Publication Date
| In 2026 | 0 |
| Since 2025 | 167 |
| Since 2022 (last 5 years) | 600 |
| Since 2017 (last 10 years) | 1229 |
| Since 2007 (last 20 years) | 2104 |
Descriptor
Source
Author
Publication Type
Education Level
Audience
| Practitioners | 125 |
| Policymakers | 95 |
| Teachers | 87 |
| Administrators | 81 |
| Researchers | 33 |
| Parents | 31 |
| Media Staff | 27 |
| Students | 25 |
| Counselors | 17 |
| Community | 5 |
| Support Staff | 5 |
| More ▼ | |
Location
| United States | 80 |
| Australia | 79 |
| Canada | 79 |
| United Kingdom | 62 |
| California | 61 |
| Turkey | 38 |
| China | 31 |
| Pennsylvania | 28 |
| Texas | 27 |
| Florida | 26 |
| North Carolina | 24 |
| More ▼ | |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Peer reviewedSchool Libraries in Canada, 2000
Presents a teaching unit from the Media Awareness Network Web site that introduces students (grades six through nine) to ways in which commercial Web sites collect personal information from children and issues surrounding children and privacy on the Internet. Highlights: objective; learning outcomes; preparation and materials; the lesson; guided…
Descriptors: Child Safety, Children, Class Activities, Computer Security
Splitt, David A. – Executive Educator, 1996
The privacy aspect of e-mail is a touchy subject. "Erased" computer files can easily be restored with simple software. Some public agencies are required to retain backup files on computer data and information. E-mail might also be subject to freedom-of-information access, depending how a "record" or "document" is defined. Also, e-mail exchanges…
Descriptors: Electronic Mail, Elementary Secondary Education, Freedom of Information, Legal Problems
Dowling-Sendor, Benjamin – American School Board Journal, 2000
In its "stare decisis" ruling upholding a Pennsylvania school district's random drug-testing policy, a three-judge panel of the Seventh Circuit Court of Appeals nonetheless declared its disagreement with a similar panel's 1998 decision upholding another district's policy of random, suspicionless drug, alcohol, and tobacco testing. (MLH)
Descriptors: Court Litigation, Drug Use Testing, Elementary Secondary Education, Privacy
Peer reviewedKastman, Lee-Ann M.; Gurak, Laura J. – Technical Communication: Journal of the Society for Technical Communication, 1999
Reviews ways educational research has most commonly involved the Internet. Discusses issues that complicate educational research conducted in computer-enhanced instructional environments, focusing on privacy, ownership, and permissions. Offers a case study at an online writing center, and provides guidelines for technical communication researchers…
Descriptors: Case Studies, Educational Research, Higher Education, Internet
Lyman, Peter – Educom Review, 1999
Consideration of metaphors related to the Internet focuses on the information superhighway, virtual communities, and digital libraries. Highlights include the Digital Millenium Copyright Act of 1998; the Uniform Commercial Code; equality; privacy; communication; authorship; open software; information management; user fees; library collections; and…
Descriptors: Communication (Thought Transfer), Computer Software, Electronic Libraries, Information Management
Sheketoff, Emily; Costabile, Mary Rae; Adler, Allan – Bowker Annual Library and Book Trade Almanac, 2001
Includes two articles: one discusses Federal legislation and regulations affecting libraries in 2000, including database protection, the Digital Millennium Copyright Act, funding, Internet filtering, and e-rate; and the second discusses legislation and regulations affecting publishing, including copyright, foreign sales corporation tax, children's…
Descriptors: Children, Copyrights, Databases, Federal Legislation
Breeding, Marshall – Computers in Libraries, 2005
Who can be trusted on the Web? These days, with identity theft seemingly rampant, it's more important than ever to take all possible measures to protect privacy and to shield personal information from those who might not have good intentions. Today, librarians also have to take reasonable precautions to ensure that the online services that they…
Descriptors: Web Sites, Librarians, Trust (Psychology), Internet
Rose, Linwood H. – EDUCAUSE Review, 2004
Protecting the critical infrastructure of this country is essential to the preservation of lives as they are now lived. The time has come for leaders in higher education to recognize and creatively respond to the opportunity and realities of protecting the national critical infrastructure. To do this effectively, the academy must embrace and…
Descriptors: College Faculty, Computer Security, Higher Education, College Role
Stokes, Mark; Kaur, Archana – Autism: The International Journal of Research and Practice, 2005
Few studies have compared sexual behaviours among adolescents with high-functioning autism (HFA) and typical populations, and indicated whether specialized education is required. We hypothesized that adolescents with HFA would (1) display poorer social behaviours; (2) engage in fewer behaviours related to privacy and have poorer knowledge…
Descriptors: Interpersonal Relationship, Interaction, Adolescents, Sexuality
Pohlman, Katherine; Schwab, Nadine – Journal of School Nursing, 2003
This article is a reprint of the National Association of School Nurses' "Issue Brief" on Privacy Standards for Student Health Records. It distinguishes between the Family Education Rights and Privacy Act (FERPA) and the Health Insurance Portability and Accountability Act (HI-PAA), clarifies which of these laws governs the privacy of…
Descriptors: School Nurses, Health Insurance, Privacy, Role
Academe, 2005
The advent of electronic and digital communication as an integral part of academic discourse has profoundly changed the ways in which universities and their faculties pursue teaching and scholarship. Such changes are manifest in the methods by which information is obtained and disseminated, the means of storing and retrieving such information, and…
Descriptors: Academic Freedom, Computer Mediated Communication, Access to Information, Access to Computers
Gilley, Ann; Gilley, Jerry W. – College and University, 2006
Student privacy and confidentiality are protected by the Family Educational Rights and Privacy Act of 1974 (FERPA), also known as the Buckley Amendment. Among the four specific rights granted to students who have reached the age of eighteen or who attend a postsecondary institution, "consent to disclosure of records" is the most commonly…
Descriptors: College Faculty, Student Records, Student Rights, Federal Legislation
Grush, Mary – Campus Technology, 2007
Ken Klingenstein has led national networking initiatives for the past 25 years. He served as director of computing and network services at the University of Colorado at Boulder from 1985-1999, and today, Klingenstein is director of middleware and security for Internet2. Truth is, this networking innovator has participated in the development of the…
Descriptors: Higher Education, Internet, Information Technology, Computer Interfaces
Van Der Werf, Martin – Chronicle of Higher Education, 2007
This article describes the findings of a Florida commission on campus safety that was issued in May 2007. The commission contradicted assertions by officials at Virginia Tech that they could not share information about the gunman in April's fatal shooting rampage because of privacy laws. The commission was assembled by Governor Charlie Crist in…
Descriptors: School Safety, Public Agencies, Privacy, Health Insurance
Farrall, Kenneth N. – ProQuest LLC, 2009
This dissertation problematizes the "state dossier system" (SDS): the production and accumulation of personal information on citizen subjects exceeding the reasonable bounds of risk management. SDS--comprising interconnecting subsystems of records and identification--damage individual autonomy and self-determination, impacting not only…
Descriptors: Foreign Countries, Case Studies, Social Systems, Risk Management

Direct link
