The document discusses surveillance and privacy issues. It describes a 2008 decision by the Swedish Data Inspection Authority that companies cannot use GPS to monitor employees' work hours. It also discusses surveillance of children, hidden cameras disguised as common objects, and how personal data is collected and used online. The document provides historical context on the development of privacy laws and issues over time as technologies advanced.
IBM Tivoli Event Management - Folksams resa mot en centraliserad övervakningIBM Sverige
Folksam delar med sig av sina erfarenheter kring deras sätt att jobba med Event Management. Vilka problemområden vill man lösa och varför? Denna presentation hölls vid ett seminariepass för Tivoli på IBM Software Day 2010. Talare: Harald Wikell, Komponentansvarig Systems Management på Folksam
Kameraövervakningens effekter – vad vet vi och vad vet vi inte? Benjamin Weaver
Lusax presentation vid en workshop om övervakning och integritet, organiserad av Wilhelm Agrell på uppdrag av Myndigheten for samhällsskydd och beredskap (MSB), 5 mars 2014 i Lund.
https://digitalguardian.com/blog/social-engineering-attacks-common-techniques-how-prevent-attack
Statement of Michelle Richardson, Director, Privacy & Data
Center for Democracy & Technology
before the
United States Senate Committee on the Judiciary
GDPR & CCPA: Opt-ins, Consumer Control, and the Impact on Competition and Innovation
March 12, 2019
On behalf of the Center for Democracy & Technology (CDT), thank you for the
opportunity to testify about the importance of crafting a federal consumer privacy law that
provides meaningful protections for Americans and clarity for entities of all sizes and sectors.
CDT is a nonpartisan, nonprofit 501(c)(3) charitable organization dedicated to advancing the
rights of the individual in the digital world. CDT is committed to protecting privacy as a
fundamental human and civil right and as a necessity for securing other rights such as access to
justice, equal protection, and freedom of expression. CDT has offices in Washington, D.C., and
Brussels, and has a diverse funding portfolio from foundation grants, corporate donations, and
individual donations.1
The United States should be leading the way in protecting digital civil rights. This hearing
is an opportunity to learn how Congress can improve upon the privacy frameworks offered in
the European Union via the General Data Protection Regulation (GDPR) and the California
Consumer Privacy Act (CCPA) to craft a comprehensive privacy law that works for the U.S. Our
digital future should be one in which technology supports human rights and human dignity. This
future cannot be realized if people are forced to choose between protecting their personal
information and using the technologies and services that enhance our lives. This future depends
on clear and meaningful rules governing data processing; rules that do not simply provide
1 All donations over $1,000 are disclosed in our annual report and are available online at:
https://cdt.org/financials/.
2
people with notices and check boxes but actually protect them from privacy and security
abuses and data-driven discrimination; protections that cannot be signed away.
Congress should resist the narratives that innovative technologies and strong privacy
protections are fundamentally at odds, and that a privacy law would necessarily cement the
market dominance of a few large companies. Clear and focused privacy rules can help
companies of all sizes gain certainty with respect to appropriate and inappropriate uses of data.
Clear rules will also empower engineers and product managers to design for privacy on the
front end, rather than having to wait for a public privacy scandal to force the rollback of a
product or data practice.
We understand that drafting comprehensive privacy legislation is a complex endeavor.
Over the past year we have worked with partners in civil societ.
IBM Tivoli Event Management - Folksams resa mot en centraliserad övervakningIBM Sverige
Folksam delar med sig av sina erfarenheter kring deras sätt att jobba med Event Management. Vilka problemområden vill man lösa och varför? Denna presentation hölls vid ett seminariepass för Tivoli på IBM Software Day 2010. Talare: Harald Wikell, Komponentansvarig Systems Management på Folksam
Kameraövervakningens effekter – vad vet vi och vad vet vi inte? Benjamin Weaver
Lusax presentation vid en workshop om övervakning och integritet, organiserad av Wilhelm Agrell på uppdrag av Myndigheten for samhällsskydd och beredskap (MSB), 5 mars 2014 i Lund.
https://digitalguardian.com/blog/social-engineering-attacks-common-techniques-how-prevent-attack
Statement of Michelle Richardson, Director, Privacy & Data
Center for Democracy & Technology
before the
United States Senate Committee on the Judiciary
GDPR & CCPA: Opt-ins, Consumer Control, and the Impact on Competition and Innovation
March 12, 2019
On behalf of the Center for Democracy & Technology (CDT), thank you for the
opportunity to testify about the importance of crafting a federal consumer privacy law that
provides meaningful protections for Americans and clarity for entities of all sizes and sectors.
CDT is a nonpartisan, nonprofit 501(c)(3) charitable organization dedicated to advancing the
rights of the individual in the digital world. CDT is committed to protecting privacy as a
fundamental human and civil right and as a necessity for securing other rights such as access to
justice, equal protection, and freedom of expression. CDT has offices in Washington, D.C., and
Brussels, and has a diverse funding portfolio from foundation grants, corporate donations, and
individual donations.1
The United States should be leading the way in protecting digital civil rights. This hearing
is an opportunity to learn how Congress can improve upon the privacy frameworks offered in
the European Union via the General Data Protection Regulation (GDPR) and the California
Consumer Privacy Act (CCPA) to craft a comprehensive privacy law that works for the U.S. Our
digital future should be one in which technology supports human rights and human dignity. This
future cannot be realized if people are forced to choose between protecting their personal
information and using the technologies and services that enhance our lives. This future depends
on clear and meaningful rules governing data processing; rules that do not simply provide
1 All donations over $1,000 are disclosed in our annual report and are available online at:
https://cdt.org/financials/.
2
people with notices and check boxes but actually protect them from privacy and security
abuses and data-driven discrimination; protections that cannot be signed away.
Congress should resist the narratives that innovative technologies and strong privacy
protections are fundamentally at odds, and that a privacy law would necessarily cement the
market dominance of a few large companies. Clear and focused privacy rules can help
companies of all sizes gain certainty with respect to appropriate and inappropriate uses of data.
Clear rules will also empower engineers and product managers to design for privacy on the
front end, rather than having to wait for a public privacy scandal to force the rollback of a
product or data practice.
We understand that drafting comprehensive privacy legislation is a complex endeavor.
Over the past year we have worked with partners in civil societ.
Warrants. Wiretaps. PRTTs. Subpoenas. Section 702. 2703(d) order. National Security Letters. All Writs Act. Many in the infosec community are aware that the government has an array of legal authorities to use in investigating crimes which allow them access to user content and metadata, but few people could articulate the differences among these types of orders. This talk will review each type of legal process used by state and federal agencies to request access to various types of user data and content.
ODI Queensland - Open Data Essentials - Law and LicensingAusGOAL
This presentation was conducted for ODI Queensland by Baden Appleyard. It examines the law and licensing issues associated with open data, in particular from a Queensland perspective. It was presented on 21 October 2015. Links to further resources exist within the presentation.
Lofty Ideals: The Nature of Clouds and EncryptionSean Whalen
An overview of the legal, privacy, and security issues surrounding modern cloud services and cryptography
Created as an alumnus talk for the Computer & Network Support Technology Fairfield Career Center senior class of 2016.
1 (Slip Opinion) OCTOBER TERM, 2017
Syllabus
NOTE: Where it is feasible, a syllabus (headnote) will be released, as is
being done in connection with this case, at the time the opinion is issued.
The syllabus constitutes no part of the opinion of the Court but has been
prepared by the Reporter of Decisions for the convenience of the reader.
See United States v. Detroit Timber & Lumber Co., 200 U. S. 321, 337.
SUPREME COURT OF THE UNITED STATES
Syllabus
CARPENTER v. UNITED STATES
CERTIORARI TO THE UNITED STATES COURT OF APPEALS FOR
THE SIXTH CIRCUIT
No. 16–402. Argued November 29, 2017—Decided June 22, 2018
Cell phones perform their wide and growing variety of functions by con-
tinuously connecting to a set of radio antennas called “cell sites.”
Each time a phone connects to a cell site, it generates a time-stamped
record known as cell-site location information (CSLI). Wireless carri-
ers collect and store this information for their own business purposes.
Here, after the FBI identified the cell phone numbers of several rob-
bery suspects, prosecutors were granted court orders to obtain the
suspects’ cell phone records under the Stored Communications Act.
Wireless carriers produced CSLI for petitioner Timothy Carpenter’s
phone, and the Government was able to obtain 12,898 location points
cataloging Carpenter’s movements over 127 days—an average of 101
data points per day. Carpenter moved to suppress the data, arguing
that the Government’s seizure of the records without obtaining a
warrant supported by probable cause violated the Fourth Amend-
ment. The District Court denied the motion, and prosecutors used
the records at trial to show that Carpenter’s phone was near four of
the robbery locations at the time those robberies occurred. Carpen-
ter was convicted. The Sixth Circuit affirmed, holding that Carpen-
ter lacked a reasonable expectation of privacy in the location infor-
mation collected by the FBI because he had shared that information
with his wireless carriers.
Held:
1. The Government’s acquisition of Carpenter’s cell-site records
was a Fourth Amendment search. Pp. 4–18.
(a) The Fourth Amendment protects not only property interests
but certain expectations of privacy as well. Katz v. United States, 389
U. S. 347, 351. Thus, when an individual “seeks to preserve some-
thing as private,” and his expectation of privacy is “one that society is
2 CARPENTER v. UNITED STATES
Syllabus
prepared to recognize as reasonable,” official intrusion into that
sphere generally qualifies as a search and requires a warrant sup-
ported by probable cause. Smith v. Maryland, 442 U. S. 735, 740 (in-
ternal quotation marks and alterations omitted). The analysis re-
garding which expectations of privacy are entitled to protection is
informed by historical understandings “of what was deemed an un-
reasonable search and seizure when [the Fourth Amendment] was
adopted.” Carroll v. United States, 267 U. S..
Evolving international privacy regulations and cross border data transfer - g...Ulf Mattsson
We will discuss the Evolving International Privacy Regulations. Cross Border Data Transfer for GDPR under Schrems II is now ruled by an EU court that defined what is required. This ruling can be far reaching for many businesses.
Is technology making us more introverted and less social? Are selfies making us narcissistic? Or are we entering into a new genre of social behavior, speech and aesthetic.
Warrants. Wiretaps. PRTTs. Subpoenas. Section 702. 2703(d) order. National Security Letters. All Writs Act. Many in the infosec community are aware that the government has an array of legal authorities to use in investigating crimes which allow them access to user content and metadata, but few people could articulate the differences among these types of orders. This talk will review each type of legal process used by state and federal agencies to request access to various types of user data and content.
ODI Queensland - Open Data Essentials - Law and LicensingAusGOAL
This presentation was conducted for ODI Queensland by Baden Appleyard. It examines the law and licensing issues associated with open data, in particular from a Queensland perspective. It was presented on 21 October 2015. Links to further resources exist within the presentation.
Lofty Ideals: The Nature of Clouds and EncryptionSean Whalen
An overview of the legal, privacy, and security issues surrounding modern cloud services and cryptography
Created as an alumnus talk for the Computer & Network Support Technology Fairfield Career Center senior class of 2016.
1 (Slip Opinion) OCTOBER TERM, 2017
Syllabus
NOTE: Where it is feasible, a syllabus (headnote) will be released, as is
being done in connection with this case, at the time the opinion is issued.
The syllabus constitutes no part of the opinion of the Court but has been
prepared by the Reporter of Decisions for the convenience of the reader.
See United States v. Detroit Timber & Lumber Co., 200 U. S. 321, 337.
SUPREME COURT OF THE UNITED STATES
Syllabus
CARPENTER v. UNITED STATES
CERTIORARI TO THE UNITED STATES COURT OF APPEALS FOR
THE SIXTH CIRCUIT
No. 16–402. Argued November 29, 2017—Decided June 22, 2018
Cell phones perform their wide and growing variety of functions by con-
tinuously connecting to a set of radio antennas called “cell sites.”
Each time a phone connects to a cell site, it generates a time-stamped
record known as cell-site location information (CSLI). Wireless carri-
ers collect and store this information for their own business purposes.
Here, after the FBI identified the cell phone numbers of several rob-
bery suspects, prosecutors were granted court orders to obtain the
suspects’ cell phone records under the Stored Communications Act.
Wireless carriers produced CSLI for petitioner Timothy Carpenter’s
phone, and the Government was able to obtain 12,898 location points
cataloging Carpenter’s movements over 127 days—an average of 101
data points per day. Carpenter moved to suppress the data, arguing
that the Government’s seizure of the records without obtaining a
warrant supported by probable cause violated the Fourth Amend-
ment. The District Court denied the motion, and prosecutors used
the records at trial to show that Carpenter’s phone was near four of
the robbery locations at the time those robberies occurred. Carpen-
ter was convicted. The Sixth Circuit affirmed, holding that Carpen-
ter lacked a reasonable expectation of privacy in the location infor-
mation collected by the FBI because he had shared that information
with his wireless carriers.
Held:
1. The Government’s acquisition of Carpenter’s cell-site records
was a Fourth Amendment search. Pp. 4–18.
(a) The Fourth Amendment protects not only property interests
but certain expectations of privacy as well. Katz v. United States, 389
U. S. 347, 351. Thus, when an individual “seeks to preserve some-
thing as private,” and his expectation of privacy is “one that society is
2 CARPENTER v. UNITED STATES
Syllabus
prepared to recognize as reasonable,” official intrusion into that
sphere generally qualifies as a search and requires a warrant sup-
ported by probable cause. Smith v. Maryland, 442 U. S. 735, 740 (in-
ternal quotation marks and alterations omitted). The analysis re-
garding which expectations of privacy are entitled to protection is
informed by historical understandings “of what was deemed an un-
reasonable search and seizure when [the Fourth Amendment] was
adopted.” Carroll v. United States, 267 U. S..
Evolving international privacy regulations and cross border data transfer - g...Ulf Mattsson
We will discuss the Evolving International Privacy Regulations. Cross Border Data Transfer for GDPR under Schrems II is now ruled by an EU court that defined what is required. This ruling can be far reaching for many businesses.
Is technology making us more introverted and less social? Are selfies making us narcissistic? Or are we entering into a new genre of social behavior, speech and aesthetic.
Safalta Digital marketing institute in Noida, provide complete applications that encompass a huge range of virtual advertising and marketing additives, which includes search engine optimization, virtual communication advertising, pay-per-click on marketing, content material advertising, internet analytics, and greater. These university courses are designed for students who possess a comprehensive understanding of virtual marketing strategies and attributes.Safalta Digital Marketing Institute in Noida is a first choice for young individuals or students who are looking to start their careers in the field of digital advertising. The institute gives specialized courses designed and certification.
for beginners, providing thorough training in areas such as SEO, digital communication marketing, and PPC training in Noida. After finishing the program, students receive the certifications recognised by top different universitie, setting a strong foundation for a successful career in digital marketing.
Read| The latest issue of The Challenger is here! We are thrilled to announce that our school paper has qualified for the NATIONAL SCHOOLS PRESS CONFERENCE (NSPC) 2024. Thank you for your unwavering support and trust. Dive into the stories that made us stand out!
Normal Labour/ Stages of Labour/ Mechanism of LabourWasim Ak
Normal labor is also termed spontaneous labor, defined as the natural physiological process through which the fetus, placenta, and membranes are expelled from the uterus through the birth canal at term (37 to 42 weeks
This slide is special for master students (MIBS & MIFB) in UUM. Also useful for readers who are interested in the topic of contemporary Islamic banking.
Tuesday, September 8, 2009 Mathias Klang klang@ituniv.se ctrl frk 2 by kreep cc by nc sa
What are you looking at? by Enjoy Surveillance cc by nc sa Tuesday, September 8, 2009 Mathias Klang klang@ituniv.se
GPS by orangejack cc by nc sa GPS-övervakning av anställda vanligare SVD 2008 http://www.svd.se/nyheter/inrikes/artikel_1553599.svd Tuesday, September 8, 2009 Mathias Klang klang@ituniv.se
http://www.datainspektionen.se/press/nyhetsarkiv/2008/inte-tillatet-att-kontrollera-arbetstider-med-gps/ http://www.datainspektionen.se/Documents/beslut/2008-03-03-GPS-kontroll.pdf Tuesday, September 8, 2009 Mathias Klang klang@ituniv.se
running after pigeons by wrote cc by nc Schoolkid chipping trial 'a success' http://www.theregister.co.uk/2007/10/22/kid_chipping_doncaster_go/ Tuesday, September 8, 2009 Mathias Klang klang@ituniv.se
http://www.spyshops.ca/trackerbackpack.htm Tuesday, September 8, 2009 Mathias Klang klang@ituniv.se
http://www.brickhousesecurity.com/wf200.html Tuesday, September 8, 2009 Mathias Klang klang@ituniv.se
LEGO Gears of War Minifigs by Dunechaser by nc sa Tuesday, September 8, 2009 Mathias Klang klang@ituniv.se
http://www.dpl-surveillance-equipment.com/100611.html Tuesday, September 8, 2009 Mathias Klang klang@ituniv.se
http://www.dpl-surveillance-equipment.com/1006177.html Tuesday, September 8, 2009 Mathias Klang klang@ituniv.se
AIR travellers will be invited to take part in "virtual strip searches" [X-rays] at Australian airports when the Federal Government begins trials of security screening measures this month. The measures include a body scanner [X-rays] that can see what lies under a person's clothes. The Government says the scanner could detect weapons and explosives, but critics say it is an invasion of privacy. "It provides detailed images of a person's body … which many people might find highly embarrassing," said Stephen Blanks, of the NSW Council for Civil Liberties. http://publik18.blogspot.com/2008/10/privacy-health-fears-over-airport-body.html Tuesday, September 8, 2009 Mathias Klang klang@ituniv.se
Google automatically scans e-mails to add context-sensitive advertisements to them. Privacy advocates raised concerns that the plan involved scanning their personal, assumed private, e-mails, and that this was a security problem. Allowing e-mail content to be read, even by a computer, raises the risk that the expectation of privacy in e-mail will be reduced. Furthermore, e-mail that non-subscribers choose to send to Gmail accounts is scanned by Gmail as well, even though those senders never agreed to Gmail's terms of service or privacy policy. Google can change its privacy policy unilaterally and Google is technically able to cross-reference cookies across its information-rich product line to make dossiers on individuals. However, most e-mail systems make use of server-side content scanning in order to check for spam . [41] [42] Privacy advocates also regard the lack of disclosed data retention and correlation policies as problematic. Google has the ability to combine information contained in a person's e-mail messages with information from Internet searches. Google has not confirmed how long such information is kept or how it can be used. One of the concerns is that it could be of interest to law enforcement agencies. More than 30 privacy and civil liberties organizations have urged Google to suspend Gmail service until these issues are resolved. [43] Gmail's privacy policy contains the clause: "residual copies of deleted messages and accounts may take up to 60 days to be deleted from our active servers and may remain in our offline backup systems". Google points out that Gmail adheres to most industry-wide practices. Google has stated that they will "make reasonable efforts to remove deleted information from our systems as quickly as is practical." [44] [45] Google defends its position by citing their use of email-scanning to the user's benefit. Google states that Gmail refrains from displaying ads next to potentially sensitive messages such as those that mention tragedy, catastrophe, or death. [4 Tuesday, September 8, 2009 Mathias Klang klang@ituniv.se
Consumer Watchdogs Flog Google's Privacy Policy (2008) http://techdailydose.nationaljournal.com/2008/06/consumer-watchdogs-flog-google.php Google originally placed a cookie on each registered user's computer, which can be used to track that person's search history, and that cookie was not set to expire until 2038 . [12] As of 2007, Google's cookie now expires in two years but renews itself when a Google service is used. [12] There is no evidence that Google turns over information to the FBI or the NSA , though some users remain anxious about the possibility. [12] In response, Google claims cookies are necessary to maintain user preferences between sessions and offer other search features. Other popular search engines, such as Yahoo! Search and Microsoft 's Bing , use cookies with distant expiration dates as well. Privacy International has raised concerns regarding the dangers and privacy implications of having a centrally-located, widely popular data warehouse of millions of Internet users' searches, and how under controversial existing U.S. law, Google can be forced to hand over all such information to the U.S. government [13] . In early 2005, the United States Department of Justice filed a motion in federal court to force Google to comply with a subpoena for, "the text of each search string entered onto Google's search engine over a one-week period (absent any information identifying the person who entered such query)." [14] Google fought the subpoena, due to concerns about users' privacy. [15] In March 2006, the court ruled partially in Google's favor, recognizing the privacy implications of turning over search terms and refusing to grant access. [16] Steve Ballmer [17] , Liz Figueroa [18] , Mark Rasch [19] , and the editors of Google Watch [20] believe the processing of email message content by Google's Gmail service goes beyond proper use. Google claims that mail sent to or from Gmail is never read by a human being beyond the account holder, and is only used to improve relevance of advertisements. [21] Whether Google is the only one doing this or simply the only one who publicly admits it is unknown, since the privacy policies of other popular email services, like Hotmail and Yahoo , allows for collection and utilizing of personal information for ads when using their services, but do not specify precisely what information and which services [22] [23] . Google's online map service, "Street View" has been accused of taking pictures and coming too close inside people's private homes and/or people who walk down the street not knowing they are being watched on Google's service. [24] [25] Aaron and Christine Boring, a Pittsburgh couple, sued Google for "invasion of privacy". They claimed that Street View made a photo of their home available online, and it diminished the value of their house, which was purchased for its privacy. [26] They lost their case in a Pennsylvania court. "While it is easy to imagine that many whose property appears on Google's virtual maps resent the privacy implications, it is hard to believe that any – other than the most exquisitely sensitive – would suffer shame or humiliation," Judge Hay ruled. [27] In its 2007 Consultation Report, Privacy International ranked Google as "Hostile to Privacy", its lowest rating on their report, making Google the only company in the list to receive that ranking. [28] [29] Carl Hewitt noted that intimate personal information is a "toxic asset" in Google datacenters because it will lead to government regulation "analogous to nuclear power plants," Consequently, he recommended that Google should perform semantic integration in clients' clouds so that client information in Google datacenters could be decrypted only by using a client's private key. [30] [ edit ] European Union European Union (EU) data protection officials (the Article 29 working party who advise the EU on privacy policy) have written to Google asking the company to justify its policy of keeping information on individuals’ internet searches for up to two years. The letter questioned whether Google has “fulfilled all the necessary requirements” on the EU laws concerning data protection. [31] The probe by the EU into the data protection issue, As of 24 May 2007 (2007 -05-24) [update] is continuing. On 1 June Google agreed that its privacy policy is vague, and that they are constantly working at making it clearer to users. [32] The resulting modifications to its privacy policies have been met with praise [33] . [ edit ] Norway The Data Inspectorate of Norway (Norway is not a member of the EU ) has investigated Google (and others) and has stated that the 18- to 24-month period for retaining data proposed by Google was too long. [34] Tuesday, September 8, 2009 Mathias Klang klang@ituniv.se
http://en.wikipedia.org/wiki/Criticism_of_Facebook 10 Privacy Settings Every Facebook User Should Know http://www.allfacebook.com/2009/02/facebook-privacy/ Facebook privacy: a guide http://arstechnica.com/web/news/2009/08/meshing-social-networking-and-privacy-on-facebook.ars Tuesday, September 8, 2009 Mathias Klang klang@ituniv.se
Tuesday, September 8, 2009 Mathias Klang klang@ituniv.se Naturlig behov Kulturell beståndsdel Social konstruktion Individ/grupp Om I är viktigt – hur mycket?
Tuesday, September 8, 2009 Mathias Klang klang@ituniv.se Foucault (1926-1984) & Benthams ( 1748 – 1832) ) model prison – The Panopticon Övervakningsarkitektur This shapes how individuals see themselves and leads them to behave differently than they might if they weren’t being observed
Tuesday, September 8, 2009 Mathias Klang klang@ituniv.se
Tuesday, September 8, 2009 Mathias Klang klang@ituniv.se
Tuesday, September 8, 2009 Mathias Klang klang@ituniv.se
Bismarck on his deathbed: Maybe this is the first example of the works of Paperazzi: Max Priester & Willy Wilcke took this picture secretly without consent; the even managed to shift the body so that the face would be more visible and turned the clock back. They sold the pictures until the Bismarck family confiscated the plates. The pictures later appeared in a.o. the Frankfurter Illustrierte Tuesday, September 8, 2009 Mathias Klang klang@ituniv.se
A reporter for the New York Daily News, Thomas Howard, sat in the front row as a woman named Ruth Snyder sat in the electric chair, in Sing Sing, in 1928; he had a concealed camera on his ankle, and he took a picture of Snyder as the electricity surged through her body. The picture sold an incredible amount of newspapers Tuesday, September 8, 2009 Mathias Klang klang@ituniv.se
Mathias Klang klang@ituniv.se Alison Chiang
Tuesday, September 8, 2009 Mathias Klang klang@ituniv.se
Tuesday, September 8, 2009 Mathias Klang klang@ituniv.se such as is in accordance with the law and is necessary in a democratic society in the interests of national security, public safety or the economic well-being of the country, for the prevention of disorder or crime, for the protection of health or morals, or for the protection of the rights and freedoms of others.
Tuesday, September 8, 2009 Mathias Klang klang@ituniv.se
Tuesday, September 8, 2009 Mathias Klang klang@ituniv.se
Tuesday, September 8, 2009 Mathias Klang klang@ituniv.se 1996 fanns i Sverige 5 000 tillstånd 2002 fanns nästan det dubbla London uppskattas antalet kameror till 2,5 miljoner; en londonbo fotograferas 300 gånger om dagen. I Berlin måste butikerna ha övervakningskameror. Försäkringsbolagen sätter det som villkor för att teckna en försäkring. I Victoria i Australien försågs nyligen taxibilarna med kameror. Där filmas passagerarna under hela resan och dessutom spelas ljudet in. En affär i Norge filmade en kvinna & barn som tog en vara och gick utan att betala. För att identifiera snattarna spelade man sekvensen på en TV-skärm i butiken. ”Snattarna” blev snart identifierade och utpekade i hela byn… … men de hade lov av kassörskan att ta varan i utbyte mot en annan…
Tuesday, September 8, 2009 Mathias Klang klang@ituniv.se
Tuesday, September 8, 2009 Mathias Klang klang@ituniv.se
Tuesday, September 8, 2009 Mathias Klang klang@ituniv.se
Maman by helen.2006 cc by nc sa Tuesday, September 8, 2009 Mathias Klang klang@ituniv.se