NotesFAQContact Us
Collection
Advanced
Search Tips
What Works Clearinghouse Rating
Showing 2,416 to 2,430 of 3,396 results Save | Export
Sultanik, Jeffrey, T. – School Business Affairs, 1997
E-mail has created friction between school districts' proprietary needs and employees' privacy rights. This article examines e-mail law (constitutional, statutory, and common) and issues (employer monitoring, discover problems, admissibility, and attorney-client privilege) and provides policy guidelines. The 1996 Communications Decency Act,…
Descriptors: Electronic Mail, Elementary Secondary Education, Internet, Legal Problems
Peer reviewed Peer reviewed
Tu, Chih-Hsiung; McIsaac, Marina – American Journal of Distance Education, 2002
Studied social presence in an online learning environment and focused on three elements: social context, online communication, and interactivity: that emerged as important in establishing a sense of community among online learners. Discusses the privacy factor, learner characteristics, computer-mediated communication, and course design.…
Descriptors: Computer Mediated Communication, Interaction, Interpersonal Competence, Interpersonal Relationship
Peer reviewed Peer reviewed
Fifarek, Aimee – Online Information Review, 2002
Describes potential situations where patron privacy can be endangered by the presence of information technology and how academic librarians can protect patron information and prepare patrons for safe information seeking in the online world. Discusses the USA PATRIOT Act, search warrants, and acceptable use policy. (Author/LRW)
Descriptors: Academic Libraries, Federal Legislation, Higher Education, Information Seeking
Van Horn, Royal – Phi Delta Kappan, 2002
Argues that 1998 Digital Millennium Copyright Act, providing increased protection against unauthorized access to copyrighted electronic media, and the Sonny Bono Copyright Term Extension Act, extending the term of most copyrighted books, unduly burden users of electronic media and books. Discusses the negative impact of recent federal laws to…
Descriptors: Child Safety, Copyrights, Elementary Secondary Education, Fair Use (Copyrights)
Overbeck, Wayne – Community College Journalist, 1990
Reviews controversies that have arisen at two California community colleges because campus newspapers were accused of violating the Buckley Amendment by publishing reports that student leaders were ineligible to hold their offices based on confidential academic records. Summarizes the Buckley Amendment and various court decisions related to…
Descriptors: Community Colleges, Confidential Records, Court Litigation, Disclosure
Peer reviewed Peer reviewed
Campbell, Richard; Reeves, Jimmie L. – Critical Studies in Mass Communication, 1989
Interprets four news stories about Joyce Brown, a homeless women who, against her will, was institutionalized by the city of New York. Examines how television news marks boundaries between the marginal and the mainstream, between a major socioeconomic problem demanding collective engagement and a personal problem requiring private remedy. (MS)
Descriptors: Discourse Analysis, Homeless People, Mass Media Role, Media Research
Peer reviewed Peer reviewed
Mhlaba, Sondlo Leonard – Government Information Quarterly, 1995
Discusses origins of Transborder Data Flows (TDFs) as an international problem in the early 1970s. Shows how technological development in telecommunications and networks has made regulation more complex and urgent. Recommends the internationalization of the Key Escrowed Encryption System (KEES) and the development of broad international TDF…
Descriptors: Coding, Computer Security, Copyrights, Information Transfer
Peer reviewed Peer reviewed
Johnston, Sue; Hedemann, Maree – Educational Review, 1994
A case study of a teacher committee collaborating on development of school policy illuminates such barriers to teacher collaboration and school-based management as time constraints and lack of inservice support. A major difficulty is that the culture of teaching is based on privacy and individualism. (SK)
Descriptors: Curriculum Development, Educational Cooperation, Foreign Countries, Individualism
Leatherman, Courtney – Chronicle of Higher Education, 1995
After accepting the presidency of the College of Wooster (Ohio), a highly-qualified and respected woman withdrew the day before taking office in the wake of rumors about a long-term relationship with another woman. Concern within the college community about the situation centers on two issues: homophobia and privacy for administrators. (MSE)
Descriptors: Administrator Characteristics, Administrator Role, Administrator Selection, College Presidents
Peer reviewed Peer reviewed
Panepinto, Joe – Telematics and Informatics, 1995
Examines recent findings that could influence the use of e-mail on university campuses. National privacy legislation and the inviolability of student records are discussed. It is concluded that more effective safeguards are necessary, and that the current steps are inadequate for the protection of students' rights. (Author/LRW)
Descriptors: Computer Security, Confidential Records, Electronic Mail, Federal Legislation
Mazur, Joan M. – School Business Affairs, 1995
As schools merge onto the information highway, districts must address their liability associated with Internet access. Schools need a practical policy supporting high access to global educational resources while limiting district liability. USENET provides easy access to controversial and pornographic materials. This article outlines federal…
Descriptors: Computer Networks, Elementary Secondary Education, Freedom of Information, Legal Responsibility
Peer reviewed Peer reviewed
Wilkes, Adeline W.; Grant, Susan Marie – RQ, 1995
Gives a historical explanation of library confidentiality policies and procedures and reviews notable invasions of patron privacy through use of library records by the Federal Bureau of Investigation and the Internal Revenue Service. Also reports on a study that examined patron confidentiality policies in Texas academic library reference…
Descriptors: Academic Libraries, Confidential Records, Confidentiality, Librarians
Peer reviewed Peer reviewed
Halachmi, Arie – Public Personnel Management, 1992
The dysfunctions associated with artificial workgroups require attention to the social context of work. Complex issues of safety and security related to information technology may necessitate a new classification of experts, information rangers, with policing and investigative authority. (SK)
Descriptors: Information Technology, Interprofessional Relationship, Morale, Occupational Safety and Health
Wilson, A. P.; Bishard, Thomas G. – American School Board Journal, 1994
Interviews with 12 Kansas school executives and questionnaire data received from 49 board presidents and 72 superintendents disclosed that the majority had perceived the occurrence of communications that violated employees' privacy. Training, ethical awareness, and a well-written policy are part of the solution. A model policy is provided to guide…
Descriptors: Boards of Education, Confidentiality, Elementary Secondary Education, Interpersonal Relationship
Peer reviewed Peer reviewed
Sweet, Jill D. – American Indian Culture and Research Journal, 1991
The Pueblo Indians have developed creative and assertive techniques for interacting with tourists that help the Pueblo cope with the pressures of tourist contact, fortify their cultural boundaries, and exercise control over potentially uncomfortable situations. Secrecy and community regulations are examined in relation to host/guest dynamics and…
Descriptors: American Indian Culture, American Indians, Community Control, Cultural Background
Pages: 1  |  ...  |  158  |  159  |  160  |  161  |  162  |  163  |  164  |  165  |  166  |  ...  |  227