NotesFAQContact Us
Collection
Advanced
Search Tips
What Works Clearinghouse Rating
Showing 2,836 to 2,850 of 3,396 results Save | Export
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Berson, Ilene R.; Berson, Michael J. – International Journal of Social Education, 2006
The right to privacy is a firmly entrenched democratic principle that has been inferred in the U.S. Constitution and protected by the Fourteenth Amendment as a liberty of personal autonomy. It is the statutory right to privacy that has been most closely aligned with data protection as a form of self-protection. The U.S. Federal Trade Commission…
Descriptors: Privacy, Personal Autonomy, Child Advocacy, Access to Information
Peer reviewed Peer reviewed
Direct linkDirect link
Meisel, Joshua S. – Teaching Sociology, 2008
In this article I explore the ethical terrain of experiential learning activities drawing on my experiences leading college students on field trips into criminal justice settings. Though there are numerous educational benefits to adopting experiential learning activities, the rewards must be evaluated in light of the potential harms to nonstudent…
Descriptors: College Students, Field Trips, Criminals, Correctional Rehabilitation
National Archives and Records Administration, 2009
The Secretary of Education (Secretary) establishes requirements, definitions, and approval criteria for the State Fiscal Stabilization Fund (Stabilization or SFSF) program. The Secretary may use one or more of these requirements, definitions, and approval criteria in awarding funds under this program in fiscal year (FY) 2010. These requirements,…
Descriptors: Educational Finance, Resource Allocation, Financial Support, Criteria
Cheung, Oona; And Others – 1997
Education-agency and school staff are legally and ethically responsible for safeguarding student information. In addition to federal and state laws and regulations, education agencies need policies and procedures to guide their everyday information-maintenance operations. This document provides examples of policies and procedures as well as…
Descriptors: Compliance (Legal), Confidential Records, Confidentiality, Data Collection
Desser, Daphne – 1995
With each technological advancement--telephone, automobile, television, and modem--people gain convenience, efficiency, and speed; they lose immediacy, real as opposed to virtual community, and physicality. At a writer's computer conference, journal writers who have used a diary with a lock and key to keep writings private wonder how to reconcile…
Descriptors: Computer Mediated Communication, Higher Education, Journal Writing, Personal Writing
Ruberg, Laurie F.; Miller, Mary G. – 1993
The increasing use of computer technology for sending and receiving electronic mail messages not only signifies changes in how we communicate, but also signals changes in the skills, knowledge, and practices associated with communication by mail. Some of the characteristics of electronic mail (e-mail) are considered. E-mail refers to the capacity…
Descriptors: Computer Software, Cost Effectiveness, Electronic Equipment, Electronic Mail
Frostburg State Coll., MD. – 1990
A series of four speeches on law-related topics comprise this volume. The text of each speech along with comments of invited respondents are included. The presentations include: "Justice and Sentencing" (Daniel Moylan); "Law: Obedience and Civil Disobedience" (Linda Irvin); "Liberty--The Right of Privacy" (Allan Powell); and "Punishment: The Death…
Descriptors: Capital Punishment, Civil Disobedience, Civil Liberties, Constitutional Law
National Association of Secondary School Principals, Reston, VA. – 1983
The Family Educational Rights and Privacy Act (FERPA) provides students and parents access to their school records and requires that parents and adult students be informed of their rights under the act. FERPA also bars the release of records to third parties without written consent except to school district employees possessing legitimate…
Descriptors: Administrator Guides, Administrator Responsibility, Administrator Role, Court Litigation
Trager, Robert – 1987
The press and public should have access to pretrial discovery documents in civil litigation when matters of public concern are at issue. Recently, the Supreme Court expanded the public's First Amendment right of access to criminal proceedings, and based on that, some lower courts have granted access to civil trials. In its decisions establishing…
Descriptors: Censorship, Civil Liberties, Constitutional Law, Court Litigation
Labov, William – 1981
The field methods for data collection in a research project on linguistic change and variation in the Philadelphia speech community, their origins and use, are described. Five working principles of the project are detailed: (1) there are no single style speakers; (2) styles can be ranged along a single dimension, according to the attention paid to…
Descriptors: Civil Liberties, Data Collection, Diachronic Linguistics, Field Studies
DeLay, Jeanine A. – 1987
An overview of six major issues in computer ethics is provided in this paper: (1) unauthorized and illegal database entry, surveillance and monitoring, and privacy issues; (2) piracy and intellectual property theft; (3) equity and equal access; (4) philosophical implications of artificial intelligence and computer rights; (5) social consequences…
Descriptors: Artificial Intelligence, Case Method (Teaching Technique), Case Studies, Computers
Brickhouse, Nancy W. – 1989
The desire to abolish the gap between research theory and classroom practice has sparked an increasing interest in field-based research among science educators. Although most researchers are aware of the standard meanings of informed consent and confidentiality, and there are some codes of ethical principles published by such groups as the…
Descriptors: Confidentiality, Data Collection, Ethics, Field Studies
Dinkins, Carol E. – 1984
In considering the purposes of the Freedom of Information Act (FOIA), it is essential to keep in mind that the Act is not, and never could be, a statute with the singleminded purpose of disclosing government information. Many kinds of information that the government has in its possession must be kept confidential to protect important public…
Descriptors: Disclosure, Federal Government, Federal Legislation, Freedom of Speech
Coggins, Patrick C.; And Others – 1979
This participant manual is designed to provide an overview of federal laws and regulations pertaining to the confidentiality of alcohol and drug abuse patient records. The relationship of federal laws to state laws and regulations is also discussed. The materials, useful for persons involved in the fields of substance abuse treatment or…
Descriptors: Alcoholism, Confidential Records, Confidentiality, Court Litigation
Glasser, Theodore L.; Jassem, Harvey C. – 1979
In the 1978 "FCC v. Pacifica Foundation" ruling, the United States Supreme Court considered the authority of the Federal Communications Commission (FCC) to regulate indecent radio programing, finding that the public has a constitutionally protected interest in being protected against objectionable programing. The FCC suit, arising out of…
Descriptors: Censorship, Communication (Thought Transfer), Court Litigation, Courts
Pages: 1  |  ...  |  186  |  187  |  188  |  189  |  190  |  191  |  192  |  193  |  194  |  ...  |  227