SlideShare uma empresa Scribd logo
1 de 18
The Guardian                      BBC News




Brown, Andrew. They Know All    UN Warns on Password
About You. The Guardian.        “Explosion.” BBC News.
Retrieved April 26, 2009 from   Retrieved April 26, 2009 from
http://www.guardian.co.uk/wo    http://news.bbc.co.uk/1/hi/tec
rld/2006/aug/28/usa.searcheng   hnology/6199372.stm
ines
New York Times                      Washington Post




Leppard, David. Police Set to      Bridis, Ted. FBI Eavesdropping
Step Up Hacking of Home PC’s.      Tools. Washington Post.
NY Times. Retrieved April 26,      Retrieved April 26, 2009 from
2009 from                          http://www.rumormillnews.co
http://www.timesonline.co.uk/t     m/cgi-
ol/news/politics/article5439604.   bin/archive.cgi?noframes;rea
ece                                d=15391
San Francisco Chronicle             New York Times




                                  Schwartz, Mattathias. The Trolls
Chonin, Neva. Sex and the City.
                                  Among Us. New York Times.
San Francisco Chronicle.
                                  Retrieved April 26, 2009 from
Retrieved April 26, 2009 from
                                  http://www.nytimes.com/2008/
http://www.sfgate.com/cgi-
                                  08/03/magazine/03trolls-
bin/article.cgi?f=/c/a/2006/09/
                                  t.html?ex=1375329600&en=b50
17/PKG6BKQQA41.DTL
                                  85d50ee5c65e5&ei=5124&part
                                  ner=permalink&exprod=permali
                                  nk
eSchool News                    The Wired Campus




Teachers Warned About            A MySpace Photo Costs a
MySpace Profiles. eSchool        Student a Teaching Certificate.
News. Retrieved April 26, 2009   The Wired Campus. Retrieved
from                             April 26, 2009 from
http://www.eschoolnews.com/      http://chronicle.com/wiredca
news/top-news/related-top-       mpus/index.php?id=2029
news/index.cfm?i=50557
Washington Post              Electronic Privacy Information
                                    Center




Deutsch, Sarah. Supreme            RIAA v. Verizon. Electronic
Court Internet Privacy Decision.   Privacy Information Center.
The Washington Post. Retrieved     Retrieved April 26, 2009 from
April 26, 2009 from                http://epic.org/privacy/copyrig
http://www.washingtonpost.co       ht/verizon/
m/wp-dyn/articles/A29974-
2004Oct13.html
 Summer 2002 – RIAA files suit against four
  people for music piracy
 RIAA requests user information from
  Verizon
 Verizon did not comply
 RIAA sues Verizon
 Supreme Court rules in favor of Verizon
 Courtney Meyers – Political Science /
  Journalism
 Kenneth Taylor - Political Science
 Zach Thomas – Chemistry
 Lawson Doyle – Business Management
 Matt Sullivan - Business Management
1.Should the recording industry be granted
information about users of peer to peer software or
torrent sites?

    Courtney Meyers – No, not if the clients had signed a confidential
     contract and had a reasonable expectation of privacy.
    Kenneth Taylor - No, I believe that it is a privacy issue. It should
     never be assumed that a consumer consents to having their
     information used in ways outside of their consent.
    Zach Thomas - That should be the policy of the individual P2P
     software firm. I'd like to see IP laws change, because there are other
     pathways for musicians and movie-stars to be paid.
    Lawson Doyle - No, it takes away from people's privacy.
    Matt Sullivan - No. The RIAA has no right to personal information
     unless it is provided directly to them from the user. Downloading
     music is illegal, but the RIAA does not have the right to infringe on
     individual privacy when there was no direct theft from them.
2. Do you think users of such programs should be held
responsible for stealing music?


   Courtney Meyers - No, because copyrighted music is a corrupt
    system, it isn't the creator of the music benefiting, but recording
    industry. Downloading of files promotes the artist.
   Kenneth Taylor - No, I believe only those who provide the service
    should be held responsible.
   Zach Thomas - Not unless they are trying to sell it.
   Lawson Doyle - No, it has grown to such an extent that a great
    majority of people are responsible.
   Matt Sullivan - I don’t think there is any good way to properly judge
    and punish every single person who “steals” music.
3. Should employers, university's, or other institutions be
allowed to fire or penalize people for the content of
their myspace or facebook pages?

 Courtney Meyers - Yes, when working for a private company a
  person’s reflects on that organization. An organization has the right
  to penalize someone for displaying unethical, illegal or irresponsible
  behavior on the Internet.
 Kenneth Taylor - Yes, as an employee your actions reflect those of
  the company. If the content could do harm to the integrity of the
  organization, I believe they should be able to take action.
 Zach Thomas - What you put on social networking sites is pretty
  much public information, but I don't think you should be penalized
  for your political or religious information .
 Lawson Doyle - If they can access the page that’s fine, but using a
  person’s friends as a “backdoor” should not be allowed.
 Matt Sullivan - If you state where you work on your myspace page
  then you are representing the company and they should be
  allowed leverage over you. You pay universities tuition, so they
  should have no say over your myspace content.
4. Do you feel it is ethical for google and other search
engines to supply data, such as email or search
engine queries, to the U.S. government?

   Courtney Meyers - Yes, as long as users of google and other search
    engines know that data may be monitored.
   Kenneth Taylor - Yes, the information that is provided is open and
    free to the public.
   Zach Thomas – Yes, and the government will keep tabs of google
    searches no matter how illegal it is.
   Lawson Doyle - I only think it is unethical if the information is of
    individuals and not anonymous.
   Matt Sullivan - No, but much of what the government does isn’t
    ethical. People actually assume their information is secure, so if their
    privacy was to be compromised by giving their data to the
    government that would be a breach of trust and an ethical impass.
5. Should google even keep records of such
     material?


   Courtney Meyers – Yes, by monitoring this information, google is
    better able to improve their product and grow advertising revenue
    by figuring out how advertisers can reach their desired audience.
   Kenneth Taylor - Yes, any information that is given and used by the
    Federal Government should be recorded and released at a later
    date for accountability purposes.
   Zach Thomas -I'd like for it not to, but it's not a public utility, google
    owns the information. The world of no privacy is scary, but if you
    don't like it, don't google anything.
   Lawson Doyle - Yes, only if personal information is not stored.
    Keeping personal information that is not permitted by the user is a
    breach of their privacy.
   Matt Sullivan - I think they should keep whatever records they feel
    like; as long as they keep the information for internal use, no harm is
    done.
6. The U.K. allows its law enforcement agencies access
to the content of private computers via spyware
without a warrant. Do you think this could happen in
the U.S.? Should it?
   Courtney Meyers - No it won't happen here. The British have a very
    different form of government. It has no written Constitution, and the
    laws are such a journalist can be arrested on one government
    officials belief that a story is treasonous.
   Kenneth Taylor - I believe that this could possibly happen here in the
    U.S. although I do think that it would be a clear violation of the
    Constitution.
   Zach Thomas - I don't like it, but I absolutely think the US government
    is doing that.
   Lawson Doyle - It could happen, but I strongly disapprove of it. It is a
    deceitful and unjust means of operation.
   Matt Sullivan - Accessing computers directly is a blatant invasion of
    privacy. If there is a place where the government, including law
    enforcement, should stop it should be at the access point to a
    computer.
7. The FBI uses a similar keylogging trojan called
lantern, which some antivirus programs have chosen
to ignore when checking for viruses. Should the
creators of the antivirus programs protect their users or
aid the FBI?
   Courtney Meyers – The programs should not detect the FBI
    keylogger, but the keylogger should only be used with a warrant.
   Kenneth Taylor - I believe that upon principal the producer should
    always protect the consumer as it relates to the product.
   Zach Thomas - I would like the antivirus programs to protect the users
    as a matter of principle, but it's not going to happen.
   Lawson Doyle - They should protect the users, until the virus is
    accredited and lawful. I believe the FBI is wrong for monitoring the
    internet in such a deceitful manner.
   Matt Sullivan - They should protect against the FBI because the user
    pays for virus protection, which includes Trojans, no matter who
    writes or uses them. No hacking or virus writing is legal.
8. Overall, do you feel privacy should be protected
online? If so, how much?


   Courtney Meyers - As I stated earlier, there are many problems with
    current IP laws. However, I don't believe one should blanket the issue
    with a concrete answer on an organic topic.
   Kenneth Taylor - I believe privacy, such as any other civil
    liberty, should be protected by the government.
   Zach Thomas - Privacy should be protected online to the extent that
    certain types of information gathering should be illegal google
    searches, for instance.
   Lawson Doyle - Yes, I think it is very important. There is no reason why
    privacy on the internet should be any different than other common
    forms privacy with U.S. citizens.
   Matt Sullivan - I think all privacy that travels over hard lines is by law
    required to be protected.
1        2        3       4        5       6        7       8


Courtney P         P        NP      NP       NP      NA       NP      NA


Kenneth   P        P        NP      NP       NP      NA       P       P


Zach      P        P        NP      NP       P       NA       P       P


Lawson    P        P        P       P        P       NA       P       P


Matt      P        P        P       P        NP      NA       P       P



 P = In favor of privacy; NP = not in favor of privacy; NA = Not applicable
Privacy




          For 60%
          Against 25%
          Unclear 15%

Mais conteúdo relacionado

Mais procurados

Revenge porn: punish, remove, forget, forgive?
Revenge porn: punish, remove, forget, forgive? Revenge porn: punish, remove, forget, forgive?
Revenge porn: punish, remove, forget, forgive? Lilian Edwards
 
What do we do with aproblem like revenge porn ?
What do we do with  aproblem like  revenge porn ?What do we do with  aproblem like  revenge porn ?
What do we do with aproblem like revenge porn ?Lilian Edwards
 
Sopa (stop online piracy act)
Sopa (stop online piracy act)Sopa (stop online piracy act)
Sopa (stop online piracy act)kmcintire84
 
Net safety presentation
Net safety presentationNet safety presentation
Net safety presentationPamela Rijo
 
An Attorney’S Guide To Managing Social Media Based Evidence 03142011
An Attorney’S Guide To Managing Social Media Based Evidence 03142011An Attorney’S Guide To Managing Social Media Based Evidence 03142011
An Attorney’S Guide To Managing Social Media Based Evidence 03142011larrylieb
 
2600 v22 n1 (spring 2005)
2600 v22 n1 (spring 2005)2600 v22 n1 (spring 2005)
2600 v22 n1 (spring 2005)Felipe Prado
 
Haters & Trolls: Creating Safe Spaces Online
Haters & Trolls: Creating Safe Spaces OnlineHaters & Trolls: Creating Safe Spaces Online
Haters & Trolls: Creating Safe Spaces OnlineWomensMediaCenter
 
Weaponized Web Archives: Provenance Laundering of Short Order Evidence
Weaponized Web Archives: Provenance Laundering of Short Order Evidence Weaponized Web Archives: Provenance Laundering of Short Order Evidence
Weaponized Web Archives: Provenance Laundering of Short Order Evidence Michael Nelson
 
Social Media Ethics and Law in Higher Education
Social Media Ethics and Law in Higher EducationSocial Media Ethics and Law in Higher Education
Social Media Ethics and Law in Higher EducationKenneth Ronkowitz
 
Raj Goel - Social Media & Cloud Computing Threats to Privacy, Security & Libe...
Raj Goel - Social Media & Cloud Computing Threats to Privacy, Security & Libe...Raj Goel - Social Media & Cloud Computing Threats to Privacy, Security & Libe...
Raj Goel - Social Media & Cloud Computing Threats to Privacy, Security & Libe...Raj Goel
 
Social Media Ethics Made Easy
Social Media Ethics Made EasySocial Media Ethics Made Easy
Social Media Ethics Made EasyJoe Barnes
 
Best Practices in Social Media Use
Best Practices in Social Media UseBest Practices in Social Media Use
Best Practices in Social Media UseChristine Wekerle
 

Mais procurados (20)

Social media carrie cherveny-revised
Social media carrie cherveny-revisedSocial media carrie cherveny-revised
Social media carrie cherveny-revised
 
Digital Tattoo Website Orientation
Digital Tattoo Website OrientationDigital Tattoo Website Orientation
Digital Tattoo Website Orientation
 
Socialmedialandmines
SocialmedialandminesSocialmedialandmines
Socialmedialandmines
 
The Now Generation Internet Safety
The Now Generation   Internet SafetyThe Now Generation   Internet Safety
The Now Generation Internet Safety
 
Revenge porn: punish, remove, forget, forgive?
Revenge porn: punish, remove, forget, forgive? Revenge porn: punish, remove, forget, forgive?
Revenge porn: punish, remove, forget, forgive?
 
What do we do with aproblem like revenge porn ?
What do we do with  aproblem like  revenge porn ?What do we do with  aproblem like  revenge porn ?
What do we do with aproblem like revenge porn ?
 
Sopa (stop online piracy act)
Sopa (stop online piracy act)Sopa (stop online piracy act)
Sopa (stop online piracy act)
 
File000098
File000098File000098
File000098
 
Net safety presentation
Net safety presentationNet safety presentation
Net safety presentation
 
File000097
File000097File000097
File000097
 
An Attorney’S Guide To Managing Social Media Based Evidence 03142011
An Attorney’S Guide To Managing Social Media Based Evidence 03142011An Attorney’S Guide To Managing Social Media Based Evidence 03142011
An Attorney’S Guide To Managing Social Media Based Evidence 03142011
 
IS201 facebook
IS201 facebookIS201 facebook
IS201 facebook
 
2600 v22 n1 (spring 2005)
2600 v22 n1 (spring 2005)2600 v22 n1 (spring 2005)
2600 v22 n1 (spring 2005)
 
Haters & Trolls: Creating Safe Spaces Online
Haters & Trolls: Creating Safe Spaces OnlineHaters & Trolls: Creating Safe Spaces Online
Haters & Trolls: Creating Safe Spaces Online
 
Weaponized Web Archives: Provenance Laundering of Short Order Evidence
Weaponized Web Archives: Provenance Laundering of Short Order Evidence Weaponized Web Archives: Provenance Laundering of Short Order Evidence
Weaponized Web Archives: Provenance Laundering of Short Order Evidence
 
Social Media Ethics and Law in Higher Education
Social Media Ethics and Law in Higher EducationSocial Media Ethics and Law in Higher Education
Social Media Ethics and Law in Higher Education
 
Raj Goel - Social Media & Cloud Computing Threats to Privacy, Security & Libe...
Raj Goel - Social Media & Cloud Computing Threats to Privacy, Security & Libe...Raj Goel - Social Media & Cloud Computing Threats to Privacy, Security & Libe...
Raj Goel - Social Media & Cloud Computing Threats to Privacy, Security & Libe...
 
Social Media Ethics Made Easy
Social Media Ethics Made EasySocial Media Ethics Made Easy
Social Media Ethics Made Easy
 
Best Practices in Social Media Use
Best Practices in Social Media UseBest Practices in Social Media Use
Best Practices in Social Media Use
 
File000095
File000095File000095
File000095
 

Destaque

Jk rowling
Jk rowlingJk rowling
Jk rowlingsam_17
 
Hvordan Finder Gps Damen Rundt
Hvordan Finder Gps Damen RundtHvordan Finder Gps Damen Rundt
Hvordan Finder Gps Damen RundtSik Cambon Jensen
 
Reading 1 4°
Reading 1   4°Reading 1   4°
Reading 1 4°sam_17
 
Geografisk kommunikation i Web 2.0 æraen
Geografisk kommunikation i Web 2.0 æraenGeografisk kommunikation i Web 2.0 æraen
Geografisk kommunikation i Web 2.0 æraenSik Cambon Jensen
 
Unit 5
Unit 5Unit 5
Unit 5sam_17
 
GIS Indeni - Den korte vej til den menneskelige applikation
GIS Indeni - Den korte vej til den menneskelige applikationGIS Indeni - Den korte vej til den menneskelige applikation
GIS Indeni - Den korte vej til den menneskelige applikationSik Cambon Jensen
 

Destaque (9)

Jk rowling
Jk rowlingJk rowling
Jk rowling
 
sample example
sample examplesample example
sample example
 
Hvordan Finder Gps Damen Rundt
Hvordan Finder Gps Damen RundtHvordan Finder Gps Damen Rundt
Hvordan Finder Gps Damen Rundt
 
Reading 1 4°
Reading 1   4°Reading 1   4°
Reading 1 4°
 
Geografisk kommunikation i Web 2.0 æraen
Geografisk kommunikation i Web 2.0 æraenGeografisk kommunikation i Web 2.0 æraen
Geografisk kommunikation i Web 2.0 æraen
 
Unit 5
Unit 5Unit 5
Unit 5
 
Udfordringen
UdfordringenUdfordringen
Udfordringen
 
GIS Indeni - Den korte vej til den menneskelige applikation
GIS Indeni - Den korte vej til den menneskelige applikationGIS Indeni - Den korte vej til den menneskelige applikation
GIS Indeni - Den korte vej til den menneskelige applikation
 
Af jord er du kommet
Af jord er du kommetAf jord er du kommet
Af jord er du kommet
 

Semelhante a Privacy Law

NSA Persuasive Essay
NSA Persuasive EssayNSA Persuasive Essay
NSA Persuasive EssayJill Lyons
 
Why Study Ethics In Law Enforcement
Why Study Ethics In Law EnforcementWhy Study Ethics In Law Enforcement
Why Study Ethics In Law EnforcementPatty Buckley
 
Fake news and fact finding
Fake news and fact findingFake news and fact finding
Fake news and fact findingYumonomics
 
Lis 768 Privacy Presentation
Lis 768 Privacy PresentationLis 768 Privacy Presentation
Lis 768 Privacy PresentationJulia Bryan-Diehl
 
Fourth Amendment as a Service - Workshop - 2-21-17
Fourth Amendment as a Service - Workshop - 2-21-17Fourth Amendment as a Service - Workshop - 2-21-17
Fourth Amendment as a Service - Workshop - 2-21-17FourthAsAService
 
The Self-Invasion Of Privacy
The Self-Invasion Of PrivacyThe Self-Invasion Of Privacy
The Self-Invasion Of PrivacyDiane Allen
 
Social Media Law: It is Real, and, Yes, It Really Can Impact Your Business - ...
Social Media Law: It is Real, and, Yes, It Really Can Impact Your Business - ...Social Media Law: It is Real, and, Yes, It Really Can Impact Your Business - ...
Social Media Law: It is Real, and, Yes, It Really Can Impact Your Business - ...Shawn Tuma
 
Professional Essay Writing Service Australia Essay Onli
Professional Essay Writing Service Australia Essay OnliProfessional Essay Writing Service Australia Essay Onli
Professional Essay Writing Service Australia Essay OnliAllison Koehn
 
Writing copy 7 research 1
Writing copy 7 research 1Writing copy 7 research 1
Writing copy 7 research 1ashboyne
 
Writing copy 7 research 1
Writing copy 7 research 1Writing copy 7 research 1
Writing copy 7 research 1ashboyne
 
My Space Project
My Space ProjectMy Space Project
My Space ProjectPat Howarth
 
My Space Project
My Space ProjectMy Space Project
My Space ProjectPat Howarth
 

Semelhante a Privacy Law (14)

NSA Persuasive Essay
NSA Persuasive EssayNSA Persuasive Essay
NSA Persuasive Essay
 
Social Networking and E-discovery
Social Networking and E-discoverySocial Networking and E-discovery
Social Networking and E-discovery
 
Why Study Ethics In Law Enforcement
Why Study Ethics In Law EnforcementWhy Study Ethics In Law Enforcement
Why Study Ethics In Law Enforcement
 
Fake news and fact finding
Fake news and fact findingFake news and fact finding
Fake news and fact finding
 
Cyber Security 4.0 conference 30 November 2016
Cyber Security 4.0 conference 30 November 2016Cyber Security 4.0 conference 30 November 2016
Cyber Security 4.0 conference 30 November 2016
 
Lis 768 Privacy Presentation
Lis 768 Privacy PresentationLis 768 Privacy Presentation
Lis 768 Privacy Presentation
 
Fourth Amendment as a Service - Workshop - 2-21-17
Fourth Amendment as a Service - Workshop - 2-21-17Fourth Amendment as a Service - Workshop - 2-21-17
Fourth Amendment as a Service - Workshop - 2-21-17
 
The Self-Invasion Of Privacy
The Self-Invasion Of PrivacyThe Self-Invasion Of Privacy
The Self-Invasion Of Privacy
 
Social Media Law: It is Real, and, Yes, It Really Can Impact Your Business - ...
Social Media Law: It is Real, and, Yes, It Really Can Impact Your Business - ...Social Media Law: It is Real, and, Yes, It Really Can Impact Your Business - ...
Social Media Law: It is Real, and, Yes, It Really Can Impact Your Business - ...
 
Professional Essay Writing Service Australia Essay Onli
Professional Essay Writing Service Australia Essay OnliProfessional Essay Writing Service Australia Essay Onli
Professional Essay Writing Service Australia Essay Onli
 
Writing copy 7 research 1
Writing copy 7 research 1Writing copy 7 research 1
Writing copy 7 research 1
 
Writing copy 7 research 1
Writing copy 7 research 1Writing copy 7 research 1
Writing copy 7 research 1
 
My Space Project
My Space ProjectMy Space Project
My Space Project
 
My Space Project
My Space ProjectMy Space Project
My Space Project
 

Último

Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactdawncurless
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformChameera Dedduwage
 
Science 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsScience 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsKarinaGenton
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Celine George
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxpboyjonauth
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxGaneshChakor2
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxmanuelaromero2013
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...Marc Dusseiller Dusjagr
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionSafetyChain Software
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfchloefrazer622
 
Concept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfConcept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfUmakantAnnand
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxOH TEIK BIN
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Krashi Coaching
 

Último (20)

Staff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSDStaff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSD
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 
Science 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsScience 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its Characteristics
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
 
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptx
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptx
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory Inspection
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdf
 
Concept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfConcept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.Compdf
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptx
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 

Privacy Law

  • 1.
  • 2. The Guardian BBC News Brown, Andrew. They Know All UN Warns on Password About You. The Guardian. “Explosion.” BBC News. Retrieved April 26, 2009 from Retrieved April 26, 2009 from http://www.guardian.co.uk/wo http://news.bbc.co.uk/1/hi/tec rld/2006/aug/28/usa.searcheng hnology/6199372.stm ines
  • 3. New York Times Washington Post Leppard, David. Police Set to Bridis, Ted. FBI Eavesdropping Step Up Hacking of Home PC’s. Tools. Washington Post. NY Times. Retrieved April 26, Retrieved April 26, 2009 from 2009 from http://www.rumormillnews.co http://www.timesonline.co.uk/t m/cgi- ol/news/politics/article5439604. bin/archive.cgi?noframes;rea ece d=15391
  • 4. San Francisco Chronicle New York Times Schwartz, Mattathias. The Trolls Chonin, Neva. Sex and the City. Among Us. New York Times. San Francisco Chronicle. Retrieved April 26, 2009 from Retrieved April 26, 2009 from http://www.nytimes.com/2008/ http://www.sfgate.com/cgi- 08/03/magazine/03trolls- bin/article.cgi?f=/c/a/2006/09/ t.html?ex=1375329600&en=b50 17/PKG6BKQQA41.DTL 85d50ee5c65e5&ei=5124&part ner=permalink&exprod=permali nk
  • 5. eSchool News The Wired Campus Teachers Warned About A MySpace Photo Costs a MySpace Profiles. eSchool Student a Teaching Certificate. News. Retrieved April 26, 2009 The Wired Campus. Retrieved from April 26, 2009 from http://www.eschoolnews.com/ http://chronicle.com/wiredca news/top-news/related-top- mpus/index.php?id=2029 news/index.cfm?i=50557
  • 6. Washington Post Electronic Privacy Information Center Deutsch, Sarah. Supreme RIAA v. Verizon. Electronic Court Internet Privacy Decision. Privacy Information Center. The Washington Post. Retrieved Retrieved April 26, 2009 from April 26, 2009 from http://epic.org/privacy/copyrig http://www.washingtonpost.co ht/verizon/ m/wp-dyn/articles/A29974- 2004Oct13.html
  • 7.  Summer 2002 – RIAA files suit against four people for music piracy  RIAA requests user information from Verizon  Verizon did not comply  RIAA sues Verizon  Supreme Court rules in favor of Verizon
  • 8.  Courtney Meyers – Political Science / Journalism  Kenneth Taylor - Political Science  Zach Thomas – Chemistry  Lawson Doyle – Business Management  Matt Sullivan - Business Management
  • 9. 1.Should the recording industry be granted information about users of peer to peer software or torrent sites?  Courtney Meyers – No, not if the clients had signed a confidential contract and had a reasonable expectation of privacy.  Kenneth Taylor - No, I believe that it is a privacy issue. It should never be assumed that a consumer consents to having their information used in ways outside of their consent.  Zach Thomas - That should be the policy of the individual P2P software firm. I'd like to see IP laws change, because there are other pathways for musicians and movie-stars to be paid.  Lawson Doyle - No, it takes away from people's privacy.  Matt Sullivan - No. The RIAA has no right to personal information unless it is provided directly to them from the user. Downloading music is illegal, but the RIAA does not have the right to infringe on individual privacy when there was no direct theft from them.
  • 10. 2. Do you think users of such programs should be held responsible for stealing music?  Courtney Meyers - No, because copyrighted music is a corrupt system, it isn't the creator of the music benefiting, but recording industry. Downloading of files promotes the artist.  Kenneth Taylor - No, I believe only those who provide the service should be held responsible.  Zach Thomas - Not unless they are trying to sell it.  Lawson Doyle - No, it has grown to such an extent that a great majority of people are responsible.  Matt Sullivan - I don’t think there is any good way to properly judge and punish every single person who “steals” music.
  • 11. 3. Should employers, university's, or other institutions be allowed to fire or penalize people for the content of their myspace or facebook pages?  Courtney Meyers - Yes, when working for a private company a person’s reflects on that organization. An organization has the right to penalize someone for displaying unethical, illegal or irresponsible behavior on the Internet.  Kenneth Taylor - Yes, as an employee your actions reflect those of the company. If the content could do harm to the integrity of the organization, I believe they should be able to take action.  Zach Thomas - What you put on social networking sites is pretty much public information, but I don't think you should be penalized for your political or religious information .  Lawson Doyle - If they can access the page that’s fine, but using a person’s friends as a “backdoor” should not be allowed.  Matt Sullivan - If you state where you work on your myspace page then you are representing the company and they should be allowed leverage over you. You pay universities tuition, so they should have no say over your myspace content.
  • 12. 4. Do you feel it is ethical for google and other search engines to supply data, such as email or search engine queries, to the U.S. government?  Courtney Meyers - Yes, as long as users of google and other search engines know that data may be monitored.  Kenneth Taylor - Yes, the information that is provided is open and free to the public.  Zach Thomas – Yes, and the government will keep tabs of google searches no matter how illegal it is.  Lawson Doyle - I only think it is unethical if the information is of individuals and not anonymous.  Matt Sullivan - No, but much of what the government does isn’t ethical. People actually assume their information is secure, so if their privacy was to be compromised by giving their data to the government that would be a breach of trust and an ethical impass.
  • 13. 5. Should google even keep records of such material?  Courtney Meyers – Yes, by monitoring this information, google is better able to improve their product and grow advertising revenue by figuring out how advertisers can reach their desired audience.  Kenneth Taylor - Yes, any information that is given and used by the Federal Government should be recorded and released at a later date for accountability purposes.  Zach Thomas -I'd like for it not to, but it's not a public utility, google owns the information. The world of no privacy is scary, but if you don't like it, don't google anything.  Lawson Doyle - Yes, only if personal information is not stored. Keeping personal information that is not permitted by the user is a breach of their privacy.  Matt Sullivan - I think they should keep whatever records they feel like; as long as they keep the information for internal use, no harm is done.
  • 14. 6. The U.K. allows its law enforcement agencies access to the content of private computers via spyware without a warrant. Do you think this could happen in the U.S.? Should it?  Courtney Meyers - No it won't happen here. The British have a very different form of government. It has no written Constitution, and the laws are such a journalist can be arrested on one government officials belief that a story is treasonous.  Kenneth Taylor - I believe that this could possibly happen here in the U.S. although I do think that it would be a clear violation of the Constitution.  Zach Thomas - I don't like it, but I absolutely think the US government is doing that.  Lawson Doyle - It could happen, but I strongly disapprove of it. It is a deceitful and unjust means of operation.  Matt Sullivan - Accessing computers directly is a blatant invasion of privacy. If there is a place where the government, including law enforcement, should stop it should be at the access point to a computer.
  • 15. 7. The FBI uses a similar keylogging trojan called lantern, which some antivirus programs have chosen to ignore when checking for viruses. Should the creators of the antivirus programs protect their users or aid the FBI?  Courtney Meyers – The programs should not detect the FBI keylogger, but the keylogger should only be used with a warrant.  Kenneth Taylor - I believe that upon principal the producer should always protect the consumer as it relates to the product.  Zach Thomas - I would like the antivirus programs to protect the users as a matter of principle, but it's not going to happen.  Lawson Doyle - They should protect the users, until the virus is accredited and lawful. I believe the FBI is wrong for monitoring the internet in such a deceitful manner.  Matt Sullivan - They should protect against the FBI because the user pays for virus protection, which includes Trojans, no matter who writes or uses them. No hacking or virus writing is legal.
  • 16. 8. Overall, do you feel privacy should be protected online? If so, how much?  Courtney Meyers - As I stated earlier, there are many problems with current IP laws. However, I don't believe one should blanket the issue with a concrete answer on an organic topic.  Kenneth Taylor - I believe privacy, such as any other civil liberty, should be protected by the government.  Zach Thomas - Privacy should be protected online to the extent that certain types of information gathering should be illegal google searches, for instance.  Lawson Doyle - Yes, I think it is very important. There is no reason why privacy on the internet should be any different than other common forms privacy with U.S. citizens.  Matt Sullivan - I think all privacy that travels over hard lines is by law required to be protected.
  • 17. 1 2 3 4 5 6 7 8 Courtney P P NP NP NP NA NP NA Kenneth P P NP NP NP NA P P Zach P P NP NP P NA P P Lawson P P P P P NA P P Matt P P P P NP NA P P P = In favor of privacy; NP = not in favor of privacy; NA = Not applicable
  • 18. Privacy For 60% Against 25% Unclear 15%