Confidentiality Of Sources Whether Or Thesis

PAGES
5
WORDS
1619
Cite

The states that do have such laws are Alabama, Alaska, Arizona, Arkansas, California, Colorado, Delaware, Florida, Georgia, Illinois, Indiana, Kentucky, Louisiana, Maryland, Michigan, Minnesota, Montana, Nebraska, Nevada, New Jersey, New Mexico, New York, North Carolina, North Dakota, Ohio, Oklahoma, Oregon, Pennsylvania, Rhode Island, South Carolina, Tennessee, and the District of Columbia. Each of these states defines and applies a journalist's privilege differently. They examine who is a journalist, what kind of information the privilege protects, and whether there are any qualifications to the privilege. In addition, there is no federal shield law, though the Department of Justice does apply something akin to a shield law at the federal level. The qualifications contained in the shield laws are of critical importance to journalists, because the shield laws really provide little more protection than the common-law right to privilege. In states with shield laws, journalists actually receive more subpoenas than journalists in states without...

...

390-391). The shield laws suffer from other deficiencies as well. Many of them can be overcome with a judicial determination of necessity. Some states require a confidentiality agreement between a journalist and a source for the privilege to apply. Some states hold that the privilege is waived if the journalist reveals any of the confidential material, which is, in essence, waiving the privilege if the journalist reports his findings. Finally, shield laws only cover confidential communications, not what a reporter witnesses, so that a reporter can be required to testify about what a source has done in the reporter's presence. All of these qualifications make it clear that reporters may have a limited confidentiality privilege, but that such privilege is not vigorous.

Sources Used in Documents:

References

Pember-Calvert . (2004). Mass Media Law, 2005-2006 Edition. The Mc-Graw-Hill

Companies.


Cite this Document:

"Confidentiality Of Sources Whether Or" (2010, February 24) Retrieved April 25, 2024, from
https://www.paperdue.com/essay/confidentiality-of-sources-whether-or-14754

"Confidentiality Of Sources Whether Or" 24 February 2010. Web.25 April. 2024. <
https://www.paperdue.com/essay/confidentiality-of-sources-whether-or-14754>

"Confidentiality Of Sources Whether Or", 24 February 2010, Accessed.25 April. 2024,
https://www.paperdue.com/essay/confidentiality-of-sources-whether-or-14754

Related Documents
Deciding Whether or Not to
PAGES 5 WORDS 1965

The author currently contract with Verisma. Record Jacket Release Manager Overview is the current system that they use to scan the documents (Verisma Systems) that they are sending out for Guthrie Clinic. The author, however, is considering implementing EMR. There are essentially five top medical records that are considered to be most proficient for using as EMR. One of these is the Hyland Software OnBase, for scanning the medical instittuion's medical

Open Source Social Science
PAGES 13 WORDS 3536

Open source software has recently emerged as the frontrunner for many industries as the primary method of code production, as it is widely predicted to provide more options for its users in a quicker, quality improved, and cost effective format than the more traditional proprietary software. Linux, the dominant player in the market, is a considerable threat to the Microsoft operating system, which has successfully established itself in the global

Ethics The question of whether the behavioral school of management or the classical school of management would be a better style for General Motors in its present state is one that is quite interesting. The unions would have the public (and the governments that bailed out the company) believe that the workers are the most important cog in the wheel of productivity at GM. However, upon further study, it could be determined

Balancing the Right to Know With the Right for Privacy and Records Confidentiality Balancing the right to know with the right of American public for the privacy and confidentiality of their personal information is a challenging enterprise, and it is reasonable to suggest that optimal solutions require careful analysis of the competing interests that are involved. Indeed, some proponents argue that the American public's right to know is embodied in the

Digital Forensics to Capture Data Sources Network Intrusion Prioritizing Data Sources Account Auditing Live System Data Intrusion Detection System Event Log Analysis Malware Installation Prioritizing data sources Activity Monitoring Integrity Checking Data Mining Insider File Deletion Prioritizing data sources Use of Uneraser program Recovers the Deleted Data Network Storage A recent advance in information technology has brought about both benefits and threats to business organizations. While businesses have been able to achieve competitive market advantages through the internet technology, the hackers are also using the opportunities

Confidentiality and Law: Expectations of Trust in Legal Ethics There is a significant and critical difference between what one considers professional ethics and one's personal morality. Professional ethical rules may have developed under the wider umbrella of ethical principles, but they do not necessarily reflect what people would consider to be moral behavior. In fact, in some instances, acting in a manner that is considered professionally ethical may require people to