NotesFAQContact Us
Collection
Advanced
Search Tips
What Works Clearinghouse Rating
Showing 2,326 to 2,340 of 3,386 results Save | Export
Peer reviewed Peer reviewed
Vidmar, Neil; Flaherty, David H. – Journal of Communication, 1985
Surveyed attitudes toward the importance of privacy, seriousness of various privacy invasions, organizations that are trusted or mistrusted, etc. Concluded, among other findings, that most respondents were wary of possible invasions of privacy by the government but preferred government regulation of data collection by private businesses to…
Descriptors: Adults, Attitudes, Business, Cable Television
Flygare, Thomas J. – Phi Delta Kappan, 1986
A recent Supreme Court decision on a First Amendment case involving a teacher in Texas illustrates how teachers' and other public employees' rights to freedom of speech face serious erosion. The problem is deciding whether grievances fall into the protected area of "public concern" or the unprotected area of a "purely private…
Descriptors: Confidentiality, Court Litigation, Elementary Secondary Education, Government Employees
Peer reviewed Peer reviewed
Rotegard, Lisa L.; And Others – Mental Retardation, 1983
Court rulings and legislation are cited in a discussion of institutionalized mentally retarded persons' rights to privacy. The authors emphasize the need to restructure job responsibilities and/or descriptions to ensure appropriate resident-staff relations for dressing, bathing, toileting, and other private activities. (CL)
Descriptors: Civil Rights, Court Litigation, Federal Legislation, Hygiene
Ficklen, Ellen – American School Board Journal, 1985
The pros and cons of financial disclosure laws of varying strictness and their effects on school board members are discussed. Recent trends are noted and a tabulation is provided of the statutory requirements concerning disclosure of personal finances and campaign contributions in all 50 states and the District of Columbia. (PGD)
Descriptors: Boards of Education, Elementary Secondary Education, Legal Responsibility, Privacy
Peer reviewed Peer reviewed
Marx, Gary T.; Reichman, Nancy – American Behavioral Scientist, 1984
Computers make possible a variety of investigative and enforcement techniques. However, the technology of systematic data searching is subject to at least six sources of error, e.g., incorrectly entered data, none of which can be completely eliminated. Thus, a thought police as envisioned by Orwell remains a technological fiction. (RM)
Descriptors: Civil Liberties, Computers, Confidentiality, Disclosure
Peer reviewed Peer reviewed
Senter, Joy – Educational Forum, 1981
Examines educational tasks in general computing, including computer-assisted instruction, computer-managed instruction, word processing, secretarial and business applications, time sharing, and networking to larger computers. (CT)
Descriptors: Computer Assisted Instruction, Computer Managed Instruction, Computer Programs, Copyrights
Baer, Richard A., Jr. – Principal, 1982
Notes that both liberals and conservatives have criticized values clarification courses on the grounds that they assume only one correct position regarding values: ethical relativism. Maintains that values clarification fails to live up to its own claims of openness and neutrality. (Author/JM)
Descriptors: Elementary Secondary Education, Ethical Instruction, Moral Values, Privacy
Peer reviewed Peer reviewed
Whitlatch, Jo Bell – RQ, 1979
Reviews recent federal publications on government information, particularly in the area of general informational services, public access to government information and privacy issues, coordination of government information systems, and congressional information needs. (Author)
Descriptors: Annotated Bibliographies, Federal Government, Government Publications, Guides
Dern, Daniel P. – Online, 1997
Online users leave traces that others can find and use. Provides an overview of where and how users leave traces and what users can do to protect their privacy. Discusses Internet accounts; special files ("signature,""plan,""project,""file,""finger,""whois," and "vacation");…
Descriptors: Computer Networks, Electronic Mail, Online Systems, Privacy
Peer reviewed Peer reviewed
Sidbury, Benjamin F. – Journal of College and University Law, 2003
Discusses the U.S. Supreme Court's opinion in Gonzaga University v. Doe, where the Supreme Court held that a person whose records were disclosed has no right to sue the institution for its violation of the Family Educational Rights and Privacy Act of 1974 (FERPA). Explores the decision's ramifications for higher education, including applicable…
Descriptors: Confidential Records, Court Litigation, Disclosure, Higher Education
Peer reviewed Peer reviewed
O'Donnell, Margaret L. – Journal of College and University Law, 2003
Discusses the history of the Family Educational Rights and Privacy Act (FERPA), the Falvo and Gonzaga U.S. Supreme Court cases, and how universities might rethink FERPA in light of digital records. A discussion of Professor Lawrence Lessig's book "Code and Other Laws of Cyberspace" is used as a framework for discussing institutional…
Descriptors: Confidential Records, Court Litigation, Disclosure, Higher Education
Jenkinson, Edward – American School Board Journal, 1989
Teachers should examine classroom questions, assignments, and activities to determine if any of them actually violate rights of student and family privacy. Lists an example of classroom questions that signal possible invasion of privacy, and guidelines for invasion of privacy charges. (MLF)
Descriptors: Elementary Secondary Education, Politics of Education, Privacy, Student Journals
Curran, Robert F. – CAUSE/EFFECT, 1989
Some of the laws, rules, and principles related to student privacy, especially as they relate to the electronic era, are described. Some of the key elements of the Buckley Amendment are detailed and the ethical implications are discussed. (Author/MLW)
Descriptors: College Students, Computers, Confidentiality, Higher Education
Peer reviewed Peer reviewed
Perlman, Gail L. – Social Work, 1988
Discusses the increasing legal regulation of social workers' professional obligation to client confidentiality which means that social workers no longer can rely solely on an ethical commitment to maintaining client privacy. Contends social workers must learn to read and interpret applicable statutes and court decisions both for protection of…
Descriptors: Client Characteristics (Human Services), Compliance (Legal), Confidentiality, Ethics
Estabrook, Leigh S. – Library Journal, 1996
Examines libraries' policies of keeping patron records private and confidential. Addresses the idea that libraries use their automated systems to retain and use patron data to develop and improve library services. Describes uses of patron data that can help libraries develop targeted services to users to better meet their information needs. (JMV)
Descriptors: Confidential Records, Improvement, Library Automation, Library Policy
Pages: 1  |  ...  |  152  |  153  |  154  |  155  |  156  |  157  |  158  |  159  |  160  |  ...  |  226