination, Information Retrieval
Hsiao, D. K.; And Others – 1974
A description is provided of a conceptual model for a data secure system. The discussion first offers a formal working vocabulary and next, using the intuitive idea of a dichotomy between permissible and impermissible accesses, formalizes the idea with an Extended Logical Data Base and with protection specifications and patterns. These…
Descriptors: Computers, Conceptual Schemes, Confidentiality, Databases
Peer reviewedRobins, Lee N. – American Journal of Psychiatry, 1977
Recent regulations concerning consent procedures and protection of privacy fall most severely on follow-up studies of children. Compliance with current regulations on subjects' rights sometimes seems potentially more harmful to the subjects than is the research itself. (Author/AM)
Descriptors: Child Advocacy, Civil Liberties, Followup Studies, Legislation

Direct link
