1 / 18

Politics and Privacy: The Misinformation Age By Meg Yahl

Politics and Privacy: The Misinformation Age By Meg Yahl. The 4 th Amendment.

forest
Télécharger la présentation

Politics and Privacy: The Misinformation Age By Meg Yahl

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Politics and Privacy:The Misinformation AgeBy Meg Yahl

  2. The 4th Amendment The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall not be violated, and no Warrants shall issue, but upon probable cause, supported by Oath or affirmation, and particularly describing the place to be searched, and the persons or things to be seized

  3. What’s all this then?

  4. “… later we extended privacy protections to new modes of communications such as the telephone, the computer, and eventually email.”

  5. Consumer Privacy Bill of Rights • Intended to protect the people’s basic right to privacy. • Serves as a guide to developing future legislation regarding online privacy. • Also intended to keep the legal jargon of the legislation clear and relatively easy to understand.

  6. Ease of Readability

  7. Sec 217 Interception of PC Tresspasser Communications (1) in section 2510— (A) in paragraph (18), by striking ‘‘and’’ at the end; (B) in paragraph (19), by striking the period and inserting a semicolon; and (C) by inserting after paragraph (19) the following: ‘‘(20) ‘protected computer’ has the meaning set forth in section 1030; and ‘‘(21) ‘computer trespasser’— ‘‘(A) means a person who accesses a protected computer without authorization and thus has no reasonable expectation of privacy in any communication transmitted to, through, or from the protected computer; and ‘‘(B) does not include a person known by the owner or operator of the protected computer to have an existing contractual relationship with the owner or operator of the protected computer for access to all or part of the protected computer.’’; …

  8. The Short Version

  9. The Long Version • (The) Uniting (and) Strengthening America (by) Providing Appropriate Tools Required (to) Intercept (and) Obstruct Terrorism (Act)

  10. The “For Dummies” Version

  11. National Security Letters

  12. Abuse of Power • “… on over 700 occasions the FBI obtained telephone toll billing records or subscriber information from 3 telephone companies without first issuing NSLs or grand jury subpoenas. Instead the FBI issued so-called ‘exigent letters’ signed by FBI Headquarters Counterterrorism Division personnel who were not authorized to sign NSLs. In many instances there was no pending investigation associated with the request at the time the exigent letters were sent. In addition … many were not issued in exigent circumstances, and the FBI was unable to determine which letters were sent in emergency circumstances due to inadequate recordkeeping.”

  13. What It Can and Can’t Do • “A national security letter cannot be used to authorize eavesdropping or to read the contents of e-mail. But it does permit investigators to trace revealing paths through the private affairs of a modern digital citizen. The records it yields describe where a person makes and spends money, with whom he lives and lived before, how much he gambles, what he buys online, what he pawns and borrows, where he travels, how he invests, what he searches for and reads on the Web, and who telephones or e-mails him at home and at work.”

  14. Expat • Definition:   A person who is voluntarily absent from home or country • In a sentence: Daniel Flynn was an American expat before the USA PATRIOT Act.

  15. Unintended Consequences • “It seems the new anti-terrorist rules are having unintended effects. … I was born in San Francisco in 1939, served my country as an army officer from 1961 to 1963, have been paying U.S. income taxes for 57 years, since 1952, have continually maintained federal voting residence, and hold a valid American passport. … [His U.S. bank of 44 years] said that the new anti-terrorism rules required them to close our account because of our address outside the U.S.”

  16. The 3rd Commandment of Computer Ethics • Thou Shalt Not Snoop Around In Other People’s Computer Files • So, which sounds more ethical to you?

  17. Presentation Resources • http://www.washingtonmonthly.com/blogphotos/Blog_National_Security_Letters.gif • http://theheretik.typepad.com/the_heretik/images/the_patriot_act_for_dummies_061005.jpg • http://www.washingtonpost.com/wp-dyn/content/article/2005/11/05/AR2005110501366.html • http://www.cartoonstock.com/directory/l/legal_jargon.asp • http://www.inquisitr.com/wp-content/2012/02/internet-privacy.jpg

More Related