SlideShare a Scribd company logo
Media Law:
Online Privacy




        By
   Scott Carroll
Questions
1. Are cookies, small text
   files or programs to
   track a website
   viewer’s online
   preferences, an
   invasion of privacy?
   Do websites have the
   right to know their
   users browsing habits?
   Why or why not?
Questions
2. Many employers use the web
  (Facebook, Twitter, Google, etc.) to perform
  background checks on potential employees.
  Why could this be considered an invasion of
  privacy? Why could it be considered fair
  practice?

               +                   =
Questions
3. Social media sites like Facebook and Myspace
  use personal information (age, likes & dislikes,
  location)provided by their users to help
  advertisers target customers. Why or why not
  should they be allowed to do so? What
  privacy problems could arise from this
  practice?
Questions
4. Users of Facebook cannot
   actually delete their accounts;
   they merely remain dormant in
   case the user chooses to
   reactivate their account later
   on, meaning Facebook keeps all
   user info during the dormant
   period. What could Facebook
   be using this info for, besides
   advertising? Why or why not
   should Facebook be allowed to
   keep user information?
Questions
5. Criminals such as sex
  offenders may have their
  prior offenses, mug-
  shots, and personal info, like
  current address or
  workplace, posted online for
  the public to view. Why
  don’t the privacy rights of
  normal citizens apply to
  criminal offenders online?
Questions
6. What makes identity theft a concern on the
  internet? How can information provided in
  online banking, shopping, downloading, and
  other online activities be used against the
  user?
Questions
7. Social media such as
   Twitter, Facebook, Myspace, and
   specifically blogs, makes it easy to
   post information about other
   people, true or not. As the scope of
   the internet allows such content to
   be seen by anyone, what kind of
   privacy rules should be enforced to
   protect users from slander or libel?
   What kind of rules are currently
   enforced by social media sites?
Questions
8. Children often have to
  register information online
  to visit some sites (games,
  Myspace, etc.) . What
  measures should be taken
  to ensure the privacy of
  children online?
Legal Case: Sarah Palin’s hacked email
               account
• Hacker impersonates Palin online
  in September 2008
• Steals password
• Publishes Palin’s emails online
• FBI and Secret Service
  investigation follow
• McCain-Palin campaign calls
  hacking “an invasion of Palin’s
  privacy.”
Huffington Post
Screen grabs of Palin’s account
Email hack(continued)
• Yahoo’s “forgot my
  password” service exploited
• Security issues raised –
  hacker only had to guess
  where Palin met her
  husband to gain access to
  account
• Violation of 1986 Electronic
  Communications Privacy Act
Email hack (continued)
• Authorities search
  apartment of University
  of Tennessee student
  David Kernell in
  Knoxville
• Kernell is the son of TN
  state rep. and Memphis
  Democrat Mike Kernell
Email hack (continued)
• Kernell is indicted in October 2008 on charges of
  intentionally accessing Palin’s email without
  authorization
• Pleads “not guilty” in federal court
• Trail pushed back to October 2009 as 3 more
  charges arise
  -fraud
  -unlawful electronic transmission of material
  outside Tennessee
  -attempting to conceal records to impede an FBI
  investigation
Conclusion
• Lines of privacy blurred
  online
• User not always in control
  of own information
• Few laws exist that define
  privacy on the web
• Blatant invasions of
  privacy can be punished
• Private information and
  free information on web
  not extensively defined
Sources
• Huffington Post. Three More Charges in Sarah Palin
  Hacking Case. September 17, 2008.
  <www.huffingtonpost.com/huff-wires/20090309/palin-
  hacked/>
• Huffington Post. Palin email Hack: Man Indicted. October
  8, 2008. <www.huffingtonpost.com/2008/10/08/palin-
  email-hack-man-indi_n_132902.html>
• Huffington Post. Palin email Hacking Case Results in FBI
  Search of Apartment.
  <www.huffingtonpost.com/2008/09/22/palin-email-
  hacking-case_n_128315.html>
• Huffington Post. Palin’s email Account Hacked (Photos).
  <http://www.huffingtonpost.com/2008/09/17/palins-
  email-account-hack_n_127184.html>
Sources (continued)
• Students interviewed
  -Justin Perry, junior history major
  -Mike Bridges, junior business major
  -Bethany London, junior undeclared

More Related Content

What's hot

How to Catch Someone Who Is Cheating Online
How to Catch Someone Who Is Cheating OnlineHow to Catch Someone Who Is Cheating Online
How to Catch Someone Who Is Cheating Online
Paul Bossky
 
Legal issues of social media 2016
Legal issues of social media 2016Legal issues of social media 2016
Legal issues of social media 2016
Brian Huonker
 
Social Media and Privacy
Social Media and PrivacySocial Media and Privacy
Social Media and Privacy
Typeset
 
Users and behaviors social internet: Safety & Security
Users and behaviors social internet: Safety & SecurityUsers and behaviors social internet: Safety & Security
Users and behaviors social internet: Safety & Security
Dr. V Vorvoreanu
 
Perimeter E-Security: Will Facebook Get You Hired or Fired?
Perimeter E-Security: Will Facebook Get You Hired or Fired?Perimeter E-Security: Will Facebook Get You Hired or Fired?
Perimeter E-Security: Will Facebook Get You Hired or Fired?
Taylor Van Sickle
 
Facebook gen yes
Facebook gen yesFacebook gen yes
Facebook gen yes
Kran Kumar
 
Users and Behaviors- Social Internet
Users and Behaviors- Social InternetUsers and Behaviors- Social Internet
Users and Behaviors- Social Internet
Kenie Moses
 
Social Media and the Law: #SMI12
Social Media and the Law: #SMI12 Social Media and the Law: #SMI12
Social Media and the Law: #SMI12
Sustainly
 
Legal Implications Of Social Media
Legal Implications Of Social MediaLegal Implications Of Social Media
Legal Implications Of Social Media
DaliahSaper
 
Chapter 8 Big Data and Privacy
Chapter 8 Big Data and PrivacyChapter 8 Big Data and Privacy
Chapter 8 Big Data and Privacy
Solomben
 
Team Lecture Presentation 2
Team Lecture Presentation 2Team Lecture Presentation 2
Team Lecture Presentation 2
Nick Buonvicino
 
Managing Social Media in the Workplace
Managing Social Media in the WorkplaceManaging Social Media in the Workplace
Managing Social Media in the Workplace
Eric Swenson
 
Privacy and social media in the workplace
Privacy and social media in the workplacePrivacy and social media in the workplace
Privacy and social media in the workplace
Bailey and Wyant PLLC
 
Presentation3
Presentation3Presentation3
Presentation3ChantallD
 
3 ways cops are catching crooks
3 ways cops are catching crooks3 ways cops are catching crooks
3 ways cops are catching crookshunterfithen
 
Ip issues in social media
Ip issues in social mediaIp issues in social media
Ip issues in social mediaAltacit Global
 
Osint part 1_personal_privacy
Osint part 1_personal_privacyOsint part 1_personal_privacy
Osint part 1_personal_privacy
Sandra (Sandy) Dunn
 
Keeping your Children Safe Online
Keeping your Children Safe OnlineKeeping your Children Safe Online
Keeping your Children Safe OnlineMatt Smith
 

What's hot (20)

How to Catch Someone Who Is Cheating Online
How to Catch Someone Who Is Cheating OnlineHow to Catch Someone Who Is Cheating Online
How to Catch Someone Who Is Cheating Online
 
Legal issues of social media 2016
Legal issues of social media 2016Legal issues of social media 2016
Legal issues of social media 2016
 
Social Media and Privacy
Social Media and PrivacySocial Media and Privacy
Social Media and Privacy
 
Users and behaviors social internet: Safety & Security
Users and behaviors social internet: Safety & SecurityUsers and behaviors social internet: Safety & Security
Users and behaviors social internet: Safety & Security
 
Facebook slide
Facebook slideFacebook slide
Facebook slide
 
Perimeter E-Security: Will Facebook Get You Hired or Fired?
Perimeter E-Security: Will Facebook Get You Hired or Fired?Perimeter E-Security: Will Facebook Get You Hired or Fired?
Perimeter E-Security: Will Facebook Get You Hired or Fired?
 
Facebook gen yes
Facebook gen yesFacebook gen yes
Facebook gen yes
 
Users and Behaviors- Social Internet
Users and Behaviors- Social InternetUsers and Behaviors- Social Internet
Users and Behaviors- Social Internet
 
Social Media and the Law: #SMI12
Social Media and the Law: #SMI12 Social Media and the Law: #SMI12
Social Media and the Law: #SMI12
 
Legal Implications Of Social Media
Legal Implications Of Social MediaLegal Implications Of Social Media
Legal Implications Of Social Media
 
Chapter 8 Big Data and Privacy
Chapter 8 Big Data and PrivacyChapter 8 Big Data and Privacy
Chapter 8 Big Data and Privacy
 
Team Lecture Presentation 2
Team Lecture Presentation 2Team Lecture Presentation 2
Team Lecture Presentation 2
 
Hs facebook pwrpoint
Hs facebook pwrpointHs facebook pwrpoint
Hs facebook pwrpoint
 
Managing Social Media in the Workplace
Managing Social Media in the WorkplaceManaging Social Media in the Workplace
Managing Social Media in the Workplace
 
Privacy and social media in the workplace
Privacy and social media in the workplacePrivacy and social media in the workplace
Privacy and social media in the workplace
 
Presentation3
Presentation3Presentation3
Presentation3
 
3 ways cops are catching crooks
3 ways cops are catching crooks3 ways cops are catching crooks
3 ways cops are catching crooks
 
Ip issues in social media
Ip issues in social mediaIp issues in social media
Ip issues in social media
 
Osint part 1_personal_privacy
Osint part 1_personal_privacyOsint part 1_personal_privacy
Osint part 1_personal_privacy
 
Keeping your Children Safe Online
Keeping your Children Safe OnlineKeeping your Children Safe Online
Keeping your Children Safe Online
 

Viewers also liked

Frac Pp09
Frac Pp09Frac Pp09
Frac Pp09
gordonbures
 
Open For Business Presentation
Open For Business PresentationOpen For Business Presentation
Open For Business Presentation
Doug Edge
 
Million Dollar Mystery Challenge
Million Dollar Mystery ChallengeMillion Dollar Mystery Challenge
Million Dollar Mystery Challenge
Zeljko_Ropar
 
Marketing Strategies ISBDC 09
Marketing Strategies ISBDC 09Marketing Strategies ISBDC 09
Marketing Strategies ISBDC 09
Doug Edge
 
Hiroshima
HiroshimaHiroshima
Hiroshimawassita
 
Post Financial Crisis Reforms
Post Financial Crisis ReformsPost Financial Crisis Reforms
Post Financial Crisis Reforms
Manama, Bahrain
 

Viewers also liked (7)

Frac Pp09
Frac Pp09Frac Pp09
Frac Pp09
 
Open For Business Presentation
Open For Business PresentationOpen For Business Presentation
Open For Business Presentation
 
Million Dollar Mystery Challenge
Million Dollar Mystery ChallengeMillion Dollar Mystery Challenge
Million Dollar Mystery Challenge
 
Marketing Strategies ISBDC 09
Marketing Strategies ISBDC 09Marketing Strategies ISBDC 09
Marketing Strategies ISBDC 09
 
Hiroshima
HiroshimaHiroshima
Hiroshima
 
Post Financial Crisis Reforms
Post Financial Crisis ReformsPost Financial Crisis Reforms
Post Financial Crisis Reforms
 
.Te amO.
.Te amO..Te amO.
.Te amO.
 

Similar to Media Law

Intellectual Freedom, Privacy and Social Media
Intellectual Freedom, Privacy and Social MediaIntellectual Freedom, Privacy and Social Media
Intellectual Freedom, Privacy and Social Media
Elizabeth T. "Eli" Edwards
 
Darkside
DarksideDarkside
Darkside
Kenie Moses
 
Social Media and Online Investigation Of Claims
Social Media and Online Investigation Of ClaimsSocial Media and Online Investigation Of Claims
Social Media and Online Investigation Of Claims
Dano0403
 
4.Copyright © 2014 Pearson Education, Inc.Ethical and.docx
4.Copyright © 2014 Pearson Education, Inc.Ethical and.docx4.Copyright © 2014 Pearson Education, Inc.Ethical and.docx
4.Copyright © 2014 Pearson Education, Inc.Ethical and.docx
tamicawaysmith
 
Socialize Conference Toronto 2012 - FaceBook Marketing:
Socialize Conference Toronto 2012 - FaceBook Marketing: Socialize Conference Toronto 2012 - FaceBook Marketing:
Socialize Conference Toronto 2012 - FaceBook Marketing:
Adler Law Group
 
Uga Social Media Privacy June2011
Uga Social Media Privacy June2011Uga Social Media Privacy June2011
Uga Social Media Privacy June2011
Deborah Gonzalez, Esq.
 
Ethics & Technology :Facebook
Ethics & Technology :FacebookEthics & Technology :Facebook
Ethics & Technology :Facebook
rahul8793
 
Google study questions
Google study questionsGoogle study questions
Google study questionsjotsthink
 
Brandon + Eddie users guide phi 235
Brandon + Eddie users guide phi 235Brandon + Eddie users guide phi 235
Brandon + Eddie users guide phi 235brendaylo
 
CSUN - Youth Driven Information Privacy Education Campaign
CSUN - Youth Driven Information Privacy Education CampaignCSUN - Youth Driven Information Privacy Education Campaign
CSUN - Youth Driven Information Privacy Education Campaign
Kimberly Gonzalez
 
Internet Censorship Power Point
Internet Censorship Power PointInternet Censorship Power Point
Internet Censorship Power Pointguest6b73ff
 
Online Social Networks: 5 threats and 5 ways to use them safely
Online Social Networks: 5 threats and 5 ways to use them safelyOnline Social Networks: 5 threats and 5 ways to use them safely
Online Social Networks: 5 threats and 5 ways to use them safely
Tom Eston
 
Ethics in Social Media
Ethics in Social MediaEthics in Social Media
Ethics in Social Mediajrfields
 
Untitled.docx
Untitled.docxUntitled.docx
Untitled.docx
gekas1
 
computer misuse n criminal law
computer misuse n criminal lawcomputer misuse n criminal law
computer misuse n criminal law
Hamza Cheema
 
finance and accounting
finance and accountingfinance and accounting
finance and accounting
Hamza Cheema
 
Facebook danger
Facebook dangerFacebook danger
Facebook danger
rihabswilah
 

Similar to Media Law (20)

Intellectual Freedom, Privacy and Social Media
Intellectual Freedom, Privacy and Social MediaIntellectual Freedom, Privacy and Social Media
Intellectual Freedom, Privacy and Social Media
 
Darkside
DarksideDarkside
Darkside
 
Social Media and Online Investigation Of Claims
Social Media and Online Investigation Of ClaimsSocial Media and Online Investigation Of Claims
Social Media and Online Investigation Of Claims
 
4.Copyright © 2014 Pearson Education, Inc.Ethical and.docx
4.Copyright © 2014 Pearson Education, Inc.Ethical and.docx4.Copyright © 2014 Pearson Education, Inc.Ethical and.docx
4.Copyright © 2014 Pearson Education, Inc.Ethical and.docx
 
Socialize Conference Toronto 2012 - FaceBook Marketing:
Socialize Conference Toronto 2012 - FaceBook Marketing: Socialize Conference Toronto 2012 - FaceBook Marketing:
Socialize Conference Toronto 2012 - FaceBook Marketing:
 
Uga Social Media Privacy June2011
Uga Social Media Privacy June2011Uga Social Media Privacy June2011
Uga Social Media Privacy June2011
 
Ethics & Technology :Facebook
Ethics & Technology :FacebookEthics & Technology :Facebook
Ethics & Technology :Facebook
 
Facebook
FacebookFacebook
Facebook
 
Google study questions
Google study questionsGoogle study questions
Google study questions
 
Adler nurani
Adler nurani Adler nurani
Adler nurani
 
Brandon + Eddie users guide phi 235
Brandon + Eddie users guide phi 235Brandon + Eddie users guide phi 235
Brandon + Eddie users guide phi 235
 
CSUN - Youth Driven Information Privacy Education Campaign
CSUN - Youth Driven Information Privacy Education CampaignCSUN - Youth Driven Information Privacy Education Campaign
CSUN - Youth Driven Information Privacy Education Campaign
 
Internet Censorship Power Point
Internet Censorship Power PointInternet Censorship Power Point
Internet Censorship Power Point
 
Online Social Networks: 5 threats and 5 ways to use them safely
Online Social Networks: 5 threats and 5 ways to use them safelyOnline Social Networks: 5 threats and 5 ways to use them safely
Online Social Networks: 5 threats and 5 ways to use them safely
 
Ethics in Social Media
Ethics in Social MediaEthics in Social Media
Ethics in Social Media
 
Adler nurani
Adler nurani Adler nurani
Adler nurani
 
Untitled.docx
Untitled.docxUntitled.docx
Untitled.docx
 
computer misuse n criminal law
computer misuse n criminal lawcomputer misuse n criminal law
computer misuse n criminal law
 
finance and accounting
finance and accountingfinance and accounting
finance and accounting
 
Facebook danger
Facebook dangerFacebook danger
Facebook danger
 

Recently uploaded

Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Thierry Lestable
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
Elena Simperl
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
Dorra BARTAGUIZ
 
Assure Contact Center Experiences for Your Customers With ThousandEyes
Assure Contact Center Experiences for Your Customers With ThousandEyesAssure Contact Center Experiences for Your Customers With ThousandEyes
Assure Contact Center Experiences for Your Customers With ThousandEyes
ThousandEyes
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
Cheryl Hung
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
UiPathCommunity
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
ThousandEyes
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
Product School
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
DianaGray10
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
Safe Software
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Ramesh Iyer
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
Sri Ambati
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
Jemma Hussein Allen
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
Product School
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
nkrafacyberclub
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 

Recently uploaded (20)

Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
 
Assure Contact Center Experiences for Your Customers With ThousandEyes
Assure Contact Center Experiences for Your Customers With ThousandEyesAssure Contact Center Experiences for Your Customers With ThousandEyes
Assure Contact Center Experiences for Your Customers With ThousandEyes
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 

Media Law

  • 1. Media Law: Online Privacy By Scott Carroll
  • 2. Questions 1. Are cookies, small text files or programs to track a website viewer’s online preferences, an invasion of privacy? Do websites have the right to know their users browsing habits? Why or why not?
  • 3. Questions 2. Many employers use the web (Facebook, Twitter, Google, etc.) to perform background checks on potential employees. Why could this be considered an invasion of privacy? Why could it be considered fair practice? + =
  • 4. Questions 3. Social media sites like Facebook and Myspace use personal information (age, likes & dislikes, location)provided by their users to help advertisers target customers. Why or why not should they be allowed to do so? What privacy problems could arise from this practice?
  • 5. Questions 4. Users of Facebook cannot actually delete their accounts; they merely remain dormant in case the user chooses to reactivate their account later on, meaning Facebook keeps all user info during the dormant period. What could Facebook be using this info for, besides advertising? Why or why not should Facebook be allowed to keep user information?
  • 6. Questions 5. Criminals such as sex offenders may have their prior offenses, mug- shots, and personal info, like current address or workplace, posted online for the public to view. Why don’t the privacy rights of normal citizens apply to criminal offenders online?
  • 7. Questions 6. What makes identity theft a concern on the internet? How can information provided in online banking, shopping, downloading, and other online activities be used against the user?
  • 8. Questions 7. Social media such as Twitter, Facebook, Myspace, and specifically blogs, makes it easy to post information about other people, true or not. As the scope of the internet allows such content to be seen by anyone, what kind of privacy rules should be enforced to protect users from slander or libel? What kind of rules are currently enforced by social media sites?
  • 9. Questions 8. Children often have to register information online to visit some sites (games, Myspace, etc.) . What measures should be taken to ensure the privacy of children online?
  • 10. Legal Case: Sarah Palin’s hacked email account • Hacker impersonates Palin online in September 2008 • Steals password • Publishes Palin’s emails online • FBI and Secret Service investigation follow • McCain-Palin campaign calls hacking “an invasion of Palin’s privacy.”
  • 12. Screen grabs of Palin’s account
  • 13.
  • 14.
  • 15. Email hack(continued) • Yahoo’s “forgot my password” service exploited • Security issues raised – hacker only had to guess where Palin met her husband to gain access to account • Violation of 1986 Electronic Communications Privacy Act
  • 16. Email hack (continued) • Authorities search apartment of University of Tennessee student David Kernell in Knoxville • Kernell is the son of TN state rep. and Memphis Democrat Mike Kernell
  • 17. Email hack (continued) • Kernell is indicted in October 2008 on charges of intentionally accessing Palin’s email without authorization • Pleads “not guilty” in federal court • Trail pushed back to October 2009 as 3 more charges arise -fraud -unlawful electronic transmission of material outside Tennessee -attempting to conceal records to impede an FBI investigation
  • 18. Conclusion • Lines of privacy blurred online • User not always in control of own information • Few laws exist that define privacy on the web • Blatant invasions of privacy can be punished • Private information and free information on web not extensively defined
  • 19. Sources • Huffington Post. Three More Charges in Sarah Palin Hacking Case. September 17, 2008. <www.huffingtonpost.com/huff-wires/20090309/palin- hacked/> • Huffington Post. Palin email Hack: Man Indicted. October 8, 2008. <www.huffingtonpost.com/2008/10/08/palin- email-hack-man-indi_n_132902.html> • Huffington Post. Palin email Hacking Case Results in FBI Search of Apartment. <www.huffingtonpost.com/2008/09/22/palin-email- hacking-case_n_128315.html> • Huffington Post. Palin’s email Account Hacked (Photos). <http://www.huffingtonpost.com/2008/09/17/palins- email-account-hack_n_127184.html>
  • 20. Sources (continued) • Students interviewed -Justin Perry, junior history major -Mike Bridges, junior business major -Bethany London, junior undeclared