NotesFAQContact Us
Collection
Advanced
Search Tips
What Works Clearinghouse Rating
Showing 2,506 to 2,520 of 3,396 results Save | Export
Shea, Virginia – EDUCOM Review, 1994
Discusses rules of etiquette for communicating via computer networks, including conversing as politely as you would face-to-face; ethical behavior; becoming familiar with the domain that you are in; rules for discussion groups; quality of writing; sharing appropriate knowledge; and respecting individuals' privacy. (LRW)
Descriptors: Communication (Thought Transfer), Computer Mediated Communication, Computer Networks, Electronic Mail
Peer reviewed Peer reviewed
Veeder, Stacy B. – Journal of Academic Librarianship, 1995
Examines issues surrounding electronic mail privacy. Topics include the Electronic Communications Privacy Act (ECPA), lawsuits filed under the ECPA, and limitations of the ECPA; state law and criminal law; finding solutions to privacy within the academic sector, governmental sector, and corporate sector; and creating coherent policy. (AEF)
Descriptors: Court Litigation, Criminal Law, Educational Environment, Electronic Mail
Majestic, Ann L.; And Others – Executive Educator, 1995
Regarding school searches, courts have provided guidelines balancing individual students' rights against the larger school community's rights. Administrators are bound by the Fourth Amendment, which stresses reasonable grounds of suspicion and related circumstances. Strip searches, metal detectors, hidden cameras, and locker searches may meet…
Descriptors: Administrator Responsibility, Court Litigation, Legal Problems, Privacy
Peer reviewed Peer reviewed
Nucci, Laurence – New Directions for Child Development, 1994
Notes research indicating that children develop conceptions of personal domain. Focuses on what mothers believe ought to be personal and up to their children to decide. Explores how personal concepts are constructed, negotiated, and elaborated during social interaction in cultural contexts. (ET)
Descriptors: Children, Concept Formation, Mother Attitudes, Mothers
Peer reviewed Peer reviewed
Filmer, Paul E. – Library Hi Tech, 1995
Addresses concerns associated with the evolving National Information Infrastructure, including navigation; electronic bulletin board arrangements, including kiosks or sandboxes; electronic journals and electronic publishing; copyright issues, including liability issues associated with software or downloaded data; privacy rights; and collaboration…
Descriptors: Computer Software, Copyrights, Downloading, Electronic Journals
Peer reviewed Peer reviewed
Pfeiffer, Jay J. – Journal of Vocational Education Research, 1994
Florida's Education and Training Placement Information Program links records of former students to databases of state and federal agencies to obtain follow-up data on employment, military service, and postsecondary education. Results are provided to counselors, teachers, and policymakers for planning, evaluation, and guidance. (SK)
Descriptors: Academic Records, Data Processing, Databases, Followup Studies
Peer reviewed Peer reviewed
Lawrence, David M. – School Law Bulletin, 1992
Discusses the 1992 North Carolina Supreme Court case News and Observer Publishing Co. v. Poole and its implications for public school and community college records. (19 references) (MLF)
Descriptors: Community Colleges, Court Litigation, Elementary Secondary Education, Government Employees
Peer reviewed Peer reviewed
Donahue, Simone A. – Update on Law-Related Education, 1991
Presents a lesson plan for teaching about gangs and the Fourth Amendment of the U.S. Constitution. Includes a handout and discussion questions and identifies sources for further reading. (SG)
Descriptors: Civil Liberties, Constitutional Law, Court Litigation, Juvenile Gangs
Peer reviewed Peer reviewed
Smith, Stephen A. – Communication Education, 1994
Examines First Amendment, privacy, and intellectual property issues of communication on the Internet. Discusses developments in communications policy related to the proposed communication superhighway. Suggests ways in which communication scholars can secure fundamental legal protections necessary for full, free, and effective communication in the…
Descriptors: Computer Networks, Freedom of Speech, Higher Education, Information Networks
Goode, Joanne; Johnson, Maggie – Online, 1991
Presents a summary of guidelines for the use of electronic mail (e-mail) and examines legal issues and existing law governing electronic communication. The Electronic Communications Privacy Act of 1986 is discussed, lawsuits involving e-mail are described, and the future of e-mail privacy is considered. (11 references) (LRW)
Descriptors: Computer Networks, Court Litigation, Electronic Mail, Federal Legislation
Peer reviewed Peer reviewed
Huey, Wayne C. – NASSP Bulletin, 1991
Crisis intervention procedures can potentially conflict with students' right to privacy as defined by law and American School Counselor Association ethical standards. Principals are encouraged to work with their counseling staff and other pupil personnel workers to explore ethically appropriate means to serve students in crisis without violating…
Descriptors: Crisis Intervention, Ethics, Guidelines, Legal Responsibility
Leatherman, Courtney – Chronicle of Higher Education, 1993
A conference of 200 women college presidents focused on a variety of issues of interest to women, such as peace, poverty, children, and the environment and also on the complications their gender creates in their administrative roles. Lack of personal privacy emerged as a primary concern. (MSE)
Descriptors: Administrator Attitudes, College Presidents, Conferences, Feminism
Peer reviewed Peer reviewed
Mihesuah, Devon A. – American Indian Culture and Research Journal, 1993
Suggested institutional guidelines for faculty research on American Indians include researcher behaviors related to obtaining tribal approval of the research proposal, being sensitive to cultural mores and privacy issues, giving fair return to informants, communicating anticipated consequences of research to participants, and allowing tribal…
Descriptors: American Indians, Behavior Standards, Data Collection, Faculty College Relationship
Peer reviewed Peer reviewed
Phillips, Bruce – Canadian Journal of Information and Library Science, 1995
This lecture by the Privacy Commissioner of Canada addresses issues related to information technology and privacy, including privacy law, government role, surveillance techniques, and security measures to protect the privacy of electronic communications. The text of the question and answer period following the lecture is included. (MES)
Descriptors: Computer Mediated Communication, Computer Security, Federal Legislation, Foreign Countries
Peer reviewed Peer reviewed
Ferraraccio, Michael – Journal of Law and Education, 1999
Asks whether proponents' justifications for using metal detectors to counteract school violence are compelling enough to override students' privacy interests. Concludes that there are serious constitutional concerns raised by using metal detectors. The rationale for upholding school searches in other contexts does not apply to metal-detector…
Descriptors: Court Litigation, Elementary Secondary Education, Privacy, Public Schools
Pages: 1  |  ...  |  164  |  165  |  166  |  167  |  168  |  169  |  170  |  171  |  172  |  ...  |  227