NotesFAQContact Us
Collection
Advanced
Search Tips
Showing all 7 results Save | Export
Parry, Marc – Chronicle of Higher Education, 2012
Colleges share many things on Twitter, but one topic can be risky to broach: the reading habits of library patrons. Patrons' privacy is precious to most librarians. Yet new Web services thrive on collecting and sharing the very information that has long been protected. This points to an emerging tension as libraries embrace digital services.…
Descriptors: Academic Libraries, Internet, Reading Habits, Influence of Technology
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Berson, Ilene R.; Berson, Michael J. – International Journal of Social Education, 2006
The right to privacy is a firmly entrenched democratic principle that has been inferred in the U.S. Constitution and protected by the Fourteenth Amendment as a liberty of personal autonomy. It is the statutory right to privacy that has been most closely aligned with data protection as a form of self-protection. The U.S. Federal Trade Commission…
Descriptors: Privacy, Personal Autonomy, Child Advocacy, Access to Information
Peer reviewed Peer reviewed
Direct linkDirect link
Jaeger, Paul T.; Bertot, John Carlo; McClure, Charles R.; Langa, Lesley A. – Government Information Quarterly, 2006
The provision of public Internet access and related networked services by public libraries is affected by a number of information policy issues. This article analyzes the policy dimensions of Internet connectivity in public libraries in light of the data and findings from a national survey of public libraries conducted by the authors of this…
Descriptors: Internet, Public Libraries, Access to Information, Information Policy
Uhler, Scott F.; And Others – Illinois Libraries, 1996
Examines liability issues and Internet use--specifically e-mail--that libraries should be aware of. Discusses confidentiality and employer review; how federal laws, statutory limitations, and Illinois State Constitution and statutes affect employer e-mail monitoring; invasion of privacy; and the Freedom of Information Act. Offers procedural and…
Descriptors: Confidentiality, Electronic Mail, Employer Employee Relationship, Employment Practices
Earls, Alan R. – Connection: New England's Journal of Higher Education and Economic Development, 2000
Explores privacy issues raised by information technology at colleges and universities. Drawing on accounts and opinions of faculty and staff members, provides examples of current practices and policies on Internet and e-mail use and discusses the possible need for more developed policies. (EV)
Descriptors: Access to Information, College Environment, Colleges, Confidentiality
Anderson, John A. – 1996
Information Technology (IT) personnel in higher education requirement at Mary Washington College, Virginia. The goal of the creativity, promote freedom of speech, support research and investigation, and provide information access globally, while demonstrating proper use and protection of the data of which they are in charge. This paper addresses…
Descriptors: Codes of Ethics, Computer Networks, Computer Security, Confidentiality
Willard, Nancy – Updating School Board Policies, 2000
Because of mounting budget pressures, a new business model is emerging that offers schools "free" technology supported by online advertising programs and the gathering of market data about students. Proponents argue these corporate associations benefit schools with dwindling resources. Opponents argue they are contrary to obligations to…
Descriptors: Civil Liberties, Confidentiality, Corporate Support, Elementary Secondary Education