NotesFAQContact Us
Collection
Advanced
Search Tips
What Works Clearinghouse Rating
Showing 2,446 to 2,460 of 3,396 results Save | Export
Breeding, Marshall – Computers in Libraries, 2005
Who can be trusted on the Web? These days, with identity theft seemingly rampant, it's more important than ever to take all possible measures to protect privacy and to shield personal information from those who might not have good intentions. Today, librarians also have to take reasonable precautions to ensure that the online services that they…
Descriptors: Web Sites, Librarians, Trust (Psychology), Internet
Peer reviewed Peer reviewed
Direct linkDirect link
Rose, Linwood H. – EDUCAUSE Review, 2004
Protecting the critical infrastructure of this country is essential to the preservation of lives as they are now lived. The time has come for leaders in higher education to recognize and creatively respond to the opportunity and realities of protecting the national critical infrastructure. To do this effectively, the academy must embrace and…
Descriptors: College Faculty, Computer Security, Higher Education, College Role
Peer reviewed Peer reviewed
Direct linkDirect link
Stokes, Mark; Kaur, Archana – Autism: The International Journal of Research and Practice, 2005
Few studies have compared sexual behaviours among adolescents with high-functioning autism (HFA) and typical populations, and indicated whether specialized education is required. We hypothesized that adolescents with HFA would (1) display poorer social behaviours; (2) engage in fewer behaviours related to privacy and have poorer knowledge…
Descriptors: Interpersonal Relationship, Interaction, Adolescents, Sexuality
Peer reviewed Peer reviewed
Direct linkDirect link
Pohlman, Katherine; Schwab, Nadine – Journal of School Nursing, 2003
This article is a reprint of the National Association of School Nurses' "Issue Brief" on Privacy Standards for Student Health Records. It distinguishes between the Family Education Rights and Privacy Act (FERPA) and the Health Insurance Portability and Accountability Act (HI-PAA), clarifies which of these laws governs the privacy of…
Descriptors: School Nurses, Health Insurance, Privacy, Role
Peer reviewed Peer reviewed
Direct linkDirect link
Academe, 2005
The advent of electronic and digital communication as an integral part of academic discourse has profoundly changed the ways in which universities and their faculties pursue teaching and scholarship. Such changes are manifest in the methods by which information is obtained and disseminated, the means of storing and retrieving such information, and…
Descriptors: Academic Freedom, Computer Mediated Communication, Access to Information, Access to Computers
Peer reviewed Peer reviewed
Direct linkDirect link
Gilley, Ann; Gilley, Jerry W. – College and University, 2006
Student privacy and confidentiality are protected by the Family Educational Rights and Privacy Act of 1974 (FERPA), also known as the Buckley Amendment. Among the four specific rights granted to students who have reached the age of eighteen or who attend a postsecondary institution, "consent to disclosure of records" is the most commonly…
Descriptors: College Faculty, Student Records, Student Rights, Federal Legislation
Ministerial Council on Education, Employment, Training and Youth Affairs (NJ1), 2008
In 2008 the Council of Australian Government (COAG), which comprises the Prime Minister, State Premiers and Territory Chief Ministers, agreed to a new reform agenda to ensure that all Australian school students acquire the knowledge and skills to participate effectively in society and employment in a globalised economy. In order to advance its…
Descriptors: Foreign Countries, Enrollment, Student Characteristics, Elementary School Students
Grush, Mary – Campus Technology, 2007
Ken Klingenstein has led national networking initiatives for the past 25 years. He served as director of computing and network services at the University of Colorado at Boulder from 1985-1999, and today, Klingenstein is director of middleware and security for Internet2. Truth is, this networking innovator has participated in the development of the…
Descriptors: Higher Education, Internet, Information Technology, Computer Interfaces
Van Der Werf, Martin – Chronicle of Higher Education, 2007
This article describes the findings of a Florida commission on campus safety that was issued in May 2007. The commission contradicted assertions by officials at Virginia Tech that they could not share information about the gunman in April's fatal shooting rampage because of privacy laws. The commission was assembled by Governor Charlie Crist in…
Descriptors: School Safety, Public Agencies, Privacy, Health Insurance
Henkel, Jane R. – 1990
This information memorandum describes three federal laws which govern public access to federal records and the treatment of personally identifiable information by federal agencies or under federal programs. It is noted that these laws generally apply only to federal agencies in the executive branch of government. The first of four major sections…
Descriptors: Access to Information, Data Processing, Federal Legislation, Freedom of Information
Sherer, Michael D. – 1983
The individual's right to privacy has evolved into a concept that can affect photojournalists' newsgathering efforts in nearly every state in the nation. In addition to the many states that have recognized the right of privacy through common or statutory laws, the United States Supreme Court has dealt with the issue of an invasion of privacy by…
Descriptors: Civil Liberties, Court Litigation, Federal Courts, Freedom of Speech
Dockrell, W. B. – 1983
This paper is devoted to an analysis of the "Standards for Evaluation of Educational Programs, Projects, and Materials" as they apply to qualitative data. The most difficult ethical problem arises from the conflict between the right to privacy of research subjects and the right to know of audiences. There are two technical points in the…
Descriptors: Data Analysis, Foreign Countries, International Studies, Privacy
Fisher, Lawrence; And Others – 1987
Reported are preliminary data from a study of the relationship of three family systems dimensions to three measures of adolescent health extracted from the RAND Health Assessment Questionnaire: the Health Index, General Well-Being, and Symptom Checklist. Three hypotheses were tested: (1) perceived family organization, perceived family privacy, and…
Descriptors: Adolescents, Family Influence, Family Life, Family Structure
American Federation of Information Processing Societies, Montvale, NJ. – 1982
These four papers were presented as background at a national symposium exploring the relationships among law, ethics, and technology as they relate to the individual's informational privacy. George B. Trubow's "The Development and Status of 'Informational Privacy' Law and Policy in the United States" discusses privacy as it relates to the…
Descriptors: Confidentiality, Data Collection, Disclosure, Ethics
Tarleau, Alison, T.; Horner, Bill – 1982
The document's major portion addresses aspects of rural social work practice from importance of the worker's first actions to knowing when and how to leave successfully. Beginning with "What is your Rural IQ?" and some definitions of rurality, all subsequent sections conclude with "Some Exercises and Mental Challenges" and a…
Descriptors: Adjustment (to Environment), Caseworker Approach, Local Issues, Privacy
Pages: 1  |  ...  |  160  |  161  |  162  |  163  |  164  |  165  |  166  |  167  |  168  |  ...  |  227