Group 7 Exploring Privacy through policies, laws and human rights down to the bits Daniel Beach Alex Cruz Rahmatullah Ismail Conrad Skye Sandoval David.

Slides:



Advertisements
Similar presentations
Cyber Crime and Technology
Advertisements

Bill of Rights guarantees personal liberties
Implementation of Human Rights Treaties in Hong Kong C.K. Law HKU July 8,
What is Law.
Prescription for Criminal Justice Forensics. The government has all but declared a national state of emergency regarding computer-related crimes and has.
THE USA PATRIOT ACT AND THE DOMESTIC WAR ON TERROR Essential Questions: What limits should be put on the executive branch to carry out the domestic war.
USA PATRIOT ACT: Is it a legitimate law to protect national security or is it a violation of your Civil Liberties? Essential Question:
Effects of Counterterrorism Legislation post 09/11 James J. Clements Honors Colloquium May 3 rd, 2007.
Big Brother Might be Watching. Agenda: US Patriot Act Copyright Infringement Social Media Packets.
Works Citied. How Has the War on Terrorism Affected Civil Liberties? Opposing Viewpoints Civil Liberties Cole, David. The War on Terrorism.
The Bill of Rights 1 st amendment: 1. Freedom of religion 2. Freedom of speech 3. Freedom of the press 4. The right to peacefully assemble 5. The right.
Responding to Cybercrime in the Post-9/11 World Scott Eltringham Computer Crime and Intellectual Property Section U.S. Department of Justice (202)
Chapter 15 Counter-terrorism. Introduction  United and Strengthening America by Providing Appropriate Tools Required to Intercept and Obstruct Terrorism.
HUMAN RIGHTS – BAD? GRESHAM COLLEGE 5 TH NOVEMBER 2014 GEOFFREY NICE.
Instructions for using this template. Remember this is Jeopardy, so where I have written “Answer” this is the prompt the students will see, and where.
Law for Business and Personal Use
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
This work is supported by the National Science Foundation under Grant Number DUE Any opinions, findings and conclusions or recommendations expressed.
Freedom of Speech in Cyberspace 1. The U.S. Constitution - The 1 st Amendment: The 1 st Amendment Congress shall make no law respecting an establishment.
The Bill Of Rights The first 10 amendments to the Constitution.
Bill of Rights.
GROUP 7 RAHUL JIMMY RONEY GEORGE SHABNAM EKKA SHEETHAL JOSEPH Cyber Laws in India- IT Act, 2000; 2004.
Human Rights Lecture 18.
The Rights, Responsibilities, and Advantages (Benefits) of being a U.S. Citizen By Marcus Harris 1.
SECTION1 Lecture: Due Process of Law. SECTION2 Pair Share: The 5th Amendment declares that the Federal Government cannot deprive any person of “life,
+ Protecting Individual Liberties Section 1 Chapter 14.
Rights and Freedoms of Citizens. 1.Individual Rights – rights that shouldn’t be taken away without due cause & are protected in the Constitution 2.The.
The first 10 amendments to the Constitution
Copyright © 2008 by West Legal Studies in Business A Division of Thomson Learning Chapter 11 Cyberlaw Twomey Jennings Anderson’s Business Law and the Legal.
The Patriot Act Protecting the US or Violating People’s Freedoms.
CS 4001Mary Jean Harrold1 Class 24 ŸFreedom of speech in cyberspace ŸAssign ŸAssignment 8—due today ŸTerm paper—due 11/20.
Ch. 2-3: Bill of Rights Goal was to prevent the Fed. Government from abusing peoples basic rights Goal was to prevent the Fed. Government from abusing.
The Federal System Powers of the National Government
Bill of Rights. The Bill of Rights 10 Amendments Created to ratify Constitution Written by Madison Personal rights Legal rights State rights.
Introduction to Citizenship. Citizens Citizens are legal members of a country. Being a citizen includes rights and responsibilities. Good citizens work.
Constitutional Rights Domestic Policy. What is domestic Policy? Domestic Policy is everything that deals with our homeland, such a taxes, education, and.
October 21, 2008 Jennifer Q.; Loriane M., Michelle E., Charles H. Internet Safety.
Computer Forensics Law & Privacy © Joe Cleetus Concurrent Engineering Research Center, Lane Dept of Computer Science and Engineering, WVU.
1 The Broader Picture Laws Governing Hacking and Other Computer Crimes Consumer Privacy Employee Workplace Monitoring Government Surveillance Cyberwar.
Socratic Seminar Units 1-6. Unit 1: Principles of Government What were some of the reasons that the text indicated for governments forming? What effects.
The Amendments. The Constitution was a document that was meant to be changed, or amended. The founding fathers knew that it was only a guideline and that.
Chapter 4 Notes Civics. 1. Adding Bill of Rights Between 1787 and 1790 the 13 states ratified the constitution Some people felt it did not protect their.
© 2004 West Legal Studies in Business A Division of Thomson Learning BUSINESS LAW Twomey Jennings 1 st Ed. Twomey & Jennings BUSINESS LAW Chapter 11 Cyberlaw.
Introduction to Citizenship. ________ are legal members of a country. Being a citizen includes _________ and ______________. Citizens rights responsibilities.
Chapter 11 CYBERLAW. 2 Cyberlaw is not a new body of laws. Cyberlaw is not a new body of laws. Cyberlaw is the application of existing laws and legal.
Liberty v. Order Federalist/Anti-Federalist Arguments.
OVERVIEW OF AMENDMENTS FOCUS ON BILL OF RIGHTS + OTHER KEY AMENDMENTS.
Chapter 4: Laws, Regulations, and Compliance
The Bill Of Rights The first 10 amendments to the Constitution PROTECT CITIZENS from the FEDERAL GOVERNMENT.
Whats it all about?.  C omputer crime refers to any crime that involves a computer and a network. The computer may have been used in the commission of.
The Place of Cyberlaw in the MSIS Curriculum Ramesh Subramanian Bruce White Quinnipiac University.
The Constitution Unit 1 Chapter 3 Section 1, 3 and 4.
Extending the Constitution Amendments to the US Constitution.
Internet Privacy Define PRIVACY? How important is internet privacy to you? What privacy settings do you utilize for your social media sites?
The Living Constitution Modern U.S. History. The 7 “Principles” of the Constitution  Popular Sovereignty  Republicanism  Federalism  Separation of.
The Amendments. The Bill of Rights: The First 10 Amendments September, 1789 – Congress sends to the states 12 proposed Amendments 2 were not adopted The.
PRIVACY Carl Hoppe Ted Worthington. OUTLINE What is privacy? What is privacy? 4 TH Amendment Rights 4 TH Amendment Rights Technology Growth and Privacy.
Civil Rights of Inmates. Rights of Inmates come from: Federal government through the ____of _______ & _______________ ___________________________________.
CHAPTER SIXTEEN The Right to Privacy and Other Protections from Employer Intrusions.
SECTION1 The Amendments to the Constitution. SECTION2 Bill of Rights (All ratified 1791) 1 st – No law against religion, freedom of speech (press), freedom.
Bellwork Think about this…. Historical Event
Legal Implications.
Video: Digital citizenship is defined as the norms of appropriate,
Amending the Constitution
Chapter 4 Law, Regulations, and Compliance
The Bill of Rights Past Experiences Shaped the Writing
Freedom of Speech in Cyberspace
Quiz Review You can lead a horse to water
Bill of Rights Chapter 10.
Presentation transcript:

Group 7 Exploring Privacy through policies, laws and human rights down to the bits Daniel Beach Alex Cruz Rahmatullah Ismail Conrad Skye Sandoval David Saunders

Topics Progression of Laws Laws of the US v. Other countries Events that have affected Laws and Policies Actions being taken Crime and Punishment Current Events Questions

Privacy is the ability of an individual or group to keep their lives and personal affairs out of public view, or to control the flow of information about themselves.  Wikipedia Privacy

Hot Topic Advancements in Technology Cyberspace Cell Phones World Events: 9/11, War on Terror Controversial Pen register w/out warrant Right US Constitution contains "penumbras" that implicitly grant a right to privacy against government intrusion.

Progression of Law Progression of laws, since inception Human Rights Privacy

Progression of Law Human Rights - refers to the concept of human beings as having universal rights, or status, regardless of legal jurisdiction or other localizing factors, such as ethnicity, nationality, and sex.

Progression of Law Bill of Rights – 1791 (Ratified) United Nations, Universal Declaration of Human Rights (UDHR) – 1948 International Covenant on Civil and Political Rights – 1966 International Covenant on Economic, Social and Cultural Rights – 1976

Progression of Law Justices of the Peace Act – st, 3 rd, 4 th, and 9 th amendments were interpreted Examples Griswold v Connecticut Eisenstadt v. Baird First data protection law – 1974 Now – laws are extended to include electronic data

Progression of Law Other laws had to be created to challenge new threats COPPA – protecting children Digital Millennium Copyright Act – DRM circumvention Uniting and Strengthening America by Providing Appropriate Tools Required to Intercept and Obstruct Terrorism Act

United States Vs. Other Countries United States - Democratic China - Communist Russia - Communist

Events that have changed Policies and Laws Hacking Virus Wiretapping Spam Trojan horse

What is being done Anti-Virus programs exist MacAfee Norton Free ones do exist AVG Available at:

What is being done Microsoft Spam Attorney General FBI CIA

Crime and Punishment Fraud Title 18, USC Establishment of Offense Punishment Comes in two flavors 1. Serving Time 2. Pay Fine and Serve Time

Crime and Punishment Cont. Fraud Cases: California man receives 27 months for obtaining private bank account information. (2003) 33-year-old former customer service representative charged with selling private data from 30,000 accounts with a cost of $2.7 million. $1 million in fines 35 years in Federal Prison

Current Events FBI Carnivore System ePassports Veterans Affair Data Theft Google’s Battle with Justice Department

Carnivore Packet sniffing program developed by the FBI in 1999 much speculation and concern regarding the implementation, usage, and possible abuses contracted the IIT Research Freedom of Information Act eventually discarded in January 2005

ePassports Privacy Issues Safety Issues Skimming Viruses Fixes

Veterans Affair Data Theft May 3, Million People Largest SSN Breach Other Incidents Policy Problems

Google vs Justice Department August of 2006 COPA 1 Mil Internet addresses Random sampling of 1 million search queries Google forced to comply 50,000 web addresses Precedent

Conclusion Progression of Laws Laws of the US v. Other countries Events that have affected Laws and Policies Actions being taken Crime and Punishment Current Events

Questions?