NotesFAQContact Us
Collection
Advanced
Search Tips
What Works Clearinghouse Rating
Showing 2,626 to 2,640 of 3,386 results Save | Export
Peer reviewed Peer reviewed
Virunurm, Valdeko; Gaunt, Roger N. – New Directions for Institutional Research, 1977
Sophisticated computer technology now allows for increasingly adaptable privacy safeguards. Various protection mechanisms are described, including password technology and encryption techniques, and administrative guidelines are offered. (Editor/LBH)
Descriptors: Computer Science, Confidential Records, Consumer Protection, Data Collection
Peer reviewed Peer reviewed
Jones, E. Terrence; Saunders, Joan – Journalism Quarterly, 1977
Describes an urban mass media campaign that had a direct impact on changing public opinion regarding the privacy issue. (GW)
Descriptors: Attitude Change, Change Agents, Civil Liberties, Community Attitudes
Inequality in Education, 1977
The text of the federal Family Educational Rights and Privacy Act of 1974, which concerns students' school records is provided. This is followed by: appended regulations and amendments; a section on school records of handicapped children; the Massachusetts regulations on implementation of the Act; and examples of consent and data forms relating to…
Descriptors: Confidentiality, Elementary Secondary Education, Federal Legislation, Handicapped Students
Peer reviewed Peer reviewed
Mattessich, Carole Marie – Catholic University Law Review, 1975
Although conceived, passed, and enacted in a somewhat unconventional manner, the Buckley Amendment, intended to open up individual school files for student and parental review, illuminates a new and important trend in the law--granting students the same legal guarantees as other citizens. The amendment's waiver provision is expected to remain a…
Descriptors: Confidential Records, Elementary Secondary Education, Federal Legislation, Higher Education
Peer reviewed Peer reviewed
Johnson, Deborah G. – Journal of Social Issues, 1984
Argues that philosophical, ethical analysis is needed when the moral rules relevant to a situation (such as the use of computers) are not obvious, or when several moral principles come into conflict. In this context, examines rights of ownership of computer programs, and the effects of increasing computer use on privacy and power. (Author/KH)
Descriptors: Codes of Ethics, Computer Software, Computers, Ethics
Peer reviewed Peer reviewed
Mendelsohn, L. D. – Information Services and Use, 1987
This description of the development of privacy protection laws in several developed nations identifies possible motivations for such legislation other than protection of citizens' privacy, including economic factors and national sovereignty. The impact of privacy legislation on international trade is discussed. (20 references) (CLB)
Descriptors: Access to Information, Civil Rights Legislation, Developed Nations, Economic Factors
Peer reviewed Peer reviewed
Gluckman, Ivan B.; Koerner, Thomas J., Jr. – West's Education Law Reporter, 1988
In general, because of varying federal and state legislation and a paucity of court decisions, the law governing the recording of conversations is in considerable flux. School personnel desiring to record conversations in school without the consent or knowledge of all parties involved must proceed with considerable caution. (Author)
Descriptors: Audiotape Recorders, Audiotape Recordings, Court Litigation, Elementary Secondary Education
Peer reviewed Peer reviewed
McDonald, Frances M. – Library Trends, 1986
Explores five issues related to technology's impact on privacy and access to information--regulation and licensing of the press, electronic surveillance, invasion of privacy, copyright, and policy-making and regulation. The importance of First Amendment rights and civil liberties in forming a coherent national information policy is stressed.…
Descriptors: Cable Television, Civil Liberties, Copyrights, Electronic Mail
Peer reviewed Peer reviewed
McCamus, John D. – Government Information Quarterly, 1986
This comparison of freedom of information legislation in Canada and the United States focuses on the concern evident in both to protect personal privacy. Specific criteria for achieving a balance between access and privacy are articulated. (CLB)
Descriptors: Access to Information, Comparative Analysis, Confidential Records, Democracy
Peer reviewed Peer reviewed
Stenger, Robert L. – Journal of Law and Education, 1986
Outlines important considerations in maintaining legal relationships between the school, pupils, and third parties (including parents). Defines "child" and "parent." Discusses the impact on school personnel of the complex variety of persons and institutions that may claim rights and privileges as "parent" with regard…
Descriptors: Academic Records, Child Custody, Divorce, Elementary Secondary Education
Peer reviewed Peer reviewed
Gowen, Brent – Exercise Exchange, 1985
Provides a rationale for allowing students to write in journals that the teacher will never read. Suggests requiring students to write responses to their journal writing at the end of the semester, which would be shared with the teacher and the rest of the class. Includes a sample response. (HTH)
Descriptors: English Instruction, High Schools, Higher Education, Privacy
Peer reviewed Peer reviewed
Hatton, Elizabeth J. – Journal of Education for Teaching, 1985
In order to realize the progressive potential of team teaching, shared responsibility for teacher work is necessary. This paper reviews teacher orientation to work in open plan settings through the interrelated concepts of privacy, autonomy, and individualized practice. The implications for preservice and inservice preparation of teachers are…
Descriptors: Inservice Teacher Education, Open Plan Schools, Preservice Teacher Education, Privacy
Peer reviewed Peer reviewed
Randolph, Marc L.; Wade, Robert E. – Urban League Review, 1984
Discusses legal, ethical, and economic aspects of free flow of information/data across national borders, as related to both developed and developing countries. Also explores the role of Blacks in telecommunications ownership and policy formation. (GC)
Descriptors: Black Businesses, Black Influences, Developed Nations, Developing Nations
Peer reviewed Peer reviewed
Grover, Paul L.; Uguroglu, Margaret E. – Evaluation and the Health Professions, 1984
Ethical issues relating to naturalistic evaluation are addressed, focusing on the role of the evaluator, problems of privacy and data gathering techniques, and issues relating to the use/abuse of findings. Benefits and costs of the naturalistic approach to program evaluation are also identified. (EGS)
Descriptors: Classroom Observation Techniques, Data Collection, Ethics, Evaluation Methods
Peer reviewed Peer reviewed
Gluckman, Ivan B. – NASSP Bulletin, 1985
An edited version of federal district court Judge William O. Bertelsman's opinion in "Bahr vs. Jenkins" reveals his thinking on the courts' self-restraint in cases affecting school administrators' authority when disciplining students. The opinion also discusses, in an informal style, the rights and responsibilities of parties in such…
Descriptors: Constitutional Law, Court Litigation, Discipline, Discipline Policy
Pages: 1  |  ...  |  172  |  173  |  174  |  175  |  176  |  177  |  178  |  179  |  180  |  ...  |  226