Internet Privacy for High School Students

Internet Privacy for High School Students

The unrestrained stream of information is conceived necessary for democracies and market-based economies. The capability of the Internet to make available the vast quantity of information to practically everyone, irrespective of their locations thus entails large benefits. The Internet provides access to the greatest libraries of the world to the students even in the smallest towns and permit the medical specialists to analyze the patients situated about thousands of miles away. The attribute of interactivity of the Internet fosters communication and personal and political expression. The Internet also assists to make the economies progress as it enhances the ease, speed and cost effectiveness with regard to the collection, compilation and delivery around the world to the multiple extent. The electronic commerce will decline the business costs as companies are able to take the benefits of enhanced access to customers, products and suppliers worldwide along with more and better customer marketing information. (Buchholz, Rosenthal, 2002)

Don't use plagiarized sources. Get Your Custom Essay on
Internet Privacy for High School Students
Just from $9/Page
Order Essay

Consumers will also be benefited from the declined prices and wider product selection that generate the flow from ease of understanding to more and better consumer information and more vendors. With such advantages however, also crop up problematic confrontation of electronic networks for commerce that generate information trails permitting the transaction information of the customers to be easily monitored, collected and compiled entailing others with the personal details of the lives of the people. The Supermarkets and other retail vendors apply the scanners to monitor the purchases. The bank and credit card companies store the information about our payment records, the location of our shopping, the things we purchase. The insurance companies, doctors and hospitals have large amounts of personal information on their clients and patients.

The contemporary technology has not only enhanced the quantity of information circulating about individuals, but also the easiness of retrieving practically anything one wants to know about someone. Such information stems from various sources. At any moment one entails the information for credit card applications, medical records, insurance applications, driver’s applications and renewals, online purchases, or visits to Websites, information is collected and stored. Generating personal information is essential in our society; however, everybody provides it with the anticipation that it will remain secret. Such information however, is treated as a hot commodity and is offered for sale, and those offering for sell are not essentially liable to safeguard the privacy of individuals. While it is growingly problematic to belief any site to maintain personal information safe from the interlopers the biggest risk to privacy of data is not crackers, stalkers or data brokers. It is the legal online businesses like advertising networks, retailers and others that generate detailed profiles of the people their activities on the Internet. (Buchholz, Rosenthal, 2002)

Governments, schools, businesses and other agencies might have gathered the personal information. The information gathered by governments is often publicly offered in the form of Public Registers. The Electoral Roll and the Telephone Directory are Public Registers. The Electoral Roll and the Telephone Directory are illustrations of Public Registers. The school, university or employer may bring out the name or other related information. Much of the personal information that is widely available has been gathered and compiled into the databases by means of Web-based companies that offer such information for sell from many sources. Since there is little or no law anywhere in the world administering such kind of activity there do not exist much that can be performed about it, but at least it can be understood. (Protecting your Privacy on the Internet) The ease and cost effectiveness with which the personal information is collected, compiled, and transferred can, if not maintained carefully calls upon decline of personal privacy.

New surveillance and information gathering technologies are available presently everywhere and they are fixing up all sorts of warning bells for those who are concerned about the corrosion of privacy. (Linda, 2001) The cookies are applied for those of us that reach the internet through a public ISP, each request we make to a Website cannot be connected to a previous request, while each request do not entail a permanent specific identifier. The cookies permit website operators to offer a permanent identifier to a computer that can be applied to associate the requests made to the Website from that computer. Cookies offer the information to the website that you have been there earlier and also can be applied to record the portions of the website that is visited. While cookies themselves may not identify you, in the way a name or address perform, a cookie could prospectively be connected with other identifying information. Further there exists several attributes of HTTP that may permit your surfing behavior to be monitored. Other information that may be sent whenever a web page is requested is that includes the e-mail address and the last web page that is looked upon. The transmission of such information is based on the compatibility of the browser to such options or if the browser has been configured with the e-mail address. (Protecting your Privacy on the Internet)

The consequence is warning of awful predictions. The books have currently been brought out with such titles as Database Nation: The Death of Privacy in the 21st Century by Simson Garfinkel, The Unwanted Gaze: The Destruction of Privacy in America by Jeffrey Rosen and the End of Privacy: How Total Surveillance Is Becoming a Reality by Reg Whitaker. The Survey reports have indicated that the public is seriously worried: a 1999 Wall Street Journal — NBC survey, to illustrate indicate that privacy is the matter of great concern for the Americans during the 21st Century and much beyond the overpopulation, racial tensions and global warming. The politicians cannot say sufficiently on privacy and are hurrying to pass legislations to safeguard it. Growingly business and technology are seen as the culprits. Over the next 50 years, the journalist Simson Garfinkel narrates in Database Nation that we visualize the new kinds of risks to privacy that do not trace their roots in totalitarianism, but in capitalism, the free market, advanced technology, and the unrestrained exchange of electronic information. (Lester, 2001)

The privacy is a great mater of consumer concerns and there is no doubt about it. A survey conducted in October, 2000 by the National Consumers League presented that the consumers are more anxious about personal privacy than about the health care, education, crime, and taxes. A survey conducted in January, 2001 by Wirthlin Worldwide revealed that a plethora of adverse emotions related to extension of personal information during business transactions. The three most common words the consumers apply to narrate their intensions were cautious, hesitant and suspicious. Such words replicate specific privacy threats. As per the American Demographics survey that took the sample of 1024 people, the consumers first risk is that businesses or individuals will victimize their children — 66% of the sample population reveals that they are seriously concerned about this. Another existing threat among consumers is that private information will somehow be applied against them. And over half of those surveyed reveal that they are extremely or very concerned. Another prevalent fear among consumers is that private information will somehow be applied against them.

More than 50% of those surveyed apprehend that if they reveal the personal information they will be raid or cheated or even their identity will be stolen for use in fake modes. However, most of these threats are termed as ‘anti-victimization fears’ by Alan Westin due to the fact that they concentrate on physical or financial damages. While marketers can assist the consumers assure of precautions taken to address such possibilities such fears are dealt with primarily by legal action in Congress and the courts. A large number of bills awaiting on the Hill deal with a plethora of privacy issues, incorporating distribution of authorities to the FTC for privacy protection, enhancing penalties against computer crimes and stringent amendments to the Electronic Communications Privacy Act of 1986. Rachael Shanahan, chief privacy officer for Unica an analytical CRM provider perceived the privacy issue to be very multifaceted. Being capable of isolated and understanding those underlying fears is significant so that marketers can address that is real concern to their target. Taking into account the population figures and structures, privacy is not considered to be a big issue. Rich and educated people are seen to be much reactive to safeguard their privacy. (Lester, 2001)

Hence, the information privacy — a control over the process by which the personal information is collected, revealed and applied — is considered critical to the development and use of electronic commerce. The U.S. strategy to safeguard privacy balances the privacy rights of individuals with the assistance associated with the free flow of information. To attain such balance, the U.S. conventionally, has depended upon a blend of sector-specific acts, rules and private sectors ethics and market forces. Such strategy to privacy continues to make the most sense in the electronic commerce context, since electronic commerce will flourish only if the privacy rights of individuals are balanced with the assistance related to the free flow of information. This approach also erected on the special qualities of the Internet. The global attribute of the Internet and its decentralized nature confine the effectiveness of conventional government control. And the capability of interactivity of Internet permits the consumers to empanel their ideas instantly and precisely, radically enhancing the likelihood that the marketplace will search the optimal balance between data safeguard and freedom of information values. (Wellbery; Wolfe, 1998)

Secured Internet Access specifically in schools and public libraries continues to be of much concern. Many of the schools and districts are interested in placing the student information online to foster the community relations and make easier the internal communications. A district may like to apply its Web site to demonstrate its effectiveness with the community. The schools may generate an intranet or internal network to make the most of communications among the student and staff. When such forms of communication are utilized to post personally detectable student information, the student privacy rights are associated. (Baskin; Surratt, 2001)

A rapid view at the Web indicates that there exists a minimum of 50 million URLs ready to be browsed through Yahoo, Lycos, Web Crawler and similar search engines. Much to add there are over 3000 colleges and universities spread over 80 countries with home pages- depicting an enhancement of 15% over the last four months. Such pages are non-duplicative ‘official’ pages — sites that indicate the institution in a public way. Such sites may indicate links to other pages incorporating fiscal policy statements, admissions and curriculum information, calendars, phone books and similar information. The Princeton University to illustrate has about 120 Departmental pages varying from admissions through its writing program while the University of California-Berkeley home page lists and narrates 300 departmental and unit pages. Besides, their official Web pages, colleges and universities safeguard a much wider and unquantifiable number of ‘unofficial’ pages: personal pages generated by faculty, staff, and students.

These personal pages are quite unique and incorporate extensive variation of the quantities and types of materials; they sometimes include the connection to other pages around the globe. (Cartwright, 1996) The embarrassment that we face with this shift in standard in based on the fact that there have been several abuses of the Internet. Students were found to provide confidential information about themselves and their family members to the vendors or others who have no right to access such data; persons with exploitative nature entice their preys to isolated meeting spots; half truths are provided to the public. Normally the educators and parents never desire that their children come across any thing considered harmful, however simultaneously the media and politicians have capitalized on such incidents to enhance their own interest. (Brooks-Young, 2000)

Relying on the mode of configuration of a school system the parent can prospectively monitor the unexcused absence of their children. They can visualize the grades on all tests, quizzes and homework assignments, along with the present overall grade and descriptions of imminent homework assignments. They can collect such information by e-mail and find out discipline warnings when their children were attempting to disturb classes. Presently, a minimum of 6500 schools nationwide have fixed Web-based software with electronic-leash capability. It is practically used in middle schools and high schools where grades and attendance are more of an issue than in the lower grades. The list incorporates campuses in Los Gatos, San Jose’s East Side Union High School District and the Loma Prieta district in the Santa Cruz Mountains, in Santa Clara County. (Suryaraman, 2003)

Variations thus even when it is positive always generates imbalance, and the area of Internet usage is growing at an unprecedented rate. (Brooks-Young, 2000) The induction of new advanced technology into admissions, registrar’s, bursar’s, monetary aid, and student counseling offices has reduced paperwork, restructured administrative functions and made access to information more proficient. However, with those conveniences, information technology specialists dealing with higher education caution that virtual learning and administrative settings create a still increased danger to student privacy protection, especially outside the campus limits. (Yates, 1999)

The increasing understanding of online predators has concentrated parental and governmental attention on the potential threats of the Internet entails to the children and the natural necessity for protection. Specifically, many parents and privacy advocates realize privacy regulations necessary to safeguard children from diffusing information about themselves and their families. However, the control of Internet use is equivalent to censorship. The commentators and advocates do not convince over the authority to safeguard the children from the potential threats of the Internet — the government, the Internet industry, or parents and whether there is necessity for the safeguard at all. The conclusion as to which group is required to control is intricate not only by the legality of authorizing such power to one group but more significantly, by which group would be the most successful safeguard. Many advocate that the government is not required to have any power to control the Internet; others believe that government regulations will foster new technological advances since people are required to be creative to conform to new laws. The Internet, as per some, can control itself better than any legislative action. Others contradict on the ground that government is not confronted with similar economic considerations that approach to exhausted industry regulations. (Hersh; Fordham, 2001)

The Internet is a specific industry in that it contains different communities of users each sharing varied beliefs about the acceptability of behavior and concepts. People come across Internet in varied ways than other previously regulated media. Unlike radio or television, with which a child necessitated only turn a switch to be stormed with information on the Internet a child must make cognizant effort to intervene with someone or something. Contrary to a dial-a-porn phone lines the access to which is discouraged by the parents the children are generally encouraged by the parents to use Internet. Such interaction is more like the real world and in such way it is hard to control. The control of Internet communication is more like attempting to control whom the children can speak with on the street or playground. (Hersh; Fordham, 2001) Students have their own privacy rights in relation to the Internet.

Privacy is a specifically personal right that represents the individual liberty from intrusion. Safeguarding privacy implies making certain that information about individuals is not revealed without their consent. The liberty of students to maintain privacy is infringed when the personal information is revealed to others without their permission or when he or she is required by others, who are not legally authorized, to disclose the personal information. The confidentiality indicates regulation of the revelation of information only to authorize individuals the privacy indicates safeguard from personal intrusion. The High School students and their parents assign the schools their personal information with the anticipation that the information will be applied by the school authorities to cater to the requirements of the students effectively and efficiently. The school districts maintain and use personal information for varied educational purposes while students are in schools. To safeguard the privacy of the students and their families, agency and school staff are legitimately and morally liable for protecting the student information. (Section 1: A Primer for Privacy)

The privacy laws give rise to instituting the regulations that education agencies and schools required to follow so that the information about children is offered only to personnel those are authorized to come across such information. The laws were enacted by the U.S. congress to make the parents certain about the liberty of accessing information to their children while permitting the education officials the flexibility they necessitated to apply the information in making decisions that serve the children well. The Federal and state privacy legislations relating to students in elementary and secondary schools are based on the concepts of general law and privacy guarantees revealed in the U.S. Constitution. The Communication Decency Act — CDA of 1996 and the Child Online Protection Act COPA of 1997 addressed the protection of children from exposure to obscene materials. All these laws make the government obligatory to control the regulatory concerns on the Internet. In reaction to such acts, the Child Online Privacy Protection Act of 1998 — COPPA was legislated in April 21, 2000 to address the different problem- privacy. (Hersh; Fordham, 2001)

COPPA extends more liberation to parents permitting them to select whether or not their children can access sites, in a way that is similar to control of other industries. However, it still exerts much of the incidence of regulation on website providers and the government that leads to parental complacency. COPPA is not the solution; it is just the latest failed attempt at statutory regulation proving self-regulation to be much preferable to less useful statutes. (Hersh; Fordham, 2001) The objective of the Family Educational Rights and Privacy Act-FERPA was to deter the school districts from delivering the education records of the students without written parental consent however except in very extreme circumstances. An ‘education record’ is any information associated straightly to a student that is maintained by a school district or someone acting for the school district. The education record of the student could be disclosed in only two cases. First a school district may disclose student information that has been indicated to be ‘directory information’, so long as the school district has entailed the notice narrated below. Secondly, the student information can be disclosed in consonance with the written consent of the parents. (Baskin, Surratt, 2001)

The concepts of notification, disclosure and informed consent are considered to be basic to the legislation of the government on data collection, privacy and suitable use in FERA. The concept of notification in FERPA indicates the liability of an agency to inform parents, guardians or students those are over eighteen of the legal basis for gathering data and the confined circumstances under those records can be released or disclosed. While the school officials gather information on families or students they are required to explain the rationale — or ‘give public notice’ — of the causes the data are being collected. The concept of the disclosure indicates access, release or transfer of personal information about individuals. The privacy laws indicate suitable or unsuitable information disclosures or releases. As per the FERPA, data about students may be revealed without parental consent only to the school and other educational personnel who apply this to extend educational services or to carryout legitimately specified administrative and statistical activities. (Section 1: A Primer for Privacy)

Any incidence in which the unauthorized individuals visualize or use private information about students in considered being suitable and sometimes legitimate revelation, unless the parent or the student accords consent or the law makes such access legal. Informed consent is associated with extension of a written account of why personal information is necessitated and how it will be applied. In general, parents are required to have the option, without penalty, of agreeing or declining to provide the information an education agency or school request. Some information however, is necessitated by the Schools and parents are required to provide the information in order for their children to be registered. The agreement of the parents is required to depend upon a comprehensible explanation of how the information will be applied. Once the informed consent of the parent is accorded for a specific objective or a set of objectives the information cannot be re-disclosed or applied by a third party except as originally pointed out. The FERPA regulations necessitate that the parents may accord prior consent for the revelation of information to the persons other then the school authorities. (Section 1: A Primer for Privacy)

A latest report poses difficult queries concerning if the federal Family Education Rights and Privacy Act, enacted by Congress during 1974, is still able to protect against privacy concerns which was absent 25 years back when the law was enacted. In the report, Privacy and the Handling of Student Information in the Electronic Networked Environments of Colleges and Universities suggests that colleges and universities are emphasizing for that law to be implemented in a rapid manner fulfilling the needs of present day’s electronic scenario. The report states that “With the institutions including information technology to improve teaching and learning, restructure business processes, and enhance student services, they are discovering that information technology is bane as also boon as regards privacy.” (Yates, 1999) It goes on to add that “A fragile balance exists between the task for maintaining student privacy rights and the task for extending effectual and well-organized services to students” (Yates, 1999) The report which runs into 53 pages insist on the institutions to organize special panels, drawing members from every campus constituency, to investigate into the question of student records privacy and draft policies customized for every single college and university. (Yates, 1999)

High school students are vulnerable to be exposed to more than just pornography. The High school students are at the threat of being exposed to several online elements including the commercial sites, chat rooms, web content and pedophiles. (Kids Privacy on the Net) The people that the children encounter sometimes pedophiles allure them into revelation of personal information about themselves and their families. However, unlike pornography, the threat exerted by people alluring the children into hazardous environments is one that has not yet been addressed by legal enforcement or statutory regulations. (Hersh; Fordham, 2001) Most of the commercial sites that the students encounter demands personal information. (Kids Privacy on the Net)

Students studying in High Schools are regularly been subjected to the standards of the Internet that would entail enough disturbance to most of the parents. They sometimes browse for the information relating to sex and race which they feel uncomfortable to discuss with the adults. The Journal of Applied Developmental Psychology in its special issue dedicated to research on students and the electronic media, attained at the National Science Foundation-funded Students’ Digital Media Center, bring out such revelations among others. Students seeking pornography find easily and comprehensively over the Internet. As revealed by Patricia Greenfield, ULCA psychology professor and director of UCLA Student Digital Media Center, CDMC. The students those are not actually seeking pornography are also involuntarily exposed to at the time of searching on perfectly suitable subjects. As Greenfield pointed out that childhood is comparatively a time of relative innocence for many students.

However, with present day all pervasive sexualized media surroundings the innocence of the children is no longer the case. During the later stage of childhood days when they reach the High school education it has been very problematic to dissuade highly sexualized and racial material that is designed for an adult audience. It is worthwhile to analyze the impact of such all-pervasive sexual and racial oriented media environment. The pornography and sexual media has profound impact on sexual violence, sexual attitudes, moral values and sexual activity of students and youth. Amy Sussman of National Science Foundation — NSF program officer opined, such analysis collectively, represents the ways the use of Internet by high school students has emerged within the short span of time. They represent both the threats and scopes on the Web along with exposures mostly visualized however reveals erroneous notions about high school Internet use. (The internet’s all-pervasive sexualized media environment affects childhood learning)

According to the CDMC researcher Brendesha Tynes the race is considered to be a general topic on teen chat rooms and that the teens recognize themselves on the basis of race. She could search out plethora of ugly racial slurs but fostering news. She revealed that many forms of racial hostility and negative typecast that prevails offline are recurring in teen chat on the Internet. For the most part teenager discussions were positive in nature. They reveal positive racial comments in about 87% of the transcripts that were studied and neutral comments in 76% and negative references in 47%. Contrary to these, prior studies have revealed that when race is chatted about in adult online forums it is sometimes negative. The proscriptions sometimes related to the chatting of the race may be dispersing. Tynes pointed out that we are reaching a period when diversity is valued and a common topic of conversation that is an essential element of healthy race relations.

Still a plethora of work remains prior to our liberation of negative racial attitudes and the expression of such attitudes. Tynes and co-authors UCLA undergraduate Lindsay Reynolds and Greenfield could come across significantly more racial and ethnic stain in unmonitored teen chat rooms than in chat rooms with adult monitors and rules of conduct prohibiting harassment or threatening, using of hate speech etc. In a widely used teen chat room one chat session concentrated on music till the adult monitor revealed that she was leaving out for a short time. One of the teen expressed, ‘The HOST is gone?!’ Suddenly the conversation varied to an antagonistic questioning of the racial identity of one of the participant. Tynes could found that the white students along with the minorities are sometimes victims of discrimination in teen chat rooms. The minorities are often condemned for sounding white in chat rooms. (The internet’s all-pervasive sexualized media environment affects childhood learning)

The Internet is alleged to be debasing sexually our students more specifically the high school students. Parents never have any idea that they would be ever required to beg the children for use of the telephone. The concept of Instant Messenger — IM permits the children to speak incognito and, consequently, has radically varied their interactions with each other. Instant Messenger could possible avoid the requirement of social chitchat, and has made the High School students to become much smarter in their dealings with one another. The screen names of Instant Messenger permits the users to transmit the profiles those are necessarily bill boards for the whole world to see. These can be applicable to make disapproving comments about classmates; those abandon the victims feeling defenseless. Since profiles are easily variable, the perpetrator can pretend innocence when captured taking down the site prior to a parent can visualize it. From their profiles the kids could connect to the sub-profiles like exprofile.com and blog sites like www.xanga.com. (Elizabeth, 2005)

The friends and enemies can go around. Such sites are uncontrolled and sometimes incorporate obscene or forbidden material. It is distressing to note that the kids are transmitting the nude photos of themselves or their friends online. Kids are ill-advised to feel this as right. They are ignorant of the fact that this is regarded as child pornography and are illegal. During October, a boy aged about 13 years from Washington was indicted of possessing and dealing in child pornography for transmitting sexually explicit pictures of himself online. According to Parry Aftab, a lawyer specializing in online privacy and security, cyber crime, and safety issues, the Kids can be nabbed for such offence irrespective of the fact that they were doing this for joke. Kids are being prosecuted; most often they just have to take the picture down and some times indicted as juvenile and deported to a kind of reform school. Even though the nasty image or message has been wiped out the damage has already been made and consequences of such postings are sometimes most shocking particularly when the entire schools can visualize the sites.

The extensive use of cell phone cameras, the scope is enhancing for such type of mistreatment. The students apply the camera phones in restrooms, then instantly send the photos to friends. The Instant Messenger also permits posting of photo icon that is exhibited in the pop up screen of users. Some of the websites incorporate small photos for posting sometimes even porn ones. The website www.badassbuddy.com has cartoon animations of all sorts of x-rated images. Being protected and being confident by their anonymity, the high school boys approach girls for sex. Such conversations are copied and sent by e-mails to all kids in a group, multiplying the abuse. It has become easier for kids to sign up with a new user name and assault using a fake name. The victim is not aware as to who is sending the message giving rise to anxiety at school, as she is not sure who is abusing and to whom she can rely upon. (Elizabeth, 2005)

To detect what the young people are subjected to on the Internet, Greenfield browsed a Web content mostly meant for the students with objective-‘Be seen, be heard, be you’ and was quite surprised by the web content that includes unsolicited sexual advances from strangers. She pointed out that the racism and sex are not confined to hate sites. Internet is mostly found to be reservoir of information, however, the reality faced by Greenfield in the chat room led her to conclude that we require questioning the values that we wish to convey, and differences between those values and the ones to which teenagers are being exposed. These are not only Internet concerns but concern our own culture in general and youth trend in particular. Greenfield also entered a teen chat room that had adult supervisors and regulations to reduce offensive and crude comments. She could found that the chat in such sites was quite different from that of in unsupervised sites still sex and violence were not totally absent; instead they became hidden in code. The participants in such teen chat room were speaking about sex a lot of the time. They were indicating to several forms of sex, all in code language, without really uttering the words about sex. (The internet’s all-pervasive sexualized media environment affects childhood learning)

The teenagers and students use a detailed code to safeguard their privacy online. While a child is online and a parent is nearby the child may say POS for ‘parent over shoulder’. The coded references are thus devoid of feelings and contacts. (The internet’s all-pervasive sexualized media environment affects childhood learning) Tom Keenen, the computer science professor of University of California, pointed out that addiction to the Internet is real and can give rise to grave isolation, particularly among the high school students. A research analysis at the Alfred University of New York indicated that the Internet as a reason for an enhancement in the number of failures and dropouts at schools. The study indicated that about 50% of the students those failed at the college used the Internet when they were required to be studying. Most of the students reported to have logged on long hours and have experienced too many late night sessions in chat rooms. According to a school staff Richard Oft, the computer rooms have entailed failure of more students and being failed than membership in fraternity and sorority houses. (Rockey, 1996)

But the analyses have also brought out the advantages gained by the high school students with the use of Internet. The health and sex information on the Internet can conveniently attained round the clock on Web pages, bulletin boards, newsgroups, listservs and chat rooms. The teenagers could conveniently browse for them and search out such information on the cyber world. The research on the peer health advice on teen bulletin boards and the members of Digital Media Center of the students of UCLA could reveal that the students were hesitant to seek face-to-face advice about sex from parents and other adults previously. However, the students presently could gain such information from their peers on online health bulletin boards. According to a report published by Lalita Suzuki, a CDMC member and Jerel Calzo, another member of the UCLA center, the Internet health bulletin boards may evade the clumsiness related to the query of sexual and relationship questions while apparently satisfying the adult needs by permitting teens to frankly discuss concerns about the relationships and sexuality in their replies to one another.

Suzuki and Calzo studied the substance on two public health oriented bulletin boards that dealt with general teen issues and teen sexual health. Queries indicating sexual techniques roused much interest in the student sexual health issues board and so did the interpersonal aspects of sex like problems with boy friends and girl friends in relation to whether or not to have sex. The board dealing with general concerns of the teens also obtained many questions about what to do in romantic relationships. The adolescents are aggressively applying the bulletin boards to query several kinds of sensitive question online, and they receive numerous replies from online peers. The reactions are packed with personal opinions, advice and concrete information and are sometimes emotionally supportive. The questions about the romantic relationships were most commonly posted such as tips for asking someone out, as were questions about sex, pregnancy and birth control. While the replies were often critical many more replies were assistive and supportive and some who sent the questions expressed thankfulness for the advice and information they receives. (The internet’s all-pervasive sexualized media environment affects childhood learning)

In a quite different study, the Elisheva Gross analyzed more than 200 students belonging to the class of seventh and tenth grades with average ages between 12 and 15, in upper middle class suburban California schools to study what they do online and the reason thereof. The Instant messaging is revealed to be one of the most common online activity among such students and the one to which the students devote the most of the time, which is on the average 40 minutes per day. The students also spend most of their time browsing through Web sites mostly to download music, and posting and receiving the e-mails. They are engaged on many activities simultaneously. The most regularly cited causes for instant messaging are to engage with the friends and alleviate boredom. The most common topics talked about are friends and gossip. Gross pointed out that the Internet appears to serve social functions similar to the telephone. The communication with strangers is relatively irregular. About eighty-two percent of instant messaging is with friends from schools. This pattern is equivalent to both boys and girls and for the seventh and tenth grade students. The students are engaged for most of the available time online in interaction with close, offline friends.

About half the students reported to have never pretended themselves to be of anyone else. About 40% of students revealed that they resorted to such pretensions a couple of times. Ten percent admit they do so irregularly or more often. A majority who resort to pretension indicated that they were engaged in such activities in the company of friends. About fifty percent of such students indicate that they do so as a matter of joke. About 11% of such students resort to pretension for becoming more exciting to the other person. A 10th grade girl reveals that the pretensions enables her to pose as one as she wishes. The boys and girls do not differ much in their daily Internet use. Boys and girls both narrated their online social interaction existed in private environments like e-mail and instant messaging and with friends those are part of their daily offline lives. They are engaged in conversing general topics like friendship and gossip. According to Gross the idea that the Internet use by boys is from Mars and that of girls is from Venus emerges to be untrue. (The internet’s all-pervasive sexualized media environment affects childhood learning)

The school districts getting E-rate funding presently are necessitated to comply with the Children’s Internet Protection Act or CIPA, imposing to watch the way the students are using Internet. The new Federal legislations necessitate the districts to use computer software that will safeguard against access to visual depiction of obscene contents and involve child pornography or could inflict damage to the minors. CIPA also necessitate the every school district to devise an Internet safety plan that deals with access to unsuitable Web contents and security of students while applying the electronic communications, unauthorized access and other illegal activities and unauthorized disclosure, use and dissemination of personal information with regard to students. (Willard, 2002) Next, we are required to keep in mind that the children and adults have varied understandings about the way the address the Internet security. Finally it is essential to persistently find out the options for our schools that will generate a rational level of protection and enable all users to have access to this valuable information tool. (Perine, 2000)

Safety measures implemented to curb the availability of contentious content over the Internet are performed by the schools in allowing a logging system that shows what are the sites that have been visited by each student by their account user identification; overseeing the students when they are surfing the Internet, making it mandatory for every student using the Internet to accept by signing the School District Student Acceptable Use Agreement prior to permission access. Proper use of technology comprises of, but not restricted to, the definitions stated as under Logging on to the Internet and/or Network services: It is compulsory for the students to have the permission of their parents for Internet and/or email usage, and accept by putting their signature on the Student Technology Acceptable Use Form. This account will be in force till punitive action is necessary, till the final day of the school year for which the student puts his signature on the Student Acceptable Use Agreement or till the student quits the district whichever is earlier.

Activities matters take precedence over non-academic matters for technology use. (b) Personal Safety and Privacy: Students must not part with their personal data regarding themselves that includes home and work addresses as well as telephone numbers and so on or the personal contact information of any other persons. Students are not permitted to be engaged in Internet chat with anybody online save for educational purposes where particularly permitted by a teacher and individually overseen by that particular teacher. Students will immediately bring to the notice of their teacher regarding any message or content which is unsuitable. Students should not upload a message that was intended to be read by them privately in the absence of the consent of the individual who dispatched the message. The district technology expert and/or network administrator reserves the right to examine, without the prior permission of the student, any data or files which is stored on any computer or on the network. Communication or network work connected with and/or in support of unlawful activities may be brought to the notice of the district and/or law enforcement staff and the consequence could be divesting of rights and/or prosecution under the criminal law. (Board Policy with Guidelines Date Subject: Student Technology Acceptable Use Policy)

(c) Unlawful or Destructive activities: Student will not try to gain unlawful access to any computer or network system. This comprises trying to log in using another person’s account, password, or files secretly without their approval. Students should refrain from destroying, disrupting or causing damage to any data which does not belong to them. Students are not allowed to download or start installation of software without the permission of the technology expert. They are not permitted to utilize the equipment of the district to carry out any action which infringes local, state, or federal law, or other school policy. (d) System Security: District security is kept through a user identification and password. Individuals should not disclose their password to third parties. In case a student doubts that his/her access is impersonated by somebody else, they are required to bring this to the notice of their teacher or principal.

(e) Inappropriate conduct: – Student should not take recourse to vulgar, blasphemous, bawdy, arrogant, provocative, intimidating, or discourteous language which includes and is not restricted to email. Students must not start accessing to or dispatch content that is blasphemous, vulgar, bawdy, and pornographic, supports unlawful activities, abets aggression, or encourages discrimination towards others. There is scope for exclusion for access to the Internet when it is done to conduct research, in case it is consented to by the teacher as well as the parent, and the student is individually controlled by that particular teacher. Students will refrain from unleashing personal diatribe or upload offensive information regarding an individual or organization. Student will not source information which could result in impair, threat, or interruption. Student will refrain from troubling other users. (f) Respecting the use of resources: Students will open their emails in short intervals and exercise sufficient care. They will cancel subscription of mailing lists prior to the onset of vacation, intervals, or other prolonged absence from their school. (g) Plagiarism and Copyright Infringement: Students will utilize district technologies to lift ideas, literature, or works of others and pass them as their own. Students will show reverence to the right of copyright owners. (Board Policy with Guidelines Date Subject: Student Technology Acceptable Use Policy)

Now we shall take a look at the several Internet and Web policy discussions at some universities. Regularly cited is the necessity to make certain that users — students, faculty, staff of the Internet and institutionally supported networks adhere to the federal, state and local regulations along with the institutional policies. Secondly it is in relation to the quality. The home pages of college and university entail a window that offers the outsiders a glance at institution and permits them to learn more about it. As a result of this it is required to maintain a high quality image in the better interests of the institution. Besides, being well designed and visually appealing the official pages are required to be accurate, updated, and technically sound. The official pages that are linked to the home page are required to have a dependable design and not to extend information that is ambiguous and opposes that of other pages. While the liberty of expression is acknowledged the users of institutional computer accounts architecture reveals that certain categories of speech-defamation, obscenity and incitement to the lawlessness are not safeguarded by the Constitution.

It is obligatory on the part of the users to agree to regard the privacy of others and to eliminate fighting words and offensive expressions relating to ethnicity, race, religion, gender, sexual orientation, age or disability. The official Web pages are required to be dealt with an extensive variety of audiences. In addition to those who apply such Web or Internet for research purposes, Web use is progressively significant for those associated with external relations, marketing, development and recruitment. Other application of Internet at varied audiences incorporates information services to the local community, state or region. Applying the Web to extend instruction to on-campus as well as off-campus students-distance education- also is becoming popular. Now the question arises as to who regulates its use and to what extent. The Web policies and guidelines are required to deal with the concerns associated with the regulation of the content of official pages and are required to indicate explicitly which office and individual is liable for information utilized and for the audience already referred to. Most likely, that office is required to be quite different from the category that really perform the technical work like artistic design, programming and maintaining the computers that assist the official pages. (Brooks-Young, 2000)

Official pages are those that indicate the institution and thus are allowed to use the official college or university seal and other institutional logos or word marks. Such pages are to be accorded the same weight as that of college or university publications and tied to the same paradigm and publication guidelines as other more traditional print publications. Contrary to this the unofficial pages are personal pages created by staff, faculty and students. Some institutions entails that a disclaimer be posted on such pages declaring that the pages do not essentially indicate official policy or positions of the institution. Likewise, some official home pages post declaimers reflecting that the institution is not capable of assuring the accuracy or integrity of linked pages and those pages may include the content that has not been approved by the university or college. Care should be taken not to use any copyrighted quotations, images, audio, video or other contents on other pages unless relevant copyright clearances have been obtained. Web pages and Web policies are time sensitive. It is significant to let the visitors to your site visualize when the material was last evaluated and updated. He sites like ‘Current Campus Events’ were evidently seen to be much older.

The Web policies are required to be reviewed more often mostly within six months after their initial development and at least annually then after. It is being tempted to include big, beautiful photographs of campus scenes. However, a big image involves more time to load and display in most of the computers. The proposed audience may not be prepared to wait for a photo to be demonstrated and will move on to another site. It may not be the case that if you create your field of electronic beams, visitors will come to it. You are required to consider the methods to foster your site and to assist people in searching it out. Incorporating the concerned URLs in letter heads, advertisements and promotional materials is becoming normal. The other method of assisting the people to search you out is to register your URL with the major search services such as Yahoo, Lycos, Web Crawler, or Alta Vista. It can be attained by contacting a service called ‘Submit It’ at http://www.submit-it.com. There is a substitution between specifying a very precise URL and one that is easier to remember and type. The precise kind is long and cumbersome however takes directly to the site of interest. A relatively brief and more general URL is less vulnerable to sorting out errors but then necessitates finding out the ways through a copse of menus to access the field of interests. (Brooks-Young, 2000)

Apart from these guidelines the schools are of the opinion that they desire to eliminate the monitoring of Internet use by their students. While the school authorities are mostly not in favor of putting restraints on what the students are doing with their computers some reveal that monitoring is quite essential. Dr. Michael Zastrocky, a former college administrator and at present an analyst at research firm Gartner, reveals that about 80% schools do not assess or do not get associated with what their students are doing with Internet will definitely confront an incident of negative publicity or legal action within the next five years. Dr. Juan Gilbert a professor of computer science at Auburn University in Alabama reveals that his school is capable of exerting some sort of restraint on the data traffic that streams into the network infrastructure of the school since the individual departments extend dedicated network access and server space to students. The college of engineering to illustrate permits the students to download information those are meticulously tracked by the department authorities, as the storage space is under the control of university.

Gilbert further states that the students could visualize that the engineering department assess the traffic as well as the server space; they don’t apply such accounts to download pirated music and video files. However, in specific departments it is quite evident to maintained sub-networks not managed by the central computing administration of the university to exert stringent control over the accessibility of the students to such resources. The sub-networks can entail misuse. He opines that he has been at institutions where the students apply special, unmonitored sub-networks to set up businesses to store and distribute pirated music files. According to him while schools restrain the abuse of sub-networks it is more problematic to assess the data students are downloading to their privately owned computer through the central network of the campus. Close tracking increases the anxiety of the supporters of the civil liberty those entail that the free exchange of information is one of the basic principles of university life. Chris Hoofnagle of the Electronic Privacy Information Center, a privacy rights group puts the actions of the recording industry and other copyright trade association as an attempt to turn the higher education institutions into policing bodies. (Roach, 2003)

A number of present cases have revealed the ways the student and rights can interfere with the norms of school security and discipline issues. Such cases emphasize the necessity for school officials to become aware of the inherent legal issues that demarcate their authority to control the student speech. The Supreme Court has established that the school authorities have the enough power to control the particular speech in a rational way so as to make certain such speech do not interfere with the educational goals of the school. However, the case from which that determination stems from, Hazelwood School District v. Kuhlemeier — 484 U.S. 260 [1988], makes the distinction between speech associated with an individual student and speech related to school. Particularly, such distinction is considered primary in addressing the reasons that associate speech on student-made web pages. At the end for a school official to legally restrict or prohibit individual student speech, the school must establish that the speech would generate substantial disturbance or material impediment of the functioning of school. (Taylor, 2001)

Irrespective of the fact that the First Amendment deters government and educational institutions from legislating laws and policies that prohibit free speech the right to expression of an individual is not unrestrained. Particular forms of speech can have remarkable legal implications in both face-to-face and online contexts. To illustrate a court may find that communicating sexually explicit jokes or messages considered unsuitable in considered to gender and racial issues over e-mail involves illegal embarrassment online. Additionally, the communication of the threatening e-mail may be viewed as illegal embarrassment or basing on the nature of the threat, to represent the criminal acts. A new federal legislation entailing certain schools and public libraries to institute Internet filtering devices and to develop Internet safety policies took effect. The Children’s Internet Protection Act- CIPA is applicable to the school districts receiving the e-rate and also applicable to the schools getting grants for Internet service and computer equipment under Title III of the Elementary and Secondary Education Act — ESEA.

Irrespective of the fact that the actual compliance with the act is not necessary instantly, CIPA has oriented considerable controversy in the education community. There are issues on one side safeguarding children from age- inappropriate material; on the other side, uneasiness about safeguarding the First Amendment rights conferred in Internet use, to illustrate, eliminating censorship of constitutionally safeguarded materials. Some adversaries of CIPA believe that the questionable functionality of filtering devices may give rise to arbitrary and potentially illegal restrictions of worthy data and information from adults those have the authority to access the data and restriction of access from minors who most need it since they do not have or cannot afford computers or Internet access at home. Additionally, some adversaries of the act believe that filters should not substitute teaching children and others responsible and acceptable uses of the Internet at Schools. (Taylor, 2001)

A normal improvement of the concerns and legal norms as applicable to the application of the technology in education counts invaluable while administrators are attempting to provide Internet access in their schools. Now the question arises what the school leaders are required to understand about the law to direct the successful and appropriate assimilation of Internet use in their schools. (Brooks-Young, 2000) Since the teens and pre-teens involve in careless activities while using Internet, the school districts are duty bound to educate the students about the rights and responsibilities as cyber citizens. The concept of copyright is to be fully understood by them. They are required to know the legal concerns associated with computer security violations and the multiplication of the viruses and Internet scams. They are required to be able to differentiate between the free speech and harmful speech.

The district policies associated with diffusion, use and revelation of the student information on the Internet also are required. Policy should deal with disclosure of student information on school Web sites, student disclosure of personal information about themselves or others and staff diffusion of the clandestine student information through e-mail. The revelation of student profiles to companies on the Internet is particularly complicated. The Federal Trade Commission recommends the teachers as they can act in lieu of parents to accord permission for children under the age of 13 to entail personal information and ensure such policies in accordance with the Federal Educational Rights and Privacy Act, related State Privacy laws and the new Student Privacy Protection Act. (Willard, 2002)

At the base level, a school administrator is required to understand the broad mechanics and singular features of the Internet. To illustrate, it is required to understand how the electronic mail functions, be aware of the method of communication known as ‘chat rooms’ and be able to generally appreciate as to how one gets around the cyberspace. The educators are also required to acquire sound knowledge and appreciation of the most remarkable legal concerns that arise in the technology in educational field. The foremost of these concerns are security. The issues of online security in the school environment vary from student and employee discipline for unsuitable application of school equipment to supervision issues associated with the negligence to confidentiality concerns associated with the application of student information. Sometimes school administrators wonder whether students are disciplined for transmitting threatening e-mail message or whether an employee can be disciplined or thrown out for unsuitable application of the computers of schools. In both incidences the school has a legal issue to safeguard the security and to uphold the instituted rules associated with the application of district technology. (Brooks-Young, 2000)

Accessing the Internet at school is a prerogative, does not constitute a right, and must be regarded like that by the students as well as faculty members. Normally speaking, an officer could possibly be held responsible under an assumption of careless administration when the administrator is duty bound under law to safeguard the student; the administrator infringes or becomes unsuccessful to espouse that particular responsibility, and that lack of success or violation in discharging responsibility results in impairment or damage to the student. A vital characteristic of any negligence claim nevertheless is the “reasonable person” norm. This indicates an administrator will solely be responsible for neglecting in case they are unsuccessful in behaving as a rational person given their education and testimonials would in an identical circumstance. Consequently, the administrator at school and teachers must have to take immense care to give a justifiable amount of control to their students while those students access the Internet while in school. Privacy matters concerned with Internet access in schools normally lay centered on whether to upload information related to students or their work to be available online. Impending troubles can resist from uploading student writing and art, photographs of students, or other information which can recognize students. Schools leaders must be conscious of the Family Educational Rights and Privacy Act — FERPA a federal regulation which regulate the release of educational records.

FERPA forbids school districts from issuing educational information of particular students without the permission from the parent of the student, and in case of students who have attained majority age, without the consent of the student. Educational records are reports which are kept by a public school district and are directly associated to a student. A remarkable exclusion to FERPA’s permission needs is connected with “directory information.” Schools are capable of defining some information as directory information, and in case a student or parent does not complain, such information can be published without previous approval. Characteristically, directory information comprises of the name of the student, address, telephone, email address, photograph and so on. Besides, under the Individuals with Disabilities Education Act — IDEA, a school district may not divulge information regarding the student having a problem of disability. For instance, uploading an unidentifiable photograph on the website of the school showing a student in a wheelchair might infringe the privacy requirements of IDEA. (Taylor, 2001)

It is imperative to develop a wide-ranging suitable usage policy to regulate the use of technology in your school. A model policy will have a transparent and explicit language regarding enforcement strategy and norms, suitable and unsuitable uses of the Internet or other technology through school equipment, and proper online protocol. Several schools even comprise student and parental permission forms, as also policy and privacy statements. Besides, there is an urgency to refrain from allowing students uncontrolled access to the Internet. To find out the extent of supervision required it is pertinent to consider the age and level of the student, and examine the particular work which they are utilizing the Internet for. Students and faculty members must know the manner in which to use the Internet in a responsible way. It is pertinent to strike a chord among the users that privacy is relative on the Web, that they are at no point of time alone, and that they must not take for granted every matter which they hear or come across on the Web. Apart from that, firmly urge students to report an adult staff member at once in case they come across content or any other communication through the Internet, which makes them embarrassing.

There is a felt urgency to stop publishing the full names of the students or other classified information regarding the students on the web page of the school. Besides, any requirement for information regarding a student’s work may be sent to his or her family, and let the family take decision whether to get in touch with the interested party. In spite of debatably applicable exclusions under FERPA, one should not upload restricted student information, inclusive of directory information, on the Internet without giving the student or the parent advance notice. Adequate caution must be exercised to keep away from uploading photographs of students without the consent of parent or guardian of the student. Exclusive care must have to be taken for keep away from uploading exclusive photographs of students having disabilities. One ought to be very cautious regarding the type of content which you give on the Web and be aware that a visitor who visits your website can put together information to find out what they desire to know. As a result, keep away from uploading maximum information on the website of the school on a specific student. (Taylor, 2001)

Further disagreements vary from WebPages designed by the students which condemn to intimidating or irritating communications to concerns revolving around filtering and blocking software. (Taylor, 2001) The supporters of civil-liberties put forth that they are not against the applicability of the filtering software in schools and public libraries. But they are against the fact that they represent as a heavy-handed government mandate that calls upon censorship. (Perine, 2000) However, educators do not think the mandate of the decision to apply such type of software. In an online survey of subscribers to the e-school news website performed in early July, about 81% of the respondents reveal that the option of installing filter should be a school or district decisions instead of state or federal legislation. (Brooks-Young, 2000)

However, the school districts depend primarily on jamming technologies that may positions the students in a position of greater vulnerability and risk at those unavoidable moments when the students unsubstantiated access through a system without blocking. (Willard, 2002) This is also worth considering that this software is not foolproof. Its installation necessitates proper maintenance, regular updating and monitoring. Even then it is likely that determined users to get around practically any block. Monitoring software enables a network administrator to visualize the sites browsed. Most of the educators find such strategy preferable to filtering in the faith that it is significant for students to make suitable decisions on their own, confronting negative results for misusing the Internet access. (Brooks-Young, 2000)

The primary concentration of schools is required to assist the students to devise their own filtering and blocking experiences. Similar to the fenced play grounds found suitable for young children clearly we are required to keep the elementary school students in safe places on the Internet and supervise any occasional access to the World Wide Web. Students during this age do not have the necessary skills or knowledge to deal with the Internet in a secured way out of their won. However, fenced yards are regarded as unsuitable environment for teenagers. The Secondary school students apply the Internet in many environments. They are required to understand as to the ways to avoid Internet garbage independently and the way out for being mouse-napped and when unable to get out of porn site. They are also required to understand the secured communication skills and to safeguard their personal privacy and to acknowledge, address and report sexual solicitations. They are required to devise the methods to safeguard themselves from Internet scams and to acknowledge the problems of Internet addiction. (Willard, 2002)

The emerging technology safeguard measures can foster responsible choice and ensure accountability. Such technologies function by scrutinizing the incoming traffic and cautioning the possibility infiltration of unsuitable materials or by filtering all Internet traffic and reporting instances of potential violations to the administrator. Such technologies required to cater to the needs of CIPA and considered as substitutes to the older blocking technologies. When the schools apply the blocking technologies, the local officials effectively are turning over control to third parties to determine the suitability of material for students. No isolated process is in place to make sure that the companies are deciding to block in consonance with the suitable educational standards. The experienced Internet educators anticipate that blocking software avoids them and their students from reaching perfectly appropriate material about 20% of the time. Such over blocking intervenes with successful learning. Educators have much larger experience and expertise in determining the suitability of the contents than the staff at software companies. (Willard, 2002)

The assessment approach necessitates presence of somebody to read the logs and address the infractions. Most of the vendors provide filtering and tracking software structured for school use. To illustrate, Surf Watch released by JSB Software technologies, presently expanded its filtering criteria to incorporate sites that sell or promote the sale of weapons, ammunition or poisonous substances in reaction to prescriptions made by their Advisory Committee that regularly monitors their filtering criteria. A new edition 5.0 proxy of Cyber Patrol released by the Learning Company for education is presently available for schools. Win Guardian is released by Webroot Software, Inc. As a tool that assesses and logs Internet use. Chaperon 2000 released by Corner post software extends filtering with a twist. Two additional features are incorporated: Instant warnings that send a message to the network administrator instantly when an attempt is made to access an unsuitable site; and Agility Filter, a utility that can persistently update the list of blocked sites. Cyber Snoop is another monitoring instrument developed by Pearl Software. The EPALS Classroom Exchange, LLC entails a free service through which the teachers can set up and monitor the e-mail accounts of the students to assess e-mail prior to delivery. (Brooks-Young, 2002)

Most of the companies make available the products that incorporate a varied number of services in a single package. To illustrate the Content Inspector and Site Blocker by Computer Software Manufaktur incorporates site blocking, virus protection, Java security, centralized alerting, logging and remote administration tools into one program. This necessitates the Firewall 1 to run the program. Another option in this line is iPrism from Internet Products, Inc. This server tool can be instituted on a network with no variations to the prevailing hardware and software configurations. Sites those are blocked are assessed weekly and downloaded automatically. The device also entails monitoring potentials. The BASCOM Global Internet Services, Inc. currently announced the updated release of their Internet Communications Server. This device extends ‘plug and play installation; to act as a firewall; along with remote administration; improved Internet access management capabilities and an expanded Global Chalkboard an educational portal. Even the filters and monitoring do not address with the problem of volume and content quality of websites. It seems disgusting to waste lots of hours on unproductive Internet Search. (Brooks-Young, 2002)

Schools applying such blocking technologies are required to be cautions in choosing implement them in a manner that will safeguard the constitutional rights of the students to access information and foster effective educational use of the Internet. (Willard, 2002) The teachers are required to play a crucial role in making the student and parents under the ways to make the best use of the advantages of the Internet without inflicting any damage. Since the Internet usage of the students scrutinizes in the classroom in several methods it is better to include some protections in the lesson plans to help understand the students and their parents. Moreover, the internet filters are only really effective when combined with quality professional development and education programs. It is not sufficient to rely on technology to ban or regulate students. School may be deprived of considerable professional improvement dimensions and extend the gap between the teachers, students and successful application of the Web. (Wollinsky, 2003)

While the school use exerts heavy stress on Website access and some e-mail, researches have been made to reveal that at home students have enough liberty to cross all of the confinements. Students resort to instant messaging, chat peer-to-peer networking and document sharing to do legitimate school work. Such techniques are sometimes perceived to potential hazardous and troublesome and are normally blocked rather than fostered. While they are having negative prospective without supervision, using technology safeguard to block sites and failing to acknowledge their potential to be an overlooked teaching opportunity. It also avoids potential teaching techniques from the radar scopes of teachers and thus extends the gap between the students and teachers. There is a necessity to function with students to devise effective procedures for safe, productive application of the Internet. (Wollinsky, 2003) It is necessary to permit the students know that teachers understand what is going on online. This does not imply the teachers to study everything students post online but you can let them think that they perform. Some teachers set up an IM screen name which enables the students to make contact with. (Elizabeth, 2005)

Unavoidably a couple of student may send messages to them that enable the teachers to enter into the school the next day and casually mention how cute the students Web page was. This will definitely attract the attention of all the kids and word will spread that this teacher studies their student information. When the students are aware they could be traced out this increases their liability that makes them stop to think prior to doing some thing unsuitable, that makes them stop to think prior to doing something unsuitable. (Elizabeth, 2005) Further it is necessary to learn from and work with students to devise successful procedures for secured and productive use of Internet tools like chat sessions, shared documents or even videoconferencing. In addition to that there is a necessity to search out the ways students use the Internet out of school. There is a necessity for parents to set up the blocking software at home for maximum benefits. The single student with unlimited Internet access has enough scope to mail the forbidden material to others. (Wollinsky, 2003)

Another relatively less known hazard is that a student with an unblocked computer can also set up a circumventor program that permit students to surpass the school blocking software by linking the home computer and using it as a server. The most convenient method of blocking the access to such circumventor sites is to block access to port 443, a secure server port that is applied to access the circumventor sites. Some parents frequently watch the online usage of their children and that incorporates viewing at the Websites of the classmates of their children. The parents are advised to report the teachers if something is out of control. One of the highly regarded football coach warned his players to clean up their websites on pain of the demanding workouts or even expulsions from the team if any objectionable material appear on their websites again. He established the stringent code of respectable behavior online since it reflected on their school. 15. Once such techniques are effectively implemented then our students will not only be safe but will be healthy on the road to being serious thinkers. (Wollinsky, 2003)

It is the up to the school administrators to balance the lawful constitutional rights of students while maintaining security and discipline inside the school settings. (Taylor, 2001) Many federal and state laws and regulations associated with maintaining and delivering student information must be pursued, however, the school districts and schools necessitate supplementary policies and regulations to manage the daily strategies. As the schools and districts differ in the ways they gather and manage information about the students the kinds of policies and procedures also differ. (Section 1: A Primer for Privacy) In order to enhance privacy protection over the Internet, there is an urgency of student education. The secondary students are required to have a clear awareness of the anticipations for their activity when using the Internet in school and be held accountable for such usage. (Privacy Expectations in a High Tech World)

There is an alarming necessity for students to be conversant regarding what is the impact on them while they browse the Internet, to be educated in the best possible manner to monitor the uses of their personal information, and to be aware of their legal rights and otherwise also. Such student education comprises the use of technologies to protect their privacy. Preferably, high school students include the use of technologies privacy protection strategies in school. This is a tough decision when business messages inundate their tender lives, exhibiting the Internet to be a “cool” and affable centre. Youths fall at danger for taking into account the current circumstances as the standard. The need of Canada is that every child gets media attention while in school is definitely commendable. Secondly, there is the urgency of a “societal feedback system” in which the queries and complaints of the students can be listened, examined and finally action taken.

Thirdly, companies should undertake privacy impact appraisal on their products and services while in the development level. Prior to its introduction in the marketplace, the Pentium chip remained in the development stage for many years. The customer clamor and resulting backtracking by Intel could have been evaded if the privacy allusion of the chip’s inbuilt serial number been reviewed and action taken immediately. A number of companies have at present brought together privacy advisory committees to train them in the development of new products. Fourthly, there is urgency for Congress to frame regulation which gives individuals with a background of privacy safeguard on the Internet by legalizing the fair information principles. The 1998 Harris poll on Internet privacy revealed that just over 50% of the people surveyed “support government passing laws to control the manner in which personal information can be gathered and used in the Internet.” (Privacy Expectations in a High Tech World)

An immense volume of proof shows that the auto-regulation of the industry has failed. Whereas approximately two-thirds of the biggest web sites possess privacy policies, the enormous bulk of them are just disclosure statements giving just two of the fair information principles, notice and make a choice. Nearly all policies leave out the other principles like access, correctness, safety, restriction on collection and answerability. Besides, we are aware that a there are a lot of companies who do not adhere to the present strategies. A study published by the California Healthcare Foundation revealed that a lot of health-associated web sites gather information from their visitors and divulge it to third party marketers against their declared policies. (Privacy Expectations in a High Tech World)

References

Baskin, Joy Surratt; Surratt, Jim. “Student Privacy Rights and Wrongs on the Web” School Administrator. Vol: 35; No: 2; pp: 102, 114-116

Beth Givens, (February 2000) “Privacy Expectations in a High Tech World” Computer and High Technology Law Journal. Retrieved from http://www.privacyrights.org/ar/expect.htm Accessed on 14 April, 2005

‘Board Policy with Guidelines Date Subject: Student Technology Acceptable Use Policy” (17 July, 2001) North Sanpete School District Policy. Number V-30. Retrieved from http://www.nsanpete.k12.ut.us/~nshs/nslibrary/accuse.html Accessed on 14 April, 2005

Brooks-Young, Susan. (November-December, 2000) “Internet usage update” Today’s Catholic Teacher. Vol: 17: No: 2; pp: 53-56

Buchholz, Rogene A: Rosenthal, Sandra B. (2002) “Internet Privacy: Individual Rights and the Common Good” SAM Advanced Management Journal. Vol. 67; No: 1; pp: 116-120

Cartwright, Philip. G. (September-October, 1996) “Creating a Web policy: what you need to know – university policies on the World Wide Web” Change. Vol: 8; No: 1; pp: 15-18

Elizabeth, R. (March, 2005) “Protecting Kids from Others and Themselves Online” Today’s Catholic Teacher. Vol: 22; No: 1; pp: 60-65

Hersh, Melanie L. (2001) “Is COPPA a Cop out? The Child Online Privacy Protection Act as Proof That Parents, Not Government Should Be Protecting Children’s Interests on the Internet” Fordham Urban Law Journal. Vol. 28; No: 1; pp: 64-67

“Kids Privacy on the Net” Retrieved from http://lrs.ed.uiuc.edu/wp/original/privacy/kidprivacy.html Accessed on 14 April, 2005

Lester, Toby. (March, 2001) “Reinvention of Privacy: It Used to Be That Business and Technology Were Considered to Be the Enemies of Privacy. Not Anymore” The Atlantic Monthly. Vol. 287; No: 1; pp: 81-85

Linda, R. (1 July, 2001) “Mixed Signals – Consumers want Privacy” American Demographics. Vol: 26; No: 3; pp: 73-77

Perine, Keith. (27 November, 2000) “Taking Liberties – Government Activity” The Industry Standard. Vol: 14; No: 2; pp: 28-31

“Protecting your Privacy on the Internet.” Retrieved from http://www.privacy.gov.au/internet/internet_privacy / Accessed on 14 April, 2005

Roach, Ronald. (2 January, 2003) “Internet forces schools to contend with copyright, speech issues” Black Issues in Higher Education. Vol: 14: No: 2; pp: 53-55

Rockey, B. (23 September, 1996) “Net mania 1996: will the internet grow out of control?.” Currents Events. Vol: 7; No: 2; pp: 15-18

‘Section 1: A Primer for Privacy. National Center for Education Statistics” Retrieved from http://nces.ed.gov/pubs97/p97527/Sec1_txt.asp Accessed on 14 April, 2005

Suryaraman, Maya. (27 October 2003) “School software helps parents keep tabs on teens” Retrieved from http://www.siliconvalley.com/mld/siliconvalley/7116015.htm Accessed on 14 April, 2005

Taylor, Kelley. R. (May/June, 2001) “Schools on the Web: Untangling the legal issues” Principal Leadership. Vol: 12; No: 1; No: 25-27

“The internet’s all-pervasive sexualized media environment affects childhood learning” (2 March, 2005) Child Health News. Retrieved from http://www.news-medical.net/?id=8122 Accessed on 14 April, 2005

Wellbery, Barbara. S; Wolfe, Claudia. C. (January, 1998) “Privacy in the Information Age” Business America. Vol: 11; No: 1; pp: 7-8

Willard, Nancy. (April, 2002) “Complying with federal law for safe Internet use” School Administrator. Vol: 21; No: 1; pp: 26-28

Wollinsky, Art. (August, 2003) “Filtering, Privacy & Online Safety” School Executive. Vol: 16: No: 51-54

Yates, Eleanor Lee. “The Lack of Virtual Privacy” (18 February, 1999) Black Issues in Higher Education. Vol: 10; No: 1; pp: 27-30.


Get Professional Assignment Help Cheaply

Buy Custom Essay

Are you busy and do not have time to handle your assignment? Are you scared that your paper will not make the grade? Do you have responsibilities that may hinder you from turning in your assignment on time? Are you tired and can barely handle your assignment? Are your grades inconsistent?

Whichever your reason is, it is valid! You can get professional academic help from our service at affordable rates. We have a team of professional academic writers who can handle all your assignments.

Why Choose Our Academic Writing Service?

  • Plagiarism free papers
  • Timely delivery
  • Any deadline
  • Skilled, Experienced Native English Writers
  • Subject-relevant academic writer
  • Adherence to paper instructions
  • Ability to tackle bulk assignments
  • Reasonable prices
  • 24/7 Customer Support
  • Get superb grades consistently
 

Online Academic Help With Different Subjects

Literature

Students barely have time to read. We got you! Have your literature essay or book review written without having the hassle of reading the book. You can get your literature paper custom-written for you by our literature specialists.

Finance

Do you struggle with finance? No need to torture yourself if finance is not your cup of tea. You can order your finance paper from our academic writing service and get 100% original work from competent finance experts.

Computer science

Computer science is a tough subject. Fortunately, our computer science experts are up to the match. No need to stress and have sleepless nights. Our academic writers will tackle all your computer science assignments and deliver them on time. Let us handle all your python, java, ruby, JavaScript, php , C+ assignments!

Psychology

While psychology may be an interesting subject, you may lack sufficient time to handle your assignments. Don’t despair; by using our academic writing service, you can be assured of perfect grades. Moreover, your grades will be consistent.

Engineering

Engineering is quite a demanding subject. Students face a lot of pressure and barely have enough time to do what they love to do. Our academic writing service got you covered! Our engineering specialists follow the paper instructions and ensure timely delivery of the paper.

Nursing

In the nursing course, you may have difficulties with literature reviews, annotated bibliographies, critical essays, and other assignments. Our nursing assignment writers will offer you professional nursing paper help at low prices.

Sociology

Truth be told, sociology papers can be quite exhausting. Our academic writing service relieves you of fatigue, pressure, and stress. You can relax and have peace of mind as our academic writers handle your sociology assignment.

Business

We take pride in having some of the best business writers in the industry. Our business writers have a lot of experience in the field. They are reliable, and you can be assured of a high-grade paper. They are able to handle business papers of any subject, length, deadline, and difficulty!

Statistics

We boast of having some of the most experienced statistics experts in the industry. Our statistics experts have diverse skills, expertise, and knowledge to handle any kind of assignment. They have access to all kinds of software to get your assignment done.

Law

Writing a law essay may prove to be an insurmountable obstacle, especially when you need to know the peculiarities of the legislative framework. Take advantage of our top-notch law specialists and get superb grades and 100% satisfaction.

What discipline/subjects do you deal in?

We have highlighted some of the most popular subjects we handle above. Those are just a tip of the iceberg. We deal in all academic disciplines since our writers are as diverse. They have been drawn from across all disciplines, and orders are assigned to those writers believed to be the best in the field. In a nutshell, there is no task we cannot handle; all you need to do is place your order with us. As long as your instructions are clear, just trust we shall deliver irrespective of the discipline.

Are your writers competent enough to handle my paper?

Our essay writers are graduates with bachelor's, masters, Ph.D., and doctorate degrees in various subjects. The minimum requirement to be an essay writer with our essay writing service is to have a college degree. All our academic writers have a minimum of two years of academic writing. We have a stringent recruitment process to ensure that we get only the most competent essay writers in the industry. We also ensure that the writers are handsomely compensated for their value. The majority of our writers are native English speakers. As such, the fluency of language and grammar is impeccable.

What if I don’t like the paper?

There is a very low likelihood that you won’t like the paper.

Reasons being:

  • When assigning your order, we match the paper’s discipline with the writer’s field/specialization. Since all our writers are graduates, we match the paper’s subject with the field the writer studied. For instance, if it’s a nursing paper, only a nursing graduate and writer will handle it. Furthermore, all our writers have academic writing experience and top-notch research skills.
  • We have a quality assurance that reviews the paper before it gets to you. As such, we ensure that you get a paper that meets the required standard and will most definitely make the grade.

In the event that you don’t like your paper:

  • The writer will revise the paper up to your pleasing. You have unlimited revisions. You simply need to highlight what specifically you don’t like about the paper, and the writer will make the amendments. The paper will be revised until you are satisfied. Revisions are free of charge
  • We will have a different writer write the paper from scratch.
  • Last resort, if the above does not work, we will refund your money.

Will the professor find out I didn’t write the paper myself?

Not at all. All papers are written from scratch. There is no way your tutor or instructor will realize that you did not write the paper yourself. In fact, we recommend using our assignment help services for consistent results.

What if the paper is plagiarized?

We check all papers for plagiarism before we submit them. We use powerful plagiarism checking software such as SafeAssign, LopesWrite, and Turnitin. We also upload the plagiarism report so that you can review it. We understand that plagiarism is academic suicide. We would not take the risk of submitting plagiarized work and jeopardize your academic journey. Furthermore, we do not sell or use prewritten papers, and each paper is written from scratch.

When will I get my paper?

You determine when you get the paper by setting the deadline when placing the order. All papers are delivered within the deadline. We are well aware that we operate in a time-sensitive industry. As such, we have laid out strategies to ensure that the client receives the paper on time and they never miss the deadline. We understand that papers that are submitted late have some points deducted. We do not want you to miss any points due to late submission. We work on beating deadlines by huge margins in order to ensure that you have ample time to review the paper before you submit it.

Will anyone find out that I used your services?

We have a privacy and confidentiality policy that guides our work. We NEVER share any customer information with third parties. Noone will ever know that you used our assignment help services. It’s only between you and us. We are bound by our policies to protect the customer’s identity and information. All your information, such as your names, phone number, email, order information, and so on, are protected. We have robust security systems that ensure that your data is protected. Hacking our systems is close to impossible, and it has never happened.

How our Assignment  Help Service Works

1.      Place an order

You fill all the paper instructions in the order form. Make sure you include all the helpful materials so that our academic writers can deliver the perfect paper. It will also help to eliminate unnecessary revisions.

2.      Pay for the order

Proceed to pay for the paper so that it can be assigned to one of our expert academic writers. The paper subject is matched with the writer’s area of specialization.

3.      Track the progress

You communicate with the writer and know about the progress of the paper. The client can ask the writer for drafts of the paper. The client can upload extra material and include additional instructions from the lecturer. Receive a paper.

4.      Download the paper

The paper is sent to your email and uploaded to your personal account. You also get a plagiarism report attached to your paper.

smile and order essaysmile and order essay PLACE THIS ORDER OR A SIMILAR ORDER WITH US TODAY AND GET A PERFECT SCORE!!!

order custom essay paper

Internet: Privacy for High School Students

Internet: Privacy for High School Students

 

Don't use plagiarized sources. Get Your Custom Essay on
Internet: Privacy for High School Students
Just from $9/Page
Order Essay

An Analysis of Privacy Issues and High School Students in the United States Today

 

In the Age of Information, the issue of invasion of privacy continues to dominate the headlines. More and more people, it seems, are becoming victims of identity theft, one of the major forms of privacy invasion, and personal information on just about everyone in the world is available at the click of a mouse. In this environment, can anyone, especially high school students, reasonably expect to have any degree of privacy? High school students, after all, are not protected by many of the same constitutional guarantees as adults, but their needs for privacy may be as great, or greater, than their adult counterparts. To determine what measure of privacy, if any, high schools students can expect at home and school today, this paper provides an overview of the issue of privacy, followed by an analysis of its various dimensions as they apply to this segment of the population. A discussion of current and future trends is followed by a summary of the research in the conclusion.

 

Review and Discussion

 

Background and Overview. In his essay, “The Costs of Privacy,” Kent Walker (2001) advises that “Privacy is both an individual and a social good. Still, the no-free-lunch principle holds true. Legislating privacy comes at a cost: more notices and forms, higher prices, fewer free services, less convenience, and, often, less security. More broadly, if less tangibly, laws regulating privacy chill the creation of beneficial collective goods and erode social values” (p. 87). Likewise, Jeffrey Rosen suggests that “privacy protects us from being misdefined and judged out of context in a world of short attention spans, a world in which information can easily be confused with knowledge” (p. 209). Yet, while the headlines are replete with reports concerning privacy issues and how they are playing out in the workplace and school, there are some profound differences in what can reasonably be expected in terms of privacy from one society to the next.

 

In the West, privacy assumes a more important role for many people, perhaps, than their counterparts in the East simply by virtue of the social emphasis on individuality in the former and the emphasis on the needs of the group first in the latter; nevertheless, people everywhere seem to agree to privacy is an important component of the human existence. This assumption was borne out by research conducted by Naz Kaya and Margaret J. Weber (2003), who found further differences even in the nations of the West as their concerned the reasonable expectation for privacy. “Although the desire for privacy varies from one situation to another,” they say, “it appears that some cultures have a stronger preference for privacy and more privacy needs and gradients than others” (Kaya & Weber, 2003, p. 79). Other researchers have characterized different cultures as being “contact” and “non-contact” in their privacy expectations, with a clear reference to the Western concept of the “need for space” being involved in such assessments. According to Kaya and Weber, “The contact culture is composed of individuals (e.g., Mediterranean, Middle Eastern, Hispanic) who interact more closely with one another than individuals of the non-contact culture (e.g., Northern European, North American)” (p. 80). Therefore, students from contact cultures who prefer closer social interaction would have less privacy needs than their non-contact culture counterparts.

 

In an increasingly multicultural society, these different expectations of privacy can result in different reactions among different people, of course, but despite these differences, all people need to be alone sometimes, and solitude in these cases should not be confused with isolation. According to James Q. Whitman, “In every corner of the Western world, writers proclaim ‘privacy’ as a supremely important human good, as a value somehow at the core of what makes life worth living. Without our privacy, we lose ‘our very integrity as persons'” (p. 1151). A number of observers have agreed that privacy is somehow fundamental to humanity’s “personhood”; further, it is widely recognized that individual privacy is being threatened by the evolution of contemporary society through innovations in telecommunications, surveillance and increasingly intrusive methods of inquiry. Whitman says, “Commentators paint this menace in very dark colors: Invasions of our privacy are said to portend a society of “horror,” to “injure [us] in [our] very humanity,” or even to threaten “totalitarianism,” and the establishment of law protecting privacy is accordingly declared to be a matter of fundamental rights. It is the rare privacy advocate who resists citing Orwell when describing these dangers” (p. 1151). These fears are not unfounded of course.

 

Today, many states, as well as a number of counties, localities, and federal agencies, operate a variety of centralized “human services” data banks that manage client records submitted by agencies for virtually permanent storage. According to Trudy Hayden, Evan Hendricks, and Jack D. Novik’s book, Your Right to Privacy: A Basic Guide to Legal Rights in an Information Society (1990), “Police and other criminal justice officials can often obtain information from client records simply on request. Schools, employers, and landlords are sometimes told that a student, employee, or tenant is the client of a welfare or social services program. Records are often made available to researchers. So loose are the confidentiality regulations for most programs that these disclosures are perfectly legal. On the other hand, some programs maintain very strict confidentiality; for example, federally funded drug and alcohol abuse treatment programs generally protect client records even against a subpoena” (p. 57).

 

At the same time, advocates of maintaining existing privacy protections and expanding them in the future are likewise forced to admit that the concept of privacy is exceedingly difficult to define. “[N]obody,” writes Judith Jarvis Thomson, “seems to have any very clear idea what [it] is” (p. 37). While all authors are not quite as vague about the concept as Thomson, many of them feel compelled, nevertheless, to acknowledge that privacy, fundamentally important though it may be, is an particularly elusive concept to articulate. “In particular,” Whitman says, “the sense of what must be kept ‘private,’ of what must be hidden before the eyes of others, seems to differ strangely from society to society” (p. 1152). There are some legal guidelines available, though, that help to codify precisely what adults in the United States can expect in terms of personal privacy.

 

According to Black’s Law Dictionary (1990), the “right to privacy” means “The right to be left alone; the right of a person to be free from unwarranted publicity; and right to live without unwarranted interference by the public in matters with which the public is not necessarily concerned” (p. 1195). While everyone, adolescent and adult, East and West alike, perhaps, shares an approximation of what “the right to privacy” is and what can reasonably be expected in day-to-day life, there are four basic categories of privacy invasion that are actually actionable in the U.S. courts today:

 

1.

 

Appropriation. This term refers to the increasingly common crime of identity theft, or other circumstances wherein an individual’s name or likeness is appropriated without permission.

 

2.

 

Intrusion. This occurs when someone intrudes on another person’s solitude or seclusion, as well as an individual’s residence.

 

3.

 

Public disclosure of private facts. This type of privacy invasion involves unwanted publicity “of a highly objectionable kind,” that is provided about someone; the information can even be true, but a cause of action may still exist if the individual involved is not a celebrity, politician, sports figure or someone who has been otherwise exempted from this component. According to Robert Lissit, there is a fine line between what is allowed to be publicly disclosed, but this line has become increasingly blurred in recent years, particularly as it applies to juveniles: “Whether it’s a live telecast of bloodied teens carried from Columbine High School, a live feed of a man shooting himself on a California freeway, or a mother and son running from cameras after visiting a memorial for school shooting victims, there’s a conflict between the public’s right to know and the individual’s right to privacy” (p. 98).

 

4.

 

False light in the public eye.

 

The final type of privacy invasion consists of publicity that places an individual in the “false light of the public eye” (Black’s, p. 1195).

 

Certainly, most people cherish their privacy and will go to great lengths to protect it; however, privacy considerations for adults and adolescents vary in significant ways, but still tend to mirror privacy considerations for their adult counterparts. In his essay, “The Two Western Cultures of Privacy: Dignity vs. Liberty,” James Q. Whitman points out that, “Privacy advocates often like to claim that all modern societies feel the same intuitive need to protect privacy. Yet it is clear that intuitive sensibilities about privacy differ from society to society, even as between the closely kindred societies of the United States and continental Europe. Some of the differences involve questions of everyday behavior, such as whether or not one may appear nude in public. But many involve the law” (p. 1151). These issues have assumed increasing importance in recent years as well.

 

For example, in her book, Mind Your Own Business: The Battle for Personal Privacy, Gini Graham Scott (1995) reports that, “From elementary school to college, school has become a privacy battleground, primarily in high school and university. Mainly, these conflicts have occurred on four main fronts: the effort to keep schools safe from crime and drugs; efforts to control, shape, or punish different types of student behavior; the school — media conflict over what the media can cover and publish; and the struggle over what a school can say when it is trying to terminate or has terminated a teacher or staff member” (p. 271). The increasing surveillance in other areas of society that have been the result of concerns about crime and drugs has been carried over into the country’s high schools and colleges.

 

According to Scott, “Like a microcosm of society, schools have been invaded by these same problems, resulting in the airport-like screening devices and police practices that have become a daily routine in many schools. In many communities, as widely reported in the news, even elementary schools now have check-in stops through which students have to pass, so they can be checked for weapons” (p. 271). If any contraband is found, it is confiscated, and the student will sometimes be charged with a crime or suspended from school as well. In many high schools, school officials now conduct occasional locker checks for illegal drugs, stolen property, or other evidence of a crime. Like their adult counterparts in the workplace, student lockers represent a particular challenge for authorities seeking a balance between the Fourth Amendment guarantees and the need to ensure the safety of the juvenile and others. From an adult’s perspective, these expectations have assumed some fairly concrete forms. According to Darien A. McWhirter (1994), “By the end of the twentieth century both the police and average citizens have a good idea of what the Fourth Amendment does and does not protect. W hile some of the rules may seem silly to some people, they are not confusing. From searching automobiles to backpacks to houses, mistakes can no longer be laid at the door of the Supreme Court. Police officers who violate the rules have only themselves to blame if a guilty person goes free because constitutional rights were violated” (p. 144). The same can also be said concerning the more general right to privacy as it applies to adults. Although other areas may also fall under the umbrella constitutional protections, adults in the United States have the right to decide who they will marry, whether or not they will have children, and whether or not their children will attend private school; women have a fundamental right to control their own bodies, including the right to decide to have an abortion, limited only by the right states enjoy to regulate the abortion process to serve legitimate governmental goals (McWhirtier, 1994). By sharp contrast, though, these Fourth Amendment guarantees fade in significance when they are applied to a high school setting, a point made by Barbara Dority (1997) who reports that, “Every day, public schools in America are becoming safer. Walk-through metal detectors have been in use in many inner city schools for over a decade, while hand-held detectors and random weapons screenings are more popular on smaller, rural campuses. They’re expensive, but they’re thorough. And we want nothing but the best when it comes to the safety of our children” (p. 37). Under various circumstances, schools across the country are requiring students to submit to body searches. The Washington state chapter of the American Civil Liberties Union recently settled a case in which fifteen students were strip-searched by school personnel looking for a missing $100. Commented one of the students, ‘It felt like we were criminals. It was humiliating.’ Kids say the darndest things, don’t they?” (Dority, 1997, p. 38). The war on drugs is being vigorously waged in our public schools, as reflected in an October 1996 story by the Associated Press. A thirteen-year-old honor student in Ohio was suspended ten days from Junior high school for accepting two Midol tablets from a classmate. The school’s “zero tolerance” policy makes no distinctions — prescription or nonprescription, legal or illegal. The student could reduce her suspension time only by undergoing “drug screening” (initial cost, $100; several subsequent “counseling” sessions, $90 each). She and the friend who gave her the tablets were ordered to undergo a “drug evaluation” or face expulsion. Both girls said this hardly seemed fair for two unswallowed Midols, but they’re just kids. When they’re older, they’ll understand why it was so important for officials to make no exceptions (Dority, 1997, p. 38). .

 

In a 1995 Supreme Court ruling permitting mandatory random drug testing of students participating in sports and other extracurricular activities, the Court specifically said that those who refuse testing can be barred from participation. Students in at least twenty two states are now required to submit or be excluded from many school activities. To some students, this seems unjust. But to quote the father of a star athlete at one Washington high school, ‘We’re supposed to prepare students for the world of work. On the door of Albertson’s [food store] it says, ‘We’re going to drug test you before we hire you, so don’t apply if you do drugs'” (Dority, 1997, p. 38). Likewise, in early July 2002, the U.S. Supreme Court held that high school students involved in extracurricular activities could be required to submit to drug testing. According to Hagen and Nichols (2002), “Privacy and drug-decriminalization groups voiced disappointment. ‘We believe the testing of students violates their Fourth Amendment right to protection from unreasonable search and seizure’ says Shawn Heller, national director of Students for Sensible Drug Policy (SSDP)” (p. 6). The lack of parental involvement in such invasive programs was also denounced: “If a student wants a Tylenol he needs parental consent, but not for an invasive drag test,” Heller said. “The role of schools is to educate, not investigate and incriminate. Schools can perform a useful rule in educating students about the real harms of drug and alcohol use” (emphasis added). These observations are entirely on point and timely as well. Sharlene A. McEvoy (2002) reports that as a result of more technology in the workplace and the ability of employees to have access to e-mail and the Internet on employer-owned computers, questions have arisen as to an employer’s right to monitor personal use of these devices in the workplace. McEvoy says, “Cases indicate that an employee uses e-mail and the Interact for personal purposes at his or her peril” (p. 69). The “peril” involved is very real and adult concerns over privacy in the workplace are likewise very real because they are based on the reality of workplace surveillance today. For instance, in May 2000, the American Management Association conducted a survey that determined the number of businesses that performed at least some type of worker surveillance grew from 45% to 66% in 1999. According to McEvoy, monitoring telephone calls is also on the list of employee activities that are used by companies today. These same surveillance techniques, as well as the rationale that supports them, are being used in high schools today, but critics are pointing out that in many cases school officials and law enforcement authorities are taking the whole thing much too far. “Kids love dogs, right?,” Dority asks. This author notes that by, “Having a drug sniffing dog check out their clothing, lockers, purses, and book bags isn’t nearly as upsetting as searches by police. The dogs are usually brought in without notice each semester. Students are permitted to play with them after the work is finished. It’s important to turn these activities into positive experiences whenever we can. After all, there’s no reason kids should be upset by these little safety precautions” (Dority, 1997, p. 39). Because they are using company-owned equipment and using company-owned facilities in which to work, adults usually recognize and grudgingly accept the inherent rights of an employer to engage in these types of surveillance practices in the workplace, even extending to the right to search an individual’s desk or other property, so long as it is located on company property — even the parking lots. There are not many adult workers, though, who would likely sit still for a random search of their desk just to keep them intimated and “in their place,” but Dority suggests that this is just what is being done in the nation’s high schools in the form of random locker searches. In the past, random locker searches were fairly commonplace in inner-city schools; however, these practices are being increasingly used in all high schools across the country. “These searches don’t often turn up drugs or ‘other contraband,’ primarily because students no longer leave any personal items in their lockers. But school officials know it is important to continue the searches anyway; students need to be reminded that zero tolerance means zero tolerance” (1997, p. 39). Some of the other methods being employed to keep illegal substances such as alcohol out of the nation’s high schools would also never pass muster in an adult setting, but are continued to be foisted upon the nation’s high school students. For example, school authorities have used bans on clothing with alcohol-related messages as well as the use of breath alcohol analysis machines. According to Dority, “A handy $500, hand-held device detects one’s level of alcohol. Any amount detected results in a suspension of a few days to a full semester, and most schools require offenders to undergo a ‘substance-abuse assessment and treatment program’ before returning to school. When asked what would happen if a student refused to take a breath test, the vice-principal at a Washington school replied, ‘That’s never happened. But if it did, my line would be, ‘I can do this or the police can do this'” (Dority, 1997, p. 39). Based on empirical observations, if this practice were in place in most American workplaces, half of the workforce would be on suspension and the other half would be in a rehabilitation program. In fact, in response to worker backlash against such practices into their private lives, a majority of states have now enacted some version of off-the-job privacy protection laws (Dworkin, 1997). There are some other similarities between the privacy issues in the workplace and those in place at many high schools today. For example, the U.S. Postal Service uses postal inspectors that are able to watch any employee in any facility at any time without the employee’s knowledge; however, such surveillance in the nation’s high schools has truly assumed Orwellian qualities. According to Dority, “Then there are the surveillance cameras. System manufacturers recommend that medium-sized campuses install at least twenty-five: in classrooms, hallways, gyms, cafeterias, parking lots; on football fields and on each school bus” (1997, p. 40). Surveillance systems are also being installed in many new school facilities during their construction phase; one student in a Texas district described the experience as being imprisoned, and Dority believes these considerations far outweigh any real security that is being achieved in the process: “Everywhere you go, there’s a camera right above you, watching. They’re invading our privacy. It makes it feel like jail.’ When he’s older, he’ll realize how much safer he was because of those cameras” (emphasis added) (Dority, 1997, p. 41). If an adult worker in the United States or the West in general becomes sufficiently dissatisfied with the conditions in a given workplace, he or she is free to seek other gainful employment; however, as noted above, high school students do not typically enjoy these same luxuries and are compelled for one reason or another to stay in school, and in many cases, a specific school. As an essentially “trapped audience,” then, high school students are at the mercy of these same surveillance systems, and they have been misused. According to Ralph W. Larkin (1979):

 

The fact is that students are forced to attend school, because of compulsory attendance laws, as in the case of most high school students, or there are no other viable alternatives, or nonattendance is an admission of failure in the status struggle, as in the case of most college students, contrary to the popular ideology that education is a privilege. This particular contradiction unnerves students, since they tend to believe the popular ideology and have feelings of guilt because they don’t really want to be there. They are caught in the double-bind of being coerced into a position which they believe is privileged. (p. 59)

 

Unfortunately, when students become trapped in a system that continues to exhibit signs of oppressiveness, there will be profound consequences. When that same system is used to exploit them even further, the consequences can be equally serious for the authorities responsible for their installation, even if they had no part in how such devices were misused for privacy invasion purposes. For example, in their essay, “Privacy and Negligence,” Paul Mick and Thomas H. Sawyer (1999) report that a hidden surveillance camera was placed in the locker room of an American high school to videotape females participating in a lifeguard-training session. A high school student not participating in the lifeguard training had hidden the camera and taped the exercises and circulated copies of a tape of the students undressing. Two of the female students who were videotaped brought suit against the high school, the school corporation, the organization sponsoring the lifeguard training, and the teacher who conducted the training; however, suit was not brought against the high school student who actually placed the camera in the locker room. “The plaintiffs felt that it was the responsibility of those named to ensure their security and privacy,” the authors noted (Mick & Sawyer, 1999, p. 12).

 

Furthermore, when inordinately restrictive security policies are in place that overly intrude into students’ lives, they cannot help but become resentful and distrustful of adults. According to Dority, an increasing number of high schools are hiring additional security staff to police student behavior and are arranging daily visits by police officers. As a result:

 

Kids say it makes them feel that the campus isn’t ‘theirs’ anymore. But they’ll soon realize that the police are their friends and adjust to their presence. Censorship of school newspapers and other student publications has become commonplace since the Supreme Court’s 1988 Hazelwood decision, which held that school officials may censor student publications as they see fit and this does not violate the rights of students. Student journalists and writers faced with this situation often call on organizations like the Washington Coalition Against Censorship. “But they’re just kids; they don’t know the real world. Experiencing forms of censorship teaches young journalists that success in their future careers will require that they accept the advice and correction of experienced editors. (Dority, 1997, p. 38).

 

“And here’s a truly innovative idea: let’s take away students’ drivers licenses if they drop out of school before age eighteen! Why didn’t we think of this long ago? It’s already being declared a success in West Virginia, and similar laws have been adopted in Arkansas, Florida, Louisiana, and Texas” (Dority, 1997, p. 38). Since the most frequently cited reasons for dropping out of school are the need to earn money and to care for a child, this plan might seem cruel and unfair now, but they’ll thank us for it when they realize it was for their own good. The list of safety measures being employed in America’s public schools goes on and on: paying kids cash rewards for turning in fellow students suspected of using drugs, narcotics agents posing as students, searches of students’ cars in school parking lots, and the like.

 

For kids, school isn’t preparation or rehearsal for life. School is life. We know their experiences there leave a profound impression upon their young, developing minds. That’s why their secondary school years are the ideal time to help them make the adjustments necessary to be successful in our society. They may resist, but it’s natural for youths to rebel against authority. Only by being firm and consistent can we assure that the next generation of Americans will become model citizens (Dority, 1997, p. 38).

 

Although these surveillance and search tactics have been challenged in some localities, the lower courts have generally held them constitutional based on the need for added security measures given the risks of these dangerous times and the need to protect students from these dangers. Scott notes that, “In fact, in some jurisdictions, there are moves to make carrying a concealed weapon into a school a felony, and in some states (such as California) it now is a felony for both adults and juveniles” (p. 272). At the same time, there have been a number of initiatives introduced throughout the country to make juveniles more accountable for what they do, including no longer sealing the juvenile’s record. For example, in California, following the Polly Klaas murder and Richard Allen Davis’s conviction, Mike Reynolds, another California father whose daughter was raped and killed, received renewed support for the more severe “three strikes and you’re out” measure that he proposed 2 years previously. These incidents compelled lawmakers to pass this law quickly, and it was the first of several similar proposals signed into law by Governor Pete Wilson. One of its provisions allowed juvenile records to be unsealed and allowed convictions as a juvenile to count toward the “three strikes”; according to this law, life sentences are mandated for three-time offenders who have previously committed at least two violent crimes (Scott, 1995).

 

As a result, popular opinion is calling for increased vigilance on juveniles in general, as well as in the schools; this popular opinion, has in turn, added to existing concerns about juvenile crime which has served to justify the crackdown on juvenile privacy because of the need to protect the general public and juveniles from one another. In addition, beyond the need to protect students from danger, school officials maintain that they need this added surveillance and control to keep the school environment conducive to learning (Scott, 1995). The “four main fronts” for adolescent privacy compare in some approximate ways to those covered by adult privacy considerations as well. An analysis of these various dimensions of privacy and how they apply to high school students today is provided below.

 

Privacy and High School Students Today. High school is a unique place in society; adolescents are at a crossroads in their physical, emotional and sexual development, and virtually all high school students are in a hurry to grow up and join the adult world, perhaps in not all of its responsible roles, but at least as far as the fun things go. In this rush to join up with the adult ranks though, high school students frequently exercise the same type of poor judgment that plagues all of mankind, but which is amplified in the young. This is why juvenile offenders are treated so differently in most cases than their adult counterparts in criminal cases (although the line between adults and juveniles is becoming increasingly blurred); however, this uniqueness of situation also translates into some grey areas when it comes to how much and when the same types of privacy protections that are guaranteed to all American citizens (high school students are citizens, aren’t they?). According to Black’s Law Dictionary (1990), “All persons born or naturalized in the United States, and subject to the jurisdiction thereof, are citizens of the United States and of the state wherein they reside” (p. 244). By virtue of the Fourteenth Amendment, then, the Bill of Rights would naturally apply even to high school students — but it does not in its entirety, and in the cases where it is applied, high school students continue to occupy some type of “quasi-citizenship” status that remains better described in the literature than it is defined. According to Rodney A. Smolla (1999):

 

Under the rubric of substantive due process, U.S. constitutional law shelters certain aspects of privacy and autonomy from governmental interference. In the 20th century, the doctrine was once often invoked to strike down government legislation that interfered with property rights and entrepreneurial liberty, treating the Due Process Clause as the embodiment of laissez-faire economic theory. Justice Oliver Wendell Holmes and others rebelled from this constitutionalization of laissez-faire economics. This rebellion would ultimately prevail during the New Deal when the Supreme Court repudiated the invocation of substantive due process principles as a legitimate vehicle for overturning economic regulation. However, substantive due process theory has had considerably more staying power regarding the regulation of non-economic aspects of life and has been the principal doctrinal device for the protection of individual privacy. (1999, p. 113).

 

As a result, substantive due process principles may thus be invoked to challenge infringements of certain fundamental fights on the theory that such rights are protected against most forms of governmental interference by the direct force of the Due Process Clause (Smolla, 1999). The aforementioned need to ensure the safety of students in a day and age characterized by an increased incidence of violence and school shooting, drug dealing in the hallways and electronic monitors at the school doors, though, has meant that high school students are somehow stripped of their Constitutional rights when they step onto school property. Their basic rights to free speech, to assemble and discuss, to pray, to bad-mouth the principal and other school officials and to generally engage in the same types of behaviors seen in any adult political convention are somehow magically whisked away, not to be seen again until 3:00 P.M. And they leave school property, or they reach the age of majority, whichever comes first. According to Kaminer (1999), “The landmark 1969 Supreme Court decision Tinker v. Des Moines Independent Community School District upholding the right to wear a black armband to school to protest the Vietnam War has not been overruled, but its assertion that students do not leave their First Amendment rights at the schoolhouse door has not been honored either” (p. 11). Given this dichotomy of treatment, there must be some highly compelling reasons beyond the need for student safety to continue to regulate student newspapers or to promulgate overly officious dress codes, for example. Some authorities, in fact, point to several such reasons for continuing to treat high school students differently than their adult counterparts when it comes to privacy issues.

 

From a privacy intrusion perspective, for example, high school students are at an inordinate risk for sexual harassment. In 1992, Strauss and Espeland studied sexual harassment in high schools in Minnesota and observed that “many students say that sexual harassment is the norm in their schools. There have been numerous reports of sexual assaults and rapes on school grounds and in school buildings. In an environment that condones sexual harassment, everyone is a victim, not just those who are direct targets of the harassment. All students come to see school as an unsafe place, hostile and intimidating. They may alter their own behaviors in an attempt to decrease their sense of vulnerability” (p. 7). This point is also made by Susan Fineran and Larry Bennett (1998) in their essay, “Teenage Peer Sexual Harassment: Implications for Social Work Practice in Education.” There, the authors report that peer-on-peer sexual harassment is a problem for both girls and boys in American’s high schools, and the effects from this experience can have adverse effects on students’ lives into their adulthood. “Many students report school performance difficulties as a result of sexual harassment,” the authors add, “including absenteeism, decreased quality of schoolwork, skipping or dropping classes, lower grades, loss of friends, tardiness, and truancy” (p. 55). These symptoms can result in ineligibility for specific colleges or merit scholarships and loss of recommendations for awards, colleges, or jobs; further, all of these factors can result in fewer career choices and decreased or lost economic opportunities and possible job failure that can affect a student for the rest of her or his life (Fineran & Bennett, 1998). The very nature of the high school experience is part of this problem. As noted above, high schools in the United States occupy a unique niche that creates a legal limbo of sorts for students; nevertheless, most students find their high school experience crucial to their personal development and readiness to become part of the adult world. “Peer sexual harassment interferes with and inhibits this important developmental process,” the authors note. From a social worker perspective, “Social workers who are able to clearly identify the problems associated with peer sexual harassment strengthen their positions as advocates for improved school environments, and perception of the problems allows them to define hostile school environments as a serious social problem with negative mental health and legal ramifications” (p. 56). In the past, incidents of sexual harassment were generally regarded as being just “teasing” or “good-natured fun”; however, this “typical adolescent behavior” needs to be reassessed today as being what it actually is: “behavior that hurts both boys and girls in the educational setting and continues the discrimination of women in society at large” (Fineran & Bennett, 1998, p. 56).

 

According to a study by Kay Deaux, Carren Loredo, and Anne Reid (1995), there has been much attention directed to sexual harassment in the workplace and college campuses; however, sexual harassment is certainly not restricted to these settings. “One of the least studied environments, and one often not recognized as a locale for sexual harassment,” the authors report, “is the high school. Students in high schools are often excluded from studies of sexual harassment, possibly because they are assumed to have limited exposure to such behavior” (p. 29). The results of a nationwide survey of students in grades eight through eleven, though, determined that the majority of students (85% of girls and 76% of boys) have experienced some type of unwelcome behavior of a sexual nature at school. The typical experiences have included being the target of sexual comments or looks (reported by 76% of girls and 56% of boys) and being touched, grabbed or pinched in a sexual way (reported by 65% of girls and 42% of boys).

 

Based on their experiences with such encounters, many of the students in this study reported that they did not want to go to school or talk in class, that they found it hard to pay attention, and that they had even considered changing schools (Deaux et al., 1995). These findings on the frequent occurrence of sexual harassment need to be considered from the unique perspective of the high school and its place in society: “First, high school students have less personal mobility than other targets of sexual harassment. “Teenagers, in general, do not have the sole voice in deciding whether or not to attend high school. Furthermore, they are often not free to choose the high school that they attend” (Deaux et al., 1995, p. 30). What types of behavior constituted harassment was a matter of some disagreement among the respondents; for some students, sexual harassment was restricted to a quid pro quo exchange; for one student, physical force was also a criterion.

 

Still another student said, “This situation is not really that harassing because he is not forcing, or threatening, or imposing his position on her.” From this perspective, jokes, even if they are sexual or scatological in nature, are still regarded as being casual or playful rather than constituting harassing behaviors. Statements reflecting this position include “Joking around among friends is generally okay as [long] as it’s done in an innocent way;” and “I don’t think it’s very serious; it’s just part of our culture today, and it’s not meant personally” (Deaux et al., 1995, p. 31). Other students in this study indicated that any type of behavior that treats a person as a sexual object can be considered harassing; included in this definition were jokes, as well as comments on a person’s body, the display of degrading pictures, and personal questions about one’s sexual activities (Deaux et al., 1995).

 

This position can be found in student statements such as “Directly commenting on one’s body is outright harassment” and “he is degrading her by making her a sexual object”; any repetition of the behavior was also considered important by some students. Deaux and her colleagues found that if the behavior happened occurred once, students were willing to excuse it; however, future recurrence constituted harassing behavior. Thus, the authors concluded that “one comment is not sexual harassment, but if it continues and Bill tells Lorna to stop, it is” (1995, p. 31). In addition, a number of the students in this study used the target’s reaction to the behavior as the “acid test” for making evaluations as to the extent of harassment. According to the authors, harassment was said to occur if the target was put in an uncomfortable situation, if he or she was embarrassed, felt ashamed, or was subject to an invasion of privacy; some examples of this criterion include the following statements:

 

“It is sexual harassment if it imposes or embarrassed her. However, if this inquiry doesn’t embarrass her, then it is not sexual harassment.”

 

Also, “he’s making her feel unsure of herself. He is being very intimidating.”

 

More broadly, echoing the legal standard of a “hostile work environment,” one student judged an incident to be harassing because the teacher was “making the classroom an uncomfortable environment for the student.”

 

Even without the emotional expression, some students believe that harassment occurs whenever a person does not wish to be subjected to some behavior. For example, ‘This is harassment because Alice says she does not want to hear the joke'” (Deaux, Loredo & Reid, 1995, p. 31).

 

These authors emphasize that it is clear that sexual harassment is a serious problem in the high schools, as it is in other organizations in the society. Young women, in particular, are at risk of harassment from both teachers and fellow students; young men may experience a lower incidence of such behaviors, but the perception of the seriousness of the transgression is just as great: “Not included in the present study, but of obvious importance, is the interpretation and incidence of same-sex harassment, directed toward both women and men. Sexual harassment respects no boundaries of age or gender” (Deaux, Loredo & Reid, 1995, p. 32). Although the level of awareness of sexual harassment has improved significant from just a few years ago, the results of the Deaux et al. study suggest that a substantial amount of work remains to be done in educating people about the conditions of harassment, particularly in terms of the line between attraction and harassment among high school peers. High school appears to represent an excellent place to begin this process: “The priority of interpersonal concerns among people of high school age make the high school an especially important setting for exploring this demarcation line” (emphasis added) (Deaux, Loredo & Reid, 1995, p. 32). Legal authorities, though, may not demarcate the line at all as a result of Megan’s law; today, pedophiles are sometimes classified the same as high school students who have been convicted of statutory rape by having sex with their underage girlfriends or boyfriends (Solove, 2003).

 

Therefore, high school students are in a fairly nebulous class of citizens; by virtue of their juvenile status, public officials are precluded from publishing any information about them; on the other hand, also due to their lack of majority, high school students do not enjoy many of the same Fourth Amendment guarantees to privacy as their adult counterparts. According to Samantha Elizabeth Shutler’s essay, “Random, Suspicionless Drug Testing of High School Athletes” (1996), in the case Vernonia School Dist. 47J v. Acton, the United States Supreme Court decided whether a school district could impose random and suspicionless urinalysis drug testing on high school student athletes. In this case, the Court found that such testing did not violate students’ Fourth Amendment rights and was therefore constitutional. “In so deciding,” Shutler says, “the Court vastly expanded the permissible realm of drug testing contexts beyond the limits defined in two earlier decisions, Skinner v. National Railway Labor Executives Ass’n and National Treasury Employees Union v. Von Raab. In those cases, the Court previously stated that the government could only transcend the Fourth Amendment requirement of individualized suspicion where it had a compelling interest at stake, namely a threat to public safety or national security.

 

The Vernonia Court argued that, because high school athletes have decreased expectations of privacy by virtue of their participation in extracurricular athletics, the suspicionless drug testing was constitutionally justified. Shutler maintains that the Supreme Court overstepped the boundaries of the Fourth Amendment in two fundamental ways in deciding Vernonia:

 

1.

 

By finding the interest of the Vernonia District in promulgating the drug testing to be “compelling” given the paucity of the evidence of athletes using drugs; and,

 

2.

 

By holding that student athletes have diminished privacy expectations solely due to the structure and requirements of the athletic program.

 

The author concludes that the Supreme Court arrived at this decision based on policy considerations (specifically the eradication of drug use among America’s children); however, although this reason is a well-intentioned one, it does not justify the consequence of eroding constitutional privacy rights of high school students (Shutler, 1996). In her essay, “Public School Drug Testing: The Impact of Acton,” Irene Merker Rosenberg (1996), writes that “When the rights of children in the public schools) and the safeguards of the Fourth Amendment intersect in a case before the United States Supreme Court, it is no surprise that both lose. So it was that in Vernonia School District v. Acton, the Court reversed a Ninth Circuit ruling and upheld a public school district’s policy authorizing random urinalysis drug testing of grade school and high school students who voluntarily participated in interscholastic athletic programs” (p. 349). Writing for the six-person majority, Justice Scalia continued the Court’s previous expansion of administrative searches that do not require individualized suspicion because the purpose of the search was to achieve an objective other than enforcement of the penal laws.

 

Rosenberg notes that at the same time, the Court narrowed the Fourth Amendment privacy rights of students and their parents by building on its finding in New Jersey v. T.L.O. As well as other cases that dealt with the rights of students in the nation’s public schools. According to Rosenberg, “While T.L.O. dispensed with the need for either a warrant or probable cause in searching students for evidence of wrongdoing, Acton went farther, eliminating even the need for the individualized suspicion that was present in the T.L.O. case” (p. 350). While Justice Ginsburg concurred in the decision on the understanding that the holding was restricted to students who voluntarily participate in interscholastic athletics, a careful review of the majority opinion suggests otherwise (Rosenberg, 1996).

 

According to this author, if the ruling is not so restrictive, millions of high school students may be forced to urinate into test tubes while being monitored, conditions that Justice Scalia characterized as being “typically encountered in public restrooms” (p. 350). In Justice O’Connor’s dissenting opinion, joined by Justices Stevens and Souter, there was criticism for majority for failing to adhere to either history or precedent. Justice O’Connor maintained that, for the first time, the Court allowed a random search of innocent persons even though a suspicion-based program would have been feasible. Rosenberg points out that, “Justice Scalia’s majority opinion is susceptible of varying interpretations. On the one hand, even if it is not as limited as Justice Ginsburg suggested — that is, to interscholastic athletes and no others — the ruling may at least be confined to public school students” (p. 350). From this perspective, the result in Acton was that the tests in question were being performed on school children rather than adults; given that, Acton would be following an established judicial trend of using the selective invocation of the unique status of childhood only as a basis for diminution of constitutional protection and never for its enhancement. This perspective of Acton is based on the Court’s past narrow interpretation of the privacy rights of students in general (Rosenberg, 1996). In administrative search cases, though, the standard is one of reasonableness, and, in arriving at that determination, the Justices used a multi-factor balancing test, only one element of which is the individual privacy interest. According to Rosenberg, the Acton court’s analysis of the intrusion on that interest and its assessment of the government interest were reliant only in part on considerations that were specifically related to children. By engaging in a reasonableness inquiry, the issue was completely separated from the warrant and probable cause requirements of the Fourth Amendment; therefore, the dissenting Justices suggested that the majority manipulated the constituent factors in the balancing test, thereby relaxing the government’s burden of establishing appropriate ends and means and minimizing not just the individual privacy right but also the intrusion on it; this analysis could potentially have implications in the future for adults as well as children. Rosenberg concludes that, “Because the entire balancing test for reasonableness is fluid and highly subjective, and because only one of the balancing factors in Acton relates exclusively to children, it is not possible to write the decision off as merely another case limiting the constitutional rights of minors. Read this way, Acton is a far more ominous development in Fourth Amendment jurisprudence” (p. 351). Besides the surveillance crackdown to control violent crime, high schools are increasingly implementing stricter controls designed to deal with discipline and drug problems; these policies have, in turn, resulted in the other erosions of student privacy (Scott, 1995).

 

For example, most of the students in a study group analyzed by Albanes, Armitay, Fisher and Warner (1998) reported that they tend to be more circumspect in where and when they use marijuana than they are when using alcohol, and that this caution, in turn, tended to reduce the odds of their coming into contact with the police as a result of their criminal behavior. “This was especially true of female participants,” they say, “who reported that they tend to use marijuana in settings that offer privacy and, with it, a certain degree of security from exposure and possible arrest” (p. 404). High school students, too, are in another type of legal limbo between federal and state laws concerning invasion of relevant privacy protections. According to Deckle Mclean, in the case, Stern v. New Haven Community Schools, the court held that the privacy interests of a high school student who had been observed by a school employee buying marijuana in a restroom were derived from state tort law, not the federal Constitution.

 

Current and Future Trends. Today, people absolutely need reliable and timely information in order to make judgments about others, and these judgments are important for how people will live their lives and whom they trust; however, in many cases, people’s judgments are inaccurate and people are frequently judged inappropriately based on erroneous information. According to Daniel J. Solove:

 

The manner in which the law regulates the disclosure of personal information is of profound importance. Privacy, in the form of protection against disclosure, regulates the way people relate to others in society. Among other things, it promotes one’s ability to engage in social affairs, form friendships and human relationships, communicate with others, and associate with groups of people sharing similar values. Social judgment and social norms can impede these practices. (2003, p. 968).

 

These considerations are assuming new levels of importance among young people today as they seek alternative social relationships in various computer-mediated online forums. Personal considerations of privacy today may well relate to the ability to “be online” with others in an externally driven environment while protected from the potential implications of such interactions by virtue of their seclusion at home or elsewhere, interacting with others solely through an online medium.

 

The term “Internet addiction” describes the compulsive need to log on to the Internet in an effort to ward off loneliness or complex feelings and emotions. “Sufferers often become moody or restless when unable to log online. People who grow greatly dependent on the Internet, who increase online usage and suffer from mental and physical pain when deprived of Internet use, can be categorized as Internet addicts” (Alarming Number of Teens Addicted to the Internet, 2001, p. 3). A survey of students in 2001 found that a total of 44.2% of male students exhibited early stages of online addiction, while 4.4% were in critical stages; by contrast, female students were relatively less addicted, but 31.6% were still found to be somewhat addicted and one percent were shown to have serious levels of Internet addiction (Alarming Number of Teens Addicted to the Internet, 2001). Those students who played online games exhibited the highest levels of compulsive Internet use with 51.8%, while 43.4% of those who pursued personal relationships through the Internet were found to be addicted. The study showed that the average time that students logged onto the Internet was 2 hours and 26 minutes; however, more than half of the students (55.1%) spent one to three hours online, while 25.1% spent three to five hours. “Students who used the Internet for at least five hours totaled 10.8%, and only nine percent hooked up for less than an hour” (Alarming Number of Teens Addicted to the Internet, 2001, p. 3).

 

Given the growing number of Internet users in the United States since that time and the proliferation of teen-based forums online, it is reasonable to assume that these trends have continued today. To prevent Internet addiction, some experts suggest establishing a set amount of computer usage that is allowed, as well as make efforts to log online after finishing other pressing tasks. In addition, “Erasing unnecessary game files on the computer and also trying to expand your scope of relationships in real life, rather than in cyber space, can be other ways to effectively control compulsive Internet use” (Alarming Number of Teens Addicted to the Internet, 2001, p. 3). In academic settings, though, Internet skills will provide students with an improved ability to master the subject matter. In a study by Wasylik (2003), a high school science teacher, it was reported that using different types of technology enabled the educator to reach his literacy objectives much more easily. According to Wasylik, “I used to teach this information in a very traditional manner — lecture and tests — and had great difficulty reaching my curriculum goals because I teach nonhonors and challenged students. When I captured the students’ interest with cable TV, technology, and Internet applications, I surpassed my objectives, and the students retained the information long after the project was over — a key factor in science literacy” (p. 10). Clearly, while increasing social transparency and the ability to take advantage of the technologies that support it can play a significant role in facilitating a free society, so too can privacy.

 

People must feel that they have a right to privacy that is enforceable in order to be secure in their thoughts and beliefs; furthermore, the right to privacy appears to be right up there with other natural laws such as the right to protect oneself and one’s property. Solove suggests that the benefits of privacy transcend these private considerations though: “In fact, privacy can improve people’s judgments about others,” he says, “or at least prevent certain flaws in the judging process. Privacy can prevent harms to individuals, as well as provide people with freedom for self-exploration and room to change, grow, and rehabilitate themselves. Too much information, as with too much of almost anything, can be more detrimental than beneficial” (emphasis added) (p. 968). Privacy policies as they are typically applied in virtually every other setting can also have some unintended negative consequences at the high school level that may be challenged in the future.

 

For example, one of the rules of the National Association of Secondary School Principals’ Contest and Activity Committee prevents student organizations from collecting student names and addresses to avoid intrusions into their privacy now and in the future. This rule was introduced in an effort to prevent organizations from selling their lists to vendors and political parties; however, the rule also makes the creation of a support group for educational programs next-to-impossible. According to Fine, “Ironically, such a rule has the unintended consequence of preventing additional financial support for education. With appropriate limits on the privacy of information, such a rule should be overturned” (p. 239). Fine makes the point that this rule prevents various organizational support groups from following up on high school students — at least those who have demonstrated exceptional abilities — after they have graduated to provide professional support to those who deserve or need such assistance.

 

Another, and potentially even more disturbing trend, is the use of military recruiters in the nation’s high schools in support of a costly war on terrorism that has made recruiting extremely difficult for all of the armed services, as well as the manner in which these recruiters are prosecuting their cases on the nation’s high school campuses. According to Katha Pollitt’s report, “Can You Spell Cannon Fodder?,” the No Child Left Behind legislation has funded some potentially harmful practices that are highly invasive not only to student privacy but to their parents as well. For example, Pollitt points out that the New York City public school system did not have enough money, time or organizational skills in 2002 to ensure that every student has a dictionary, or even a desk; however, in Fall 2002, “it found something like $50,000 to send the parents or guardians of all 250,000 high school students a letter informing them that if they didn’t want their child’s name, address and phone number to be given to military recruiters they had to fill out a form (enclosed) stating they did not consent to the release of the data” (p. 9). Because of the manner in which the recruiting opt-out materials were framed, many parents may not have noticed the requirement to return the right form in time to avoid having their child called upon — without their permission otherwise — by a military recruiter. Pollitt says, “I’m sure I’m not the only parent who misplaced the letter before it was even opened, and almost missed the final deadline for sending in the form. Had it not turned up at the last minute, the military would have my 15-year-old daughter’s contact information and GI Joe and Jane could be interrupting dinner nightly to urge her to be all that she can be — Sergeant Sophie!” (2002, p. 9).

 

One of the provisions of the No Child Left Behind Act was that military recruiters were added to a provision that requires schools to provide students’ contact information to “institutions of higher learning”; Pollitt notes that this provisions is entirely unnecessary since high school students can already elect to do this when they take the SAT or the ACT. Nevertheless, when combined with the Solomon Amendment (which denies funding to colleges that ban military recruiters), the provision provides armed forces recruiters with virtually unlimited access to the nation’s high school student population. “Why the stepped-up effort?,” the author asks. “You might not know it from the constant barrage of patriotic propaganda and a few highly visible post-9/11 enlistments — Doris Kearns Goodwin proudly announced on the Jim Lehrer NewsHour that her son had joined up — but interest in the military is quite low: Kids would rather get jobs, if they can find them, or go to college” (p. 9). Today, the situation has become even worse, with many recruiters being unable to complete their mission box requirements for suitable graduate candidates. Certainly, there is nothing new about military recruiters on the nation’s high school and college campuses; however, today, because of the combination of unrestricted access and a growing recruitment need, there are bound to be abuses and it is not a matter of if but when. According to Pollitt:

 

Of course, military recruiters have long been active around high schools. But it’s one thing for them to make their pitch to kids who stop at a booth or a table, and quite another for the schools to deliver to the military the names, home addresses and phone numbers of a huge captive pool of teenagers. Even hawkish conservatives — the ones like William Safire who worry about the amassing of personal data by government, credit card companies, Internet merchants and so on — should be able to spot the invasion of privacy here. (2002, p. 9)

 

The current opt-out model of consent requires parents to take action to keep their children out of an activity; Pollitt notes that this approach is useful for the recruiters because many (most, in fact), do not return them. The military recruiters are not going to try to change things either. Having received such a communication herself, Pollitt says there is nothing about the envelope that indicated anything required action or returning, with no sense of a deadline or urgency being communicated either. The author describes it thusly: “Nothing about this envelope marked its contents as urgent or requiring a response (the letter about military recruitment was wadded in with the discipline code and the principal’s list of rules intended to improve ‘school tone’ — no headphones during class, no cell phones ever). Some parents are too busy, or are uninvolved in their kids’ school lives. Many don’t speak English. Some can’t even read” (p. 9). In response, Donna Lieberman, the executive director of the New York Civil Liberties Union, called for New York City schools to adopt an opt-in policy on military recruitment:

 

People should have the right to control their contact information, which may even include unlisted phone numbers. Sure, they can hang up, but it’s still an invasion of privacy, and potentially more than that. We’ve had reports of Muslim and Southwest Asian immigrants afraid to report crimes and fires for fear of being detained by the INS. Do we want to make them afraid to send their kids to school too? In any case, why should the schools bend over backward to sacrifice students’ privacy in order to help the military meet its recruiting goals? (emphasis added) (Pollitt, 2002, p. 9)

 

Today, military service is frequently being promoted, particularly among low-income and otherwise marginalized youths, as a viable path to good jobs and a college education. High school students are not blind to world events, though, and most recognize that the war on terrorism is taking its toll on enlistees and many may not feel as strongly about Islamic insurgents in Tikrit as their adult counterparts in Washington, D.C. Even before the death toll topped 1,500, this author suggested that the impact of the No Child Left Behind Act and its provisions for military recruitment would have profound consequences for the nation’s high school students, a dire prediction that has been borne out by the facts. “As the Bush Administration hustles the nation toward the next one, the schools should be teaching young people to be skeptical about hard-sell recruiting tactics that paint military service as Outward Bound in uniform, not serving their charges up on a plate. Otherwise, we might as well call the No Child Left Behind Act the No Child Left Out of the Military Database Act” (p. 9). When people are confronted with such invasions to their privacy, their responses will likely be varied, and may assume voice, private and third-party responses (Hoy & Sheenan, 1999). According to these authors, people voice concern with their privacy when they ask the entity to remove their name and address from a mailing list. Studies have shown that 46% of those respondents concerned about threats to personal privacy had previously requested removal from a mailing list, compared to just 31% among the unconcerned responses, a finding that suggests increased privacy concerns were the motivating factor for this action. Although a growing number of opt-out services are being provided, including so-called “do not call” lists, and Hoy and Sheehan report that there has been a gradual rise in the number of individuals who belong to these lists, they still represent a low percentage of the total population in the United States (less than 2-3%). More and more people — including high school students — are responding to invasions of their online privacy in this manner as well (Hoy & Sheehan, 1999).

 

According to Hoy and Sheehan, “Online users adopt similar voice responses when they directly contact online entities that have sent them unsolicited e-mail. A recent study showed that 19% of online users contact mailers to request that they not receive additional mail. A small percentage (5%) retaliate with something like a mail bomb (a large file of data designed to crash a user’s system or network) to mailers” (Hoy & Sheehan, 1999, p. 37). In other instances, online users have ganged up to voice their dissatisfaction to companies concerning privacy issues. This has been the case with the online concern about P-Trak, an online database of information that is published and maintained by Lexis-Nexis, and with an e-mail spam of immigration law practice (Bolt, 1997). The authors report that consumers in both the P-Trak and the e-mail spam situations took private actions to voice their concerns about invasions of their privacy. “In both these situations,” Hoy and Sheehan say, “online users communicated with each other via newsgroups and e-mail (a private action) to discuss the situation, and then bombarded the offending companies with e-mail and other communications (a voice action)” (p. 37). Other groups concerning about privacy issues discussed using a boycott of Intel because of that company’s decision to embed personal identification numbers in new chips, a process that would allow identification of individual level information during Internet activities (CNN, 1999). Although Intel maintained that the identification numbers would increase security in online transactions, they finally agreed to alter the chips so online users would have to “turn on” the identification feature themselves before they would become operational (CNN 1999).

 

According to Liza Featherstone’s report, “Hot-Wiring High School: Student Activists across the Country Experiment with Organizing by Internet” (1999), high school student groups have increasingly turned to the Internet to help them in this regard. When Galen Price, then a freshman at Mount Tabor High in Winston- Salem, North Carolina, was confronted with a potential new drug testing policy for high school students, he learned a lesson that was not included in his high school’s civics curriculum: “If you’re 15, the Constitution may not apply to you” (p. 15). The Winston-Salem School Board had been contemplating requiring all high school students to take drug tests if they wanted to participate in extracurricular activities. This student’s reaction was not uncommon, but it was clearly more informed than most:

 

What about the Fourth Amendment? Price wondered. Don’t random pee tests figure under the rubric ‘unreasonable searches and seizures’? But there wasn’t much Price could do as a lone objector. ‘People would say, “Do you do drugs? If not, why do you care?” he recalls. I don’t do drugs and I don’t plan to. That’s not what this is about.’ (Featherstone, 1999, p. 15)

 

In response, Price wrote a letter to the American Civil Liberties Union, and the ACLU put him in touch with Ben Smilowitz, another high school student from West Hartford, Connecticut. At the time, Smilowitz headed the International Student Activism Alliance (ISAA), an increasingly popular student organization that is using the Internet, among other tools, to develop a national political network of teenagers, many of whom are situated in highly isolated schools and environments. According to Featherstone, the International Student Activism Alliance is operated by and for high school students; since its founding in 1996, the organization has grown to include 160 chapters (with at least one in nearly every state) and has around 1,200 members. While the majority of the problems the group addresses, such as school administrations that do not allow gay student clubs, lack of federal college loans, censorship and repression in schools, are domestic, the group refers to itself as “International” because, as Brattleboro, Vermont, state coordinator Abby Krasner noted, “the [power] issues [involved] are international” (Featherstone, 1999, p. 15).

 

Price and Smilowitz collaborated on this issue by researching relevant case law; the drug-test requirement passed their analysis, but the group was just getting started in their organizational efforts. Price subsequently founded another chapter of the ISAA and had it formalized as an official school club. According to Featherstone, “When he moved to West Forsyth High School in the same district, he started a chapter there as well. Although the clubs have so far been unable to stop drug testing in Winston-Salem, Price is currently looking for plaintiffs for a court challenge, and his efforts have provided the basis for anti-drug testing campaigns elsewhere” (1999, p. 15). The group is having some effect as well. For example, in New Jersey, the State Board of Education was considering a nearly identical law and the Edison, New Jersey, ISAA chapter began is efforts at a national lobbying and public education campaign on the constitutionality of random drug testing. The group, and others like it, will continue to have their hands full in the future. In a report from Wendy Kaminer (1999), the point is made that America’s public schools becoming “militarized” at the expense of student civil liberties and privacy. Across the nation, Kaminer notes that the ACLU has received hundreds of complaints about cases such as these:

 

In Ohio a third-grader was suspended after writing a fortune cookie message, “You will die an honorable death,” which he submitted for a school project. (A terroristic threat? Or an innocent, well-intentioned remark by a child who watches martial-arts videos

 

Eleven high school students in Ohio were suspended for contributing to a gothic-themed Web site.

 

In Virginia a 10th-grader was suspended for dying his hair blue.

 

In Missouri, high school junior Dustin Mitchell was suspended and required to perform 42 days of community service with the local police department for offering a flippant opinion on school violence in an Internet chat room (when asked if a tragedy like the Littleton shootings could happen in his school, Mitchell responded “yes”).

 

In Louisiana a 12-year-old boy was suspended and held in juvenile detention for over two weeks after uttering a “threat” in a lunch line: “If you take all the potatoes, I’m gonna get you,” the accused terrorist said (Kaminer, 1999, p. 11).

 

When students attempted to defend their rights to free speech and voiced protests to these invasions of their privacy and violations of their civil liberties, their were routinely meted out severe punishment. For example, in Texas, 17-year-old high school student Jennifer Boccia was suspended for wearing a black armband to school in protest of the restraints on free speech that followed the shootings in Littleton, Colorado; Boccia was also reprimanded by her school principal, Ira Sparks, for telling her story to the media. The principal advised this high school student that if she wanted to clear her record, she would have to refrain from speaking to the media before discussing her remarks with school officials. In response, Boccia took her case to federal court and won a settlement from her school that confirmed her First Amendment rights. According to Kaminer, “Sometimes schools back down when threatened with lawsuits, and many students willing to challenge their suspensions should ultimately prevail in court if their judges recognize the Bill of Rights. But repression is becoming respectable, and some federal judges are as wary of free speech as school administrators are” (p. 11). Much like the constraints on American civil liberties in general that followed by terrorist attacks of September 11, 2001, student rights have also been diminished for the past several years.

 

Here again the strange-but-true quality of America’s high schools comes into play. It would seem that school authorities, law enforcement officials and the judiciary alike can play fast and free with the Constitution when it is applied to high school students with no further basis for such lassitude than the fact that these American citizens have not yet reached their majority, and are not attending private schools or being home schooled. Kaminer makes the point that, “Students’ press rights have been severely restricted, as has their right to express themselves sartorially. Unhampered by logic, judges have ruled that clothing choices are not expressive (and so are not protected by the First Amendment), but they’ve given schools the power to prohibit clothing when it conveys what administrators consider inappropriate messages” (p. 11). Citing as a good example the Utah case where a federal district court judge upheld the suspension of a high school student who wore a pro-vegan T-shirt to school and started a petition protesting a ban on vegan symbols, Kaminer notes that the school officials associated veganism with the militant branch of the animal rights movement and characterized the T-shirt as being a “gang symbol” (the author adds that in Alabama and Mississippi, the Star of David has also been banned as a gang symbol). The author states in no uncertain terms that such policies are simply capricious and arbitrary: “Schools need to run, and administrators need to make rules,” the judge in the vegan T-shirt case explained idiotically. “That’s the only reason they exist” (p. 11). What is even more disturbing though, are the cases where school authorities takes this totalitarian approach in students’ off-campus and home-based activities. Not only do high school students in particular appear to forfeit some fundamental constitutional rights when stepping over the schoolhouse doors, they are not able to get them back one they leave. According to Kaminer:

 

School administrators take an expansive, totalitarian view of their own jurisdiction. They’re punishing students for after-school and out-of-school activities or remarks. Numerous suspensions of students for the things they say in Internet chat rooms and other instances of cyberspeech exemplify this disturbing trend, but administrators have also targeted more traditional forms of childhood play. In a recent Massachusetts case, two-12-year-old boys were suspended for playing war with toy guns in the woods adjacent to their school after school hours. (Never mind that at the time the U.S. military was bombing Yugoslavia.) (Kaminer, 1999, p. 11)

 

This is truly a frightening trend, but the fact remains this is where America is heading today. Recent attempts by the current Bush administration to manipulate public opinion on the No Child Left Behind mandates through a paid television endorsement are just a tip of the right-wing iceberg, and even a casual glance at the headlines suggests that something is fundamentally wrong with a country that can invoke national interest at the expense of the Constitution when it is convenient to do so; certainly, such invocations are not new. Lincoln suspended habeas corpus during the Civil War, and Roosevelt interred tens of thousands of Japanese-Americans during World War II. Today, though, things have assumed a chilling quality in America’s high schools as a result of these trends. Kaminer makes a final point that these trends are highly ironic in view of what is taking place in high schools in the United States today:

 

While students are being suspended for playing with toy guns, police officers armed with real guns are being deployed in some schools in order to provide security — or the appearance of it. In Houston, officers wearing bulletproof vests, trained in assault tactics, and equipped with dogs as well as guns, are patrolling middle schools, high schools, and school neighborhoods. Students in the Houston schools will soon be subject to random, bimonthly searches for drugs and weapons. It’s Giuliani time in many public schools. In Georgia, an entire class of fifth-graders was strip-searched by school officials and police officers looking for a missing $26 (1999, p. 11).

 

In a “tail wagging the dog” fashion, the war on terrorism is being used to justify a wide range of constraints on civil liberties that most Americans have simply taken for granted over the years. Many high school students, though, cannot remember enjoying a period in American history that has not been characterized by increasing intrusion into their private lives based on one rationale or another. Unfortunately, it would appear that things are going to get worse before they get better.

 

Conclusion

 

The research showed that high school students occupy a unique niche in society. Not quite adults and not quite children, high school students are increasingly being subjected to inordinate invasions of their rights to privacy in their schools. These invasions have assumed the form of random locker searches, random urinalyses, surveillance cameras, metal detectors and more. If these same techniques were applied to any but the most sensitive of employment position in the private or governmental sectors, adults would likely balk at continuing their employment; however, also by virtue of their lack of majority, high school students are forced to stay in school until an age certain, and in many cases to remain in a specific school no matter what. Taken together, the trends are alarming enough; however, when they are combined with the new access granted to military recruiters to the nation’s high schools, the trends assume even more troubling aspects for high school students and their parents alike. High school students in America have always been in the position they are in today, caught between the world of childhood and becoming an adult, and are increasingly being subjected to the regulations that affect both. While the courts have largely defending these invasive initiatives to date, civil liberties, even for high school students, are a cherished part of the nation’s legacy and notwithstanding the PATRIOT Act and No Child Left Behind, American citizens will not stand still for long if they believe their privacy, and their children’s privacy in particular, is being trampled on in the name of a transient political goal.

 

References

 

Alarming Number of Teens Addicted to the Internet. (2001, February 1). Korea Times, 3.

 

Albanes, R., Armitay, O., Fischer, B., & Warner, J. (1998). Marijuana, Juveniles, and the Police: What High-School Students Believe about Detection and Enforcement.

 

Canadian Journal of Criminology, 40(4), 401-20.

 

Black’s law dictionary. (1990). St. Paul, MN: West Publishing Co.

 

Bolt, Andrew (1997), Blacklist of Internet Advertisers [Internet, WWW], http://www.its.caltech.

 

edu/~cbrown/BL / in Hoy & Sheehan, 1999, p. 37.

 

CNN Interactive (1999), Privacy Groups to Announce Boycott of Intel Products [Internet,

 

WWW], http://www.cnn.com/TECH/computing/990l/25/intel.privacy in Hoy & Sheehan,

 

1999, p. 37.

 

Deaux, K., Loredo, C., & Reid, A. (1995). Judgments and Definitions of Sexual Harassment by High School Students. Sex Roles: A Journal of Research, 32(1-2), 29.

 

Dority, B. (1997, March-April). Big Brother Goes to High School. The Humanist, 57(2), 37.

 

Dworkin, T.M. (1997). It’s My Life – Leave Me Alone: Off-the-Job Employee Associational

 

Privacy Rights. American Business Law Journal, 35(1), 47.

 

Featherstone, L. Hot-Wiring High School: Student Activists across the Country Experiment

 

with Organizing by Internet. The Nation, 268(23), 15.

 

Fine, G.A. (2001). High school debate and adolescent culture. Princeton, NJ: Princeton

 

Fineran, S. & Bennett, L. (1998). Teenage Peer Sexual Harassment: Implications for Social

 

Work Practice in Education. Social Work, 43(1), 55.

 

Hoy, M.G., Sheehan, K.B. (1999). Flaming, Complaining, Abstaining: How Online Users

 

Respond to Privacy Concerns. Journal of Advertising, 28(3), 37.

 

Hagen, S. & Nichols, H.S. (2002, August 12). Will Congress Fund School Drug Tests? Insight

 

on the News, 18(29), 6.

 

Hayden, T., & Novik, J.D. (1990). Your right to privacy: A basic guide to legal rights in an information society. Carbondale, IL: Southern Illinois University Press.

 

Kaminer, W. (1999, December 20). The War on High Schools. The American Prospect, 11(3),

 

11.

 

Kaya, N., & Weber, M.J. (2003). Privacy Regulation and College Adjustment: A Comparison

 

of American and Turkish Freshmen Living in Residence Halls. College Student Journal,

 

37(1), 79.

 

Larkin, R.W. (1979). Suburban youth in cultural crisis. New York: Oxford University Press.

 

Lissit, R. (1999, July). The Privacy Piercers. World and I, 14(7), 98.

 

Mcevoy, S.A. (2002). E-Mail and Internet Monitoring and the Workplace: Do Employees

 

Have a Right to Privacy? Communications and the Law, 24(2), 69.

 

Mclean, D. (2002). Privacy and Section 1983 of the Federal Civil Rights Law.

 

Communications and the Law, 24(1), 77.

 

McWhirter, D.A. (1994). Search, seizure and privacy. Phoenix: Oryx Press.

 

Mick, P., & Sawyer, T.H. (1999). Privacy and Negligence. JOPERD — The Journal of Physical

 

Education, Recreation & Dance, 70(6), 12.

 

Pollitt, K. (2002, November 11). Can You Spell Cannon Fodder? The Nation, 9.

 

Rosen, J. (2001). Out of Context: The Purposes of Privacy. Social Research, 68(1), 209.

 

Rosenberg, I.M. (1996). Public School Drug Testing: The Impact of Acton. American Criminal Law Review, 33(2), 349.

 

Scott, G.G. (1995). Mind your own business: The battle for personal privacy. New York:

 

Insight Books.

 

Shutler, S.E. (1996). Random, Suspicionless Drug Testing of High School Athletes. Journal of Criminal Law and Criminology, 86(4), 1265.

 

Smolla, R.A. (1999). The Constitutionality of Mandatory Public School Community Service

 

Programs. Law and Contemporary Problems, 62(4), 113.

 

Solove, D.J. (2003). The Virtues of Knowing Less: Justifying Privacy Protections against

 

Disclosure. Duke Law Journal, 53(3), 967.

 

Strauss, S., & Espeland, P. (1992). Sexual harassment and teens. Minneapolis: Free Spirit.

 

Thomson, J.J. (2002). The Right to Privacy, in Philosophical dimensions of privacy: An

 

anthology, supra note 2, at 272, 286 in Whitman, 1153.

 

Walker, K. (2001). The Costs of Privacy. Harvard Journal of Law & Public Policy, 25(1), 87.

 

Wayslik, D. (2003, August-September). A CATchy Way to Teach DNA. Reading Today,

 

21(1), 10.

 

Whitman, J.Q. (2004). The Two Western Cultures of Privacy: Dignity vs. Liberty. Yale Law Journal, 113(6), 1151.


Get Professional Assignment Help Cheaply

Buy Custom Essay

Are you busy and do not have time to handle your assignment? Are you scared that your paper will not make the grade? Do you have responsibilities that may hinder you from turning in your assignment on time? Are you tired and can barely handle your assignment? Are your grades inconsistent?

Whichever your reason is, it is valid! You can get professional academic help from our service at affordable rates. We have a team of professional academic writers who can handle all your assignments.

Why Choose Our Academic Writing Service?

  • Plagiarism free papers
  • Timely delivery
  • Any deadline
  • Skilled, Experienced Native English Writers
  • Subject-relevant academic writer
  • Adherence to paper instructions
  • Ability to tackle bulk assignments
  • Reasonable prices
  • 24/7 Customer Support
  • Get superb grades consistently
 

Online Academic Help With Different Subjects

Literature

Students barely have time to read. We got you! Have your literature essay or book review written without having the hassle of reading the book. You can get your literature paper custom-written for you by our literature specialists.

Finance

Do you struggle with finance? No need to torture yourself if finance is not your cup of tea. You can order your finance paper from our academic writing service and get 100% original work from competent finance experts.

Computer science

Computer science is a tough subject. Fortunately, our computer science experts are up to the match. No need to stress and have sleepless nights. Our academic writers will tackle all your computer science assignments and deliver them on time. Let us handle all your python, java, ruby, JavaScript, php , C+ assignments!

Psychology

While psychology may be an interesting subject, you may lack sufficient time to handle your assignments. Don’t despair; by using our academic writing service, you can be assured of perfect grades. Moreover, your grades will be consistent.

Engineering

Engineering is quite a demanding subject. Students face a lot of pressure and barely have enough time to do what they love to do. Our academic writing service got you covered! Our engineering specialists follow the paper instructions and ensure timely delivery of the paper.

Nursing

In the nursing course, you may have difficulties with literature reviews, annotated bibliographies, critical essays, and other assignments. Our nursing assignment writers will offer you professional nursing paper help at low prices.

Sociology

Truth be told, sociology papers can be quite exhausting. Our academic writing service relieves you of fatigue, pressure, and stress. You can relax and have peace of mind as our academic writers handle your sociology assignment.

Business

We take pride in having some of the best business writers in the industry. Our business writers have a lot of experience in the field. They are reliable, and you can be assured of a high-grade paper. They are able to handle business papers of any subject, length, deadline, and difficulty!

Statistics

We boast of having some of the most experienced statistics experts in the industry. Our statistics experts have diverse skills, expertise, and knowledge to handle any kind of assignment. They have access to all kinds of software to get your assignment done.

Law

Writing a law essay may prove to be an insurmountable obstacle, especially when you need to know the peculiarities of the legislative framework. Take advantage of our top-notch law specialists and get superb grades and 100% satisfaction.

What discipline/subjects do you deal in?

We have highlighted some of the most popular subjects we handle above. Those are just a tip of the iceberg. We deal in all academic disciplines since our writers are as diverse. They have been drawn from across all disciplines, and orders are assigned to those writers believed to be the best in the field. In a nutshell, there is no task we cannot handle; all you need to do is place your order with us. As long as your instructions are clear, just trust we shall deliver irrespective of the discipline.

Are your writers competent enough to handle my paper?

Our essay writers are graduates with bachelor's, masters, Ph.D., and doctorate degrees in various subjects. The minimum requirement to be an essay writer with our essay writing service is to have a college degree. All our academic writers have a minimum of two years of academic writing. We have a stringent recruitment process to ensure that we get only the most competent essay writers in the industry. We also ensure that the writers are handsomely compensated for their value. The majority of our writers are native English speakers. As such, the fluency of language and grammar is impeccable.

What if I don’t like the paper?

There is a very low likelihood that you won’t like the paper.

Reasons being:

  • When assigning your order, we match the paper’s discipline with the writer’s field/specialization. Since all our writers are graduates, we match the paper’s subject with the field the writer studied. For instance, if it’s a nursing paper, only a nursing graduate and writer will handle it. Furthermore, all our writers have academic writing experience and top-notch research skills.
  • We have a quality assurance that reviews the paper before it gets to you. As such, we ensure that you get a paper that meets the required standard and will most definitely make the grade.

In the event that you don’t like your paper:

  • The writer will revise the paper up to your pleasing. You have unlimited revisions. You simply need to highlight what specifically you don’t like about the paper, and the writer will make the amendments. The paper will be revised until you are satisfied. Revisions are free of charge
  • We will have a different writer write the paper from scratch.
  • Last resort, if the above does not work, we will refund your money.

Will the professor find out I didn’t write the paper myself?

Not at all. All papers are written from scratch. There is no way your tutor or instructor will realize that you did not write the paper yourself. In fact, we recommend using our assignment help services for consistent results.

What if the paper is plagiarized?

We check all papers for plagiarism before we submit them. We use powerful plagiarism checking software such as SafeAssign, LopesWrite, and Turnitin. We also upload the plagiarism report so that you can review it. We understand that plagiarism is academic suicide. We would not take the risk of submitting plagiarized work and jeopardize your academic journey. Furthermore, we do not sell or use prewritten papers, and each paper is written from scratch.

When will I get my paper?

You determine when you get the paper by setting the deadline when placing the order. All papers are delivered within the deadline. We are well aware that we operate in a time-sensitive industry. As such, we have laid out strategies to ensure that the client receives the paper on time and they never miss the deadline. We understand that papers that are submitted late have some points deducted. We do not want you to miss any points due to late submission. We work on beating deadlines by huge margins in order to ensure that you have ample time to review the paper before you submit it.

Will anyone find out that I used your services?

We have a privacy and confidentiality policy that guides our work. We NEVER share any customer information with third parties. Noone will ever know that you used our assignment help services. It’s only between you and us. We are bound by our policies to protect the customer’s identity and information. All your information, such as your names, phone number, email, order information, and so on, are protected. We have robust security systems that ensure that your data is protected. Hacking our systems is close to impossible, and it has never happened.

How our Assignment  Help Service Works

1.      Place an order

You fill all the paper instructions in the order form. Make sure you include all the helpful materials so that our academic writers can deliver the perfect paper. It will also help to eliminate unnecessary revisions.

2.      Pay for the order

Proceed to pay for the paper so that it can be assigned to one of our expert academic writers. The paper subject is matched with the writer’s area of specialization.

3.      Track the progress

You communicate with the writer and know about the progress of the paper. The client can ask the writer for drafts of the paper. The client can upload extra material and include additional instructions from the lecturer. Receive a paper.

4.      Download the paper

The paper is sent to your email and uploaded to your personal account. You also get a plagiarism report attached to your paper.

smile and order essaysmile and order essay PLACE THIS ORDER OR A SIMILAR ORDER WITH US TODAY AND GET A PERFECT SCORE!!!

order custom essay paper