SlideShare uma empresa Scribd logo
1 de 47
Baixar para ler offline
CLASSROOM
STUDENT PRIVACY IN & OUT OF THE
Disclaimer
Lawyers
“Students don't shed their constitutional rights
at the school house gates."
Central Legal Question We Will Explore:
How do schools balance students’
constitutional rights with schools’ needs to
maintain order and a positive educational
environment?
This talk is not about some abstract case studies.
This talk is about you.
What We Will Discuss:
Student Privacy Rights on Campus
Students’ Use of Social Networks
Student Records and Privacy
School Use of Third Party Online Vendors
Tracking Students
Public Relations & Privacy Issues
uncharted legal territory
Everyday Scenarios with
the Internet & Technology
Scenario #1: Asking a student for their social
network login credentials.
Not suggested!
Not only is the case law all over the place,
various states are debating legislative
proposals to address this issue.
Additionally, the Terms of Service of sites like
Facebook expressly prohibit this activity.
Scenario #2: Using private sector tracking
software to monitor students.
Ask yourself the questions:
Why and How are you using these monitoring
tools?
Scenario #3: Using RFID - Radio Frequency
Identification Technology
Not suggested!
Tracking students in this manner can be
costly, hard to manage and intrusive.
It can also be a public relations nightmare.
Scenario #4: Accessing Photos or Information
from a Device Such as a Cell or Smartphone.
Seminal Case on Student Privacy:
New Jersey v. TLO
Recent Cases:
G.C. v. Owensboro Public Schools (2013)
N.N. v. Tunkhannock Area School Dist. (2011)
Mendoza v. Klein Ind. Sch. Dist. (2011)
Scenario #5: Using Webcams or Other Means
to Take Photos of Students, Especially if the
Device Goes Off-Campus.
Relevant Case:
Robbins ex. rel Robbins v.
Lower Merion School District (2010)
“LMSD is enjoined from accessing or reviewing any
student-created files contained on student laptops
(including but not limited to documents, e-mails,
instant messaging records, photographs, Internet
usage logs, and Web browsing histories) for any
reason except as permitted by the policies and
regulations contemplated by paragraph 7 of this
Order or otherwise pursuant to a signed consent
form that clearly and conspicuously sets forth the
ability of LMSD to access or review such files.”
Scenario #6: Circumventing FERPA.
Example:
Obama Administration proposal that would
have allowed sharing students' personal
information with other state officials and
private entities for a broad spectrum of
activities without the consent of parents.
May just be the beginning of these types of
proposals.
Scenario #7: Parent Dissemination of User
Generated Content.
Social Media Amplifies Broadcast Potential
Policies should be in place for parents taking
photos with smartphones and sharing on
social networks.
Consider the implication for children in
situations where parents may have protective
or other restraining orders.
Parent & Staff Education
You may think it’s common sense, but write it
down and share it with parents and staff
members.
The Fourth Amendment
When Does It Apply
Distinguishing Fourth Amendment from privacy
in the civil sense.
The Fourth Amendment could apply when you
are searching private accounts.
The First Amendment
When Does It Apply
Tinker v. Des Moines
Long-held precedent, since 1969, that students
have wide latitude to criticize to school officials
and policies.
kidz online.
yes, different rules apply.
Personally Identifiable Information (PII)
“Personally identifiable information” is information
that identifies a particular person. “Pii” includes:
• Full name;
• National identification number;
• IP address;
• Vehicle registration plate number;
• Driver’s license number;
• Face;
• Fingerprints;
• Handwriting;
• Credit card numbers;
• Digital identity;
• Date of birth;
• Birthplace; and
• Genetic information.
Children’s Online Privacy Protection Act
Requires websites to get parental consent before
collecting or sharing info for children under 13.
Enforced by the Federal Trade Commission.
Applies to commercial websites and other online
services.
Avoiding the “Oh, crap.”
General Privacy Tips
California
Privacy Policy Required
It’s just good sense for schools too.
Social Media Privacy Act
Enacted to protect students at universities and
employees from the demand of usernames and
passwords.
On the horizon - may be amendments to apply to
K-12 schools (exemptions for instances involving
bullying investigations)
Protecting Student Records
Over 8 million student privacy records have been
lost from nearly 600 security breaches since 2005.
We just scratched the surface.
?
Lawyers
Gagnier Margossian
@gamallp
consult@gamallp.com
gamallp.com
CLASSROOM
STUDENT PRIVACY IN THE

Mais conteúdo relacionado

Mais procurados

Summeru social media_v6 (5.10.10)
Summeru social media_v6 (5.10.10)Summeru social media_v6 (5.10.10)
Summeru social media_v6 (5.10.10)Anne Arendt
 
Online digital privacy (final)
Online digital privacy (final)Online digital privacy (final)
Online digital privacy (final)onlineprivacy
 
Best invention ever
Best invention everBest invention ever
Best invention everJahid Hasan
 
Reliability_Undesirability
Reliability_UndesirabilityReliability_Undesirability
Reliability_UndesirabilityMohamed Omar
 
Legal Issues in Technology
Legal Issues in TechnologyLegal Issues in Technology
Legal Issues in TechnologyGregory Barnes
 
Filtering in schools
Filtering in schoolsFiltering in schools
Filtering in schoolsmylee720
 
Social media used in higher education
Social media used in higher educationSocial media used in higher education
Social media used in higher educationAnne Arendt
 
Social Media And Legal Ethics
Social Media And Legal EthicsSocial Media And Legal Ethics
Social Media And Legal EthicsJonathan Ezor
 
CDA 230 in the Age of Cyber Civil Rights and Terrorism
CDA 230 in the Age of Cyber Civil Rights and TerrorismCDA 230 in the Age of Cyber Civil Rights and Terrorism
CDA 230 in the Age of Cyber Civil Rights and TerrorismInternet Law Center
 
Social Implications and Ethics
Social Implications and EthicsSocial Implications and Ethics
Social Implications and Ethicskelseybee316
 
Law review presentation
Law review presentation Law review presentation
Law review presentation Erin O'Gara
 
Digital identities & digital security
Digital identities & digital securityDigital identities & digital security
Digital identities & digital securitytanvir616
 
Social Networking (Ethics in Information Technology)
Social Networking (Ethics in Information Technology)Social Networking (Ethics in Information Technology)
Social Networking (Ethics in Information Technology)Anirudhya Reevu
 
Yahoo!, the Shi Tao Case, and lessons for corporate social responsibility
Yahoo!, the Shi Tao Case, and lessons for corporate social responsibilityYahoo!, the Shi Tao Case, and lessons for corporate social responsibility
Yahoo!, the Shi Tao Case, and lessons for corporate social responsibilityrmackinnon
 
Social Media: Managing Legal Risks
Social Media: Managing Legal RisksSocial Media: Managing Legal Risks
Social Media: Managing Legal RisksGlenn Manishin
 
Internet Ethics Issues and Action in the United States
Internet Ethics Issues and Action in the United StatesInternet Ethics Issues and Action in the United States
Internet Ethics Issues and Action in the United StatesMichael Zimmer
 
11.21.10 inventedstudentuseagreement
11.21.10 inventedstudentuseagreement11.21.10 inventedstudentuseagreement
11.21.10 inventedstudentuseagreementPaula Naugle
 
Acceptable use policy
Acceptable use policyAcceptable use policy
Acceptable use policycollimic
 
China’s Internet Security _Dichotomy of National Security and Human Rights in...
China’s Internet Security _Dichotomy of National Security and Human Rights in...China’s Internet Security _Dichotomy of National Security and Human Rights in...
China’s Internet Security _Dichotomy of National Security and Human Rights in...Emily Võ
 

Mais procurados (20)

Summeru social media_v6 (5.10.10)
Summeru social media_v6 (5.10.10)Summeru social media_v6 (5.10.10)
Summeru social media_v6 (5.10.10)
 
Online digital privacy (final)
Online digital privacy (final)Online digital privacy (final)
Online digital privacy (final)
 
Best invention ever
Best invention everBest invention ever
Best invention ever
 
Reliability_Undesirability
Reliability_UndesirabilityReliability_Undesirability
Reliability_Undesirability
 
Legal Issues in Technology
Legal Issues in TechnologyLegal Issues in Technology
Legal Issues in Technology
 
Filtering in schools
Filtering in schoolsFiltering in schools
Filtering in schools
 
Social media used in higher education
Social media used in higher educationSocial media used in higher education
Social media used in higher education
 
Social Media And Legal Ethics
Social Media And Legal EthicsSocial Media And Legal Ethics
Social Media And Legal Ethics
 
CDA 230 in the Age of Cyber Civil Rights and Terrorism
CDA 230 in the Age of Cyber Civil Rights and TerrorismCDA 230 in the Age of Cyber Civil Rights and Terrorism
CDA 230 in the Age of Cyber Civil Rights and Terrorism
 
Social Implications and Ethics
Social Implications and EthicsSocial Implications and Ethics
Social Implications and Ethics
 
Law review presentation
Law review presentation Law review presentation
Law review presentation
 
Digital identities & digital security
Digital identities & digital securityDigital identities & digital security
Digital identities & digital security
 
Social Networking (Ethics in Information Technology)
Social Networking (Ethics in Information Technology)Social Networking (Ethics in Information Technology)
Social Networking (Ethics in Information Technology)
 
Yahoo!, the Shi Tao Case, and lessons for corporate social responsibility
Yahoo!, the Shi Tao Case, and lessons for corporate social responsibilityYahoo!, the Shi Tao Case, and lessons for corporate social responsibility
Yahoo!, the Shi Tao Case, and lessons for corporate social responsibility
 
Social Media: Managing Legal Risks
Social Media: Managing Legal RisksSocial Media: Managing Legal Risks
Social Media: Managing Legal Risks
 
Internet Ethics Issues and Action in the United States
Internet Ethics Issues and Action in the United StatesInternet Ethics Issues and Action in the United States
Internet Ethics Issues and Action in the United States
 
11.21.10 inventedstudentuseagreement
11.21.10 inventedstudentuseagreement11.21.10 inventedstudentuseagreement
11.21.10 inventedstudentuseagreement
 
Copyright
CopyrightCopyright
Copyright
 
Acceptable use policy
Acceptable use policyAcceptable use policy
Acceptable use policy
 
China’s Internet Security _Dichotomy of National Security and Human Rights in...
China’s Internet Security _Dichotomy of National Security and Human Rights in...China’s Internet Security _Dichotomy of National Security and Human Rights in...
China’s Internet Security _Dichotomy of National Security and Human Rights in...
 

Semelhante a Student Privacy Rights in the Classroom

The Top Five Legal Pitfalls of Social Media for School Districts
The Top Five Legal Pitfalls of Social Media for School DistrictsThe Top Five Legal Pitfalls of Social Media for School Districts
The Top Five Legal Pitfalls of Social Media for School DistrictsDiana Benner
 
Its the law
Its the lawIts the law
Its the lawnsharoff
 
Social Networks and Cyberbullying: Implications for Students and Teachers
Social Networks and Cyberbullying: Implications for Students and TeachersSocial Networks and Cyberbullying: Implications for Students and Teachers
Social Networks and Cyberbullying: Implications for Students and TeachersMemorial University
 
In Class Learning Activity
In Class Learning ActivityIn Class Learning Activity
In Class Learning Activityguest09fcd1
 
GAMABrief: When Education Meets Big Data
GAMABrief: When Education Meets Big DataGAMABrief: When Education Meets Big Data
GAMABrief: When Education Meets Big DataChristina Gagnier
 
The Interwoven Complexities of Social Media, Privacy and Data Security
The Interwoven Complexities of Social Media, Privacy and Data SecurityThe Interwoven Complexities of Social Media, Privacy and Data Security
The Interwoven Complexities of Social Media, Privacy and Data SecurityArmstrong Teasdale
 
Social Media: Legal Pitfalls and Best Practices - SXSWedu 2016
Social Media: Legal Pitfalls and Best Practices - SXSWedu 2016Social Media: Legal Pitfalls and Best Practices - SXSWedu 2016
Social Media: Legal Pitfalls and Best Practices - SXSWedu 2016Diana Benner
 
Cyber bullying write up
Cyber bullying write upCyber bullying write up
Cyber bullying write upvictoriahoo
 
Filters firstamendmenttla2011 final
Filters firstamendmenttla2011 finalFilters firstamendmenttla2011 final
Filters firstamendmenttla2011 finalLea Bailey
 
A SMART WIZARD SYSTEM SUITABLE FOR USE WITH INTERNET MOBILE DEVICES TO ADJUST...
A SMART WIZARD SYSTEM SUITABLE FOR USE WITH INTERNET MOBILE DEVICES TO ADJUST...A SMART WIZARD SYSTEM SUITABLE FOR USE WITH INTERNET MOBILE DEVICES TO ADJUST...
A SMART WIZARD SYSTEM SUITABLE FOR USE WITH INTERNET MOBILE DEVICES TO ADJUST...ijsptm
 
CSUN - Youth Driven Information Privacy Education Campaign
CSUN - Youth Driven Information Privacy Education CampaignCSUN - Youth Driven Information Privacy Education Campaign
CSUN - Youth Driven Information Privacy Education CampaignKimberly Gonzalez
 
Report_PrivacyAmongChildren.pdf
Report_PrivacyAmongChildren.pdfReport_PrivacyAmongChildren.pdf
Report_PrivacyAmongChildren.pdfDaviesParker
 
Education Privacy
Education Privacy Education Privacy
Education Privacy emilyensign
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullyingmribera87
 
reSearch with teacher commentIMG_0418.JPGreSearch with teac.docx
reSearch with teacher commentIMG_0418.JPGreSearch with teac.docxreSearch with teacher commentIMG_0418.JPGreSearch with teac.docx
reSearch with teacher commentIMG_0418.JPGreSearch with teac.docxronak56
 
Cyber_Safety_K-12_Fact_Sheet_508C.pdf
Cyber_Safety_K-12_Fact_Sheet_508C.pdfCyber_Safety_K-12_Fact_Sheet_508C.pdf
Cyber_Safety_K-12_Fact_Sheet_508C.pdfMi Ra Lavandelo
 
Internet privacy ethics and online security
Internet privacy ethics and online securityInternet privacy ethics and online security
Internet privacy ethics and online securityPaul Berryman
 
CHEPTER The Internet and ClientServer, Intranet & Cloud Computin.docx
CHEPTER The Internet and ClientServer, Intranet & Cloud Computin.docxCHEPTER The Internet and ClientServer, Intranet & Cloud Computin.docx
CHEPTER The Internet and ClientServer, Intranet & Cloud Computin.docxchristinemaritza
 

Semelhante a Student Privacy Rights in the Classroom (20)

The Top Five Legal Pitfalls of Social Media for School Districts
The Top Five Legal Pitfalls of Social Media for School DistrictsThe Top Five Legal Pitfalls of Social Media for School Districts
The Top Five Legal Pitfalls of Social Media for School Districts
 
Its the law
Its the lawIts the law
Its the law
 
Its the law
Its the lawIts the law
Its the law
 
Social Networks and Cyberbullying: Implications for Students and Teachers
Social Networks and Cyberbullying: Implications for Students and TeachersSocial Networks and Cyberbullying: Implications for Students and Teachers
Social Networks and Cyberbullying: Implications for Students and Teachers
 
In Class Learning Activity
In Class Learning ActivityIn Class Learning Activity
In Class Learning Activity
 
GAMABrief: When Education Meets Big Data
GAMABrief: When Education Meets Big DataGAMABrief: When Education Meets Big Data
GAMABrief: When Education Meets Big Data
 
The Interwoven Complexities of Social Media, Privacy and Data Security
The Interwoven Complexities of Social Media, Privacy and Data SecurityThe Interwoven Complexities of Social Media, Privacy and Data Security
The Interwoven Complexities of Social Media, Privacy and Data Security
 
Social Media: Legal Pitfalls and Best Practices - SXSWedu 2016
Social Media: Legal Pitfalls and Best Practices - SXSWedu 2016Social Media: Legal Pitfalls and Best Practices - SXSWedu 2016
Social Media: Legal Pitfalls and Best Practices - SXSWedu 2016
 
Cyber bullying write up
Cyber bullying write upCyber bullying write up
Cyber bullying write up
 
Filters firstamendmenttla2011 final
Filters firstamendmenttla2011 finalFilters firstamendmenttla2011 final
Filters firstamendmenttla2011 final
 
A SMART WIZARD SYSTEM SUITABLE FOR USE WITH INTERNET MOBILE DEVICES TO ADJUST...
A SMART WIZARD SYSTEM SUITABLE FOR USE WITH INTERNET MOBILE DEVICES TO ADJUST...A SMART WIZARD SYSTEM SUITABLE FOR USE WITH INTERNET MOBILE DEVICES TO ADJUST...
A SMART WIZARD SYSTEM SUITABLE FOR USE WITH INTERNET MOBILE DEVICES TO ADJUST...
 
CSUN - Youth Driven Information Privacy Education Campaign
CSUN - Youth Driven Information Privacy Education CampaignCSUN - Youth Driven Information Privacy Education Campaign
CSUN - Youth Driven Information Privacy Education Campaign
 
Report_PrivacyAmongChildren.pdf
Report_PrivacyAmongChildren.pdfReport_PrivacyAmongChildren.pdf
Report_PrivacyAmongChildren.pdf
 
Education Privacy
Education Privacy Education Privacy
Education Privacy
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
reSearch with teacher commentIMG_0418.JPGreSearch with teac.docx
reSearch with teacher commentIMG_0418.JPGreSearch with teac.docxreSearch with teacher commentIMG_0418.JPGreSearch with teac.docx
reSearch with teacher commentIMG_0418.JPGreSearch with teac.docx
 
Privacy and Student Data: What to Consider
Privacy and Student Data: What to ConsiderPrivacy and Student Data: What to Consider
Privacy and Student Data: What to Consider
 
Cyber_Safety_K-12_Fact_Sheet_508C.pdf
Cyber_Safety_K-12_Fact_Sheet_508C.pdfCyber_Safety_K-12_Fact_Sheet_508C.pdf
Cyber_Safety_K-12_Fact_Sheet_508C.pdf
 
Internet privacy ethics and online security
Internet privacy ethics and online securityInternet privacy ethics and online security
Internet privacy ethics and online security
 
CHEPTER The Internet and ClientServer, Intranet & Cloud Computin.docx
CHEPTER The Internet and ClientServer, Intranet & Cloud Computin.docxCHEPTER The Internet and ClientServer, Intranet & Cloud Computin.docx
CHEPTER The Internet and ClientServer, Intranet & Cloud Computin.docx
 

Mais de Christina Gagnier

European Union General Data Protection Regulation (GDPR) Checklist
European Union General Data Protection Regulation (GDPR) ChecklistEuropean Union General Data Protection Regulation (GDPR) Checklist
European Union General Data Protection Regulation (GDPR) ChecklistChristina Gagnier
 
EU Privacy Shield Self Certification
EU Privacy Shield Self Certification EU Privacy Shield Self Certification
EU Privacy Shield Self Certification Christina Gagnier
 
The United Kingdom Raises Red Flag on Initial Coin Offerings
The United Kingdom Raises Red Flag on Initial Coin OfferingsThe United Kingdom Raises Red Flag on Initial Coin Offerings
The United Kingdom Raises Red Flag on Initial Coin OfferingsChristina Gagnier
 
Regulatory Regime for Cryptocurrencies in Gibraltar
Regulatory Regime for Cryptocurrencies in GibraltarRegulatory Regime for Cryptocurrencies in Gibraltar
Regulatory Regime for Cryptocurrencies in GibraltarChristina Gagnier
 
China Bans Initial Coin Offerings, "Illegal Public Financing"
China Bans Initial Coin Offerings, "Illegal Public Financing"China Bans Initial Coin Offerings, "Illegal Public Financing"
China Bans Initial Coin Offerings, "Illegal Public Financing"Christina Gagnier
 
Initial Coin Offerings (ICOs) and Cryptocurrencies in Canada
Initial Coin Offerings (ICOs) and Cryptocurrencies in CanadaInitial Coin Offerings (ICOs) and Cryptocurrencies in Canada
Initial Coin Offerings (ICOs) and Cryptocurrencies in CanadaChristina Gagnier
 
Conducting an Initial Coin Offering: Costs and Considerations
Conducting an Initial Coin Offering: Costs and ConsiderationsConducting an Initial Coin Offering: Costs and Considerations
Conducting an Initial Coin Offering: Costs and ConsiderationsChristina Gagnier
 
SEC Update: Virtual Organizations and the SEC - July 2017
SEC Update: Virtual Organizations and the SEC - July 2017SEC Update: Virtual Organizations and the SEC - July 2017
SEC Update: Virtual Organizations and the SEC - July 2017Christina Gagnier
 
Guide to Prospective European Union - United States Privacy Shield Program
Guide to Prospective European Union - United States Privacy Shield ProgramGuide to Prospective European Union - United States Privacy Shield Program
Guide to Prospective European Union - United States Privacy Shield ProgramChristina Gagnier
 
European Union Privacy Law - General Data Protection Regulation Checklist
European Union Privacy Law - General Data Protection Regulation ChecklistEuropean Union Privacy Law - General Data Protection Regulation Checklist
European Union Privacy Law - General Data Protection Regulation ChecklistChristina Gagnier
 
Revenge Pornography: Legal and Policy Issues - Computers, Data & Privacy Prot...
Revenge Pornography: Legal and Policy Issues - Computers, Data & Privacy Prot...Revenge Pornography: Legal and Policy Issues - Computers, Data & Privacy Prot...
Revenge Pornography: Legal and Policy Issues - Computers, Data & Privacy Prot...Christina Gagnier
 
Gender Issues: Creating a Safe Environment for All Students
Gender Issues: Creating a Safe Environment for All StudentsGender Issues: Creating a Safe Environment for All Students
Gender Issues: Creating a Safe Environment for All StudentsChristina Gagnier
 
ABC's of Privacy and Security
ABC's of Privacy and SecurityABC's of Privacy and Security
ABC's of Privacy and SecurityChristina Gagnier
 
Starting a Business: The Legal Details
Starting a Business: The Legal DetailsStarting a Business: The Legal Details
Starting a Business: The Legal DetailsChristina Gagnier
 
GAMABrief: What Every School Needs to Know About Copyright Law
GAMABrief: What Every School Needs to Know About Copyright LawGAMABrief: What Every School Needs to Know About Copyright Law
GAMABrief: What Every School Needs to Know About Copyright LawChristina Gagnier
 
GAMAByte: The Legal Ramifications of Going 3D (Printing, That is)
GAMAByte: The Legal Ramifications of Going 3D (Printing, That is)GAMAByte: The Legal Ramifications of Going 3D (Printing, That is)
GAMAByte: The Legal Ramifications of Going 3D (Printing, That is)Christina Gagnier
 
GAMABrief: Preparing for the Capital Gains Tax Hike
GAMABrief: Preparing for the Capital Gains Tax HikeGAMABrief: Preparing for the Capital Gains Tax Hike
GAMABrief: Preparing for the Capital Gains Tax HikeChristina Gagnier
 
Privacy Identity Innovation 2013: Ignite Talk Slides - Content. Conduct. Cont...
Privacy Identity Innovation 2013: Ignite Talk Slides - Content. Conduct. Cont...Privacy Identity Innovation 2013: Ignite Talk Slides - Content. Conduct. Cont...
Privacy Identity Innovation 2013: Ignite Talk Slides - Content. Conduct. Cont...Christina Gagnier
 
Revenge Porn: Posting Images Without Consent
Revenge Porn: Posting Images Without ConsentRevenge Porn: Posting Images Without Consent
Revenge Porn: Posting Images Without ConsentChristina Gagnier
 
Understanding "Cyber" Bullying: California Law & Proactive Steps for School D...
Understanding "Cyber" Bullying: California Law & Proactive Steps for School D...Understanding "Cyber" Bullying: California Law & Proactive Steps for School D...
Understanding "Cyber" Bullying: California Law & Proactive Steps for School D...Christina Gagnier
 

Mais de Christina Gagnier (20)

European Union General Data Protection Regulation (GDPR) Checklist
European Union General Data Protection Regulation (GDPR) ChecklistEuropean Union General Data Protection Regulation (GDPR) Checklist
European Union General Data Protection Regulation (GDPR) Checklist
 
EU Privacy Shield Self Certification
EU Privacy Shield Self Certification EU Privacy Shield Self Certification
EU Privacy Shield Self Certification
 
The United Kingdom Raises Red Flag on Initial Coin Offerings
The United Kingdom Raises Red Flag on Initial Coin OfferingsThe United Kingdom Raises Red Flag on Initial Coin Offerings
The United Kingdom Raises Red Flag on Initial Coin Offerings
 
Regulatory Regime for Cryptocurrencies in Gibraltar
Regulatory Regime for Cryptocurrencies in GibraltarRegulatory Regime for Cryptocurrencies in Gibraltar
Regulatory Regime for Cryptocurrencies in Gibraltar
 
China Bans Initial Coin Offerings, "Illegal Public Financing"
China Bans Initial Coin Offerings, "Illegal Public Financing"China Bans Initial Coin Offerings, "Illegal Public Financing"
China Bans Initial Coin Offerings, "Illegal Public Financing"
 
Initial Coin Offerings (ICOs) and Cryptocurrencies in Canada
Initial Coin Offerings (ICOs) and Cryptocurrencies in CanadaInitial Coin Offerings (ICOs) and Cryptocurrencies in Canada
Initial Coin Offerings (ICOs) and Cryptocurrencies in Canada
 
Conducting an Initial Coin Offering: Costs and Considerations
Conducting an Initial Coin Offering: Costs and ConsiderationsConducting an Initial Coin Offering: Costs and Considerations
Conducting an Initial Coin Offering: Costs and Considerations
 
SEC Update: Virtual Organizations and the SEC - July 2017
SEC Update: Virtual Organizations and the SEC - July 2017SEC Update: Virtual Organizations and the SEC - July 2017
SEC Update: Virtual Organizations and the SEC - July 2017
 
Guide to Prospective European Union - United States Privacy Shield Program
Guide to Prospective European Union - United States Privacy Shield ProgramGuide to Prospective European Union - United States Privacy Shield Program
Guide to Prospective European Union - United States Privacy Shield Program
 
European Union Privacy Law - General Data Protection Regulation Checklist
European Union Privacy Law - General Data Protection Regulation ChecklistEuropean Union Privacy Law - General Data Protection Regulation Checklist
European Union Privacy Law - General Data Protection Regulation Checklist
 
Revenge Pornography: Legal and Policy Issues - Computers, Data & Privacy Prot...
Revenge Pornography: Legal and Policy Issues - Computers, Data & Privacy Prot...Revenge Pornography: Legal and Policy Issues - Computers, Data & Privacy Prot...
Revenge Pornography: Legal and Policy Issues - Computers, Data & Privacy Prot...
 
Gender Issues: Creating a Safe Environment for All Students
Gender Issues: Creating a Safe Environment for All StudentsGender Issues: Creating a Safe Environment for All Students
Gender Issues: Creating a Safe Environment for All Students
 
ABC's of Privacy and Security
ABC's of Privacy and SecurityABC's of Privacy and Security
ABC's of Privacy and Security
 
Starting a Business: The Legal Details
Starting a Business: The Legal DetailsStarting a Business: The Legal Details
Starting a Business: The Legal Details
 
GAMABrief: What Every School Needs to Know About Copyright Law
GAMABrief: What Every School Needs to Know About Copyright LawGAMABrief: What Every School Needs to Know About Copyright Law
GAMABrief: What Every School Needs to Know About Copyright Law
 
GAMAByte: The Legal Ramifications of Going 3D (Printing, That is)
GAMAByte: The Legal Ramifications of Going 3D (Printing, That is)GAMAByte: The Legal Ramifications of Going 3D (Printing, That is)
GAMAByte: The Legal Ramifications of Going 3D (Printing, That is)
 
GAMABrief: Preparing for the Capital Gains Tax Hike
GAMABrief: Preparing for the Capital Gains Tax HikeGAMABrief: Preparing for the Capital Gains Tax Hike
GAMABrief: Preparing for the Capital Gains Tax Hike
 
Privacy Identity Innovation 2013: Ignite Talk Slides - Content. Conduct. Cont...
Privacy Identity Innovation 2013: Ignite Talk Slides - Content. Conduct. Cont...Privacy Identity Innovation 2013: Ignite Talk Slides - Content. Conduct. Cont...
Privacy Identity Innovation 2013: Ignite Talk Slides - Content. Conduct. Cont...
 
Revenge Porn: Posting Images Without Consent
Revenge Porn: Posting Images Without ConsentRevenge Porn: Posting Images Without Consent
Revenge Porn: Posting Images Without Consent
 
Understanding "Cyber" Bullying: California Law & Proactive Steps for School D...
Understanding "Cyber" Bullying: California Law & Proactive Steps for School D...Understanding "Cyber" Bullying: California Law & Proactive Steps for School D...
Understanding "Cyber" Bullying: California Law & Proactive Steps for School D...
 

Último

[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality AssuranceInflectra
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI AgeCprime
 
Data governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationData governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationKnoldus Inc.
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPathCommunity
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersNicole Novielli
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch TuesdayIvanti
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityIES VE
 
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Farhan Tariq
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsNathaniel Shimoni
 
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...itnewsafrica
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Mark Goldstein
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...itnewsafrica
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
React Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App FrameworkReact Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App FrameworkPixlogix Infotech
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 

Último (20)

[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI Age
 
Data governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationData governance with Unity Catalog Presentation
Data governance with Unity Catalog Presentation
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to Hero
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software Developers
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch Tuesday
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a reality
 
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directions
 
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
React Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App FrameworkReact Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App Framework
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 

Student Privacy Rights in the Classroom