Privacy Policy, Law and Technology Carnegie Mellon University Fall 2005 Lorrie Cranor 1 Current Issues Week 12 -

Slides:



Advertisements
Similar presentations
Fraud Protection. Agenda Start time: ____ Break time: ____ (10 minutes) End time: ____ Please set phones to silent ring and answer outside of the room.
Advertisements

I WILL COLLECT THE FOLLOWING ON FRIDAY: INDIA DBQ SOUTH AFRICA CHART AND BSQ ANSWER TAKE ACTION ASSIGNMENT.
Youth Protection A changing scene What are the expectations that RI has on Rotary Clubs participating in its various Youth Programmes?
Language Registers. What is a Register?  describes the various styles of language available for writing or speaking.
Electronic Submission of Medical Documentation (esMD) Author of Record Recap and Harmonization of UC 1&2 Workgroup Friday, November 2,
The Internet is Forever
What Information you have and where you should keep it!
What is Marxist Criticism?
Usable Privacy and Security Carnegie Mellon University Spring 2008 Lorrie Cranor 1 Designing user studies February.
Privacy Policy, Law and Technology Carnegie Mellon University Fall 2007 Lorrie Cranor 1 Data Privacy.
Computers in Society Intellectual Property. Term Papers A draft is due SOON! November 9 I will grade the outline of your paper. At this point you need.
Do you know how to keep yourself safe?
Privacy Policy, Law and Technology Carnegie Mellon University Fall 2005 Lorrie Cranor 1 Overview Week 1 - August.
Sick Time Approval Training FOR APPROVERS IN BANNER FOR CASUAL WORKERS AND SUMMER STUDENT WORKERS.
Publicity Not just newspapers any more. Street Fairs We participated in four street fairs in 2008 Green Day at FDU April Ag Day at Cook College April.
Point of View T-Chart Pictorial
Privacy Policy, Law and Technology Carnegie Mellon University Fall 2004 Lorrie Cranor 1 History and Philosophy Week.
RULES FOR ONLINE SAFETY BY KYLE K AND JASON. CHECK WITH YOUR PARENTS FIRST ! Don’t ever agree to get together with someone you meet online without checking.
Disability Support Services New Faculty Orientation.
Multiple choice What is the most likely explanation for what the “net" in the term “netiquette" stands for? Netting Drugnet Internet Fishnet.
COMPUTER ETHICS Do you know the difference between right and wrong?
Monique Mora Senior Project Coordinator.  Graduation requirement  Project will take place for ALL seniors during the 1 st Semester  2 nd Semester will.
Privacy Policy, Law and Technology Carnegie Mellon University Fall 2004 Lorrie Cranor 1 Identity and biometrics.
All Wales School Liaison Core Programme Legal or Illegal? Quiz Resource 13a.
Privacy Policy, Law and Technology Carnegie Mellon University Fall 2004 Lorrie Cranor 1 Current Issues Week 14 -
Lesson 4: Taking Perspectives on Cyberbullying THE CYBER BULLYING VIRUS
Computers and Society Carnegie Mellon University Spring 2005 Lorrie Cranor and Dave Farber 1 Computer Reliability.
Stacey Leigh Callaway Associates Capstone in Paralegal Studies – PA 299.
Matter and Interactions 1 Fall 2006 Matter & Interactions I Physics Professor & Lecturer: Dr. Reinhard Schumacher Teaching Assistants: Ms. Elisa.
Privacy Policy, Law and Technology Carnegie Mellon University Fall 2004 Lorrie Cranor 1 Data Privacy Week 9 - October.
Kyleigh LESLIE. I will never give out my personal information like my phone number, location, and my school.
Privacy Policy, Law and Technology Carnegie Mellon University Fall 2007 Lorrie Cranor 1 Law Enforcement.
Participating in the Participant Pool Participants’ Tutorial Participant Pool Coordinator
Digital Citizenship Eagle Ridge’s School Policy. Expectations for Students  Students are invited to use their personal devices as directed by their teacher.
Cyber Bullying. ~ instant messaging ~ digital photos ~ cell phones ~ computers ~ web pages ~ social networks ~ ~ instant messaging ~ digital.
Welcome! Hello and welcome to English Composition 102, Introduction to Literature. I am looking forward to exploring, writing, and discussing literature.
CS680: Announcements and Feedbacks Sung-Eui Yoon ( 윤성의 ) Course URL:
Welcome to Parenting in the Digital Age. This session will: Help you to get to grips with what your children are doing online Explain the W-W-W- approach.
LAUSD Responsible Use Policy (RUP) BUL – Attachment A.
DIGITAL LAW. SEXTING – A Modern Phenomena Sample scenario: A 17 yr old boy and a 15 yr old girl meet at a party. The girl sends a playful, but sexually.
Let’s talk about the Illinois Waiver Proposal. FIRST What is a Waiver? and Why is it important?
Are there rules for blogging?. YES!!!!! What you need to know You have to know your school systems policies and procedures before you can begin a blog.
Mrs. Nikkia’s News Students and Families, I cant believe it is already November! We have so much to be thankful for in Rm 173. Thank you all so much for.
What would you do? Cyber Bullying. Directions: This PowerPoint contains scenarios in which you will have to think about the appropriate way to behave.
Physics of Animation (Art/Physics 123) Prof. Alejandro Garcia Fall 2009 Class is fully enrolled and I am not allowed to add students. Sorry.
Welcome to Parenting in the Digital Age. This presentation will: Help you to get to grips with what your children are doing online Explain the W-W-W-
The Patient Choice Project Use Case Working Session February 12 th, 2016.
Kids’ Online Safety Rules. 1. I will not give out personal information such as my address, telephone number, parents’ work address/telephone number without.
Faculty Expectations University of Louisville Disability Resource Center.
Lecture 3 1Norazirah Ayob, FEB. Ch  Technology advances allow individuals to self-select  what,  when, and  where messages are sent and received.
Fraud Protection.
Fraud protection.
Sex Abuse and Dating Violence
LAUSD Responsible Use Policy (RUP)
Electronic Communication
Electronic Communication
Zippy’s Gymnastics Academy Consent Form
Zippy’s Gymnastics Academy Consent Form
Research with the Super 3
Digital Driver’s License
Electronic Communication
Working with Google Maps
What is a vignette? – Vignette Notes
Digital Driver’s License
Working out sexting – Results
Announcements Quiz 5: grades and solution posted
Electronic Communication
3.9.3 Social Media: Sharing Images
Group Assignments Consult about Poster / Talk
Social Media: Sharing Images
Presentation transcript:

Privacy Policy, Law and Technology Carnegie Mellon University Fall 2005 Lorrie Cranor 1 Current Issues Week 12 - November 28, 30

Privacy Policy, Law and Technology Carnegie Mellon University Fall 2005 Lorrie Cranor 2 Announcements Need to schedule project talks We have 10 project talks, 10 minutes each + 5 minutes each for questions Dec 5, 7 (120 minutes = 5 talks each day if we start on time) Dec 13 (3 hours = 10 talks) Options:  All talks Dec 5 and 7 (start promptly at 9 am) –We could even do 1 or 2 talks this week if anyone wants to get their talk over with  All talks Dec 13  4 talks Dec 5 and 6 talks Dec 13  4 talks Dec 7 and 6 talks Dec 13

Privacy Policy, Law and Technology Carnegie Mellon University Fall 2005 Lorrie Cranor 3 Announcements Decide on talk schedule and sign up for slots If you have questions about the comments on your paper rough draft or if other questions come up as you work on your final paper, please ask!

Privacy Policy, Law and Technology Carnegie Mellon University Fall 2005 Lorrie Cranor 4 Announcements Get your foam core boards and construction paper for posters from Jennifer Lucas in Smith 231A, (412) , Or bring your poster to poster fair and attach it to foam core there

Privacy Policy, Law and Technology Carnegie Mellon University Fall 2005 Lorrie Cranor 5 Finishing up RFID

Privacy Policy, Law and Technology Carnegie Mellon University Fall 2005 Lorrie Cranor 6 Batya Friedman’s talk

Privacy Policy, Law and Technology Carnegie Mellon University Fall 2005 Lorrie Cranor 7 Pop quiz

Privacy Policy, Law and Technology Carnegie Mellon University Fall 2005 Lorrie Cranor 8 Local privacy news Upskirting and downblousing not illegal in PA and many other states. Old PA privacy law makes it illegal to photograph someone in “a location where a reasonable person would believe that he could disrobe in privacy without being concerned that his undressing was being viewed, photographed or filmed by another.” New law (signed by governor last week) makes it illegal to photograph someone’s “intimate parts” without their knowledge for the “purpose of arousing or gratifying the sexual desire of any person.”

Privacy Policy, Law and Technology Carnegie Mellon University Fall 2005 Lorrie Cranor 9 Transparent society The story of “Dog Poop Girl” dyn/content/article/2005/07/06/AR ht ml?sub=AR dyn/content/article/2005/07/06/AR ht ml?sub=AR girl-redux.html girl-redux.html Questions Was it appropriate for this incident to be photographed and blogged? Was it appropriate for people who read the blog to identify her and post her identity Was it appropriate for people to send harassing messages to her and her family Should there be limits on what personal information can be posted on the Internet and archived forever?