Publication Date
| In 2026 | 0 |
| Since 2025 | 0 |
| Since 2022 (last 5 years) | 2 |
| Since 2017 (last 10 years) | 5 |
| Since 2007 (last 20 years) | 6 |
Descriptor
| Laws | 22 |
| Legal Problems | 22 |
| Privacy | 22 |
| Court Litigation | 8 |
| Higher Education | 6 |
| Civil Liberties | 5 |
| Confidentiality | 5 |
| Data Collection | 5 |
| Disclosure | 5 |
| Foreign Countries | 5 |
| Legal Responsibility | 5 |
| More ▼ | |
Source
Author
| Azar, Alex M., II | 1 |
| Binder, Perry | 1 |
| Boruch, Robert F. | 1 |
| Carroll, James D. | 1 |
| Cecil, Joseph S. | 1 |
| Chan, Victor K. Y. | 1 |
| Cliffe, Anthony D. | 1 |
| DeVos, Betsy | 1 |
| Edwards, Harry T. | 1 |
| Fazlioglu, Muge | 1 |
| Greenleaf, Graham | 1 |
| More ▼ | |
Publication Type
Education Level
| Higher Education | 2 |
| Postsecondary Education | 2 |
Audience
| Administrators | 1 |
| Parents | 1 |
| Practitioners | 1 |
| Teachers | 1 |
Location
| European Union | 3 |
| United States | 3 |
| Australia | 2 |
| Arizona | 1 |
| Macau | 1 |
| United Kingdom | 1 |
| United Kingdom (England) | 1 |
Laws, Policies, & Programs
| Family Educational Rights and… | 2 |
| Education Amendments 1972 | 1 |
| Equal Pay Act 1963 | 1 |
| Health Insurance Portability… | 1 |
| Rehabilitation Act 1973 | 1 |
| Title IX Education Amendments… | 1 |
Assessments and Surveys
What Works Clearinghouse Rating
Suvineetha Herath; Haywood Gelman; Lisa Mckee – Journal of Cybersecurity Education, Research and Practice, 2023
In today's data-sharing paradigm, personal data has become a valuable resource that intensifies the risk of unauthorized access and data breach. Increased data mining techniques used to analyze big data have posed significant risks to data security and privacy. Consequently, data breaches are a significant threat to individual privacy. Privacy is…
Descriptors: Information Security, Privacy, Data, Standards
Chan, Victor K. Y. – International Association for Development of the Information Society, 2023
From the standpoint of a MOOC practitioner (i.e., a MOOC provider) instead of a rigorous comparative law researcher, this article attempts to analyze the potential legal issues and risks underlying instruction via MOOCs and compare these legal issues and risks between the small jurisdiction Macao and such major jurisdictions as the United States,…
Descriptors: MOOCs, Cross Cultural Studies, Laws, Privacy
Cliffe, Anthony D. – Journal of Geography in Higher Education, 2019
In the last decade, commercial Unmanned Aerial Vehicles (UAVs) have become more accessible for use in civil roles such as scientific research. Despite their increasing use in research, there has been little investigation of their potential use as an educational tool in Geoscience. This small-scale mixed methods research investigated the potential…
Descriptors: Foreign Countries, College Students, Earth Science, Field Studies
Fazlioglu, Muge – ProQuest LLC, 2017
This dissertation examines the risk-based approach to privacy and data protection and the role of information sensitivity within risk management. Determining what information carries the greatest risk is a multi-layered challenge that involves balancing the rights and interests of multiple actors, including data controllers, data processors, and…
Descriptors: Risk, Privacy, Information Security, Risk Management
DeVos, Betsy; Nielsen, Kirstjen M.; Azar, Alex M., II; Whitaker, Matthew – US Department of Education, 2018
In response to the February 14, 2018 shooting at Marjory Stoneman Douglas High School in Parkland, Florida, President Donald Trump established the Federal Commission on School Safety to review safety practices and make meaningful and actionable recommendations of best practices to keep students safe. The Commission conducted field visits,…
Descriptors: School Safety, Violence, Prevention, Best Practices
Binder, Perry; Mansfield, Nancy R. – Journal of Legal Studies Education, 2013
The explosion of social networks and the growing concern over privacy in the digital age--both in the United States and Europe--have provided an opportunity to introduce students to the legal risks of using social media in the workplace. This article builds on the authors' classroom experiences and provides social media scenarios and projects that…
Descriptors: Business Administration Education, Law Related Education, Social Networks, Web Sites
Hoyer, Freeman – Communication: Journalism Education Today, 1978
Describes the impact of an Arizona state law that prohibited the release of any information about a student without a parent's signed authorization on school yearbook production. (KS)
Descriptors: Laws, Legal Problems, Privacy, Secondary Education
Haberman, David A. – 1984
To delineate the ideas of newsworthiness and consent as they apply to journalism and private facts lawsuits (those in which plaintiffs seek to stop publication of facts about themselves), this paper covers key areas of dispute. Various sections of the paper discuss (1) the definition of newsworthiness, (2) consent as a legal defense, (3) the…
Descriptors: Court Litigation, Journalism, Laws, Legal Problems
Peer reviewedKnerr, Charles R.; Carroll, James D. – Social Science Journal, 1978
Explores the legal implications of confidentiality in social science research. Instances are described in which researchers were suboenaed by judicial authorities to disclose confidential information. Existing statutory protection of research data is described. For journal availability, see SO 506 040. (AV)
Descriptors: Civil Liberties, Confidentiality, Laws, Legal Problems
American Federation of Information Processing Societies, Montvale, NJ. – 1982
These four papers were presented as background at a national symposium exploring the relationships among law, ethics, and technology as they relate to the individual's informational privacy. George B. Trubow's "The Development and Status of 'Informational Privacy' Law and Policy in the United States" discusses privacy as it relates to the…
Descriptors: Confidentiality, Data Collection, Disclosure, Ethics
Lacy, Nick – 1977
This report discusses how courts have dealt with the use of photographs for journalistic purposes in cases where invasion of privacy was alleged. In the context of this survey of relevant case law, the following topics are addressed: the right of privacy, the 1937 guidelines for cases involving photographs that accompany articles, "legitimate…
Descriptors: Censorship, Civil Liberties, Constitutional Law, Court Litigation
Report on the National Symposium on Personal Privacy and Information Technology (October 4-7, 1981).
American Federation of Information Processing Societies, Montvale, NJ. – 1982
A national symposium was held October 4-7, 1981, to explore the relationships among law, ethics, and informational technology as they relate to the individual's informational privacy. The introduction to this report describes the conference format; discusses the Privacy Act of 1974 and the Freedom of Information Act; and offers definitions of…
Descriptors: Confidentiality, Data Collection, Ethics, Information Processing
Peer reviewedLautsch, John C. – Journal of College and University Law, 1978
The proliferation of computer processing applications on college campuses has created new legal risks for higher education institutions. The history of computer use on campuses, an overview of computer law, and a discussion of the role of the university attorney are presented. (SF)
Descriptors: Computers, Contracts, Copyrights, Data Processing
Peer reviewedSwan, Peter N. – North Carolina Law Review, 1976
Various tort principles through which information misuse claims can be analyzed and resolved are examined. It is demonstrated that non-tort law approaches, especially statutory remedies, are often possible. Existing legislative solutions are discussed, and a proposed model statute is developed. Available from: the School of Law, University of…
Descriptors: Confidential Records, Criminal Law, Federal Legislation, Justice
Boruch, Robert F.; Cecil, Joseph S. – 1978
This paper examines the effects of Privacy laws on the conduct of legitimate social research. The report focuses on national legislation dealing with individual privacy, in particular the Privacy Act of 1974, and considers several new statutes which concern the privacy of participants in research. A large portion of the paper discusses (1)…
Descriptors: Confidential Records, Confidentiality, Data, Data Collection
Previous Page | Next Page ยป
Pages: 1 | 2
Direct link
