CS 3043 Social Implications Of Computing 9/7/2015© 2004 Keith A. Pray 1 Class 7 Crime And Privacy Keith A. Pray Instructor socialimps.keithpray.net.

Slides:



Advertisements
Similar presentations
SEARCH AND SEIZURE A REASONABLE TEST Created by the Ohio State Bar Foundation.
Advertisements

The Fourth Amendment What Are Your Rights? Mr. Carr Social Studies.
The Bill of Rights, 2nd and 4th Amendments
The Patriot ACt. Amendment IV The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures.
Happy Monday SCREENMY DESK “Theme Song from the Movie The Patriot *CELL PHONES OFF OR ON SILENT, AND IN YOUR BACKPACK, WHICH SHOULD BE PLACED.
Suspects Rights Amendments 4, 5 and 6. 4 th Amendment The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable.
Legal Issues Computer Forensics COEN 252 Drama in Soviet Court. Post-Stalin (1955). Painted by Solodovnikov. Oil on Canvas, 110 x 130 cm.
Internet Privacy & Security A Presentation to WPI Student Pugwash Michael J. Ciaraldi Professor of Practice, WPI Computer Science 2003/10/02.
Computer Encryption Cheryl Dong Naima Ritter Hayden Bottoms Jennifer Kozin Brittany James.
THEFT BURGLARY THEFT VIOLENT CRIME THEFT CAR THEFT THEFT BURGLARY THEFT.
Privacy & Personal Information -- Why do we care or do we?
Fourth Amendment Assignment. Amendment 4: Right to Search and Seizure The right of the people to be secure in their persons, houses, papers, and effects,
4th Amendment.
1 Disclosing and Suppressing Evidence Chapter 12.
131 Privacy 2. DOJ Position “Visit DOJ's new website launched to educate Americans about how we are preserving.
CS 3043 Social Implications Of Computing 8/29/2015© 2009 Keith A. Pray 1 Class 5 Privacy Keith A. Pray Instructor socialimps.keithpray.net.
By Marta Telatin and Andrew Koennig 4 TH AMENDMENT.
2.6 Protecting Individual Citizens 1 st & 4 th Amendments In Depth Government & Citizenship Timpanogos High School.
Unit The Bill of Rights n First ten amendments to the U.S. Constitution. n Purpose is to prevent government from usurping the personal freedom of.
CS 3043 Social Implications Of Computing 10/19/2015© 2004 Keith A. Pray 1 Class 9 Intellectual Property Keith A. Pray Instructor socialimps.keithpray.net.
CS 3043 Social Implications Of Computing 10/19/2015© 2008 Keith A. Pray 1 Class 7 Intellectual Property Keith A. Pray Instructor socialimps.keithpray.net.
CS 3043 Social Implications Of Computing © 2009 Keith A. Pray Class 3 Professional Ethics Keith A. Pray Instructor socialimps.keithpray.net.
CS 3043 Social Implications Of Computing 10/21/2015© 2008 Keith A. Pray 1 Class 5 Crime and Privacy Keith A. Pray Instructor socialimps.keithpray.net.
CS 3043 Social Implications Of Computing 10/22/2015© 2008 Keith A. Pray 1 Class 6 Privacy Revisited Keith A. Pray Instructor socialimps.keithpray.net.
PROCEDURES IN THE JUSTICE SYSTEM, 8 th ed. Roberson, Wallace, and Stuckey PRENTICE HALL ©2007 Pearson Education, Inc. Upper Saddle River, NJ
Amendments to the U.S Constitution that have particular implications in science, medicine, and the delivery of health care >>>>>>
CS 3043 Social Implications Of Computing 10/28/2015© 2004 Keith A. Pray 1 Class 11 Freedom Of Speech Keith A. Pray Instructor socialimps.keithpray.net.
Civil Law. Law that governs private property, contracts and disputes involving individuals and businesses.
The Bill of Rights The First Fundamental Changes of the Constitution.
CS 3043 Social Implications Of Computing 11/24/2015© 2004 Keith A. Pray 1 Class 12 Risks Keith A. Pray Instructor socialimps.keithpray.net.
Constitutional Roots  By 1790, all 13 original states ratified the Constitution  Many people did not believe the Constitution did enough to protect.
The Fourth Amendment and the Home By Laura Zajac.
“The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall not be violated;
The Fourth Amendment, Technology, and a Right to Privacy
A student’s rights to privacy and freedom of speech in a school setting.  Objective:  Students will describe student rights and constitutional issues.
RIGHT TO PRIVACY A presentation by: Stacy Leatherberry Kristyn Bryson Mandy Timms Lisa Wheeler Jacob Sabins.
According to the Bill of Rights, you have the freedom of speech which means that you have the right to practice your religion › The rules are a little.
THEFT BURGLARY THEFT VIOLENT CRIME THEFT CAR THEFT THEFT BURGLARY THEFT.
 The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall not be violated,
Section 2: The Fourth Amendment: Your Right to Be Secure Chapter 13: Supreme Court Cases.
CALL TO ORDER  Have you or someone you’ve known ever been searched by the police, legally or illegally?  What do you know about the rules that police.
4 th Amendment  “The right of the people to be secure in their persons, houses, papers, and effects against unreasonable searches and seizures, shall.
By, Kris Coles Eva Ortega Christina Torres. Veronia School District v. Acton First court case to go to Supreme Court, were the school district demand.
AP U.S. GOVERNMENT & POLITICS – Civil Liberties Civil Liberties part 3.
T HE R IGHT TO B E L EFT A LONE Essential Question: How has an individual’s right to privacy changed over time?
Xin Xie Fan Yang Dorlly Cruz PRIVACY ACT. Invasion of our rights We like Technology but we also want our privacy.
Arrest and Detainment How do you know you’ve been arrested?
Understanding the Constitution
Limiting the Right of Search
Privacy Group 1 Gerson De Conti II Robert Rhyne Chris Glasnapp
Surveillance in Society
Grab a book off the shelf and look it up. (Article V)
Forensics Week 7.
Chapter 14 Searches and Seizures
Understanding Law: Mr Thompson, APT Academy
Fourth Amendment.
Thinker The first ten amendments are also known as:
CHAPTER 1 1/15/2019 BHS Law Related Education Program Criminal Justice
4th amendment By: KEila Aguilar.
Mandatory testing Civil Rights – Constitution of the United States, Article IV (of the original Bill of Rights) and Article XIV (State law versus Federal.
Bill of Rights Do Now: Paraphrase the Fourth Amendment to the Constitution. Rewrite it into your own words without leaving out any information. You can.
The Surveillance State
IA455 Chris Danieli and Zachary gibson
Warm Up – February 11 Grab the handouts from the front table
Search & Seizure in Schools:
How does this Constitutional amendment protect Americans?
Bill of Rights Amendments 4-6.
Arrest.
Judicial Restraint vs. Judicial Activism
“The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall not be violated,
Presentation transcript:

CS 3043 Social Implications Of Computing 9/7/2015© 2004 Keith A. Pray 1 Class 7 Crime And Privacy Keith A. Pray Instructor socialimps.keithpray.net

CS 3043 Social Implications Of Computing © 2007 Keith A. Pray 2 9/7/2015 Overview 1. Crime Never Stops 2. Privacy 3. Assignment

CS 3043 Social Implications Of Computing © 2007 Keith A. Pray 3 9/7/2015 Crime Pay Computer Fraud and Abuse Act (1986)  Bans unauthorized access or use of computers.  Bans unauthorized copying, modifying, or destroying data.  Bans unauthorized disclosing of passwords.  Bans disrupting government and utilities.  Covers government, financial, medical, and interstate systems.  Fines and imprisonment. USA Patriot Act (2001)  Raised penalties.  Permits freer surveillance and monitoring to detect illegal activity.

CS 3043 Social Implications Of Computing © 2007 Keith A. Pray 4 9/7/2015 Crime Stop Technical  Protect Data  Protect Machine  Protect Access Non-technical?  Social?  Legal?

CS 3043 Social Implications Of Computing © 2007 Keith A. Pray 5 9/7/2015 Overview 1. Crime Never Stops 2. Privacy 3. Assignment

CS 3043 Social Implications Of Computing © 2007 Keith A. Pray 6 9/7/2015 A Privacy Quote “The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall not be violated, and no Warrants shall issue, but upon probable cause, supported by Oath or affirmation, and particularly describing the place to be searched, and the persons or things to be seized.”  -- Fourth Amendment to the US Constitution

CS 3043 Social Implications Of Computing © 2007 Keith A. Pray 7 9/7/2015 Privacy Why do people want it? Keep private from whom? Is there any benefit in not having this stuff private? Who wants to know?

CS 3043 Social Implications Of Computing © 2007 Keith A. Pray 8 9/7/2015 Privacy Lots of things people would like to keep secret. Lots of people and organizations who would like to find out. Lots of things that could be done with the information. Correlations can be important.  Beyond secrecy.

CS 3043 Social Implications Of Computing © 2007 Keith A. Pray 9 9/7/2015 Privacy Expectations of privacy are:  Cultural  Philosophical  Political  Personal Who has the right to know?

CS 3043 Social Implications Of Computing © 2007 Keith A. Pray 10 9/7/2015 Government What kinds of info should a government legitimately have about its citizens or others? What kinds of info should a government not have? What good things (for society) could a government do with info? What bad things could a government do?

CS 3043 Social Implications Of Computing © 2007 Keith A. Pray 11 9/7/2015 Overview 1. Crime Never Stops 2. Privacy 3. Assignment

CS 3043 Social Implications Of Computing © 2007 Keith A. Pray 12 9/7/2015 Assignment Intellectual Property  Read Chapter 6. Short paper: Windows Vista License Agreement Answer short individual questions assigned during class.

CS 3043 Social Implications Of Computing © 2007 Keith A. Pray 13 9/7/2015 Assignment Group Project Due Monday  Report stating: When your Group met, and you must meet before Monday Regular meeting times  I suggest at least twice a week considering the pace of the class When your group watched the movie and/or read book Due Thursday  Cite scenes and section in your text which are related. You are only responsible for the topics covered in class so far. Keep in mind that as we cover new topics you will need to revisit the movie to see what scenes, if any, are relevant.

CS 3043 Social Implications Of Computing 9/7/2015© 2004 Keith A. Pray 14 Class 7 The End Keith A. Pray Instructor socialimps.keithpray.net