Privacy Chapter 13. 2 3 The Fourth Amendment "The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable.

Slides:



Advertisements
Similar presentations
1 drt 6455 eCommerce Law lesson 8 – IT and web 2.0 associate professor faculty of law university of montreal university of montreal chair in e-Security.
Advertisements

The Two Faces of Facebook Marianne Hebert, College Libraries (In collaboration with Jenica Rogers) Alumni Weekend July 11, 2008 SUNY Potsdam Presentation.
US Constitution and Right to Privacy Generally only protects against government action Doesn’t obligate government to do something, but rather to refrain.
Teaching American History: Moot Courts and Constitutional Concepts.
The 1 st Amendment Basic Freedoms  Freedom of Speech  Freedom of Religion  Freedom of the Press  Freedom of Assembly  Right to petition the government.
Media Legal Update Lawrence M. Miller Schwartz, Woods & Miller.
Privacy No matter how exemplary your life is, there are things you want to keep to yourself © 2004, Lawrence Snyder.
Personal Integrity and Björn Nilson Personal Integrity  Integrity vs Personal Integrity  Definition(s)  Physical and mental.
Computer Encryption Cheryl Dong Naima Ritter Hayden Bottoms Jennifer Kozin Brittany James.
Security Overview Hofstra University University College for Continuing Education - Advanced Java Programming Lecturer: Engin Yalt May 24, 2006.
Facebook me! Online social networking as part of libraries’ web presence? This research is not affiliated with or sponsored by Facebook. Kim Holmberg Information.
Keeping Your Copyrights Deborah R. Gerhardt – Fall 2005.
ISTEP Sping 2009 Brent Howard ESD 101 Technology Integration Specialist
Security Outline Encryption Algorithms Authentication Protocols Message Integrity Protocols Key Distribution Firewalls.
Harvard University CSCI E-2a Life, Liberty, and Happiness After the Digital Explosion 2: Privacy.
Privacy & Personal Information -- Why do we care or do we?
Electronic Mail Security. Authentication and confidentiality problems Two systems: - PGP (Pretty Good Privacy) - S/MIME (Science Multipurpose Internet.
1 Fluency with Information Technology Lawrence Snyder Chapter 17 Privacy & Digital Security Encryption.
131 Privacy 2. DOJ Position “Visit DOJ's new website launched to educate Americans about how we are preserving.
The World-Wide Web. Why we care? How much of your personal info was released to the Internet each time you view a Web page? How much of your personal.
What if I told you that a random stranger has access to…
Safe and Responsible Social Networking Stephanie ListerBrent Howard Assistant U.S. Attorney, ED of WANorth East Washington ESD 101 Computer Crime & Intellectual.
Internet Safety. The Now Generation! Cyber-bullying Why? “A day in the life of a student has changed”
By Marta Telatin and Andrew Koennig 4 TH AMENDMENT.
Internet regulation National limits of Internet Content.
E-Commerce Security Technologies : Theft of credit card numbers Denial of service attacks (System not availability ) Consumer privacy (Confidentiality.
(By posting) Member Content to any part of the Web site, you automatically grant, and you represent and warrant that you have the right to grant, to (company.
2.6 Protecting Individual Citizens 1 st & 4 th Amendments In Depth Government & Citizenship Timpanogos High School.
Digital Citizenship Created By: Kelli Stinson June 2011.
Internet Security. Four Issues of Internet Security Authenticity: Is the sender of a message who they claim to be? Privacy: Are the contents of a message.
PROCEDURES IN THE JUSTICE SYSTEM, 8 th ed. Roberson, Wallace, and Stuckey PRENTICE HALL ©2007 Pearson Education, Inc. Upper Saddle River, NJ
Legal Issues. Overview Standard Contract Terms of Social Networking Sites Government Content on a Third-Party Site Competitive Procurement Issues First.
Chapter 5 – The Constitution and the Regulation of Business Copyright © 2011 by Jeffrey Pittman.
Compsci 82, Fall Right to Privacy? l Article 12 No one shall be subjected to arbitrary interference with his privacy, family, home or correspondence,
CPS 82, Fall Privacy before … l Instantaneous photographs and newspaper enterprise have invaded the sacred precincts of private and domestic.
The Fourth Amendment and the Home By Laura Zajac.
The Bill of Rights and the Criminal Trial Process.
Ann Marie Perez Professor CRIMINAL PROCEDURE WEEK 1 - UNIT 1.
Social Networking and College Classrooms Some Thoughts for Instructors Kem Saichaie & Leighton Christiansen Des Moines Area Community College 27 February.
© Copyright 2009 SSLPost 01. © Copyright 2009 SSLPost 02 a recipient is sent an encrypted that contains data specific to that recipient the data.
4 th Amendment  “The right of the people to be secure in their persons, houses, papers, and effects against unreasonable searches and seizures, shall.
Compsci 82, Fall Right to Privacy? l Article 12 No one shall be subjected to arbitrary interference with his privacy, family, home or correspondence,
T HE R IGHT TO B E L EFT A LONE Essential Question: How has an individual’s right to privacy changed over time?
Doc.: IEEE /1096r2 Submission January 2006 Mike Moreton, STMicroelectronicsSlide 1 Emergency Call Support Notice: This document has been prepared.
Xin Xie Fan Yang Dorlly Cruz PRIVACY ACT. Invasion of our rights We like Technology but we also want our privacy.
First 10 Amendments to the United States Constitution.
The Fourth Amendment COURT CASES. What does the Fourth Amendment say? The right of the people to be secure in their persons, houses, papers, and effects,
WELCOME! Communication Camp NDSU Agriculture Communication WiFi Connect to NDSU Limited Open browser Enter Full name Password is 7n7K4X6g.
From Facebook to Mugshots Facebook/MySpace EDD: Legal, social & ethical issues in use of modern personal posting technologies in law enforcement and academic.
Top Ten Ways to Protect Privacy Online -Abdul M. Look for privacy policies on Web Sites  Web sites can collect a lot of information about your visit.
Encryption u “Encryption basically involves running a readable message known as “plaintext” through a computer program that translates the message according.
HW due today- Finish researching a second case Agenda NVCs Warm-up Establishment clause and balancing test Crime and amendments Rights of the accused Objectives.
Privacy and the Law.
WHO WANTS THE LIVE IN A GLASS HOUSE?
Limiting the Right of Search
Emergency Call Support
Enforcement of Fourth Amendment Protections Is a man’s home his castle
NAVAJO LAW SEMINAR October 14, 2016
Name that tune! Raise your hand if you know how to answer BOTH of the questions below. Artist? How does this song relate to what we’re learning today?
The Fourth Amendment and the Home
The Bill of Rights and the Criminal Trial Process
What Happens After Jardines?
Fourth Amendment: “The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall.
4th amendment By: KEila Aguilar.
Bill of Rights Do Now: Paraphrase the Fourth Amendment to the Constitution. Rewrite it into your own words without leaving out any information. You can.
The Bill of Rights and the Criminal Trial Process
How does this Constitutional amendment protect Americans?
Rights of the Accused Part 1
Fluency with Information Technology Lawrence Snyder
Presentation transcript:

Privacy Chapter 13

2

3 The Fourth Amendment "The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall not be violated, and no Warrants shall issue, but upon probable cause, supported by Oath or affirmation, and particularly describing the place to be searched, and the persons or things to be seized."

4 Kyllo v. United States Thermal imaging reveals unusual amount of heat radiating from Danny Lee Kyllo's garage. Search warrant reveals over 100 marijuana plants growing in Kyllo's home. Ninth Circuit Court upholds conviction. Supreme Court overturns conviction ruling that thermal imaging constituted a search.

5 "The Right To Privacy" "The narrower doctrine may have satisfied the demands of society at a time when the abuse to be guarded against could rarely have arisen without violating a contract or a special confidence; but now that modern devices afford abundant opportunities for the perpetration of such wrongs without any participation by the injured party, the protection granted by the law must be placed upon a broader foundation." [emphasis added] The Right to Privacy Samuel Warren and Louis Brandeis Harvard Law Review, 1890

6 Questions What does privacy mean?  The "right to be left alone"? What does that mean? Do we have a right to privacy?  If I see you at a street corner, can I sell that information (provided there is a buyer)?  What if you buy something at my store? How many of you have a shopping club card?

7 Cookie cookie: parcels of text sent by a server to web browser and then sent back unchanged by the client each time it accesses that server  Used to remember the user who is visiting the website in order to show the appropriate content.  Responsible for "Remember Me" checkbox. Options:  Never accept cookies Not really an option: Many legitimate websites require cookies to function  Ask each time a server wants to set a cookie Would be very annoying, so also not really an option  Accept all cookies No other option? Browser lets you choose to delete cookies when you close your browser.

8 Whose Information Is It? If you buy something at a store, what can the store do with your information?  No Uses: Delete information after transaction.  Opt-in: Can use if you approve the use.  Opt-Out: Can use unless you object.  No Limits: Store owns the information.  Internal Use: Can use to conduct business with you, but nothing else.

9 Facebook Terms of Use  "We reserve the right, at our sole discretion, to change, modify, add, or delete portions of these Terms of Use at any time without further notice. If we do this, we will post the changes to these Terms of Use on this page and will indicate at the top of this page the date these terms were last revised. Your continued use of the Service or the Site after any such changes constitutes your acceptance of the new Terms of Use."

10 Facebook Privacy Change Uproar "By posting User Content to any part of the Site, you automatically grant, and you represent and warrant that you have the right to grant, to the Company an irrevocable, perpetual, non-exclusive, transferable, fully paid, worldwide license (with the right to sublicense) to use, copy, publicly perform, publicly display, reformat, translate, excerpt (in whole or in part) and distribute such User Content for any purpose, commercial, advertising, or otherwise, on or in connection with the Site or the promotion thereof, to prepare derivative works of, or incorporate into other works, such User Content, and to grant and authorize sublicenses of the foregoing. You may remove your User Content from the Site at any time. If you choose to remove your User Content, the license granted above will automatically expire, however you acknowledge that the Company may retain archived copies of your User Content." Changed February 4, Italicized sentences were deleted. Discovered February 15, Put back February 16, 2009.

11 What Does Your Search Say About You? August 4, 2006: AOL releases search data from a 3- month period for 650,000 users Users were not personally identifiable—identified by a unique key.  Search history of individuals could be compiled.  Some people were identified by what they searched. August 21, 2006: AOL's CTO resigns.

12 Cleartext cleartext: form of a message or data which is in a form that is immediately comprehensible to a human being without additional processing Most s are sent in the clear.

13 Cryptography Private-key cryptography  Single key to encrypt and decrypt messages  Sender and receiver share the same key Public-key cryptography  Most famous algorithm is RSA

14 RSA Algorithm for public-key cryptography invented in 1977 Named after Ron Rivest, Adi Shamir, and Leonard Adleman at MIT Independently invented by British intelligence four years earlier in 1973 (information was classified until 1997)

15 Public-Key Cryptography Two keys: public key and private key  Public key encrypts messages  Private key decrypts messages Receiver generates both keys and publicizes public key "Impossible" to determine private key from public key

16 PGP: "Pretty Good Privacy" Software that provides cryptographic privacy and authentication.  Created by Phil Zimmermann in 1991 Uses keys with at least 128 bits  Keys larger than 40 bits were considered munitions within the definition of the US export regulations before 1996  Zimmerman published entire source code in a book (export of books are protected by the First Amendment)

17 United States v. Boucher December 17, 2006: Sebastien Boucher crosses border from Canada to USA at Derby Line, Vermont. Laptop was inspected. Boucher questioned. Child pornography was found on the laptop. Laptop was seized and powered-down. December 29, 2006: Laptop was booted. Contents were inaccessible due to PGP encryption. Boucher refuses to divulge the PGP key. November 29, 2007: Magistrate opines "Compelling Boucher to enter the password forces him to produce evidence that could be used to incriminate him." (Fifth Amendment) January 2, 2008: United States appeals magistrate's opinion. February 19, 2009: Judge reverses magistrate's opinion.

18 Resources Electronic Frontier Foundation  Electronic Privacy Information Center 