NotesFAQContact Us
Collection
Advanced
Search Tips
Assessments and Surveys
What Works Clearinghouse Rating
Showing 106 to 120 of 143 results Save | Export
2000
The appendices for the Commission on Child Online Protection (COPA) Report to Congress, October 20, 2000, include the following: Commission overview, which includes scope and timeline, original statute, amended statute, technologies and methods, and biographies of the commissioners; Commission finances; Commission meetings for the year 2000;…
Descriptors: Access to Information, Child Safety, Children, Federal Legislation
National Archives and Records Administration, 2004
The Secretary amends 34 CFR part 99 to implement the Department of Education's interpretation of the Family Educational Rights and Privacy Act (FERPA) identified through administrative experience as necessary for proper program operation. These final regulations provide general guidelines for accepting ''signed and dated written consent'' under…
Descriptors: Privacy, Educational Legislation, Parent Rights, Student Records
Hodges, Marjorie W.; Worona, Steven L. – CAUSE/EFFECT, 1996
Provides guidelines for the development of campus computer policies, focusing on legal issues related to adult material, harassment, privacy, commerce, and copyright. Notes that computer use policies and practices need to evolve in concert with the changing computer culture. (MDM)
Descriptors: Business, College Role, Computer Networks, Computers
Britz, J. J. – Microcomputers for Information Management, 1996
Assesses the impact of technology on privacy. Discusses electronic monitoring of people in the workplace; interception and reading of e-mail messages; merging of databases which contain personal information; rise in the number of hackers; and the development of software that makes the decoding of digital information virtually impossible. Presents…
Descriptors: Access to Information, Computer Software, Confidentiality, Databases
Burk, Dan L. – CAUSE/EFFECT, 1998
Addresses questions of intellectual property rights when faculty, staff, or students at higher education institutions place material on the Internet, noting that educational institutions frequently lack the necessary permission or own rights for such online usage. Suggests that institutions audit materials before putting them online and develop…
Descriptors: Access to Information, Copyrights, Electronic Publishing, Higher Education
Proceedings of the ASIST Annual Meeting, 2001
Abstracts and descriptions of Special Interest Group (SIG) and Panel Sessions include such topics as: knowledge management; information networks; courseware; accreditation; Web site design; information retrieval and processing; digital imaging; electronic journals; human computer interaction; digital libraries; digital divide; information science;…
Descriptors: Computer System Design, Electronic Journals, Electronic Libraries, Information Management
PDF pending restoration PDF pending restoration
American Library Association, Chicago, IL. Office of Intellectual Freedom. – 1996
The American Library Association (ALA) expresses the basic principles of librarianship in its "Code of Ethics" and in the "Library Bill of Rights" and its interpretations. All library system and network policies, procedures or regulations relating to electronic resources and services should be scrutinized for potential…
Descriptors: Access to Information, Freedom of Information, Guidelines, Information Networks
Dempsey, Bert J., Ed.; Jones, Paul, Ed. – 1998
This book gives an overview of the leading-edge Internet application areas (streaming multimedia, collaborative tools, Web databases) and key information policy issues (privacy, censorship, information quality, and more). The text serves as a primer on understanding the forces--economic, legal, social, as well as technological--that are shaping…
Descriptors: Censorship, Computer Security, Databases, Distance Education
Peer reviewed Peer reviewed
Yell, Mitchell L. – Preventing School Failure, 1996
This article addresses issues of confidentiality and the management of student records as affected by the Family Educational Rights and Privacy act (FERPA). It identifies violations of FERPA and relates FERPA to the Individuals with Disabilities Education Act. (DB)
Descriptors: Compliance (Legal), Confidential Records, Confidentiality, Disabilities
Peer reviewed Peer reviewed
Direct linkDirect link
Nixon, Andrea – EDUCAUSE Quarterly, 2006
For years computer viruses have threatened productive use of personal computers, challenging users and support providers to prevent and recover from viral attacks. Now another type of computing malady has begun to enter popular consciousness: spyware. Typically, analyses of spyware focus on technical issues or provide pointers to resources for…
Descriptors: Laws, Compliance (Legal), Computer Security, Computers
Congress of the U.S., Washington, DC. Office of Technology Assessment. – 1994
The use of information networks for business and government is expanding enormously. Government use of networks features prominently in plans to make government more efficient, effective, and responsive. But the transformation brought about by the networking also raises new concerns for the security and privacy of networked information. This…
Descriptors: Access to Information, Computer Networks, Computer Security, Cryptography
Denning, Dorothy E., Ed.; Lin, Herbert S., Ed. – 1994
This report is based on a November 1992 workshop and a February 1993 public forum which discussed some of the social issues raised by the emergence of electronic communities. The workshop examined user, provider, and other perspectives on different types of networked communities, including those on the Internet, commercial information services,…
Descriptors: Access to Information, Censorship, Computer Networks, Confidentiality
Garson, G. David – 1995
Computing involves social issues and political choices. Issues such as privacy, computer crime, gender inequity, disemployment, and electronic democracy versus "Big Brother" are addressed in the context of efforts to develop a national public policy for information technology. A broad range of research and case studies are examined in an…
Descriptors: Case Studies, Civil Liberties, Computer Security, Computers
Karmakar, Nitya L. – 2002
The Internet remains as a wonder for the 21st century and its growth is phenomenon. According to a recent survey, the online population is now about 500 million globally and if this trend continues, it should reach 700 million by the end of 2002. This exponential growth of the Internet has given rise to several security, privacy and ethical…
Descriptors: Computer Security, Ethics, Federal Government, Federal Legislation
Earls, Alan R. – Connection: New England's Journal of Higher Education and Economic Development, 2000
Explores privacy issues raised by information technology at colleges and universities. Drawing on accounts and opinions of faculty and staff members, provides examples of current practices and policies on Internet and e-mail use and discusses the possible need for more developed policies. (EV)
Descriptors: Access to Information, College Environment, Colleges, Confidentiality
Pages: 1  |  2  |  3  |  4  |  5  |  6  |  7  |  8  |  9  |  10