Publication Date
| In 2026 | 0 |
| Since 2025 | 0 |
| Since 2022 (last 5 years) | 0 |
| Since 2017 (last 10 years) | 0 |
| Since 2007 (last 20 years) | 1 |
Descriptor
Source
| Acquisitions Librarian | 1 |
| Association of Research… | 1 |
| Book Report | 1 |
| Computers in Libraries | 1 |
| Journal of Library… | 1 |
| Wilson Library Bulletin | 1 |
Author
| Barrett, Jaia, Ed. | 1 |
| Ledvinka, James | 1 |
| Lee, Leslie A. | 1 |
| Schuyler, Michael | 1 |
| Simpson, Carol Mann | 1 |
| Traister, Daniel | 1 |
| Wu, Michelle M. | 1 |
Publication Type
| Reports - Descriptive | 6 |
| Journal Articles | 5 |
| Opinion Papers | 2 |
| Collected Works - Serial | 1 |
| Guides - Non-Classroom | 1 |
Education Level
| Adult Education | 1 |
| Higher Education | 1 |
Audience
| Administrators | 1 |
| Practitioners | 1 |
Location
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Lee, Leslie A.; Wu, Michelle M. – Acquisitions Librarian, 2007
The purpose of traditional copyright law was to encourage the creation of works based on and to ensure reasonable access to original thought. Despite this harmonious intent, an intrinsic tension exists between libraries and copyright holders, as the former promotes "free" access to information that ultimately reduces the income of the…
Descriptors: Copyrights, Access to Information, Library Services, Electronic Libraries
Peer reviewedLedvinka, James – Journal of Library Administration, 1986
Reviews the laws governing access to employee records including the U.S. Constitution, especially the Fourth and Fifth Amendments of the Bill of Rights; the National Labor Relations Act; the Privacy Act of 1974; state privacy statutes; and common-law privacy protections from court opinions. Recommendations for management actions are included. (EM)
Descriptors: Compliance (Legal), Confidential Records, Court Litigation, Disclosure
Traister, Daniel – Wilson Library Bulletin, 1994
Discusses alternatives for dealing with insider theft of rare library materials, including publicizing losses and prosecuting. An example of insider theft is detailed. Ideas for preventing theft, including hiring practices and restricting access to materials, are considered. Suggestions for thinking through procedures to deal with the…
Descriptors: Academic Libraries, Court Litigation, Higher Education, Library Administration
Schuyler, Michael – Computers in Libraries, 1999
Suggests that a definitive court ruling is needed to better define rights and responsibilities related to the First Amendment and libraries' Internet use policies so that libraries can provide a comfortable environment for users while maintaining the law. Discusses filters; court cases; claims of the anti-porn cult; research studies on how much of…
Descriptors: Access to Information, Court Litigation, Information Policy, Internet
Barrett, Jaia, Ed. – Association of Research Libraries, 2004
ARL is the bimonthly report on research library issues and actions from ARL (Association of Research Libraries), CNI (Coalition of Networked Information), and SPARC (Scholarly Publishing and Academic Resources Coalition). ARL reports on current issues of interest to academic and research library administrators, staff, and users; higher education…
Descriptors: Research Libraries, Academic Libraries, University Presses, Library Science
Simpson, Carol Mann – Book Report, 1994
Discusses copyright compliance policies for school administrators and the librarian's role in policy implementation. Topics addressed include fines; court litigation; monitoring compliance; training sessions for teachers and staff; computer software audits; and sources for more information. (LRW)
Descriptors: Computer Software, Copyrights, Court Litigation, Educational Policy

Direct link
