When.com Web Search

Search results

  1. Results From The WOW.Com Content Network
  2. Children's Internet Protection Act - Wikipedia

    en.wikipedia.org/wiki/Children's_Internet...

    The following content must be filtered or blocked: Obscenity as defined by Miller v. California (1973); Child pornography as defined by 18 U.S.C. 2256; Harmful to minors; Some of the terms mentioned in this act, such as "inappropriate matter" and what is "harmful to minors", are explained in the law.

  3. Confidentiality - Wikipedia

    en.wikipedia.org/wiki/Confidentiality

    In the 1990s and early 2000s, the Catholic sexual abuse scandal involved a number of confidentiality agreements with victims. [19] Some states have passed laws that limit confidentiality. For example, in 1990 Florida passed a 'Sunshine in Litigation' law that limits confidentiality from concealing public hazards. [20]

  4. Children's Online Privacy Protection Act - Wikipedia

    en.wikipedia.org/wiki/Children's_Online_Privacy...

    Delays in obtaining parental consent often result in children moving on to other activities that are less appropriate for their age or pose bigger privacy risks. [58] In addition, age restrictions and the "parental consent" process are easy for children to circumvent, and parents generally help them to lie about their age. [59] [60]

  5. State privacy laws of the United States - Wikipedia

    en.wikipedia.org/wiki/State_privacy_laws_of_the...

    (1) Protect the security and confidentiality of personal information; (2) Protect against any anticipated threats or hazards to the security or integrity of personal information; (3) Protect against unauthorized access to and acquisition of personal information that is likely to result in a material risk of identity theft or other fraud to the ...

  6. Client confidentiality - Wikipedia

    en.wikipedia.org/wiki/Client_confidentiality

    Client confidentiality is the principle that an institution or individual should not reveal information about their clients to a third party without the consent of the client or a clear legal reason. This concept, sometimes referred to as social systems of confidentiality , is outlined in numerous laws throughout many countries.

  7. Communication privacy management theory - Wikipedia

    en.wikipedia.org/wiki/Communication_privacy...

    Communication privacy management (CPM), originally known as communication boundary management, is a systematic research theory developed by Sandra Petronio in 1991. CPM theory aims to develop an evidence-based understanding of the way people make decisions about revealing and concealing private information.

  8. Address confidentiality program - Wikipedia

    en.wikipedia.org/wiki/Address_Confidentiality...

    Address Confidentiality Programs (ACP) and Confidential Voter Listings are programs administered by the state enabling victims of domestic violence (and sometime victims of sexual assault and/or stalking) to participate in the voting process without fear of being found by their abusers.

  9. Library Bill of Rights - Wikipedia

    en.wikipedia.org/wiki/Library_Bill_of_Rights

    VII. All people, regardless of origin, age, background, or views, possess a right to privacy and confidentiality in their library use. Libraries should advocate for, educate about, and protect people’s privacy, safeguarding all library use data, including personally identifiable information.

  1. Related searches boundaries of confidentiality in safeguarding children and teens in florida

    supreme court confidentialityhipaa confidentiality rules
    therapeutic confidentialitywhat is confidentiality agreement