NotesFAQContact Us
Collection
Advanced
Search Tips
What Works Clearinghouse Rating
Showing 2,641 to 2,655 of 3,396 results Save | Export
Peer reviewed Peer reviewed
Gowen, Brent – Exercise Exchange, 1985
Provides a rationale for allowing students to write in journals that the teacher will never read. Suggests requiring students to write responses to their journal writing at the end of the semester, which would be shared with the teacher and the rest of the class. Includes a sample response. (HTH)
Descriptors: English Instruction, High Schools, Higher Education, Privacy
Peer reviewed Peer reviewed
Hatton, Elizabeth J. – Journal of Education for Teaching, 1985
In order to realize the progressive potential of team teaching, shared responsibility for teacher work is necessary. This paper reviews teacher orientation to work in open plan settings through the interrelated concepts of privacy, autonomy, and individualized practice. The implications for preservice and inservice preparation of teachers are…
Descriptors: Inservice Teacher Education, Open Plan Schools, Preservice Teacher Education, Privacy
Peer reviewed Peer reviewed
Randolph, Marc L.; Wade, Robert E. – Urban League Review, 1984
Discusses legal, ethical, and economic aspects of free flow of information/data across national borders, as related to both developed and developing countries. Also explores the role of Blacks in telecommunications ownership and policy formation. (GC)
Descriptors: Black Businesses, Black Influences, Developed Nations, Developing Nations
Peer reviewed Peer reviewed
Grover, Paul L.; Uguroglu, Margaret E. – Evaluation and the Health Professions, 1984
Ethical issues relating to naturalistic evaluation are addressed, focusing on the role of the evaluator, problems of privacy and data gathering techniques, and issues relating to the use/abuse of findings. Benefits and costs of the naturalistic approach to program evaluation are also identified. (EGS)
Descriptors: Classroom Observation Techniques, Data Collection, Ethics, Evaluation Methods
Peer reviewed Peer reviewed
Gluckman, Ivan B. – NASSP Bulletin, 1985
An edited version of federal district court Judge William O. Bertelsman's opinion in "Bahr vs. Jenkins" reveals his thinking on the courts' self-restraint in cases affecting school administrators' authority when disciplining students. The opinion also discusses, in an informal style, the rights and responsibilities of parties in such…
Descriptors: Constitutional Law, Court Litigation, Discipline, Discipline Policy
Benitz, Catherine, Comp. – Mountain Plains Regional Resource Center (MPRRC), 2006
The Health Insurance Portability and Accountability Act of 1996 (HIPAA) includes important, but limited, protections for millions of working Americans and their families around the ability to obtain and keep health coverage. Among its specific protections, HIPAA: (1) Limits the use of preexisting condition exclusions; (2) Prohibits group health…
Descriptors: Privacy, Health Conditions, Health Insurance, Confidential Records
2002
The Law Division of the proceedings contains the following 8 papers: "Trademarks and the First Amendment: The Anatomy of a Conflict" (Retha J. Martin); "Exit Polls and Other Bad Habits: An Analysis of First Amendment Considerations Concerning Policy Recommendations to Control or Prohibit Media Election Forecasts" (Niels…
Descriptors: Comparative Analysis, Copyrights, Court Litigation, Foreign Countries
Belair, Robert R. – 1997
In 1982, a national report examining law and policy for juvenile justice records concluded that the public's faith in the potential for rehabilitating juvenile offenders had eroded. To understand better the nature of juvenile crime, it was suggested that data surrounding this issue be systematically collected. Some of that information effort is…
Descriptors: Adolescents, Civil Law, Correctional Rehabilitation, Delinquency
American Library Association Video/Library Video Network, Towson, MD. – 1997
This 30-minute videotape takes an in-depth look at World Wide Web business transactions, potential risks, client privacy and security issues by asking businesses and consumers how they do business on the Internet. Also featured in the program is advice about choosing a secure password, the use of credit cards for Web purchasing and a review of…
Descriptors: Business, Computer Oriented Programs, Computer Security, Computer Use
Sargent, Jack; Kirby, Erika; Harter, Lynn M. – 1998
The boundary metaphor has been used successfully over the past two decades to explain and predict how individuals manage the tensions between the need to self-disclose and the need for privacy within interpersonal relationships. This paper explores the history of Communication Boundary Management Theories and presents suggestions for modifying the…
Descriptors: Communication Research, Communication Skills, Interpersonal Communication, Interpersonal Relationship
Hedberg, Betsy – 2002
Based on George Orwell's novel "1984," this lesson plan presents activities designed to help students understand that the historical context of the novel is based on the mood and political climate of 1949 Europe; the society Orwell created and modern society in the United States have similarities and differences; and modern privacy issues and the…
Descriptors: Civil Liberties, Class Activities, English Instruction, Language Arts
Peer reviewed Peer reviewed
Clague, Monique Weston – Catholic University Law Review, 1979
Examines the possibility of legal challenges to minimum competency tests on the grounds that they violate freedom of expression (including the right to remain silent), privacy, and substantive due process guarantees. Available from the Catholic University Law Review, Catholic University of America School of Law, Room 1 Washington, D.C. 20064; sc…
Descriptors: Constitutional Law, Court Litigation, Due Process, Freedom of Speech
Cohen, Robert N. – California Western Law Review, 1978
In Tarasoff v. Regents of the University of California the court ruled that a psychotherapist is obliged to warn third persons of threats made against them during therapy. Substantive background of this legislation; the nature of the psychotherapeutic relationship, confidentiality, and patients' rights; and the Lanterman-Petris-Short Act are…
Descriptors: Confidential Records, Confidentiality, Court Doctrine, Court Litigation
Peer reviewed Peer reviewed
Lautsch, John C. – Journal of College and University Law, 1978
The proliferation of computer processing applications on college campuses has created new legal risks for higher education institutions. The history of computer use on campuses, an overview of computer law, and a discussion of the role of the university attorney are presented. (SF)
Descriptors: Computers, Contracts, Copyrights, Data Processing
Child, Barbara – Akron Law Review, 1975
In State v. Koome, the Washington Supreme Court has striken that state's statute regarding parental consent for a minor's abortion. Implications of the finding for a minor's right to due process, equal protection, and privacy are discussed. (LBH)
Descriptors: Abortions, Adolescents, Constitutional Law, Court Litigation
Pages: 1  |  ...  |  173  |  174  |  175  |  176  |  177  |  178  |  179  |  180  |  181  |  ...  |  227