SlideShare a Scribd company logo
The Guardian                      BBC News




Brown, Andrew. They Know All    UN Warns on Password
About You. The Guardian.        “Explosion.” BBC News.
Retrieved April 26, 2009 from   Retrieved April 26, 2009 from
http://www.guardian.co.uk/wo    http://news.bbc.co.uk/1/hi/tec
rld/2006/aug/28/usa.searcheng   hnology/6199372.stm
ines
New York Times                      Washington Post




Leppard, David. Police Set to      Bridis, Ted. FBI Eavesdropping
Step Up Hacking of Home PC’s.      Tools. Washington Post.
NY Times. Retrieved April 26,      Retrieved April 26, 2009 from
2009 from                          http://www.rumormillnews.co
http://www.timesonline.co.uk/t     m/cgi-
ol/news/politics/article5439604.   bin/archive.cgi?noframes;rea
ece                                d=15391
San Francisco Chronicle             New York Times




                                  Schwartz, Mattathias. The Trolls
Chonin, Neva. Sex and the City.
                                  Among Us. New York Times.
San Francisco Chronicle.
                                  Retrieved April 26, 2009 from
Retrieved April 26, 2009 from
                                  http://www.nytimes.com/2008/
http://www.sfgate.com/cgi-
                                  08/03/magazine/03trolls-
bin/article.cgi?f=/c/a/2006/09/
                                  t.html?ex=1375329600&en=b50
17/PKG6BKQQA41.DTL
                                  85d50ee5c65e5&ei=5124&part
                                  ner=permalink&exprod=permali
                                  nk
eSchool News                    The Wired Campus




Teachers Warned About            A MySpace Photo Costs a
MySpace Profiles. eSchool        Student a Teaching Certificate.
News. Retrieved April 26, 2009   The Wired Campus. Retrieved
from                             April 26, 2009 from
http://www.eschoolnews.com/      http://chronicle.com/wiredca
news/top-news/related-top-       mpus/index.php?id=2029
news/index.cfm?i=50557
Washington Post              Electronic Privacy Information
                                    Center




Deutsch, Sarah. Supreme            RIAA v. Verizon. Electronic
Court Internet Privacy Decision.   Privacy Information Center.
The Washington Post. Retrieved     Retrieved April 26, 2009 from
April 26, 2009 from                http://epic.org/privacy/copyrig
http://www.washingtonpost.co       ht/verizon/
m/wp-dyn/articles/A29974-
2004Oct13.html
 Summer 2002 – RIAA files suit against four
  people for music piracy
 RIAA requests user information from
  Verizon
 Verizon did not comply
 RIAA sues Verizon
 Supreme Court rules in favor of Verizon
 Courtney Meyers – Political Science /
  Journalism
 Kenneth Taylor - Political Science
 Zach Thomas – Chemistry
 Lawson Doyle – Business Management
 Matt Sullivan - Business Management
1.Should the recording industry be granted
information about users of peer to peer software or
torrent sites?

    Courtney Meyers – No, not if the clients had signed a confidential
     contract and had a reasonable expectation of privacy.
    Kenneth Taylor - No, I believe that it is a privacy issue. It should
     never be assumed that a consumer consents to having their
     information used in ways outside of their consent.
    Zach Thomas - That should be the policy of the individual P2P
     software firm. I'd like to see IP laws change, because there are other
     pathways for musicians and movie-stars to be paid.
    Lawson Doyle - No, it takes away from people's privacy.
    Matt Sullivan - No. The RIAA has no right to personal information
     unless it is provided directly to them from the user. Downloading
     music is illegal, but the RIAA does not have the right to infringe on
     individual privacy when there was no direct theft from them.
2. Do you think users of such programs should be held
responsible for stealing music?


   Courtney Meyers - No, because copyrighted music is a corrupt
    system, it isn't the creator of the music benefiting, but recording
    industry. Downloading of files promotes the artist.
   Kenneth Taylor - No, I believe only those who provide the service
    should be held responsible.
   Zach Thomas - Not unless they are trying to sell it.
   Lawson Doyle - No, it has grown to such an extent that a great
    majority of people are responsible.
   Matt Sullivan - I don’t think there is any good way to properly judge
    and punish every single person who “steals” music.
3. Should employers, university's, or other institutions be
allowed to fire or penalize people for the content of
their myspace or facebook pages?

 Courtney Meyers - Yes, when working for a private company a
  person’s reflects on that organization. An organization has the right
  to penalize someone for displaying unethical, illegal or irresponsible
  behavior on the Internet.
 Kenneth Taylor - Yes, as an employee your actions reflect those of
  the company. If the content could do harm to the integrity of the
  organization, I believe they should be able to take action.
 Zach Thomas - What you put on social networking sites is pretty
  much public information, but I don't think you should be penalized
  for your political or religious information .
 Lawson Doyle - If they can access the page that’s fine, but using a
  person’s friends as a “backdoor” should not be allowed.
 Matt Sullivan - If you state where you work on your myspace page
  then you are representing the company and they should be
  allowed leverage over you. You pay universities tuition, so they
  should have no say over your myspace content.
4. Do you feel it is ethical for google and other search
engines to supply data, such as email or search
engine queries, to the U.S. government?

   Courtney Meyers - Yes, as long as users of google and other search
    engines know that data may be monitored.
   Kenneth Taylor - Yes, the information that is provided is open and
    free to the public.
   Zach Thomas – Yes, and the government will keep tabs of google
    searches no matter how illegal it is.
   Lawson Doyle - I only think it is unethical if the information is of
    individuals and not anonymous.
   Matt Sullivan - No, but much of what the government does isn’t
    ethical. People actually assume their information is secure, so if their
    privacy was to be compromised by giving their data to the
    government that would be a breach of trust and an ethical impass.
5. Should google even keep records of such
     material?


   Courtney Meyers – Yes, by monitoring this information, google is
    better able to improve their product and grow advertising revenue
    by figuring out how advertisers can reach their desired audience.
   Kenneth Taylor - Yes, any information that is given and used by the
    Federal Government should be recorded and released at a later
    date for accountability purposes.
   Zach Thomas -I'd like for it not to, but it's not a public utility, google
    owns the information. The world of no privacy is scary, but if you
    don't like it, don't google anything.
   Lawson Doyle - Yes, only if personal information is not stored.
    Keeping personal information that is not permitted by the user is a
    breach of their privacy.
   Matt Sullivan - I think they should keep whatever records they feel
    like; as long as they keep the information for internal use, no harm is
    done.
6. The U.K. allows its law enforcement agencies access
to the content of private computers via spyware
without a warrant. Do you think this could happen in
the U.S.? Should it?
   Courtney Meyers - No it won't happen here. The British have a very
    different form of government. It has no written Constitution, and the
    laws are such a journalist can be arrested on one government
    officials belief that a story is treasonous.
   Kenneth Taylor - I believe that this could possibly happen here in the
    U.S. although I do think that it would be a clear violation of the
    Constitution.
   Zach Thomas - I don't like it, but I absolutely think the US government
    is doing that.
   Lawson Doyle - It could happen, but I strongly disapprove of it. It is a
    deceitful and unjust means of operation.
   Matt Sullivan - Accessing computers directly is a blatant invasion of
    privacy. If there is a place where the government, including law
    enforcement, should stop it should be at the access point to a
    computer.
7. The FBI uses a similar keylogging trojan called
lantern, which some antivirus programs have chosen
to ignore when checking for viruses. Should the
creators of the antivirus programs protect their users or
aid the FBI?
   Courtney Meyers – The programs should not detect the FBI
    keylogger, but the keylogger should only be used with a warrant.
   Kenneth Taylor - I believe that upon principal the producer should
    always protect the consumer as it relates to the product.
   Zach Thomas - I would like the antivirus programs to protect the users
    as a matter of principle, but it's not going to happen.
   Lawson Doyle - They should protect the users, until the virus is
    accredited and lawful. I believe the FBI is wrong for monitoring the
    internet in such a deceitful manner.
   Matt Sullivan - They should protect against the FBI because the user
    pays for virus protection, which includes Trojans, no matter who
    writes or uses them. No hacking or virus writing is legal.
8. Overall, do you feel privacy should be protected
online? If so, how much?


   Courtney Meyers - As I stated earlier, there are many problems with
    current IP laws. However, I don't believe one should blanket the issue
    with a concrete answer on an organic topic.
   Kenneth Taylor - I believe privacy, such as any other civil
    liberty, should be protected by the government.
   Zach Thomas - Privacy should be protected online to the extent that
    certain types of information gathering should be illegal google
    searches, for instance.
   Lawson Doyle - Yes, I think it is very important. There is no reason why
    privacy on the internet should be any different than other common
    forms privacy with U.S. citizens.
   Matt Sullivan - I think all privacy that travels over hard lines is by law
    required to be protected.
1        2        3       4        5       6        7       8


Courtney P         P        NP      NP       NP      NA       NP      NA


Kenneth   P        P        NP      NP       NP      NA       P       P


Zach      P        P        NP      NP       P       NA       P       P


Lawson    P        P        P       P        P       NA       P       P


Matt      P        P        P       P        NP      NA       P       P



 P = In favor of privacy; NP = not in favor of privacy; NA = Not applicable
Privacy




          For 60%
          Against 25%
          Unclear 15%

More Related Content

What's hot

Social media carrie cherveny-revised
Social media carrie cherveny-revisedSocial media carrie cherveny-revised
Social media carrie cherveny-revised
HR Florida State Council, Inc.
 
Digital Tattoo Website Orientation
Digital Tattoo Website OrientationDigital Tattoo Website Orientation
Digital Tattoo Website Orientation
University of British Columbia
 
Socialmedialandmines
SocialmedialandminesSocialmedialandmines
Socialmedialandmines
Joel J. Campbell
 
The Now Generation Internet Safety
The Now Generation   Internet SafetyThe Now Generation   Internet Safety
The Now Generation Internet Safety
Daniel Jeffrey Hairfield
 
Revenge porn: punish, remove, forget, forgive?
Revenge porn: punish, remove, forget, forgive? Revenge porn: punish, remove, forget, forgive?
Revenge porn: punish, remove, forget, forgive?
Lilian Edwards
 
What do we do with aproblem like revenge porn ?
What do we do with  aproblem like  revenge porn ?What do we do with  aproblem like  revenge porn ?
What do we do with aproblem like revenge porn ?
Lilian Edwards
 
Sopa (stop online piracy act)
Sopa (stop online piracy act)Sopa (stop online piracy act)
Sopa (stop online piracy act)
kmcintire84
 
File000098
File000098File000098
File000098
Desmond Devendran
 
Net safety presentation
Net safety presentationNet safety presentation
Net safety presentation
Pamela Rijo
 
File000097
File000097File000097
File000097
Desmond Devendran
 
An Attorney’S Guide To Managing Social Media Based Evidence 03142011
An Attorney’S Guide To Managing Social Media Based Evidence 03142011An Attorney’S Guide To Managing Social Media Based Evidence 03142011
An Attorney’S Guide To Managing Social Media Based Evidence 03142011
larrylieb
 
IS201 facebook
IS201 facebookIS201 facebook
IS201 facebook
Lindsay Stuchinsky
 
2600 v22 n1 (spring 2005)
2600 v22 n1 (spring 2005)2600 v22 n1 (spring 2005)
2600 v22 n1 (spring 2005)
Felipe Prado
 
Haters & Trolls: Creating Safe Spaces Online
Haters & Trolls: Creating Safe Spaces OnlineHaters & Trolls: Creating Safe Spaces Online
Haters & Trolls: Creating Safe Spaces Online
WomensMediaCenter
 
Weaponized Web Archives: Provenance Laundering of Short Order Evidence
Weaponized Web Archives: Provenance Laundering of Short Order Evidence Weaponized Web Archives: Provenance Laundering of Short Order Evidence
Weaponized Web Archives: Provenance Laundering of Short Order Evidence
Michael Nelson
 
Social Media Ethics and Law in Higher Education
Social Media Ethics and Law in Higher EducationSocial Media Ethics and Law in Higher Education
Social Media Ethics and Law in Higher Education
Kenneth Ronkowitz
 
Raj Goel - Social Media & Cloud Computing Threats to Privacy, Security & Libe...
Raj Goel - Social Media & Cloud Computing Threats to Privacy, Security & Libe...Raj Goel - Social Media & Cloud Computing Threats to Privacy, Security & Libe...
Raj Goel - Social Media & Cloud Computing Threats to Privacy, Security & Libe...
Raj Goel
 
Social Media Ethics Made Easy
Social Media Ethics Made EasySocial Media Ethics Made Easy
Social Media Ethics Made Easy
Joe Barnes
 
Best Practices in Social Media Use
Best Practices in Social Media UseBest Practices in Social Media Use
Best Practices in Social Media Use
Christine Wekerle
 
File000095
File000095File000095
File000095
Desmond Devendran
 

What's hot (20)

Social media carrie cherveny-revised
Social media carrie cherveny-revisedSocial media carrie cherveny-revised
Social media carrie cherveny-revised
 
Digital Tattoo Website Orientation
Digital Tattoo Website OrientationDigital Tattoo Website Orientation
Digital Tattoo Website Orientation
 
Socialmedialandmines
SocialmedialandminesSocialmedialandmines
Socialmedialandmines
 
The Now Generation Internet Safety
The Now Generation   Internet SafetyThe Now Generation   Internet Safety
The Now Generation Internet Safety
 
Revenge porn: punish, remove, forget, forgive?
Revenge porn: punish, remove, forget, forgive? Revenge porn: punish, remove, forget, forgive?
Revenge porn: punish, remove, forget, forgive?
 
What do we do with aproblem like revenge porn ?
What do we do with  aproblem like  revenge porn ?What do we do with  aproblem like  revenge porn ?
What do we do with aproblem like revenge porn ?
 
Sopa (stop online piracy act)
Sopa (stop online piracy act)Sopa (stop online piracy act)
Sopa (stop online piracy act)
 
File000098
File000098File000098
File000098
 
Net safety presentation
Net safety presentationNet safety presentation
Net safety presentation
 
File000097
File000097File000097
File000097
 
An Attorney’S Guide To Managing Social Media Based Evidence 03142011
An Attorney’S Guide To Managing Social Media Based Evidence 03142011An Attorney’S Guide To Managing Social Media Based Evidence 03142011
An Attorney’S Guide To Managing Social Media Based Evidence 03142011
 
IS201 facebook
IS201 facebookIS201 facebook
IS201 facebook
 
2600 v22 n1 (spring 2005)
2600 v22 n1 (spring 2005)2600 v22 n1 (spring 2005)
2600 v22 n1 (spring 2005)
 
Haters & Trolls: Creating Safe Spaces Online
Haters & Trolls: Creating Safe Spaces OnlineHaters & Trolls: Creating Safe Spaces Online
Haters & Trolls: Creating Safe Spaces Online
 
Weaponized Web Archives: Provenance Laundering of Short Order Evidence
Weaponized Web Archives: Provenance Laundering of Short Order Evidence Weaponized Web Archives: Provenance Laundering of Short Order Evidence
Weaponized Web Archives: Provenance Laundering of Short Order Evidence
 
Social Media Ethics and Law in Higher Education
Social Media Ethics and Law in Higher EducationSocial Media Ethics and Law in Higher Education
Social Media Ethics and Law in Higher Education
 
Raj Goel - Social Media & Cloud Computing Threats to Privacy, Security & Libe...
Raj Goel - Social Media & Cloud Computing Threats to Privacy, Security & Libe...Raj Goel - Social Media & Cloud Computing Threats to Privacy, Security & Libe...
Raj Goel - Social Media & Cloud Computing Threats to Privacy, Security & Libe...
 
Social Media Ethics Made Easy
Social Media Ethics Made EasySocial Media Ethics Made Easy
Social Media Ethics Made Easy
 
Best Practices in Social Media Use
Best Practices in Social Media UseBest Practices in Social Media Use
Best Practices in Social Media Use
 
File000095
File000095File000095
File000095
 

Viewers also liked

Jk rowling
Jk rowlingJk rowling
Jk rowling
sam_17
 
sample example
sample examplesample example
sample example
guest739e156
 
Hvordan Finder Gps Damen Rundt
Hvordan Finder Gps Damen RundtHvordan Finder Gps Damen Rundt
Hvordan Finder Gps Damen Rundt
Sik Cambon Jensen
 
Reading 1 4°
Reading 1   4°Reading 1   4°
Reading 1 4°
sam_17
 
Geografisk kommunikation i Web 2.0 æraen
Geografisk kommunikation i Web 2.0 æraenGeografisk kommunikation i Web 2.0 æraen
Geografisk kommunikation i Web 2.0 æraen
Sik Cambon Jensen
 
Unit 5
Unit 5Unit 5
Unit 5
sam_17
 
Udfordringen
UdfordringenUdfordringen
Udfordringen
Sik Cambon Jensen
 
GIS Indeni - Den korte vej til den menneskelige applikation
GIS Indeni - Den korte vej til den menneskelige applikationGIS Indeni - Den korte vej til den menneskelige applikation
GIS Indeni - Den korte vej til den menneskelige applikation
Sik Cambon Jensen
 

Viewers also liked (9)

Jk rowling
Jk rowlingJk rowling
Jk rowling
 
sample example
sample examplesample example
sample example
 
Hvordan Finder Gps Damen Rundt
Hvordan Finder Gps Damen RundtHvordan Finder Gps Damen Rundt
Hvordan Finder Gps Damen Rundt
 
Reading 1 4°
Reading 1   4°Reading 1   4°
Reading 1 4°
 
Geografisk kommunikation i Web 2.0 æraen
Geografisk kommunikation i Web 2.0 æraenGeografisk kommunikation i Web 2.0 æraen
Geografisk kommunikation i Web 2.0 æraen
 
Unit 5
Unit 5Unit 5
Unit 5
 
Udfordringen
UdfordringenUdfordringen
Udfordringen
 
GIS Indeni - Den korte vej til den menneskelige applikation
GIS Indeni - Den korte vej til den menneskelige applikationGIS Indeni - Den korte vej til den menneskelige applikation
GIS Indeni - Den korte vej til den menneskelige applikation
 
Af jord er du kommet
Af jord er du kommetAf jord er du kommet
Af jord er du kommet
 

Similar to Privacy Law

NSA Persuasive Essay
NSA Persuasive EssayNSA Persuasive Essay
NSA Persuasive Essay
Jill Lyons
 
Social Networking and E-discovery
Social Networking and E-discoverySocial Networking and E-discovery
Social Networking and E-discovery
Mary-Ellen Wyatt King
 
Why Study Ethics In Law Enforcement
Why Study Ethics In Law EnforcementWhy Study Ethics In Law Enforcement
Why Study Ethics In Law Enforcement
Patty Buckley
 
Fake news and fact finding
Fake news and fact findingFake news and fact finding
Fake news and fact finding
Yumonomics
 
Cyber Security 4.0 conference 30 November 2016
Cyber Security 4.0 conference 30 November 2016Cyber Security 4.0 conference 30 November 2016
Cyber Security 4.0 conference 30 November 2016
InfinIT - Innovationsnetværket for it
 
Lis 768 Privacy Presentation
Lis 768 Privacy PresentationLis 768 Privacy Presentation
Lis 768 Privacy Presentation
Julia Bryan-Diehl
 
Fourth Amendment as a Service - Workshop - 2-21-17
Fourth Amendment as a Service - Workshop - 2-21-17Fourth Amendment as a Service - Workshop - 2-21-17
Fourth Amendment as a Service - Workshop - 2-21-17
FourthAsAService
 
The Self-Invasion Of Privacy
The Self-Invasion Of PrivacyThe Self-Invasion Of Privacy
The Self-Invasion Of Privacy
Diane Allen
 
Social Media Law: It is Real, and, Yes, It Really Can Impact Your Business - ...
Social Media Law: It is Real, and, Yes, It Really Can Impact Your Business - ...Social Media Law: It is Real, and, Yes, It Really Can Impact Your Business - ...
Social Media Law: It is Real, and, Yes, It Really Can Impact Your Business - ...
Shawn Tuma
 
Professional Essay Writing Service Australia Essay Onli
Professional Essay Writing Service Australia Essay OnliProfessional Essay Writing Service Australia Essay Onli
Professional Essay Writing Service Australia Essay Onli
Allison Koehn
 
Writing copy 7 research 1
Writing copy 7 research 1Writing copy 7 research 1
Writing copy 7 research 1
ashboyne
 
Writing copy 7 research 1
Writing copy 7 research 1Writing copy 7 research 1
Writing copy 7 research 1
ashboyne
 
My Space Project
My Space ProjectMy Space Project
My Space Project
Pat Howarth
 
My Space Project
My Space ProjectMy Space Project
My Space Project
Pat Howarth
 

Similar to Privacy Law (14)

NSA Persuasive Essay
NSA Persuasive EssayNSA Persuasive Essay
NSA Persuasive Essay
 
Social Networking and E-discovery
Social Networking and E-discoverySocial Networking and E-discovery
Social Networking and E-discovery
 
Why Study Ethics In Law Enforcement
Why Study Ethics In Law EnforcementWhy Study Ethics In Law Enforcement
Why Study Ethics In Law Enforcement
 
Fake news and fact finding
Fake news and fact findingFake news and fact finding
Fake news and fact finding
 
Cyber Security 4.0 conference 30 November 2016
Cyber Security 4.0 conference 30 November 2016Cyber Security 4.0 conference 30 November 2016
Cyber Security 4.0 conference 30 November 2016
 
Lis 768 Privacy Presentation
Lis 768 Privacy PresentationLis 768 Privacy Presentation
Lis 768 Privacy Presentation
 
Fourth Amendment as a Service - Workshop - 2-21-17
Fourth Amendment as a Service - Workshop - 2-21-17Fourth Amendment as a Service - Workshop - 2-21-17
Fourth Amendment as a Service - Workshop - 2-21-17
 
The Self-Invasion Of Privacy
The Self-Invasion Of PrivacyThe Self-Invasion Of Privacy
The Self-Invasion Of Privacy
 
Social Media Law: It is Real, and, Yes, It Really Can Impact Your Business - ...
Social Media Law: It is Real, and, Yes, It Really Can Impact Your Business - ...Social Media Law: It is Real, and, Yes, It Really Can Impact Your Business - ...
Social Media Law: It is Real, and, Yes, It Really Can Impact Your Business - ...
 
Professional Essay Writing Service Australia Essay Onli
Professional Essay Writing Service Australia Essay OnliProfessional Essay Writing Service Australia Essay Onli
Professional Essay Writing Service Australia Essay Onli
 
Writing copy 7 research 1
Writing copy 7 research 1Writing copy 7 research 1
Writing copy 7 research 1
 
Writing copy 7 research 1
Writing copy 7 research 1Writing copy 7 research 1
Writing copy 7 research 1
 
My Space Project
My Space ProjectMy Space Project
My Space Project
 
My Space Project
My Space ProjectMy Space Project
My Space Project
 

Recently uploaded

C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptxC1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
mulvey2
 
clinical examination of hip joint (1).pdf
clinical examination of hip joint (1).pdfclinical examination of hip joint (1).pdf
clinical examination of hip joint (1).pdf
Priyankaranawat4
 
How to Setup Warehouse & Location in Odoo 17 Inventory
How to Setup Warehouse & Location in Odoo 17 InventoryHow to Setup Warehouse & Location in Odoo 17 Inventory
How to Setup Warehouse & Location in Odoo 17 Inventory
Celine George
 
Cognitive Development Adolescence Psychology
Cognitive Development Adolescence PsychologyCognitive Development Adolescence Psychology
Cognitive Development Adolescence Psychology
paigestewart1632
 
MARY JANE WILSON, A “BOA MÃE” .
MARY JANE WILSON, A “BOA MÃE”           .MARY JANE WILSON, A “BOA MÃE”           .
MARY JANE WILSON, A “BOA MÃE” .
Colégio Santa Teresinha
 
How to Manage Your Lost Opportunities in Odoo 17 CRM
How to Manage Your Lost Opportunities in Odoo 17 CRMHow to Manage Your Lost Opportunities in Odoo 17 CRM
How to Manage Your Lost Opportunities in Odoo 17 CRM
Celine George
 
writing about opinions about Australia the movie
writing about opinions about Australia the moviewriting about opinions about Australia the movie
writing about opinions about Australia the movie
Nicholas Montgomery
 
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UP
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UPLAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UP
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UP
RAHUL
 
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama UniversityNatural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
Akanksha trivedi rama nursing college kanpur.
 
Smart-Money for SMC traders good time and ICT
Smart-Money for SMC traders good time and ICTSmart-Money for SMC traders good time and ICT
Smart-Money for SMC traders good time and ICT
simonomuemu
 
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdfANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
Priyankaranawat4
 
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
PECB
 
Pengantar Penggunaan Flutter - Dart programming language1.pptx
Pengantar Penggunaan Flutter - Dart programming language1.pptxPengantar Penggunaan Flutter - Dart programming language1.pptx
Pengantar Penggunaan Flutter - Dart programming language1.pptx
Fajar Baskoro
 
Main Java[All of the Base Concepts}.docx
Main Java[All of the Base Concepts}.docxMain Java[All of the Base Concepts}.docx
Main Java[All of the Base Concepts}.docx
adhitya5119
 
PIMS Job Advertisement 2024.pdf Islamabad
PIMS Job Advertisement 2024.pdf IslamabadPIMS Job Advertisement 2024.pdf Islamabad
PIMS Job Advertisement 2024.pdf Islamabad
AyyanKhan40
 
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdfবাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
eBook.com.bd (প্রয়োজনীয় বাংলা বই)
 
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
National Information Standards Organization (NISO)
 
Hindi varnamala | hindi alphabet PPT.pdf
Hindi varnamala | hindi alphabet PPT.pdfHindi varnamala | hindi alphabet PPT.pdf
Hindi varnamala | hindi alphabet PPT.pdf
Dr. Mulla Adam Ali
 
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Dr. Vinod Kumar Kanvaria
 
S1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptxS1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptx
tarandeep35
 

Recently uploaded (20)

C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptxC1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
 
clinical examination of hip joint (1).pdf
clinical examination of hip joint (1).pdfclinical examination of hip joint (1).pdf
clinical examination of hip joint (1).pdf
 
How to Setup Warehouse & Location in Odoo 17 Inventory
How to Setup Warehouse & Location in Odoo 17 InventoryHow to Setup Warehouse & Location in Odoo 17 Inventory
How to Setup Warehouse & Location in Odoo 17 Inventory
 
Cognitive Development Adolescence Psychology
Cognitive Development Adolescence PsychologyCognitive Development Adolescence Psychology
Cognitive Development Adolescence Psychology
 
MARY JANE WILSON, A “BOA MÃE” .
MARY JANE WILSON, A “BOA MÃE”           .MARY JANE WILSON, A “BOA MÃE”           .
MARY JANE WILSON, A “BOA MÃE” .
 
How to Manage Your Lost Opportunities in Odoo 17 CRM
How to Manage Your Lost Opportunities in Odoo 17 CRMHow to Manage Your Lost Opportunities in Odoo 17 CRM
How to Manage Your Lost Opportunities in Odoo 17 CRM
 
writing about opinions about Australia the movie
writing about opinions about Australia the moviewriting about opinions about Australia the movie
writing about opinions about Australia the movie
 
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UP
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UPLAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UP
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UP
 
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama UniversityNatural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
 
Smart-Money for SMC traders good time and ICT
Smart-Money for SMC traders good time and ICTSmart-Money for SMC traders good time and ICT
Smart-Money for SMC traders good time and ICT
 
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdfANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
 
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
 
Pengantar Penggunaan Flutter - Dart programming language1.pptx
Pengantar Penggunaan Flutter - Dart programming language1.pptxPengantar Penggunaan Flutter - Dart programming language1.pptx
Pengantar Penggunaan Flutter - Dart programming language1.pptx
 
Main Java[All of the Base Concepts}.docx
Main Java[All of the Base Concepts}.docxMain Java[All of the Base Concepts}.docx
Main Java[All of the Base Concepts}.docx
 
PIMS Job Advertisement 2024.pdf Islamabad
PIMS Job Advertisement 2024.pdf IslamabadPIMS Job Advertisement 2024.pdf Islamabad
PIMS Job Advertisement 2024.pdf Islamabad
 
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdfবাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
 
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
 
Hindi varnamala | hindi alphabet PPT.pdf
Hindi varnamala | hindi alphabet PPT.pdfHindi varnamala | hindi alphabet PPT.pdf
Hindi varnamala | hindi alphabet PPT.pdf
 
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
 
S1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptxS1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptx
 

Privacy Law

  • 1.
  • 2. The Guardian BBC News Brown, Andrew. They Know All UN Warns on Password About You. The Guardian. “Explosion.” BBC News. Retrieved April 26, 2009 from Retrieved April 26, 2009 from http://www.guardian.co.uk/wo http://news.bbc.co.uk/1/hi/tec rld/2006/aug/28/usa.searcheng hnology/6199372.stm ines
  • 3. New York Times Washington Post Leppard, David. Police Set to Bridis, Ted. FBI Eavesdropping Step Up Hacking of Home PC’s. Tools. Washington Post. NY Times. Retrieved April 26, Retrieved April 26, 2009 from 2009 from http://www.rumormillnews.co http://www.timesonline.co.uk/t m/cgi- ol/news/politics/article5439604. bin/archive.cgi?noframes;rea ece d=15391
  • 4. San Francisco Chronicle New York Times Schwartz, Mattathias. The Trolls Chonin, Neva. Sex and the City. Among Us. New York Times. San Francisco Chronicle. Retrieved April 26, 2009 from Retrieved April 26, 2009 from http://www.nytimes.com/2008/ http://www.sfgate.com/cgi- 08/03/magazine/03trolls- bin/article.cgi?f=/c/a/2006/09/ t.html?ex=1375329600&en=b50 17/PKG6BKQQA41.DTL 85d50ee5c65e5&ei=5124&part ner=permalink&exprod=permali nk
  • 5. eSchool News The Wired Campus Teachers Warned About A MySpace Photo Costs a MySpace Profiles. eSchool Student a Teaching Certificate. News. Retrieved April 26, 2009 The Wired Campus. Retrieved from April 26, 2009 from http://www.eschoolnews.com/ http://chronicle.com/wiredca news/top-news/related-top- mpus/index.php?id=2029 news/index.cfm?i=50557
  • 6. Washington Post Electronic Privacy Information Center Deutsch, Sarah. Supreme RIAA v. Verizon. Electronic Court Internet Privacy Decision. Privacy Information Center. The Washington Post. Retrieved Retrieved April 26, 2009 from April 26, 2009 from http://epic.org/privacy/copyrig http://www.washingtonpost.co ht/verizon/ m/wp-dyn/articles/A29974- 2004Oct13.html
  • 7.  Summer 2002 – RIAA files suit against four people for music piracy  RIAA requests user information from Verizon  Verizon did not comply  RIAA sues Verizon  Supreme Court rules in favor of Verizon
  • 8.  Courtney Meyers – Political Science / Journalism  Kenneth Taylor - Political Science  Zach Thomas – Chemistry  Lawson Doyle – Business Management  Matt Sullivan - Business Management
  • 9. 1.Should the recording industry be granted information about users of peer to peer software or torrent sites?  Courtney Meyers – No, not if the clients had signed a confidential contract and had a reasonable expectation of privacy.  Kenneth Taylor - No, I believe that it is a privacy issue. It should never be assumed that a consumer consents to having their information used in ways outside of their consent.  Zach Thomas - That should be the policy of the individual P2P software firm. I'd like to see IP laws change, because there are other pathways for musicians and movie-stars to be paid.  Lawson Doyle - No, it takes away from people's privacy.  Matt Sullivan - No. The RIAA has no right to personal information unless it is provided directly to them from the user. Downloading music is illegal, but the RIAA does not have the right to infringe on individual privacy when there was no direct theft from them.
  • 10. 2. Do you think users of such programs should be held responsible for stealing music?  Courtney Meyers - No, because copyrighted music is a corrupt system, it isn't the creator of the music benefiting, but recording industry. Downloading of files promotes the artist.  Kenneth Taylor - No, I believe only those who provide the service should be held responsible.  Zach Thomas - Not unless they are trying to sell it.  Lawson Doyle - No, it has grown to such an extent that a great majority of people are responsible.  Matt Sullivan - I don’t think there is any good way to properly judge and punish every single person who “steals” music.
  • 11. 3. Should employers, university's, or other institutions be allowed to fire or penalize people for the content of their myspace or facebook pages?  Courtney Meyers - Yes, when working for a private company a person’s reflects on that organization. An organization has the right to penalize someone for displaying unethical, illegal or irresponsible behavior on the Internet.  Kenneth Taylor - Yes, as an employee your actions reflect those of the company. If the content could do harm to the integrity of the organization, I believe they should be able to take action.  Zach Thomas - What you put on social networking sites is pretty much public information, but I don't think you should be penalized for your political or religious information .  Lawson Doyle - If they can access the page that’s fine, but using a person’s friends as a “backdoor” should not be allowed.  Matt Sullivan - If you state where you work on your myspace page then you are representing the company and they should be allowed leverage over you. You pay universities tuition, so they should have no say over your myspace content.
  • 12. 4. Do you feel it is ethical for google and other search engines to supply data, such as email or search engine queries, to the U.S. government?  Courtney Meyers - Yes, as long as users of google and other search engines know that data may be monitored.  Kenneth Taylor - Yes, the information that is provided is open and free to the public.  Zach Thomas – Yes, and the government will keep tabs of google searches no matter how illegal it is.  Lawson Doyle - I only think it is unethical if the information is of individuals and not anonymous.  Matt Sullivan - No, but much of what the government does isn’t ethical. People actually assume their information is secure, so if their privacy was to be compromised by giving their data to the government that would be a breach of trust and an ethical impass.
  • 13. 5. Should google even keep records of such material?  Courtney Meyers – Yes, by monitoring this information, google is better able to improve their product and grow advertising revenue by figuring out how advertisers can reach their desired audience.  Kenneth Taylor - Yes, any information that is given and used by the Federal Government should be recorded and released at a later date for accountability purposes.  Zach Thomas -I'd like for it not to, but it's not a public utility, google owns the information. The world of no privacy is scary, but if you don't like it, don't google anything.  Lawson Doyle - Yes, only if personal information is not stored. Keeping personal information that is not permitted by the user is a breach of their privacy.  Matt Sullivan - I think they should keep whatever records they feel like; as long as they keep the information for internal use, no harm is done.
  • 14. 6. The U.K. allows its law enforcement agencies access to the content of private computers via spyware without a warrant. Do you think this could happen in the U.S.? Should it?  Courtney Meyers - No it won't happen here. The British have a very different form of government. It has no written Constitution, and the laws are such a journalist can be arrested on one government officials belief that a story is treasonous.  Kenneth Taylor - I believe that this could possibly happen here in the U.S. although I do think that it would be a clear violation of the Constitution.  Zach Thomas - I don't like it, but I absolutely think the US government is doing that.  Lawson Doyle - It could happen, but I strongly disapprove of it. It is a deceitful and unjust means of operation.  Matt Sullivan - Accessing computers directly is a blatant invasion of privacy. If there is a place where the government, including law enforcement, should stop it should be at the access point to a computer.
  • 15. 7. The FBI uses a similar keylogging trojan called lantern, which some antivirus programs have chosen to ignore when checking for viruses. Should the creators of the antivirus programs protect their users or aid the FBI?  Courtney Meyers – The programs should not detect the FBI keylogger, but the keylogger should only be used with a warrant.  Kenneth Taylor - I believe that upon principal the producer should always protect the consumer as it relates to the product.  Zach Thomas - I would like the antivirus programs to protect the users as a matter of principle, but it's not going to happen.  Lawson Doyle - They should protect the users, until the virus is accredited and lawful. I believe the FBI is wrong for monitoring the internet in such a deceitful manner.  Matt Sullivan - They should protect against the FBI because the user pays for virus protection, which includes Trojans, no matter who writes or uses them. No hacking or virus writing is legal.
  • 16. 8. Overall, do you feel privacy should be protected online? If so, how much?  Courtney Meyers - As I stated earlier, there are many problems with current IP laws. However, I don't believe one should blanket the issue with a concrete answer on an organic topic.  Kenneth Taylor - I believe privacy, such as any other civil liberty, should be protected by the government.  Zach Thomas - Privacy should be protected online to the extent that certain types of information gathering should be illegal google searches, for instance.  Lawson Doyle - Yes, I think it is very important. There is no reason why privacy on the internet should be any different than other common forms privacy with U.S. citizens.  Matt Sullivan - I think all privacy that travels over hard lines is by law required to be protected.
  • 17. 1 2 3 4 5 6 7 8 Courtney P P NP NP NP NA NP NA Kenneth P P NP NP NP NA P P Zach P P NP NP P NA P P Lawson P P P P P NA P P Matt P P P P NP NA P P P = In favor of privacy; NP = not in favor of privacy; NA = Not applicable
  • 18. Privacy For 60% Against 25% Unclear 15%