Publication Date
In 2025 | 0 |
Since 2024 | 0 |
Since 2021 (last 5 years) | 0 |
Since 2016 (last 10 years) | 3 |
Since 2006 (last 20 years) | 11 |
Descriptor
Electronic Mail | 34 |
Privacy | 34 |
Internet | 12 |
Higher Education | 8 |
Computer Mediated… | 7 |
Computer Security | 6 |
Ethics | 6 |
Information Technology | 6 |
Access to Information | 5 |
Computer Networks | 5 |
Confidentiality | 5 |
More ▼ |
Source
Author
Mattison, Marian | 2 |
Ballard, Rhea A-L | 1 |
Beaudet, Michael | 1 |
Bernstein, Alan | 1 |
Brittain, J. Michael | 1 |
Burton, Paul F. | 1 |
Carnevale, Dan | 1 |
Dern, Daniel P. | 1 |
Desai, Mayur S. | 1 |
Duberman, Josh | 1 |
Earls, Alan R. | 1 |
More ▼ |
Publication Type
Reports - Descriptive | 34 |
Journal Articles | 32 |
Opinion Papers | 7 |
Guides - Non-Classroom | 2 |
Book/Product Reviews | 1 |
Collected Works - Serials | 1 |
Guides - Classroom - Teacher | 1 |
Guides - General | 1 |
Information Analyses | 1 |
Education Level
Higher Education | 3 |
Adult Education | 1 |
Postsecondary Education | 1 |
Secondary Education | 1 |
Audience
Administrators | 1 |
Parents | 1 |
Policymakers | 1 |
Teachers | 1 |
Location
California | 1 |
Missouri | 1 |
New York | 1 |
North Carolina | 1 |
Laws, Policies, & Programs
Family Educational Rights and… | 3 |
Bill of Rights | 2 |
Digital Millennium Copyright… | 1 |
First Amendment | 1 |
Freedom of Information Act | 1 |
Privacy Act 1974 | 1 |
Assessments and Surveys
What Works Clearinghouse Rating
Mattison, Marian – Journal of Social Work Education, 2018
The inclusion of remote digital practices (e-mail, texting, blogging, social media) to deliver social work services raises unique ethical and legal challenges for client and practitioner. Competent care necessitates providing clients with information that would materially affect clients' decisions whether to assume the risks, benefits, and…
Descriptors: Standards, Informed Consent, Social Work, Caseworkers
Pantas, Susanna; Miller, Sean A.; Kulkarni, Shanti J. – Journal of Teaching in Social Work, 2017
Social work students created a community activism project to raise awareness about trauma prevalence and impact. Trauma theory describes silencing as the mechanism that hinders individual and community healing. Therefore, students sought to create an interactive opportunity to heighten trauma visibility on campus. They created a physical mailbox…
Descriptors: Activism, Social Work, Counselor Training, Trauma
Foundation for Excellence in Education (ExcelinEd), 2016
Parents expect school districts and schools to keep their children safe while they are in school. That expectation of safety and security also extends to the protection of their children's learning data. Therefore, it is critical that school districts and schools are open and transparent about their student data privacy practices, and that those…
Descriptors: Student Records, Information Security, Privacy, Information Utilization
Mattison, Marian – Social Work, 2012
The author addresses the risks and benefits of incorporating therapeutic e-mail communication into clinical social work practice. Consumer demand for online clinical services is growing faster than the professional response. E-mail, when used as an adjunct to traditional meetings with clients, offers distinct advantages and risks. Benefits include…
Descriptors: Risk, Therapy, Methods, Social Work
Hastings, Robin – Computers in Libraries, 2010
In August 2008, the Missouri River Regional Library (MRRL), where the author serves as information technology coordinator, switched over from an internally hosted Microsoft Exchange email server to the Google Apps product. As the person who led the charge to use Google Apps and the person who actually flipped the switch, he was responsible for…
Descriptors: Information Technology, Public Libraries, Privatization, Electronic Mail
Schwartz, Harriet L. – Education Digest: Essential Readings Condensed for Quick Review, 2010
There has been much discussion about the issue of boundaries on Facebook. Some suggest faculty members can resolve potential dilemmas in relation to students by making sensible decisions about what to post and by fine-tuning privacy settings. But the challenges and opportunities run deeper. For those who want to be appropriately accessible to…
Descriptors: Electronic Mail, Social Networks, Computer Mediated Communication, Web Sites
Desai, Mayur S.; Hart, Jeff; Richards, Thomas C. – Journal of Instructional Psychology, 2009
E-mail is mandatory tool of communications any business to survive in the 21st century. It is imperative that Information technology (IT) managers monitor and make sure that the e-mail systems are used properly. In order to organize a systematic process for proper use of email an administrator must have an input into the development of appropriate…
Descriptors: Electronic Mail, Information Technology, Administrators, Administrator Attitudes
Carnevale, Dan – Chronicle of Higher Education, 2008
Frantic troubleshooting by an overworked staff versus someone else fixing problems smoothly. A sliver of server space per person versus a five-gigabyte chunk. Half a million dollars versus free. That's what colleges are faced with as they decide whether to continue running their own e-mail services or outsource them to a professional service like…
Descriptors: Electronic Mail, Information Technology, Professional Services, Internet
Genova, Gina L. – Business Communication Quarterly, 2009
Employers have legitimate business interests in monitoring workplace Internet use: to minimize legal exposure, to increase productivity, and to avoid proprietary information loss. Since employees arguably have no expectation of privacy in their work on employers' computers, there are few grounds for complaint if they are disciplined for straying…
Descriptors: Employees, Electronic Mail, Expectation, Privacy
Rosenblatt, Joel – EDUCAUSE Quarterly, 2008
Computer security is one of the most complicated and challenging fields in technology today. A security metrics program provides a major benefit: looking at the metrics on a regular basis offers early clues to changes in attack patterns or environmental factors that may require changes in security strategy. The term "security metrics"…
Descriptors: Copyrights, Privacy, Compliance (Legal), Computer Security
Subrahmanyam, Kaveri; Greenfield, Patricia – Future of Children, 2008
Over the past decade, technology has become increasingly important in the lives of adolescents. As a group, adolescents are heavy users of newer electronic communication forms such as instant messaging, e-mail, and text messaging, as well as communication-oriented Internet sites such as blogs, social networking, and sites for sharing photos and…
Descriptors: Internet, Adolescents, Interpersonal Relationship, Anxiety
Shieh, Jackie; Ballard, Rhea A-L – EDUCOM Review, 1994
Examines the relationship between electronic mail (E-mail) and employee privacy rights. Two current course cases involving the privacy issue are summarized; the Electronic Communications Privacy Act of 1986 is explained; proposed legislation is discussed; and suggestions for employee E-mail privacy that can help avoid possible litigation are…
Descriptors: Court Litigation, Electronic Mail, Federal Legislation, Legal Responsibility
Goldsborough, Reid – Black Issues in Higher Education, 2004
There's no question about it: Spam is a scourge. This ever-increasing torrent of unsolicited commercial mass e-mail saps productivity and, for some, threatens the very viability of e-mail. The battle against spam, unfortunately, is creating problems of its own, with people sometimes unable to send legitimate e-mail and other times unable to…
Descriptors: Internet, Electronic Mail, Computer Mediated Communication, Computer Security
Kilian, Crawford – TECHNOS, 1994
Discusses online communication, including privacy issues, electronic bulletin board systems, attitudes and habits from other types of communication, the proper register for online communication, training students, and teachers as moderators. (LRW)
Descriptors: Communication (Thought Transfer), Electronic Mail, Online Systems, Privacy

Bernstein, Alan – T.H.E. Journal, 1998
Describes an electronic mail project that was designed to create an electronic mailing list of parents so the high school's administrators could communicate with parents on a regular basis and keep them informed of school-related news. Issues of privacy and confidentiality are discussed, and Web sites are considered. (LRW)
Descriptors: Administrators, Confidentiality, Electronic Mail, High Schools