NotesFAQContact Us
Collection
Advanced
Search Tips
What Works Clearinghouse Rating
Showing 2,191 to 2,205 of 3,386 results Save | Export
Peer reviewed Peer reviewed
Direct linkDirect link
Rodrigues, Ruben – Bulletin of Science, Technology and Society, 2006
The growing field of nanotechnology has received considerable attention as of late. The U.S. National Nanotechnology Initiative has committed billions of dollars toward research on the nanoscale, and proponents of nanotechnology claim that its benefits will range from curing cancer to ending poverty. This article takes a look at the possible…
Descriptors: Information Technology, Science and Society, Computer Oriented Programs, Federal Legislation
Congress of the U.S., Washington, DC. Senate Committee on Governmental Affairs. – 1986
Submitted to Congress by Senator William V. Roth, Jr., of the Committee on Governmental Affairs, this document reports favorably on Senate Bill 786 (the Information Age Commission Act of 1986), legislation designed to establish a commission to study the impact of computer and communications systems on American society. The report provides: (1) a…
Descriptors: Communications, Computers, Costs, Federal Legislation
Larson, Jeffry H.; Bell, Nancy J. – 1983
Little is known about the implications of individual differences in privacy preferences. To explore the relationship between privacy preferences and the style and quality of social interaction in a first encounter, 77 of 320 college students completing the Privacy Preference Scale were grouped according to their low (20 male, 20 female) or high…
Descriptors: College Students, Higher Education, Individual Differences, Interaction
Werner, Carol; Haggard, Lois – 1984
The findings from a study of 42 administrators in a large metropolitan school district supported the hypothesis that the use of privacy regulation mechanisms is deliberate and dynamic. The researchers considered the age and sex of the administrators, the length of time they'd held their current jobs, their tendencies toward Type A or Type B…
Descriptors: Administrator Characteristics, Administrators, Coping, Hypertension
Peer reviewed Peer reviewed
Marshall, Nancy J. – Multivariate Behavioral Research, 1974
The development of the Privacy Preference Scale is described. Six subscales were constructed from a principal axis factor analysis. The ability of the subscales to differentiate between age and sex groups, and their relationship to personality measures and to self-reported privacy oriented behavior are presented. (Author/RC)
Descriptors: Adults, Age Differences, Factor Analysis, Personality Measures
Federal Register, 1976
This document provides the public with a single document containing all regulatory provisions pertaining to the Family Educational Rights and Privacy Act. Included is a summary of the major comments received after publication of a notice of proposed rule-making. Each summary of comments is followed by a response that indicates whether or not a…
Descriptors: Elementary Secondary Education, Federal Legislation, Higher Education, Parents
Riley, Sam G.; Shandle, Jack – 1974
The question of whether protection against unauthorized use of a person's name of likeness for commercial gain is subsumed under property rights or the right to privacy remains unsettled. The thesis of this article is that either area may be appropriate, depending on the plaintiff's motivation in bringing the action. The case of Lugosi v.…
Descriptors: Business, Civil Liberties, Court Litigation, Equal Protection
Peer reviewed Peer reviewed
Madsen, Rex E. – Utah Law Review, 1975
The Tenth Circuit Court affirmed that the University of New Mexico must comply with an Equal Employment Opportunity (EEOC) subpoena for personnel records. The author concludes after examining the case that the court's decision will probably not have an enduring effect in defining employee privacy interests and EEOC access to records. (JT)
Descriptors: Confidential Records, Constitutional Law, Court Litigation, Higher Education
Peer reviewed Peer reviewed
Baratz, Joan C.; Churchill, Mae – Social Policy, 1978
Since third party access seems to resist effective control, it may be necessary to restrict the contents of student records to the barest minimum. With the least amount of information being kept, the practice of sharing will be reduced and so will the potential harm to students. (Author)
Descriptors: Confidential Records, Confidentiality, Data Collection, Databases
Peer reviewed Peer reviewed
McGuire, John M.; Borowy, Thomas D. – Personnel and Guidance Journal, 1978
This article explores some of the ethical and legal considerations surrounding the issue of counselors' obligations to reveal or withhold from clients information obtained during the course of their professional relationship. (Author)
Descriptors: Confidentiality, Counselor Role, Disclosure, Ethics
Peer reviewed Peer reviewed
Falsone, Anne Marie – Journal of Library Administration, 1986
Traces the events that led to the passage of Colorado's Confidentiality of Library Records Law. The growing national trend to protect patron records is also discussed, and practical suggestions for librarians to use in dealing with privacy laws are provided. (EM)
Descriptors: Compliance (Legal), Confidential Records, Disclosure, Intellectual Freedom
Mendelson, Susan R.; Libbin, Anne E. – Personnel, 1988
The third in a series of four articles, this discusses the legal implications of the use of medical tests to prevent drug and alcohol abuse in the workplace and to reduce absenteeism, tardiness, reduced productivity, and accidents that result from employee substance abuse. Cites recent cases. (JOW)
Descriptors: Civil Liberties, Court Litigation, Employer Employee Relationship, Privacy
Lee, Janis M.; Smith, G. Guy – American Libraries, 1988
A library director describes her experience of safeguarding the confidentiality of the circulation records of a woman who went on a shooting rampage at a shopping mall. The lawyer who represented the library discusses the legal responsibility of public and school libraries concerning confidentiality. (CLB)
Descriptors: Civil Liberties, Confidential Records, Confidentiality, Legal Responsibility
Peer reviewed Peer reviewed
Bender, David R. – Special Libraries, 1988
Reviews the history of transborder data flow (TDF) and the principles set forth by the Organization of Economic Cooperation and Development and the Glenerin Declaration. Two major issues relating to TDF--national sovereignty and economic and trade concerns--are discussed. Future issues, including an international policy and standardization, are…
Descriptors: Developed Nations, Developing Nations, Foreign Countries, International Organizations
Peer reviewed Peer reviewed
Plamondon, Ann L. – Journalism Quarterly, 1986
Investigates recent developments in the right to access by analyzing three Supreme Court decisions, as well as several relevant cases in federal appellate courts. (FL)
Descriptors: Content Analysis, Court Doctrine, Court Litigation, Laws
Pages: 1  |  ...  |  143  |  144  |  145  |  146  |  147  |  148  |  149  |  150  |  151  |  ...  |  226