Computers, Privacy & the Constitution
CompPrivConst Web Changed By
ATTChargesNotToTrackWebBrowsing 18 Feb 2015 - 15:42 TomLawrence
Interesting article...I don't believe I've seen a web provider put an explicit price on privacy before. "AT T's gigabit fiber to the home service has just arrived ...
AaronChanFirstPaper 11 Jan 2013 - 21:48 IanSullivan
A Privacy Framework that Changes Little By AaronChan 28 Feb 2012 Introduction The Obama administration recently released its Data Privacy Framework advocating ...
AdrianNtwatwaFirstPaper 25 Jun 2015 - 19:52 MarkDrake
A Zero Zero Game By AdrianNtwatwa 06 Mar 2015 Over the past weeks, a common theme in our class discussions has been the zero sum nature of the future of freedom ...
AdrianNtwatwaSecondPaper 26 Jun 2015 - 20:43 MarkDrake
It is strongly recommended that you include your outline in the body of your essay by using the outline as section titles. The headings below are there to remind ...
AjKhandakerFirstPaper 11 Jan 2013 - 21:48 IanSullivan
Is an equality principle underlying the First Amendment a strategically desirable framework for advancing public ownership goals like birthright bandwidth? By AjKhandaker ...
AlanWongFirstPaper 12 May 2016 - 14:35 AlanWong
The Sharing Economy and Our Privacy By AlanWong 05 Mar 2016 Within recent years, consumers have witnessed and quickly adapted to the rise of the #8220;economy ...
AlejandroMercadoFirstPaper 11 Jan 2013 - 21:48 IanSullivan
Technology Driven Rights By AlejandroMercado 26 Feb 2012 Introduction Even if we acknowledge that the Constitution is animated by old century thought, its efficacy ...
AlejandroMercadoSecondPaper 11 Jan 2013 - 21:48 IanSullivan
It is strongly recommended that you include your outline in the body of your essay by using the outline as section titles. The headings below are there to remind ...
AlejandroMercadoSecondPaper2010 14 Jan 2015 - 22:44 IanSullivan
It is strongly recommended that you include your outline in the body of your essay by using the outline as section titles. The headings below are there to remind ...
AlexAsenFirstPaper 11 Jan 2013 - 21:48 IanSullivan
Through the Procedures of Corporate Democracy... By AlexAsen 08 Mar 2012 The Problem In 2010, Justice Kennedy, writing for the majority in Citizens United , ...
AlexLawrenceFirstPaper 05 Jan 2010 - 22:29 IanSullivan
The Eisenhower Inheritance Throughout the term so far as we have discussed the implications of the Internet Age on the US Constitution Eben has constantly reminded ...
AlexLawrenceSecondPaper 05 Jan 2010 - 22:31 IanSullivan
What Can We Do? As Eben and others have mentioned throughout the term people are only too happy to give away scads of private information on the internet. No widely ...
AlexMiddletonFirstPaper 24 Jan 2009 - 21:51 EbenMoglen
The End of Privacy: Bang, Whimper or... Shrug? By AlexMiddleton 25 Mar 2008 Our last class closed with the lament that Eliot Spitzer's downfall was apparently ...
AlexUballezFirstPaper 17 Jan 2012 - 17:48 IanSullivan
The #8216;reasonable expectation #8217; test and technology. The Fourth Amendment does not explicitly protect privacy. However, the court has extrapolated an inherent ...
AlexUballezSecondPaper 17 Jan 2012 - 17:48 IanSullivan
Protecting Fourth Amendment Privacy Rights in Electronic Data. The Plain View Doctrine and Electronic Data. In physical spaces, the plain view doctrine can balance ...
AlexanderGertenFirstPaper 12 May 2016 - 15:23 EbenMoglen
Technological Threats to Adblocking and Cultural Threats from It The primary motivation of most spying on the Internet is to send more effective advertisements to ...
AlexanderHoffmanFirstPaper 16 Nov 2017 - 00:39 EbenMoglen
Quantum Cryptography and the False Promise of an Unhackable Future AlexanderHoffman 21 Mar 2017 Introduction Snowden has sparked a new era in which the privacy ...
AlexanderWongFirstPaper 11 Jan 2013 - 21:48 IanSullivan
Towards a Singularity? The Web as the Global Brain By AlexanderWong 24 Feb 2012 Introduction Modern technology has been responsible for tremendous changes within ...
AlexeySokolinFirstPaper 14 Jan 2015 - 22:44 IanSullivan
The Faustian Bargain By AlexeySokolin 12 Mar 2013 Just Trust Me Many of the "free" consumer web services are not free at all. Users give up their data and the ...
AlexeySokolinSecondPaper 14 Jan 2015 - 22:44 IanSullivan
Click Like To Share The Data From Your Home By AlexeySokolin 25 Apr 2013 Internet of Things Fifty years have passed since the airing of Jetsons in 1962. Where ...
AlexiaBedatFirstPaper 12 May 2016 - 09:01 AlexiaBedat
Finding Privacy in the Constitution In Europe, the right to privacy and freedom of expression carry (in theory) equal weight under the Convention on Human Rights ...
AliceBertramFirstPaper 26 Jun 2015 - 19:41 MarkDrake
about:black The NSA investigation committee in the German parliament By AliceBertram 13 Feb 2015 Investigating the German secret service Even though the committee ...
AliceBertramSecondPaper 26 Jun 2015 - 20:43 MarkDrake
AliceBertram 14 Feb 2015 The German Supreme Court on hearing Snowden in the Parliament's NSA investigation committee By AliceBertram 14 Feb 2015 Opposition's ...
AmandaFerberFirstPaper 22 Mar 2017 - 12:01 AmandaFerber
The Right of the People to be Secure in their Pornography By AmandaFerber 22 Mar 2017 Once Upon a Time... In the 1970s (also known as the Age of Porn), people ...
AmaneKawamotoFirstPaper 14 Jan 2015 - 22:44 IanSullivan
ESCAPING YOUR PAST #8211; THE #8220;RIGHT TO BE FORGOTTEN #8221; By AmaneKawamoto 04 Mar 2013 INTRODUCTION As one of the solutions to privacy issues rising ...
AmaneKawamotoSecondPaper 14 Jan 2015 - 22:44 IanSullivan
Storing Medical Data in the #8220;Cloud #8221; By AmaneKawamoto 30 Apr 2013 Introduction An increasing number of medical institutions are using online storage ...
AnaCarolinaVarelaFirstPaper 26 Jun 2015 - 19:43 MarkDrake
Generation Z By AnaCarolinaVarela 06 Mar 2015 The Profile (I acknowledge that any generalization about a group this size is naturally going to get some people ...
AnaCarolinaVarelaSecondPaper 26 Jun 2015 - 20:44 MarkDrake
Amici Curiae in the FISA Court By AnaCarolinaVarela 09 May 2015 ACLU v. Clapper May Mean the FREEDOM Act is Adopted The Second Circuit #8217;s in ACLU v ...
AndreiVoinigescuFirstPaper 05 Jan 2010 - 22:30 IanSullivan
Making Microsoft Pay for Windows' Shoddy Security By AndreiVoinigescu 07 Apr 2009 Introduction is the latest in a series of malware exploiting security vulnerabilities ...
AndreiVoinigescuSecondPaper 05 Jan 2010 - 22:31 IanSullivan
Search Engines and Technological Privacy Solutions Few of us share all of our intimate thoughts, anxieties and desires with even the closest of friends. Yet we have ...
AndresZambranoFirstPaper 26 Jun 2015 - 19:43 MarkDrake
Surveillance of La Oposición in Venezuela By AndresZambrano 06 Mar 2015 Introduction Venezuela is a country in turmoil. Since 2013, pof basic goods have skyrocketed ...
AndresZambranoSecondPaper 26 Jun 2015 - 20:46 MarkDrake
It is strongly recommended that you include your outline in the body of your essay by using the outline as section titles. The headings below are there to remind ...
AndrewChungFirstPaper 26 Jun 2015 - 19:44 MarkDrake
Automatic License Plate Reader Technology and Mass Surveillance (Second Draft) Questions Do citizens have a reasonable expectation to privacy in regards to the tracking ...
AndrewChungSecondPaper 26 Jun 2015 - 20:46 MarkDrake
Stingray Technology: Do We Own Our Locations? Stingrays, a technology that can track a cellphone's location to startling accuracy, have become a staple in the arsenal ...
AndrewHerinkFirstPaper 17 Jan 2012 - 17:48 IanSullivan
THE ICESCR AND THE HUMAN RIGHT TO INTERNET ACCESS INTRODUCTION Does international human rights law require that countries guarantee internet access to all their citizens ...
AndrewHerinkSecondPaper 17 Jan 2012 - 17:48 IanSullivan
Why Bobbitt is Wrong on TIA INTRODUCTION In Terror and Consent , Philip Bobbitt argues in favor of the Pentagon #8217;s Total Information Awareness (TIA) data mining ...
AndrewReichFirstPaper 14 Jan 2015 - 22:44 IanSullivan
The Sharing Culture Electorate Introduction: Electability in the Internet Age We spoke in class about the governor who flippantly declared that the #8220;only ...
AndrewReichSecondPaper 14 Jan 2015 - 22:44 IanSullivan
Technology in the Courts Introduction Five years ago, in the year 2007, the Ninth Circuit Court of Appeals presided over a copyright dispute that would ultimately ...
AndrewWatikerFirstPaper 22 Jul 2017 - 05:39 AndrewWatiker
Privacy in the Mobile Workplace !AirWatch By AndrewWatiker 22 Jul 2017 The Problem For many, the 21st century workplace has expanded far beyond the office. ...
AnnaHaapanenFirstPaper 05 Jan 2010 - 22:30 IanSullivan
Comparison of Protection of Privacy in Finland and the United States Finnish Data Protection Regime The right to privacy is fundamental right, and protected in Finland ...
AnnaHaapanenSecondPaper 05 Jan 2010 - 22:31 IanSullivan
Privacy in Electronic Communications is Protected #8211; At Least Presumptively The Section 10 of the Constitution of Finland affirms that #8220;The secrecy of correspondence ...
AppleLoopholeGivesDevelopersAccessToPhotos 11 Jan 2013 - 21:25 IanSullivan
AlejandroMercado 01 Mar 2012
ArchanHazra1FirstPaper 26 Jun 2015 - 19:46 MarkDrake
The Border Search Doctrine and Data By ArchanHazra1 06 Mar 2015 Introduction The search doctrine carves out an exception to the Fourth Amendment #8217;s requirement ...
ArchanHazra1SecondPaper 26 Jun 2015 - 20:46 MarkDrake
The TSA's Pre #10003; #8482; Program and Security Theater By ArchanHazra1 17 May 2015 Introduction Over spring break, I had the opportunity to go to a moot court ...
ArchivedMaterial 23 Jan 2009 - 15:24 IanSullivan
This is where student specific materials from previous years goes once the term ends.
AriGlattFirstPaper 26 Jun 2015 - 19:46 MarkDrake
Anonymity and the "Real Name Policy" Debate By AriGlatt 01 May 2015 Pseudonymity and the Internet The Nymwars While anonymity was not something invented with ...
AriGlattSecondPaper 26 Jun 2015 - 20:48 MarkDrake
Why Are Our Device Manufacturers Harming Us and What Can Be Done To Prevent It? By AriGlatt 10 May 2015 Introduction Privacy evokes a cornucopia of concepts for ...
ArthurMERLEBERALFirstPaper 26 Jun 2015 - 19:46 MarkDrake
Surveillance in France following the terrorist attacks in Paris: Nothing new under the sun Introduction The terrorist attacks that occurred in Paris between the 7th ...
ArthurMERLEBERALSecondPaper 26 Jun 2015 - 20:49 MarkDrake
EU Data protection: A further step back Introduction On 25th January 2012, the EU Commission released a proposal for a new regulation on data protection. Yet, it ...
AudreyAmsellemFirstPaper 30 May 2017 - 16:19 AudreyAmsellem
Who Cares If You Listen? Agency and Surveillance in Societies of Control By AudreyAmsellem May 30 2017 In 1984, George Orwell imagined a future society in which ...
AustinLeachFirstPaper 11 Jan 2013 - 21:48 IanSullivan
Branding and Privacy By AustinLeach 01 Mar 2012 Introduction Corporate marketing and branding have always sought to change how consumers view a corporation and ...
AustinLeachSecondPaper 11 Jan 2013 - 21:48 IanSullivan
RFID and Me By AustinLeach 19 May 2012 Introduction If the government has not done so already, it won #8217;t take long to circumvent the holding of United ...
AvaGuoFirstPaper 14 Jan 2015 - 22:44 IanSullivan
How the Fourth Amendment Could Be Revived By Ava Guo 04 Mar 2013 With the advent of computers and the internet, this Fourth Amendment right of people #8220;to ...
AvaGuoSecondPaper 14 Jan 2015 - 22:44 IanSullivan
The Value of Anonymity Over the past couple of weeks, my alma mater has been embroiled in a bit of a conflict. It all began with a student led protest aimed at bringing ...
AyaNakamuraFirstPaper 14 Jan 2015 - 22:44 IanSullivan
Protection of Privacy in Japan By AyaNakamura 01 Mar 2013 Section I Provisions of the Constitution and Act Subsection A Constitution The right to privacy ...
AyaNakamuraSecondPaper 14 Jan 2015 - 22:44 IanSullivan
A perpetrator #8217;s and victim #8217;s privacy in a juvenile case in Japan 1 Introduction This Article will explain how a perpetrator #8217;s and victim #8217 ...
BahradSokhansanjFirstPaper 11 Jan 2013 - 21:48 IanSullivan
Surveillance as Subordination Americans usually think about rights in individual terms. I have the right to express myself freely. I have the right to own my ...
BalancingPrivacyWithLegitimateGroundsToSue 14 Jan 2015 - 22:36 IanSullivan
I recently read the article of Lies, written by Jane Kirtley. Kirtley discusses one of the conflicts posed by an anonymous web that of making parties unable to ...
BenjaminKastnerFirstPaper 26 Jun 2015 - 19:49 MarkDrake
Market Approach to Digital Privacy Corporation #8217;s interests have not been aligned with consumers in the digital privacy context, but this may be changing. Corporations ...
BenjaminKastnerSecondPaper 26 Jul 2015 - 18:42 EbenMoglen
The Inadequacy of the Recent Congressional Review of the Patriot Act Recently, facing the expiration of several sections of the Patriot Act, Congress elected to reign ...
BenjaminLinFirstPaper 26 Jun 2015 - 19:49 MarkDrake
Voluntary Surveillance: Costs, Benefits, and a Way Forward Introduction Much has been made in class about the nefarious nature of iPhones and #8220;smart #8221 ...
BetreGizawFirstPaper 17 Jan 2012 - 17:48 IanSullivan
DNA SWABBING UPON ARREST: Race, DNA and the Law #8220;It #8217;s the right thing to do. This is where the national registry becomes so important, because what you ...
BetreGizawSecondPaper 17 Jan 2012 - 17:48 IanSullivan
Why the Pro Privacy Movement Isn #8217;t Working: Data Mining as Entertainment There is something about privacy that we all understand in an intimate way and yet seem ...
BostonIssues 14 Jan 2015 - 22:42 IanSullivan
I thought it might be useful to start a thread about the legal and privacy issues surrounding the recent events in Boston. We touched on some in class. Something ...
BrandonNguyenFirstPaper 12 May 2016 - 14:59 EbenMoglen
LinkNYC: Leveling the Playing Field, or Business as Usual? By BrandonNguyen 11 Apr 2016 Background On February 18, New York City Mayor Bill deBlasio announced ...
BranwenBuckleyFirstPaper 23 Jan 2009 - 15:33 IanSullivan
BranwenBuckley 27 Mar 2008 Search Me: Google and Microsoft's foray into medical records As laid out in O'Harrow's book, recent years have led to a wide scale incursion ...
BrianSFirstPaper 17 Jan 2012 - 17:48 IanSullivan
Ready for review, comments welcome. Book Worms: Privacy in Digital Libraries By BrianS 27 Feb 2010 The Spark: Google Books In 2002, Google took its steps towards ...
BrianSSecondPaper 17 Jan 2012 - 17:48 IanSullivan
Ready for review. Comments welcome. The Evolving Problem of DMCA Takedowns By BrianS 24 Mar 2010 Introduction: Section 512(c) The DMCA's takedown provision ...
BriannaCummingsFirstPaper 09 Jul 2016 - 03:40 BriannaCummings
Can Freedom in Person and on the Internet Co Exist for an Activist? By BriannaCummings 09 Jul 2016 I have learned more about the how the Internet works in the ...
BrittanyMorganFirstPaper 14 Jan 2015 - 22:44 IanSullivan
It is strongly recommended that you include your outline in the body of your essay by using the outline as section titles. The headings below are there to remind ...
BrittanyMorganSecondPaper 14 Jan 2015 - 22:44 IanSullivan
It is strongly recommended that you include your outline in the body of your essay by using the outline as section titles. The headings below are there to remind ...
BryanKimButlerFirstPaper 17 Jan 2012 - 17:48 IanSullivan
BryanKimButler Two questions about privacy persistently concern me: first, the extent to which privacy and sexuality are linked or affect each other; second, the ...
BryanKimButlerSecondPaper 17 Jan 2012 - 17:48 IanSullivan
Set ALLOWTOPICVIEW TWikiAdminGroup, BryanKimButler One recent occasion for reflection on obscenity, the internet, and art BryanKimButler The defendant in United ...
CarolineVisentiniFirstPaper 26 Jun 2015 - 19:50 MarkDrake
Prublic (second draft) CarolineVisentini 26 Apr 2015 Private public Prublic. I think that it is where our society is situated today. Over the course of the ...
CarolineVisentiniSecondPaper 30 Jun 2015 - 14:22 MarkDrake
Goodwill data sharing CarolineVisentini 24 Apr 2015 On March 24, 2015 Andreas Lubitz deliberately crashed a passenger jet into the French Alps. One hundred and ...
ChenyeNiSecondPaper 02 May 2017 - 18:55 ChenyeNi
Cyber Space in China: What the Government can Do When we are talking about the Constitution #8217;s response to the protection over people #8217;s privacy in the Internet ...
ChristopheWassafFirstPaper 12 May 2016 - 14:14 EbenMoglen
U.S. Privacy Laws and Facial Recognition Technology By ChristopheWassaf 16 Mar 2016 The use of biometric software for facial recognition has grown in recent years ...
ChristopherPistrittoFirstPaper 05 May 2017 - 22:00 ChristopherPistritto
The Chilling Effect of Surveillance By ChristopherPistritto Introduction The #8220;chilling effect #8221; on free speech brought about by vague and overbroad ...
ClaritySoughtOnElectronicsSearches-WashingtonPost 14 Jan 2015 - 22:42 IanSullivan
ChristopherCoverdale 07 Feb 2008 This story ran today, 2/7/08 http://www.washingtonpost.com/wp dyn/content/article/2008/02/06/AR2008020604763.html?wpisrc newsletter ...
ClassNotes 17 Jan 2012 - 18:01 IanSullivan
Class Notes This topic is a container for notes of our class meetings. Sign up for taking notes by adding your name to the chart. Be sure your classnotes pages have ...
ClassNotes03Apr08 17 Jan 2012 - 17:49 IanSullivan
So what about Confrontation? (aka PartSix) Does it limit what technology judges and lawyers can use in a courtroom, when they'd otherwise use lots more technology ...
ClassNotes10Apr08 17 Jan 2012 - 17:49 IanSullivan
GerryMoody 11 Apr 2008 Could there be benefits from the technological system #8212;to expand procedure in courts in light of technology so as to derive more technological ...
ClassNotes13Mar08 17 Jan 2012 - 17:49 IanSullivan
Anonymity GGM: lost 'two most fundamental rights of man: to sleep with a woman other than his wife and the right to lie about it.' Spitzer similarly keeping it secret ...
ClassNotes14Feb08 17 Jan 2012 - 17:49 IanSullivan
LuisVilla 14 Feb 2008 Or Of The Press One (of Eben's three) web servers got cut off by the university last week. So if Eben's web server gets cut off (presume a public ...
ClassNotes17Jan08 17 Jan 2012 - 17:49 IanSullivan
General Course Background Note taking will be rotated and in the wiki. (I'd put in the wiki URL, but you're already here.) Course requirements/Grading two ...
ClassNotes2008And2009 17 Jan 2012 - 18:02 IanSullivan
Class Notes This topic is a container for notes of our class meetings. Sign up for taking notes by adding your name to the chart. Be sureyour classnotes pages have ...
ClassNotes21Feb08 17 Jan 2012 - 17:49 IanSullivan
second part of the 'of the press' argument summarizes last week as arguing that 'the press' is about publication as a mechanism of speech, rather than of a distinct ...
ClassNotes24Jan08 17 Jan 2012 - 17:49 IanSullivan
Privacy and Surveillance: (Ancient) Historical Perspective As the Supreme Court sees it in Olmstead, the common law is not open to the development of new privacies ...
ClassNotes27Mar08 17 Jan 2012 - 17:49 IanSullivan
GerryMoody 28 Mar 2008 Problems in Tibet. There has been a bust up in the net. The firewall tightening inside China is a further example of a concerted attempt to ...
ClassNotes28Feb08 17 Jan 2012 - 17:49 IanSullivan
GerryMoody 29 Feb 2008 Professor Moglen continues to make the same "unpopular" argument. Next week there is no class because he will be at a Google event at Stanford ...
ClassNotes31Jan08 17 Jan 2012 - 17:49 IanSullivan
Misc Links CNN, Memo: Don't Use Obscene Check to Pay Parking Ticket, Jan. 12 2008 JulianM 31 Jan 2008
Classnotes13Feb2009 17 Jan 2012 - 17:49 IanSullivan
Part 4 was the problem of constitutional rights defined as freedom from government activity from unreasonable searches and seizures in the context of technological ...
Classnotes16Jan2009 17 Jan 2012 - 17:49 IanSullivan
Lecture Notes for Jan 16, 2009 #8226; The course started in 1997, and the course has never stayed the same from year to year #8226; Intended to explain the relationship ...
Classnotes19Jan2012 30 Jan 2015 - 15:55 MatthieuWharmby
MatthieuWharmby 27 Jan 2015
Classnotes20Feb2009 17 Jan 2012 - 17:49 IanSullivan
Classnotes23Jan2009 17 Jan 2012 - 17:49 IanSullivan
Weekly news items coming alongside our concerns: Reports of use of location based information to assist in political protest or counter force with those who contributed ...
Classnotes30Jan2009 17 Jan 2012 - 17:49 IanSullivan
The Framers of the U.S. Constitution took their understanding of the problems to be solved perceived the primary goal of the protection against search, seizure and ...
Classnotes6Feb2009 17 Jan 2012 - 17:49 IanSullivan
Historical 4th Amendment has vanished as a useful proposition because technological change outran the judge #8217;s enthusiasm for enforcing or expanding the protection ...
ComputerPrivacyNews 14 Feb 2008 - 21:36 LuisVilla
Some recent relevant news items: SenateAuthorizesBroadExpansionOfSurveillanceAct RethinkingSurveillance HowStickyIsMembershipOnFacebookJustTryBreakingFree ...
CorinneShimFirstPaper 25 Jul 2017 - 14:21 EbenMoglen
An Introduction to how Personal Privacy and Personal Autonomy Have Changed with Technology By CorinneShim 22 Mar 2017 Introduction We currently live in a society ...
CorinneShimSecondPaper 01 Oct 2017 - 20:14 CorinneShim
It is strongly recommended that you include your outline in the body of your essay by using the outline as section titles. The headings below are there to remind ...
CorinneShimSecondPaper2012 26 Sep 2017 - 15:16 CorinneShim
It is strongly recommended that you include your outline in the body of your essay by using the outline as section titles. The headings below are there to remind ...
CoryNelsonFirstPaper 14 Jan 2015 - 22:44 IanSullivan
A Lawyer's Professional Responsibility Duty of Confidentiality in a World of Technology By CoryNelson 24 Mar 2013 Introduction Lawyers are increasingly practicing ...
CoryNelsonSecondPaper 14 Jan 2015 - 22:44 IanSullivan
The Cyber Intelligence Sharing and Protection Act I. Introduction This Article will explain the proposed Cyber Intelligence Sharing and Protection Act ( #8220;CISPA ...
CuriousBritain 11 Jan 2013 - 21:30 IanSullivan
Britain has decided that an effective way to combat terrorism is to monitor all phone calls, text messages, emails, and web browsing. With luck, Britain will find ...
DanaDelgerFirstPaper 14 Jan 2015 - 22:44 IanSullivan
DanaDelger 15 Feb 2009 I was thirteen when I killed my first deer, the shot flying forth from my hands, an incantation to crumple cities and knees. My father ...
DanaDelgerSecondPaper 05 Jan 2010 - 22:31 IanSullivan
The Grand Inquisitor Meets Free Information the end they will lay their freedom at our feet, and say to us, #8216;Make us your slaves, but feed us. #8217; They will ...
DanielHarrisFirstPaper 05 Jan 2010 - 22:30 IanSullivan
In Defense of RFID By DanielHarris 8 Mar 2009 Introduction RFID and related technologies in the form of the smart card have taken a beating, often literally. ...
DanielHarrisSecondPaper 05 Jan 2010 - 22:31 IanSullivan
A second paper will be here in a while. DanielHarris 22 June 2009 Information war lessons from Iran mobile phones Internet anonymization social media ...
DanielShinerFirstPaper 30 Jun 2016 - 22:18 DanielShiner
Transcending Balance: Mass Surveillance and the Fourth Amendment DanielShiner 07 May 2016 Across both major political parties, the word #8220;balance #8221 ...
DanielleTomsonFirstPaper 30 Apr 2017 - 20:52 EbenMoglen
Feeding Us Ourselves: How Using Voter Data to Target Readers Threatens Truth, Choice, and Journalism By DanielleTomson 22 Mar 2017 I. Introduction If you are ...
DannyStempFirstPaper 12 May 2016 - 00:13 EbenMoglen
It is a poorly kept secret that big companies use consumer data without consumer knowledge or consent. Information about the items people buy, the websites they visit ...
DarrenHaberFirstPaper 14 Jan 2015 - 22:44 IanSullivan
To say the the internet has changed how we communicate and share information would be an incredible understatement. The ability for anyone to easily communicate with ...
DarrenHaberSecondPaper 14 Jan 2015 - 22:44 IanSullivan
I recently watched "The Lives of Others", a movie set in 1984 East Berlin which follows the life of an East German writer and the agent of the secret police tasked ...
DataSelfieApp 13 May 2016 - 18:43 LizzieOShea
Take a Data Selfie Interesting app project launched by two students at Parsons. App will make predictions and personalized profiles based on our browsing history. ...
DavidHammondFirstPaper 05 May 2017 - 18:14 DavidHammond
Is the Storing of Metadata by the United States Government a Search in Violation of the 4th Amendment? By DavidHammond 02 Mar 2017 Introduction What if I had ...
DavidMehlFirstPaper 17 Jan 2012 - 17:48 IanSullivan
Virtual Child Pornography and The Constitution Historical Background In v. California, the Supreme Court held that obscene speech does not receive First Amendment ...
DavidMehlSecondPaper 17 Jan 2012 - 17:48 IanSullivan
The Certegy Data Misappropriation Case Introduction Created in 2001, Certegy sought to empower check users by insuring checks written to merchants. Certegy did not ...
DeletionIllusion 14 Jan 2015 - 22:36 IanSullivan
This post on the New Yorker's website today by Matt Buchanan has some interesting observations about our generation's proclivity for sharing. Not much will be new ...
DianaSidakisFirstPaper 17 Jan 2012 - 17:48 IanSullivan
DianaSidakis 19 May 2010 Constructing Truth: Technology and Ritual Technology, as a product of science, has the ability to appear neutral, as if existing outside of ...
DianaSidakisSecondPaper 17 Jan 2012 - 17:48 IanSullivan
DianaSidakis 26 May 2010 Identity: Sameness or Difference Identity is sameness; sharing its root with identical. Etymologically, the formation of the word is unclear ...
DoWeNeedANewInternet 05 Jan 2010 - 21:52 IanSullivan
I don't know if people saw Markoff's article, "Do We Need A New Internet?" in this weekend's NY Times, but I thought it was an interesting piece. Though not completely ...
DuckDuckGo--AnAnonymousSearchEngine 14 Jan 2015 - 22:36 IanSullivan
I recently came across an advertisement for an online search engine titled DuckDuckGo that says it does not track you. In very plain english explains how your search ...
EbookConversion 11 Jan 2013 - 21:30 IanSullivan
You might be interested in doing the assigned reading from No Place To Hide by Ebook reader. You will need to convert the format from djvu to do this. piece of free ...
EdwardBontkowskiFirstPaper 17 Jan 2012 - 17:48 IanSullivan
READY FOR REVIEW The Stored Communications Act: The Ramifications of an Antique Privacy Law By EdwardBontkowski 26 Apr 2010 "Ways may some day be developed by ...
EdwardBontkowskiSecondPaper 17 Jan 2012 - 17:48 IanSullivan
Reasonability and Expectations of Internet Privacy By EdwardBontkowski 03 May 2010 The Fourth Amendment of the United States Constitution provides protection ...
EdyGlozmanFirstPaper 26 Jun 2015 - 19:50 MarkDrake
When Getting Back What You Already Had Costs You Your Privacy #8211; The Story of Software Updates By EdyGlozman 06 Mar 2015 Introduction A basic equation stands ...
EdyGlozmanSecondPaper 26 Jun 2015 - 21:11 MarkDrake
Antitrust Is Not the Solution, Constitution Is By EdyGlozman 01 May 2015 Introduction Scholars have been debating in the recent years over whether privacy should ...
EileenHutchinsonFirstPaper 14 Jan 2015 - 22:44 IanSullivan
Surveillance and Control By EileenHutchinson 05 May 2013 #8220;He who is subjected to a field of visibility, and who knows it, assumes responsibility for the ...
EileenHutchinsonSecondPaper 14 Jan 2015 - 22:44 IanSullivan
Say Cheese: Biometrics and Facial Recognition Technology By EileenHutchinson 05 May 2013 Government Use of Biometric Technology For the past few years, federal ...
ElizabethAkinyemiFirstPaper 26 Jul 2016 - 20:48 ElizabethAkinyemi
It is strongly recommended that you include your outline in the body of your essay by using the outline as section titles. The headings below are there to remind ...
ElizabethDoisyFirstPaper 17 Feb 2017 - 22:35 ElizabethDoisy
Seems to me a reasonably comprehensive and certainly clear summary of relatively accessible facts. The comparison between China and the US serves some ...
ElizabethDoisySecondPaper 05 Jan 2010 - 21:53 IanSullivan
Introduction In mid July, Amazon remotely deleted copies of George Orwell #8217;s novels #8220;1984 #8221; and #8220;Animal Farm #8221; from its customers #8217 ...
ElviraKrasFirstPaper 14 Jan 2015 - 22:44 IanSullivan
EmailPrivacy 14 Jan 2015 - 22:36 IanSullivan
EricSantosFirstPaper 26 Jun 2015 - 19:50 MarkDrake
The First Amendment in One Net By EricSantos 06 Mar 2015 What Do You Mean by #8220;Freedom #8221;? Envisioning a world where the ideals of the First Amendment ...
EricSantosSecondPaper 30 Jun 2015 - 14:22 MarkDrake
EricSantos 15 May 2015 Nobody Cares What You Think The central struggle presented in this course is over the fate of the One Network that connects all of humanity ...
EstherLukmanFirstPaper 26 Jun 2015 - 19:50 MarkDrake
Information: The Cost of Access and Convenience By EstherLukman 06 Mar 2015 The Two Way Highway The Internet is often nicknamed the world #8217;s #8220;information ...
EstherLukmanSecondPaper 26 Jun 2015 - 21:13 MarkDrake
Identity Ownership and the Fourth Amendment By EstherLukman 12 May 2015 Property and Privacy Rights in Our Identity The right to publicity is both a property ...
EthanThomasFirstPaper 03 May 2017 - 21:42 EthanThomas
The Campaign Against Privacy: How Propaganda is Used to Perpetuate Surveillance and State Power EthanThomas 03 May 2017 Propaganda and Power Through Subtle Influence ...
EunNyungLeeSecondPaper 17 Jan 2012 - 17:48 IanSullivan
Calls for Independent Privacy Agency Demand for Protection of Private Data The South Korean government in years past has been repeatedly chided for its ineptitude ...
EveShabtoFirstPaper 09 May 2017 - 04:40 EveShabto
I Know Where You Live and I've Seen Where you Sleep: Cell Site Location Data and the Fourth Amendment By EveShabto 04 Mar 2017 Introduction Cellular phones are ...
EvelynPangFirstPaper 26 Jun 2015 - 19:52 MarkDrake
Reconstructing Autonomy in Citizenfour By EvelynPang 06 Mar 2015 Privacy is linked to a sense of personal autonomy and control, while surveillance removes an ...
EvelynPangSecondPaper 30 Jun 2015 - 14:22 MarkDrake
From the Individual to the Collective: Reconciling Retreat with Reform In Walden , Henry David Thoreau advocates for a self sufficient life of reflection away from ...
FacebookHacking 14 Jan 2015 - 22:35 IanSullivan
FacebookLikes 01 Apr 2013 - 22:51 AndrewReich
An interesting illustration of the idea that giving up small bits of seemingly innocuous information can actually reveal more about us than we think: http://online ...
FairInformationCode 05 Jan 2010 - 22:35 IanSullivan
Background In the last class on PartFour I proposed the idea of regulating forgetting, forcing data keepers to sunset data. Eben raised First Amendment issues with ...
FernandGodardFirstPaper 11 Jan 2013 - 21:48 IanSullivan
FernandoGodard 19 Mar 2012 Is there a real protection for our personal data? More and more we see countries all over the world adopting new laws and amending their ...
FirstPaper 06 Mar 2017 - 01:47 EbenMoglen
Paper Assignment Not more than 1000 words. Under any circumstances. It's your idea. The paper's task is to exposit, weigh, and prepare the reader to explore further ...
FirstPaper2010 14 Jan 2015 - 22:44 IanSullivan
Paper Assignment Not more than 1000 words. Under any circumstances. Papers: This assignment can only be changed by: Set ALLOWTOPICCHANGE TWikiAdminGroup
FirstPaper2012 14 Jan 2015 - 22:44 IanSullivan
Paper Assignment Not more than 1000 words. Under any circumstances. javascript:submitEditForm('save',%20'save') Due Date TBA Formatting Log in. Clicking here: ...
FirstPaper2013 14 Jan 2015 - 22:44 IanSullivan
Paper Assignment Not more than 1000 words. Under any circumstances. Due Date TBA Formatting Log in. Clicking here: Create First Paper will create a page named FirstPaper2013 ...
FumihiroKajikawaFirstPaper 23 Jan 2009 - 15:28 IanSullivan
The Japanese Spectrum Policy and collusion Introduction #8211; Soviet ministries in U.S and North Korea Monarchy in Japan Walt Mossberg, the journalist of Wall Street ...
FumihiroKajikawaSecondPaper 23 Jan 2009 - 15:50 IanSullivan
The last day of the Internet in Japan? Introduction The eighteen years old high school student in Kobe Prefecture in Japan killed himself by jumping from the rooftop ...
FumihiroKajikawa_SecondPaper 14 Jan 2015 - 22:44 IanSullivan
The last day of the Internet in Japan? Introduction The eighteen years old high school student in Kobe Prefecture in Japan killed himself by jumping from the rooftop ...
GPGKeyCreate 09 Mar 2017 - 21:28 MichaelWeholt
Tech project 1: Create a GPG key and upload it to the keyservers Linux instructions There are a number of tools available to Linux users including many different plugins ...
GerryMoodyFirstPaper 23 Jan 2009 - 15:28 IanSullivan
Barbaric Yawp: Universal Spectrum Access and the Public Trust Doctrine By GerryMoody 27 Feb 2008 #8220;I sound my barbaric yawp over the roofs of the world ...
GerryMoodySecondPaper 23 Jan 2009 - 15:51 IanSullivan
GerryMoody 23 Jun 2008 Liberty and Anonymity In On Liberty, John Stuart Mill argues that autonomous thought and action are necessary conditions for personal liberty ...
GlennLortscherFirstPaper 23 Jan 2009 - 15:28 IanSullivan
Your RDA of Privacy: A Nutrition Facts Label for the Web By GlennLortscher 24 Mar 2008 How much are lists of nouns worth? Quite a lot, if you can tie them to ...
GlennLortscherSecondPaper 23 Jan 2009 - 15:56 IanSullivan
Broadband Providers See a Goldmine in Terms of Service Agreements Still hung over from a brief, drunken courtship with the media giants, broadband providers have awoken ...
GooglePrivacyPolicy 01 Apr 2013 - 23:00 AndrewReich
Google's New Privacy Policy: A Reading Lately, Google has begun to bombard me. I cannot watch a Youtube video, check a Google Doc, or run a web search without getting ...
GrahamGodwynFirstPaper 26 Jun 2015 - 19:52 MarkDrake
I Have Nothing to Hide or: Why Should I Spent 10 Minutes to Encrypt My Messages? By GrahamGodwyn 06 Mar 2015 Introduction After the revelations gifted to the ...
GrahamGodwynSecondPaper 26 Jun 2015 - 21:14 MarkDrake
Law Enforcement Behaving Like Spies By GrahamGodwyn 13 May 2015 Introduction Spooks and spies should be kept apart from domestic law enforcement. It is expected ...
GuilhermePinheiroFirstPaper 17 Jan 2012 - 17:48 IanSullivan
It is strongly recommended that you include your outline in the body of your essay by using the outline as section titles. The headings below are there to remind ...
GuilhermePinheiroSecondPaper 17 Jan 2012 - 17:48 IanSullivan
It is strongly recommended that you include your outline in the body of your essay by using the outline as section titles. The headings below are there to remind ...
HannahZale2FirstPaper 26 Jun 2015 - 19:52 MarkDrake
Could First Amendment cases regarding #8220;buffer zones #8221; have any implications for online advertising? By HannahZale2 06 Mar 2015 Introduction In this ...
HarryLaymanFirstPaper 05 Jan 2010 - 22:30 IanSullivan
Hello, World Thousands of years ago, primitive man left colorful handprints on some cave walls in Lascaux, France. Hey, they seemed to say. I was here. The instinct ...
HarryLaymanSecondPaper 05 Jan 2010 - 21:53 IanSullivan
Who killed Trellis Photonics and is Verizon next? Death in Ft. Meade Trellis Photonics. I think it has a nice ring to it, like Astronomy. I first learned of this ...
HereComesEverybody 23 Jan 2009 - 15:30 IanSullivan
Here Comes Everybody #HereComesEverybody (#HereComesEverybody) Excerpts from the by http://www.shirky.com/bio.html Clay Shirky Chapter 7: Faster and Faster #FasterAndFaster ...
HibahHussainFirstPaper 11 Jan 2013 - 21:48 IanSullivan
It is strongly recommended that you include your outline in the body of your essay by using the outline as section titles. The headings below are there to remind ...
HibahHussainMissplacedFirstPaper 30 Apr 2017 - 22:11 EbenMoglen
Yesterday, during a panel on #8220;Location Tracking and Fourth Amendment Concerns, #8221; lawyer Jeffrey Rosen recalled a conversation with Andrew !McLaughlin, who ...
HowCompaniesLearnOurConsumingSecrets 11 Jan 2013 - 21:30 IanSullivan
In my opinion, there is certainly no denying that this is equivalent as having a camera following me around at all times. I don't need to have my physical behavior ...
HowStickyIsMembershipOnFacebookJustTryBreakingFree 14 Jan 2015 - 22:35 IanSullivan
http://www.nytimes.com/2008/02/11/technology/11facebook.html?th emc th February 11, 2008 How Sticky Is Membership on Facebook? Just Try Breaking Free By MARIA ASPAN ...
HyunKyungLeeFirstPaper 05 May 2017 - 19:24 HyunKyungLee
It is strongly recommended that you include your outline in the body of your essay by using the outline as section titles. The headings below are there to remind ...
InSearchOfJeffersonsMoose 05 Jan 2010 - 21:54 IanSullivan
So this is a pretty random question but I was wondering if anyone had heard of the new book Search of Jefferson's Moose. I stumbled across a mention to it and an ...
InterestingArticle 11 Jan 2013 - 21:30 IanSullivan
Your apps are watching you: http://online.wsj.com/article/SB10001424052748704694004576020083703574602.html JessicaGuzik 30 Jan 2012
JakeLewisFirstPaper 08 Jul 2016 - 20:36 EbenMoglen
Influencing an Electorate of Consumers: Pop Culture Against a Police State Intro The Constitution is no longer a viable safeguard against the encroachment of a police ...
JamieCrooksFirstPaper 14 Jan 2015 - 22:44 IanSullivan
Free Speech and the Marketplace of Identities The serious dangers data mining presents to our freedoms and privacy are well documented. In many ways it threatens ...
JamieCrooksSecondPaper 14 Jan 2015 - 22:44 IanSullivan
Association Isn't Free: Identities, Data Mining and the First Amendment By JamieCrooks 01 May 2013 Introduction As we discussed in class, unless we take steps ...
JasonRosenbaumFirstPaper 26 Jun 2015 - 20:12 MarkDrake
Snowden and Technological Civil Disobedience By JasonRosenbaum 06 Mar 2015 Ask Me Anything In an "Ask Me Anything" thread on the Internet discussion board ...
JasonRosenbaumSecondPaper 29 Jun 2015 - 15:23 MarkDrake
ACLU v. Clapper Statutory and Constitutional Limits On Mass Surveillance By JasonRosenbaum 09 May 2015 On May 7, 2015, the Second Circuit decided that the NSA ...
JeanLeeFirstPaper 14 Jan 2015 - 22:44 IanSullivan
SNS and Children's Privacy By JeanLee 02 Mar 2013 The Exposed Generation There were many reports in and around 2005 about concerns of social networking services ...
JeanLeeSecondPaper 14 Jan 2015 - 22:44 IanSullivan
Abuse and Attempted Answers to Peer Surveillance By JeanLee 27 Apr 2013 Peer Surveillance Our discussions about how governments are benefiting from and using ...
JessicaCoreyFirstPaper 02 May 2017 - 18:56 JessicaCorey
Technology is Eroding the Fourth Amendment. Can We Stop it? By JessicaCorey 06 Mar 2017 A Radically Different Fourth Amendment The Fourth Amendment was drafted ...
JessicaGuzikFirstPaper 11 Jan 2013 - 21:48 IanSullivan
Insert non formatted text here Insert non formatted text here The Price of Facebook By JessicaGuzik 12 Mar 2012 Introduction The dangers of Facebook ...
JessicaGuzikSecondPaper 14 Jan 2015 - 22:31 IanSullivan
This is a draft in Progress, a combination of a first paper revision/second paper If one accepts the premise that we are unlikely to revert to a pre social network ...
JonPenneyFirstPaper 05 Jan 2010 - 22:30 IanSullivan
The Tragedy of the Communicative Commons: Privacy, Consumerism, and Metaphor Inc. By JonPenney 08 Mar 2009 (revised) Privacy is not doing so well these days. ...
JonPenneySecondPaper 05 Jan 2010 - 22:31 IanSullivan
The Fourth Amendment #8217;s Unwelcome Journey to Canada or Canadian Lessons for American Constitutionalism By JonPenney 27 Apr 2009 How do we fix privacy ...
JonathanBonillaFirstPaper 05 Jan 2010 - 22:30 IanSullivan
Online Behavioral Advertising By JonathanBonilla 26 Apr 2009 As seen in O #8217;Harrow #8217;s No Place to Hide, online data aggregation can pose a real problem ...
JonathanBonillaSecondPaper 05 Jan 2010 - 22:31 IanSullivan
"purpose of voir dire questioning is to obtain a fair and impartial jury" Voir Dire and the Digital Divide By JonathanBonilla 15 May 2009 The litigation process ...
JonathanBoyerFirstPaper 17 Jan 2012 - 17:48 IanSullivan
Dumb or Just Happy: Is There a Concept of Liberty That Respects the Pursuit of Apathetic Nirvana? JonathanBoyer "But if I no longer feel attached to property, no ...
JonathanBoyerSecondPaper 17 Jan 2012 - 17:48 IanSullivan
Debating Internet Law at the Speed of Light: Confounds of Relativity and Incomplete Understanding JonathanBoyer As many invested in the discussion are painfully aware ...
JonathanGuerraFirstPaper 17 Jan 2012 - 17:48 IanSullivan
JonathanGuerra 14 Oct 2010 Convenience rules the day. Friend: So you don #8217;t use Easy Pass? Me: No I don #8217;t. Friend: Why not? Me: I honestly hate the idea ...
JonathanGuerraSecondPaper 17 Jan 2012 - 17:48 IanSullivan
JonathanGuerra 30 Oct 2010 Security cameras are ubiquitous in big cities now, and this has created vast concerns about privacy. I live six blocks away from the law ...
JonathanKoppellFirstPaper 14 Jan 2015 - 22:44 IanSullivan
Introduction The consequences of a lack or breach of privacy with respect to the results of genetic testing and sequencing may be analogous to the same consequences ...
JonathanKoppellSecondPaper 14 Jan 2015 - 22:44 IanSullivan
JonathanKoppell 14 May 2013 Introduction Will Genetic data help or hurt you? Probably both #8230; DNA Sequencing has become faster, more reliable, more efficient ...
JonathanMarcusFirstPaper 11 Jan 2013 - 21:48 IanSullivan
The Panopticon Inverted: Why Privacy Is Less Valuable In Contemporary Society By Jonathan Marcus The concept of the Panopticon initially developed as a model for ...
JoseEnriqueFrias-SecondPaper 30 Jun 2015 - 14:23 MarkDrake
JoseEnriqueFrias 26 Apr 2015 Tucuy Ricuy Reloaded The Inca Empire: From 1438 to 1533, the Inca Empire was the most important and largest empire of America. Previous ...
JoseEnriqueFriasFirstPaper 26 Jun 2015 - 20:12 MarkDrake
Minors and their Smartphones Minors and their (supposed) protection: Theoretically, minors have always been subject to special protection in every country of the world ...
JoshuaDellSecondPaper 29 Jun 2015 - 15:24 MarkDrake
It is strongly recommended that you include your outline in the body of your essay by using the outline as section titles. The headings below are there to remind ...
JudyWangFirstPaper 30 Apr 2017 - 22:11 EbenMoglen
All eyes are on Apple as it takes on the US government in possibly the highest profile fight in privacy and technology. Posing as a defender of civil liberties and ...
JulianBaezFirstPaper 17 Jan 2012 - 17:48 IanSullivan
Online Voting: Easier to Participate in an Election or Easier to Steal One By JulianBaez 21 Feb 2010 Voting is Inconvenient So Some People Don #8217;t Vote Many ...
JulianBaezSecondPaper 17 Jan 2012 - 17:48 IanSullivan
DRAFT Ready for comment. How Your Tweets Are Forever Searchable By JulianBaez 16 Apr 2010 What You Thought Your Twitter account is public by default. Moments ...
JulianDunnFirstPaper 23 Jan 2009 - 15:52 IanSullivan
JulianDunn 10 Mar 2008 Julian Dunn Response Paper #1 Word Count: 999 The current battle in Washington over whether to enshrine Net Neutrality into law or not falsely ...
JulianDunn_FirstPaper 14 Jan 2015 - 22:44 IanSullivan
JulianDunn 10 Mar 2008 Julian Dunn Response Paper #1 Word Count: 999 The current battle in Washington over whether to enshrine Net Neutrality into law or not falsely ...
JulianMPaperI 23 Jan 2009 - 15:56 IanSullivan
Phorm Over Function Phorm, formerly 121Media, is a technology company based in Moscow which became the subject of much scrutiny upon announcing that it was in talks ...
JulianMPaperII 23 Jan 2009 - 15:57 IanSullivan
Extreme Porn Five years ago Jane Longhurst, a teacher from Brighton, murdered by Graham Coutts, a fan of websites such as "Club Dead" and "Rape Action" which offered ...
JulianM_Paper-I 14 Jan 2015 - 22:44 IanSullivan
Phorm Over Function Phorm, formerly 121Media, is a technology company based in Moscow which became the subject of much scrutiny upon announcing that it was in talks ...
JulianM_Paper-II 14 Jan 2015 - 22:44 IanSullivan
Extreme Porn Five years ago Jane Longhurst, a teacher from Brighton, murdered by Graham Coutts, a fan of websites such as "Club Dead" and "Rape Action" which offered ...
JulianWilliamsFirstPaper 30 Apr 2017 - 22:20 EbenMoglen
Conceptualizing the National Security Exception in a New Media World Almost fifty years have passed since the Supreme Court decided New York Times Co. v. the United ...
JulianWilliamsSecondPaper 03 May 2017 - 03:08 JulianWilliams
JulianWilliams 03 May 2017 Mass Surveillance and the Limitations of the First Amendment One of the key purposes of the First Amendment is to keep government accountable ...
JungheeChoFirstPaper 17 Jan 2012 - 17:48 IanSullivan
Twitter and Election: Do Indigent Candidates Dream of Electric Campaigns? This is a true story of a famous IT blogger in Korea. For convenience, let's call him "Doax ...
JungheeChoSecondPaper 17 Jan 2012 - 17:48 IanSullivan
Real name Internet System: Dark Side of the Internet Power On October 2 2008, a famous Korean actress, Jinsil Choi committed suicide. After her suicide, all of the ...
JustinColanninoFirstPaper 05 Jan 2010 - 22:30 IanSullivan
Does Copyright Neuter Social Movements? "Thats how to always get something, just get together all at once and yell and yell and yell and yell and yell and yell and ...
JustinColanninoSecondPaper 05 Jan 2010 - 22:32 IanSullivan
Learning New Tricks: Lessons from the Animal Rights Movement JustinColannino Collective action is a recurring theme in this class a solution to many of the discussed ...
KarmanLuceroFirstPaper 12 May 2016 - 11:58 EbenMoglen
Serendipity in Law Enforcement By KarmanLucero 11 Mar 2016 This essay addresses the growing capabilities of law enforcement to circumvent traditional barriers ...
KateVershovFirstPaper 05 Jan 2010 - 22:30 IanSullivan
#8220;Voluntariness #8221; in 2009 By KateVershov 08 Mar 2009 In States v. Miller , the Supreme Court held that there is no reasonable expectation of privacy ...
KateVershovSecondPaper 05 Jan 2010 - 22:32 IanSullivan
Comments would be greatly appreciated. I will openly admit that I am anything but a technological expert. I am, however, a science fiction buff and undyingly optimistic ...
KathrynMearesSecondPaper 29 Jun 2015 - 15:24 MarkDrake
Fear and Apathy and Surveillance Fear is the enemy of reason. It impairs judgment, distorts perceptions, and fundamentally undermines the ability to make rational ...
KeeryongSongFirstPaper 17 Jan 2012 - 17:48 IanSullivan
Different notions of privacy #8230;Korea and the U.S. I. #8220;Find Your Friend #8221; service in Korea II. Privacy in Korean education III. Different notions of ...
KeeryongSongSecondPaper 17 Jan 2012 - 17:48 IanSullivan
Data mining #8230;occurring without your consent I. Expectations and the reality II. The Korean system III. The U.S. system V. Conclusion I. Expectations and the ...
KeeryongSongThirdPaperForExtraCredit 17 Jan 2012 - 17:48 IanSullivan
Korea's movements towards "perfection" I. Registration of Fingerprints II. No place to hide III. Wrongful movements towards #8220;perfection #8221; IV. Conclusion ...
KeunjungChoFirstPaper 26 Jun 2015 - 20:13 MarkDrake
Breaking Down the Technological Panopticon: Tracing the Evolution of Surveillance as Culture and Reaching Beyond Fourth Amendment Discourse By KeunjungCho 06 Mar ...
KevinHoungFirstPaper 26 Jun 2015 - 20:14 MarkDrake
Big Data and its Intrusion Into Our Medical History: An Investigation Into Matchback Programs By KevinHoung 05 May 2015 Introduction Silently, large data companies ...
KevinHoungSecondPaper 29 Jun 2015 - 15:26 MarkDrake
Anarchy and Currency By KevinHoung 11 May 2015 Introduction #8220;Anarchism stands for the liberation of the human mind from the dominion of religion and liberation ...
KevinMorenskiFirstPaper 14 Jan 2015 - 22:44 IanSullivan
The Social Network Effect By KevinMorenski 25 Apr 2013 Introduction Facebook's guileful beginnings as an exclusive social network for university students helped ...
KosukeUenoFirstPaper 04 May 2017 - 22:09 KosukeUeno
GPS investigation found illegal in Japan's Supreme Court By KosukeUeno 22 Mar 2017 Japan #8217;s Supreme Court Decision on GPS Investigation On March 15, 2017 ...
KotaroKuboFirstPaper 23 Jan 2009 - 15:29 IanSullivan
The Public/Private Dichotomy By KotaroKubo 24 Mar 2008 Understanding of the Public/Private Dichotomy The distinction between #8216;public #8217; and #8216;private ...
KotaroKuboSecondPaper 23 Jan 2009 - 15:29 IanSullivan
KotaroKubo 05 May 2008 Reconstruction of Public/Private Dichotomy Bernard Crick wrote in his #8220;In Defense of Politics #8221; (1964) that #8220;politics are ...
KouroshShaffyFirstPaper 22 Mar 2017 - 06:26 KouroshShaffy
The Press, The People, And Trump: The Need For (Much, Much) More Access By KouroshShaffy 22 Mar 2017 #8220;As Americans grapple with the unreality of the new ...
KristenLovinFirstPaper 11 Jan 2013 - 21:48 IanSullivan
"Safarigate" and Challenges to Protecting Browser Privacy Settings By KristenLovin 18 Mar 2012 On February 17, the Street Journal announced that Google purposefully ...
KristenLovinSecondPaper 11 Jan 2013 - 21:48 IanSullivan
"Safarigate" and Challenges to Protecting Browser Privacy Settings By KristenLovin 19 Jul 2012 On February 17, the Wall Street Journal announced that Google purposefully ...
LaurenHowarSecondPaper 23 Jan 2009 - 15:58 IanSullivan
The Sixth Amendment establishes that in #8220;all criminal prosecutions, the accused shall enjoy the right #8230; to be informed of the nature and cause of the accusation ...
LaurenHowardFirstPaper 30 Apr 2017 - 22:11 EbenMoglen
Social Networking, the Hyperreal and Informed Consent by Lauren Howard In just a few years, social networking sites like Facebook have become among the most popular ...
LawPracticeWorkingGroup 11 Jan 2013 - 21:30 IanSullivan
Hi everyone. I am writing to invite you to join a group I have formed, the Law Practice Working Group. First, since I know some of you, but not all of you, let me ...
LeeSilverFirstPaper 11 Jan 2013 - 21:48 IanSullivan
The Administration #8217;s proposal The Obama Administration recently unveiled The Consumer Privacy Bill of Rights,{{ See We Can #8217;t Wait: Obama Administration ...
LeoFarbmanFirstPaper 28 Jun 2016 - 11:04 EbenMoglen
The Edible Road Back to Privacy By LeoFarbman 05 Mar 2016 Let #8217;s take a second to talk about the food industry. During World War II, the American food ...
LeonHuangFirstPaper 30 Sep 2017 - 19:50 EbenMoglen
Privacy and Trust By LeonHuang 29 September 2017 Protecting our privacy relies on finding someone we can trust. Our quest for privacy began with a loss of trust ...
LeylaHadiFirstPaper 26 Jun 2015 - 20:15 MarkDrake
Relying on the Constitutional Agenda By LeylaHadi 04 Mar 2015 Parts Four and One While the First Amendment prohibits the government from creating any law ...
LeylaHadiSecondPaper 29 Jun 2015 - 15:26 MarkDrake
It is strongly recommended that you include your outline in the body of your essay by using the outline as section titles. The headings below are there to remind ...
LizzieOSheaFirstEssay 09 May 2016 - 17:34 LizzieOShea
Data and predictive law enforcement in the age of computing The age of computing has meant that large amounts of data are readily available together with the potential ...
LizzieOSheaSecondPaper 09 May 2016 - 17:44 LizzieOShea
Theorizing the law of privacy The political economy of the panopticon Contemporary digital life invokes the panopticon for good reason. But there are also limits ...
LuChenFirstPaper 26 Jun 2015 - 20:15 MarkDrake
Employee Privacy and the BYOD Movement By LuChen 06 Mar 2015 No Expectations of Privacy It is no secret that little privacy is afforded to employees who use company ...
LuChenSecondPaper 26 Jul 2015 - 18:30 EbenMoglen
Privacy of Social Media in Litigation By LuChen 18 Jul 2015 Introduction Social media has never been regarded as a guardian of privacy, and those who share information ...
LuisVillaFirstPaper 23 Jan 2009 - 15:29 IanSullivan
Resolving the Paradox: Public Collaboration, Data Sharing, and Privacy By LuisVilla 27 Feb 2008 Collaboration in the Public Eye " W e all derive immense benefit ...
LuisVillaSecondPaper 23 Jan 2009 - 15:58 IanSullivan
The Right to Privacy is Dead; Long Live the Right To Privacy LuisVilla 21 Apr 2008 These are notes and not the final paper; having them in the history of this ...
MachineTestimonyandConfrontation 14 Jan 2015 - 22:34 IanSullivan
Last semester I was thinking about the topic of machine generated testimony and the Confrontation Clause of the Sixth Amendment. I am curious, as we wrap up the semester ...
MadhuPochaFirstPaper 23 Jan 2009 - 15:29 IanSullivan
What Happens in Vegas, Stays in . . . a Government Hard Drive? By MadhuPocha 27 Mar 2008 Few people have heard of Jonas, a man whose work has helped transform ...
MadhuPochaSecondPaper 23 Jan 2009 - 15:58 IanSullivan
The Iraqi biometric identification program and its relevance to privacy rights in the U.S. MadhuPocha 13 May 2008 Last year news organizations on the U.S. military ...
MahaAtalFirstPaper 05 Jan 2010 - 22:30 IanSullivan
How Do You Protect That Which You Cannot Define (revised) By MahaAtal 17 May 2009 In March, a journalism listserv to which I subscribe ignited over legislation up ...
MahaAtalSecondPaper 05 Jan 2010 - 22:32 IanSullivan
The Truth is Not Enough By MahaAtal 18 May 2009 In our class on Part Four, we determined that until we can build a legal infrastructure for privacy, we should take ...
MalcolmEvansFirstPaper 24 Mar 2017 - 20:03 MalcolmEvans
It is strongly recommended that you include your outline in the body of your essay by using the outline as section titles. The headings below are there to remind ...
MathewKenneallyFirstPaper 26 Jun 2015 - 20:15 MarkDrake
Why Eric Holder Really Cares if Edward Snowden is a "Whistleblower". Second Draft Chelsea Manning exposes complicity in torture and the actual death toll from the ...
MathewKenneallySecondPaper 29 Jun 2015 - 15:27 MarkDrake
The Temptations of Predictive Policing Second Draft By MathewKenneally 4 May 2015 The aspiration of online advertising is to offer something to a customer at ...
MattDavisRatner-FirstPaper 05 Jan 2010 - 22:30 IanSullivan
Individual Privacy: A Social Construction? Introduction In order to change the massive trend of disappearing privacy, many aspects of our daily lives must change ...
MattDavisRatnerSecondPaper 05 Jan 2010 - 22:33 IanSullivan
Health Insurance and the Net Individuals are risk averse. We buy insurance to mitigate our personal risks. One of the most important expenses in an individual's ...
MattKokotFirstPaper 11 Jan 2013 - 21:48 IanSullivan
United States v. Jones: A Fleeting Victory for Privacy By MattKokot 13 Mar 2012 Introduction In States v. Jones, the Supreme Court held that the Fourth Amendment ...
MatthewAmsterdamFirstPaper 14 Jan 2015 - 22:44 IanSullivan
Introduction : Years ago, when Facebook was still only accessible to students with registered .edu email addresses, I sat in a lecture with my other high school seniors ...
MatthewAmsterdamSecondPaper 14 Jan 2015 - 22:44 IanSullivan
Introduction I was troubled, if perhaps unsurprised, to read the statement from the founder of Cree.py, an application that tracks individual's locations based on ...
MatthewEckmanFirstPaper 05 Jan 2010 - 22:30 IanSullivan
Encryption, Privacy, and the Fifth Amendment By MatthewEckman 08 Mar 2009 PAPER IN PROGRESS The Electronic Frontier Foundation highly recommends that people encrypt ...
MatthewEckmanSecondPaper 05 Jan 2010 - 22:33 IanSullivan
Correction By MatthewEckman 15 May 2009 I made a mistake in class one day. Professor Moglen, as I recall, was speaking in ominous tones about the fact that grocery ...
MatthieuWharmbyFirstPaper 26 Jun 2015 - 20:16 MarkDrake
Draft #2 Escaping your online past: the case against a global right to be forgotten. By MatthieuWharmby 06 Mar 2015 Introduction Recently there have been many ...
MatthieuWharmbySecondPaper 30 Jun 2015 - 14:23 MarkDrake
  Terrorism and France's "Patriot Act."   By MatthieuWharmby 30 Apr 2015   Introduction  The "Charlie Hebdo" incidents have exposed the flaws of the French intelligence ...
MayelaGarzaFirstPaper 14 Jan 2015 - 22:44 IanSullivan
DNA Collection in the US: Where does it end? In the late 1980 #8217;s, US crime laboratories began DNA testing. Shortly, thereafter crime labs in different States ...
MayelaGarzaSecondPaper 14 Jan 2015 - 22:44 IanSullivan
MayelaGarza 13 May 2013 The Data Collectors Before coming to Columbia my doctor back in Mexico found a cyst and gave me birth pills to see if they would remove it ...
MayuArimotoFirstPaper 30 Apr 2017 - 20:06 MayuArimoto
Collection of Genetic Materials by a Search Warrant I. Introduction Acquiring fingerprint data has become crucial for the law enforcement when an Apple device is involved ...
McIntyre 11 May 2016 - 21:05 EbenMoglen
MatthieuWharmby 06 Mar 2015 McIntyre v. Ohio Elections Commission, 514 U.S. 334 (1995).
MeharJagotaFirstPaper 11 Jan 2013 - 21:48 IanSullivan
Behavioral Economics and Privacy Rights By MeharJagota 11 Apr 2012 Introduction A theme of our class has been the apparent cognitive bias which prevents people ...
MenahemGrossmanFirstPaper 26 Jun 2015 - 20:16 MarkDrake
Hiding in Plain Sight: Alternative Approaches to Cybersecurity (Draft 2) By MenahemGrossman 14 May 2015 Introduction Much of conventional cybersecurity efforts ...
MenahemGrossmanSecondPaper 29 Jun 2015 - 15:28 MarkDrake
A Game of Drones By MenahemGrossman 04 May 2015 The Threat Drones constitute the most serious looming threat to world peace, safety, and, especially, privacy ...
MichaelWrightFirstPaper 22 Mar 2017 - 03:20 MichaelWright
Internet Privacy Loss and Public Perception of Its Harms By MichaelWright 21 Mar 2017 Introduction In 1978, President Carter declared a state of emergency ...
MislavMataijaFirstPaper 05 Jan 2010 - 22:31 IanSullivan
Assessing a Regulatory Approach to Data Protection: the EU Directive By MislavMataija 01 May 2009 Can the collection of personal data be regulated by the market ...
MislavMataijaSecondPaper 05 Jan 2010 - 22:33 IanSullivan
The Flea Market and the Public Square #8211; Giving the First Amendment a Say in Copyright MislavMataija 11 May 2009 File sharing cases are based on the 1984 ...
ModuleTest28Jun2012 28 Jun 2012 - 06:57 XmvlYzlv?
XmvlYzlv 28 Jun 2012 jlkhgvkihbloijn;oijbnoiuybjuytvuytrcvuytfvjuyg
MunKiNamFirstPaper 17 Jan 2012 - 17:48 IanSullivan
Problems of the Adoption of the Notice and Takedown Regime by Other Countries By MunKiNam 01 May 2010 The Notice and Takedown Regime in DMCA Section 512 (c) of ...
MunKiNamSecondPaper 17 Jan 2012 - 17:48 IanSullivan
YouTube vs. South Korean Government: Real Name Verification System in South Korea and its Threat to the Freedom of Expression on the Internet By MunKiNam 01 May ...
NatashaBronnSecondPaper 11 Jan 2013 - 21:48 IanSullivan
Finger Prints, Iris Scans, and a Sense of Belonging By NatashaBronn 31 May 2012 Introduction In 2009, the Government of India, through the Unique Identification ...
NathanielCriderFirstPaper 26 Jun 2015 - 20:16 MarkDrake
The Revolutionary James Madison By NathanielCrider 06 Mar 2015 Introduction From the textbooks, we see James Madison as a diminutive and earnest conciliator. ...
NathanielCriderSecondPaper 29 Jun 2015 - 15:28 MarkDrake
The First Amendment Autonomy By NathanielCrider 02 May 2015 Introduction The Fourth Amendment's anachronistic focus on places is insufficient to protect the ...
NawalMaaloufFirstPaper 26 Jun 2015 - 20:17 MarkDrake
Revenge Porn By NawalMaalouf 08 Mar 2015 I. INTRODUCTION We #8217;ll call it #8220;revenge porn #8221; #8211; sexually graphic images of individuals distributed ...
NealBurstynFirstPaper 26 Jun 2015 - 20:21 MarkDrake
Riley and the Tragedy of Part Four By NealBurstyn 06 Mar 2015 February Professor Moglen has made it abundantly clear that he believes the Fourth Amendment to ...
NealBurstynSecondPaper 29 Jun 2015 - 15:31 MarkDrake
BART and the Cellphone Kill Switch By NealBurstyn 08 May 2015 Kill switches are in the news again. On April 27, the Department of Justice filed its response to ...
NelsonHuaFirstPaper 26 Jun 2015 - 20:22 MarkDrake
Self help in the Privacy Arena By NelsonHua 06 Mar 2015 On February 28, the Obama administration proposed the Privacy Bill of Rights Act. The proposed bill, supposedly ...
NelsonHuaSecondPaper 29 Jun 2015 - 15:31 MarkDrake
ALPR Mass Surveillance as a Matter of Privacy By NelsonHua 16 May 2015 As of 2012, approximately 71% of United States police departments utilized some form of ...
NewYorkerArticleMcConnell 05 Jan 2010 - 21:58 IanSullivan
The New Yorker profiles DNI Michael !McConnell Hi All I confess I have never used a "wiki" before, and despite viewing the "tutorial" I still have absolutely no ...
NewsArticles 07 Apr 2016 - 18:11 LizzieOShea
Hey Prof Moglen I cannot seem to create a new topic page? Is that the way it is suppose to be? I was just going to post article about the Panama papers which critiques ...
NicoleKimFirstPaper 30 Apr 2017 - 22:11 EbenMoglen
Privacy on Facebook: Beacon and Beyond INTRODUCTION On February 26th, the 9th Circuit denied petitions for rehearing of the $9.5 million class action settlement approved ...
NicoleKimSecondPaper 14 Jan 2015 - 22:44 IanSullivan
Our class discussion about how accumulation of personal data can predict our behavior led me to think of Report. Minority Report, of course, is famously about three ...
NikolaosVolanisFirstPaper 17 Jan 2012 - 17:48 IanSullivan
ready for review Freedom to receive information in wired and wireless communication networks: controlling the switches and the airwaves. By NikolaosVolanis 26 ...
NikolaosVolanisSecondPaper 17 Jan 2012 - 17:48 IanSullivan
ready for review A post structuralist interpretation of facebook profiles Has the medium become the message? A. Facebook at a glance... Facebook seems to be another ...
NoteTakerSignup 27 Jan 2009 - 23:21 IanSullivan
GerryMoody 28 Feb 2008 I was looking at the Law and Contemporary Society wiki, and I noticed that someone came up with a pretty good idea: a note taker sign up page ...
ObamaNarwhal 11 Jan 2013 - 21:30 IanSullivan
I plan to expand on this in the future. For now, here's a link to a Slate article regarding a new data mining and analysis system the Obama campaign plans to use to ...
OldDiscussion 17 Jan 2012 - 17:44 IanSullivan
OldDiscussionMaterials 23 Jan 2009 - 15:21 IanSullivan
OldIntros 23 Jan 2009 - 15:39 IanSullivan
OldNotes 17 Jan 2012 - 18:01 IanSullivan
Old notes:
OldPapers 23 Jan 2009 - 15:38 IanSullivan
OlenaSavytskaFirstPaper 30 Jun 2015 - 14:24 MarkDrake
Navigating a Free Net The Fourth Amendment, as we discussed in class, has a place dependent quality. It is this place dependence, in part, that has defeated its application ...
OlenaSavytskaSecondPaper 30 Jun 2015 - 14:24 MarkDrake
The Trouble with Customization A New York Times headline that caught my eye today says (and I paraphrase) that you can mute the views of people you disagree with a ...
OmarHarounFirstPaper 11 Jan 2013 - 21:48 IanSullivan
I recently read an article (http://www.salon.com/topic/sexual abuse/) about Sexually Violent Predators (SVPs) which I found intriguing and which led me to undertake ...
OrBelkinFirstPaper 05 May 2017 - 16:14 OrBelkin
A Right to Keep and Bear Cryptography? By OrBelkin 21 Mar 2017 Introduction The adoption of the individual right theory has broaden the reach of the Second Amendment ...
OriKivityFirstPaper 26 Jun 2015 - 20:22 MarkDrake
THE CONSTITUTIONAL RIGHT TO PRIVACY IN ISRAEL: DIGNITY VERSUS LIBERTY Introduction The boundaries and content of what is considered the private domain which ought ...
OriKivitySecondPaper 29 Jun 2015 - 15:32 MarkDrake
SOME THOUGHTS CONCERNING HORIZONTAL APPLICATION OF CONSTITUTIONAL RIGHTS By OriKivity 01 May 2015 Introduction One of the underlying propositions of Professor ...
PartFour 25 Jan 2017 - 16:46 JohnOMeara
Part Four: Surveillance, Search and Seizure Theory Olmstead v. United States, 277 U.S. 438 (1928) Katz v. United States, 389 U.S. 347 (1967) States v. Knotts, 460 ...
PartOne 09 Apr 2016 - 22:06 AlexanderGerten
Part One: Speech, Press, Assembly Theory Lawrence Lessig, Reading the Constitution in Cyberspace (pdf) , 43 Emory L.J. (1996) Potter Stewart, "Or of the Press" ...
PartSix 24 Jan 2009 - 23:12 EbenMoglen
Part Six: Speedy and Public Trial Theory Speedy Trial Klopfer v. North Carolina, 386 U.S. 213 (1967) United States v. Marion, 404 U.S 307, (1971) Public Trial Gannett ...
PartsNineandFourteen 14 Apr 2017 - 20:03 ChristopherPistritto
Parts Nine and Fourteen: All Privacy and Autonomy Rights Reserved Theory Griswold v. Connecticut, 381 U.S. 479 (Goldberg, J., concurring) Laurence H. Tribe, The ...
PersonalPrivacyTips 08 Apr 2016 - 05:28 GreggBadichek
GerryMoody 12 Feb 2008 I thought it might be helpful to create a topic for personal privacy solutions (encryption, etc.). Chris Soghoian, The day the wiretaps go ...
PrivateSnoopsFindGpsTrailLegalToFollow 11 Jan 2013 - 21:47 IanSullivan
I thought this article of interest to our class discussion. AlejandroMercado 29 Jan 2012
ProtectYourPrivacy 11 Jan 2013 - 21:29 IanSullivan
I refer Comp Priv Const classmates to post from LawNetSoc. You might find some of the tips there useful for your own purposes. Duck Duck Go, the most recent addition ...
PseudonymousEmail 09 May 2016 - 18:58 GreggBadichek
Creating A Pseudonymous Webmail Account Using Tails Using your Tails system, establish an email account at mailbox.org. You can have a 30 day test email account at ...
PseudonymousIM 04 May 2016 - 21:50 EbenMoglen
Pseudonymous Instant Messaging and Chat Using Tails Your Tails system includes the multi protocol chat client Pidgin, through which you can use a variety of chat systems ...
PublicExposure 11 Jan 2013 - 21:46 IanSullivan
Public Exposure The Yeshiva University Beacon Scandal and Facebook Linked Commentary Recently, a very small corner of the New York Jewish world was rocked by a scandal ...
QuestionsAndDiscussion 05 Jan 2010 - 21:58 IanSullivan
Questions and Discussion Privacy Guarding Post Office? Even though the 4th Amendment is pretty much dead because it gives no protection to identities, Eben mentioned ...
RahulWadwaFirstPaper 26 Jun 2015 - 20:22 MarkDrake
Aadhaar : Digital India's Shaky Foundation By RahulWadwa 06 Mar 2015 Introduction #8220;Digital India #8221; is the Indian government #8217;s attempt to smooth ...
RahulWadwaSecondPaper 26 Jul 2015 - 20:54 EbenMoglen
Feeling Safe When Your Health Is at Risk By RahulWadwa 15 Jul 2015 Introduction Thanks to the Internet and the widespread use of smartphones, most of us are ...
RamShchoryFirstPaper 26 Jun 2015 - 20:23 MarkDrake
Informed Consent to the Use of Private Data By RamShchory The Problem #8211; Softwares #8217; Privacy Policies Do Not Actually Provide Either Notice or Choice ...
RamShchorySecondPaper 29 Jun 2015 - 15:33 MarkDrake
Evolving Listening #8211; Israeli Case Study By RamShchory 01 May 2015 Concepts of privacy in general, and particularly of state listening have #8211; to use ...
RasheedAhmedFirstPaper 26 Jun 2016 - 20:39 EbenMoglen
Privacy vs. National Security By RasheedAhmed 24 Apr 2016 Should Americans relinquish a portion of their privacy rights in exchange for greater security? This ...
RazaPanjwaniFirstPaper 17 May 2010 - 16:35 RazaPanjwani
Are today's news organizations sustainable on their current revenue models if you cut the cost of physical printing and distribution? I think the answer is that it ...
RazaPanjwaniSecondPaper 17 May 2010 - 16:28 RazaPanjwani
On Publishers A simple proposition: digitization of a media form changes everything. This is less a proposition about digitization itself then about the fall of ...
RethinkingSurveillance 14 Jan 2015 - 22:35 IanSullivan
http://www.washingtonpost.com/wp dyn/content/article/2008/02/10/AR2008021002128.html?wpisrc newsletter Rethinking Surveillance Monday, February 11, 2008; D03 Video ...
RichardGazonFirstPaper 26 Jun 2015 - 20:23 MarkDrake
Municipal Wi Fi: Dangers in Monitoring Municipal Wi Fi has long been discussed as the next convenience coming to a city near you. Major cities such as San ...
RichardGazonSecondPaper 29 Jun 2015 - 15:33 MarkDrake
It is strongly recommended that you include your outline in the body of your essay by using the outline as section titles. The headings below are there to remind ...
RichardZemskyFirstPaper 11 Jan 2013 - 21:48 IanSullivan
Can the Law Save Us? The Search for Protection from Government Collection of Online Data By RichardZemsky 25 Apr 2012 We live in the digital age. It means technology ...
RickSchwartzFirstPaper 05 Jan 2010 - 22:31 IanSullivan
What's Left of Privacy v.2 Introduction Discarding the style to save the substance seems entirely warranted. Though I myself am not sure what my "usual project" ...
RickSchwartzOtherIdeas 05 Jan 2010 - 21:55 IanSullivan
I've moved this conversation here in order to preserve the wiki paper labeling system when I changed my topic for the second paper. RickSchwartz 25 Apr 2009 Undermining ...
RickSchwartzSecondPaper 05 Jan 2010 - 22:33 IanSullivan
Note: I know this paper is somewhat misplaced within the wiki, but there's no folder for second papers yet. Also, I moved the conversation that was previously occurring ...
RicoJedrzejczykFirstPaper 11 May 2010 - 23:26 EbenMoglen
Reporters #8217; privilege and personal data held by third party service providers #8211; a brief consideration of The New York Times v. Gonzales The government ...
RicoJedrzejczykSecondPaper 11 May 2010 - 23:52 EbenMoglen
Exposing the tip of the iceberg #8211; Google begins tracking government data requests Fresh from its very public fistfight with the Chinese Communist Party, Google ...
RobertGluntFirstPaper 23 Jan 2009 - 16:05 IanSullivan
RobertGlunt 10 Apr 2008 Large private companies are compiling databases of information about Americans without their knowledge or consent. Over the last several ...
RobertGluntSecondPaper 23 Jan 2009 - 16:04 IanSullivan
RobertGlunt 06 May 2008 A Web 2.0 Lament In college I was fairly heavily involved in parliamentary debate. It did wonderful things to my thinking, terrible things ...
RobertWatkinsFirstPaper 23 Jan 2009 - 16:04 IanSullivan
RobertW 25 Mar 2008 Word Count: 976 O #8217;Harrow #8217;s and similar works have taught us that we are quickly losing hope in maintaining privacy of our personal ...
RobertWatkinsSecondPaper 23 Jan 2009 - 16:03 IanSullivan
RobertW 28 Apr 2008 The Worn Out Unwelcomeness of Advertisement 989 Words Many believe advertisement bombardment in media will grow to a point at which ...
RobertWatkins_FirstPaper 14 Jan 2015 - 22:44 IanSullivan
RobertW 25 Mar 2008 Word Count: 976 O #8217;Harrow #8217;s and similar works have taught us that we are quickly losing hope in maintaining privacy of our personal ...
RobertWatkins_SecondPaper 14 Jan 2015 - 22:44 IanSullivan
RobertW 28 Apr 2008 The Worn Out Unwelcomeness of Advertisement 989 Words Many believe advertisement bombardment in media will grow to a point at which ...
RohanGreyFirstPaper 14 Jan 2015 - 22:44 IanSullivan
Children and Freedom Introduction: The False Hope of the Open Society When I was in school, the common refrain of my and other progressive friends' parents was ...
RohanGreySecondPaper 14 Jan 2015 - 22:44 IanSullivan
Shipbuilding 101 Wanting to Learn is Not Enough Having cut my educator's teeth directing infants fingers to hold xylophone mallets and cover recorder holes, I wasn ...
RonMazorFirstPaper 11 Jan 2013 - 21:48 IanSullivan
Wikileaks and the First Amendment By RonMazor 01 May 2012 Wikileaks as Journalism One could paint Wikileaks as an irresponsible peddler of secret gossip. Yet ...
RoyMoranFirstPaper 11 Jan 2013 - 21:48 IanSullivan
De Democratization in Innovation's Clothing Introduction The Internet is eliminating our ability to live anonymously. Google is attempting to perfect its ability ...
SamSalyerFirstPaper 11 Jan 2013 - 21:48 IanSullivan
It is strongly recommended that you include your outline in the body of your essay by using the outline as section titles. The headings below are there to remind ...
SamuelDostartFirstPaper 14 Jan 2015 - 22:44 IanSullivan
A General Right to Privacy? Probably Not By SamuelDostart 16 Feb 2013 The class discussion about how the 4th Amendment went astray led me to wonder what it would ...
SamuelDostartSecondPaper 14 Jan 2015 - 22:44 IanSullivan
CISPA: Goodbye Privacy, Hello Police State By SamuelDostart 22 Apr 2013 Section I: So What is CISPA? On the feet of massive opposition to SOPA and a failed first ...
SarahRogersFirstPaper 23 Jan 2009 - 15:30 IanSullivan
Determining the appropriate standard for unmasking anonymous defendants in internet defamation suits: what does the First Amendment require? By SarahRogers 28 ...
SarahRogersSecondPaper 23 Jan 2009 - 16:02 IanSullivan
SarahRogers 15 May 2008 Email Privacy After Councilman : Addressing the ISP Liability Loophole Enacted in 1986, the Electronic Communications Privacy Act (ECPA ...
SatellitesTrevorPaglen 05 Jan 2010 - 21:56 IanSullivan
For those interested in learning more about US satellites, take a look at the article about Trevor Paglen. He did a very interesting art exhibit at the Berkeley Art ...
SeanBerensFirstPaper 14 Jan 2015 - 22:44 IanSullivan
Criminal Records Without Convictions By SeanBerens 18 Apr 2013 The Problem In 3rd's New York Times, Stephanie Clifford and Jessica Silver Greenberg wrote of a ...
SeanBerensSecondPaper 14 Jan 2015 - 22:44 IanSullivan
The NYPD Already Knows Your Phone Number (And They Might Know Every Place You Have Been in the Past Four Years) By SeanBerens 09 May 2013 Introduction Over the ...
SecondPaper 11 May 2015 - 18:36 EbenMoglen
Paper Assignment Not more than 1000 words. Under any circumstances. Due Date Now Formatting 1. Log in. 2. Create Second Paper will create a page named SecondPaper ...
SecondPaper2010 14 Jan 2015 - 22:44 IanSullivan
Paper Assignment Not more than 1000 words. Under any circumstances. Papers: This assignment can only be changed by: Set ALLOWTOPICCHANGE TWikiAdminGroup
SecondPaper2012 14 Jan 2015 - 22:44 IanSullivan
Paper Assignment Not more than 1000 words. Under any circumstances. Due Date TBA Formatting Log in. Clicking here: Archived will create a page named SecondPaper2012 ...
SecondPaper2013 14 Jan 2015 - 22:44 IanSullivan
Paper Assignment Not more than 1000 words. Under any circumstances. Due Date TBA Formatting Log in. Clicking here: Create Second Paper will create a page named ...
SehwanJangFirstPaper 14 Jan 2015 - 22:44 IanSullivan
Public awareness of protecting one #8217;s privacy The speed of the fast changing technology and the development of the current law system can hardly meet at the ...
SehwanJangSecondPaper 14 Jan 2015 - 22:44 IanSullivan
South Korea #8217;s real name internet system: Future prospects of internet policy A policy, so called #8220;a real name internet system #8221; has brought an extraordinarily ...
SenateAuthorizesBroadExpansionOfSurveillanceAct 14 Jan 2015 - 22:35 IanSullivan
http://www.washingtonpost.com/wp dyn/content/article/2008/02/12/AR2008021201202.html?wpisrc newsletter Senate Authorizes Broad Expansion Of Surveillance Act By Paul ...
SenateSurveillanceAct 14 Jan 2015 - 22:42 IanSullivan
http://www.washingtonpost.com/wp dyn/content/article/2008/02/12/AR2008021201202.html?wpisrc newsletter Senate Authorizes Broad Expansion Of Surveillance Act By Paul ...
ShadowFactoryReview 11 Jan 2013 - 21:47 IanSullivan
AlfianKuchit 17 Jan 2009 #8220;Probably the best place within the entire region to install a listening post is the Indian city of Mumbai, #8221; James Bamford writes ...
ShakimaWellsFirstPaper 14 Jan 2015 - 22:44 IanSullivan
Under Attack After the events of September 11, 2001, which marked one of the largest terrorist attacks on United States soil in the country #8217;s history, it took ...
ShakimaWellsSecondPaper 14 Jan 2015 - 22:44 IanSullivan
The Reasonable Expectation of Privacy in Emails A few days before the close of the 2013 tax season, the ACLU released an revealing documents that indicated that it ...
ShayBanerjeeFirstPaper 08 May 2017 - 01:12 ShayBanerjee
To Understand Polarization, Look at the Software ShayBanerjee 6 May 2017 It is no coincidence that workers most affected by automation are rejecting economic ...
ShayaAfsharFirstPaper 08 May 2017 - 08:15 ShayaAfshar
The Genetic Collection Network By ShayaAfshar 05 Mar 2017 #8220;As gene tests become common, possibilities for abuse will intensify. Banks might not offer you ...
SocksProxy 09 Oct 2017 - 19:35 JohnOMeara
Technology Project 2: Better Browsing Control In your first technology project you created a !GPG key and then uploaded it to the public keyservers, making it possible ...
SolomonRotsteinFirstPaper 12 May 2016 - 14:27 EbenMoglen
Transcending utility through negative rights By SolomonRotstein 21 Apr 2016 I. Introduction: #8220;Poca política, mucha administración #8221; #8211; Porfirio ...
SophieLangeFirstPaper 11 Jan 2013 - 21:48 IanSullivan
Is electronic privacy under regulated in the U.S.? By SophieLange 26 Feb 2012 Introduction Last week President Obama outlined a #8220;consumer privacy bill of ...
StacyAdelmanFirstPaper 14 Jan 2015 - 22:44 IanSullivan
Let's Give Them Something to Talk About: Mobile Devices and the Privacy Policy Distraction Introduction "Tale of the Vacant Lot" is a story about a young girl, driven ...
StacyAdelmanSecondPaper 14 Jan 2015 - 22:44 IanSullivan
Privacy: A Torrid Affair In the face of a crisis, privacy is sacrificed on the alter of public safety. People were too busy marveling at how the government was quickly ...
StephanieTrainFirstPaper 17 Jan 2012 - 17:48 IanSullivan
Three Strikes Laws and The Human Condition: Is Access to the Internet a Right? As the internet becomes an ever larger part of daily life, the copyright industry (led ...
StephanieTrainSecondPaper 17 Jan 2012 - 17:48 IanSullivan
The Loss of Analog Anonymity The for the right to remain anonymous on the internet has been under way for some time. Proponents of digital anonymity often point to ...
StephenClarkeFirstPaper 17 Jan 2012 - 17:48 IanSullivan
The Constitutionality of Zero Marginal Cost Surveillance: A Study of Recent GPS Tracking Decisions By StephenClarke 16 Mar 2010 Since the Supreme Court decided ...
StephenClarkeSecondPaper 17 Jan 2012 - 17:48 IanSullivan
Unreasonable Suspicion and Its Insufferable Alternatives: A Look at Legal Norms Through the Lens of NYPD Stop and Frisk Activity By StephenClarke 18 Mar 2010 On ...
StingraysHowtheFBIisWatchingYou 14 Jan 2015 - 22:34 IanSullivan
In this article, the author explains how for decades the FBI has used a questionably legal (I'd say illegal) tactic of creating fake cell phone networks by means of ...
SunghyeOhFirstPaper 05 May 2017 - 19:49 SunghyeOh
Review of Massive Personal Information Leakage Case and Underlying Problems in South Korea By SunghyeOh 21 Mar 2017 Introduction When we talk about the protection ...
SylvieRampalFirstPaper 05 Jan 2010 - 22:31 IanSullivan
The Transmogrification of Self: Surveillance, Privacy, and Personhood By SylvieRampal 03 Mar 2009 People are so obsessed with innovation and modernity that they ...
TWikiGuestSecondPaper 08 May 2015 - 03:00 NealBurstyn
BART and the Cellphone Kill Switch Kill switches are in the news again. On April 27, the Department of Justice filed its response brief to EPIC #8217;s petition for ...
TaehyoungKwonFirstPaper 30 Apr 2017 - 22:11 EbenMoglen
NATIONAL SECURITY? OR FREE SOCIETY? TaehyoungKwon 23 Mar 2008 New York Gov. Eliot Spitzer resigned on March 12. amid a scandal over a $1,000 an hour prostitute ...
TaehyoungKwonSecondPaper 23 Jan 2009 - 15:31 IanSullivan
The Constitutional Issues of Spam Mail TaehyoungKwon 27 Apr 2008 I. Introduction In the society of information, spam mail, also known as "bulk e mail" or "junk ...
TailsInstallation 14 May 2017 - 20:18 AudreyAmsellem
Tails Installation Tails (The Amnesiac Incognito Live System) is a free software operating system descended from Debian, the universal free software OS which is designed ...
TailsOsx 24 Apr 2016 - 06:50 AlexanderGerten
Figuring out how to download and boot Tails from OS X Preliminary The information on this page is based on what I did to boot Tails from a particular piece of Mac ...
TheDisappearanceofCash 14 Jan 2015 - 22:34 IanSullivan
TheodoreSmithFirstPaper 05 Jan 2010 - 22:31 IanSullivan
Digital Metaphor and the 5th Amendment TheodoreSmith 31 May 2009 Table of Contents Introduction Although ontological questions in law are by no means limited ...
TheodoreSmithSecondPaper 05 Jan 2010 - 22:33 IanSullivan
The Language of Place TheodoreSmith 15 June 2009 Table of Contents Growing to Simplicity There is a point early in the growth of a network where the emergent ...
ThirdPaper 11 Jan 2013 - 21:48 IanSullivan
Paper Assignment Not more than 1000 words. Under any circumstances. Due Date Optional paper. Formatting Log in. Clicking here: Create Second Paper will create a ...
ThirdPaper2010 17 Jan 2012 - 17:59 IanSullivan
Paper Assignment Not more than 1000 words. Under any circumstances. Due Date Optional paper. Papers: This assignment can only be changed by: Set ALLOWTOPICCHANGE ...
ThomasStreinzFirstPaper 26 Jun 2015 - 20:24 MarkDrake
Fighting the NSA in the German Constitutional Court By ThomasStreinz 06 Mar 2015 In absence of any political will by the German government to take meaningful steps ...
ThoughtProvokingVideos 14 Jan 2015 - 22:34 IanSullivan
https://vimeo.com/46304267 https://www.youtube.com/watch?v Zf6C pZ3heY LandesTaylor 25 Jan 2013 Please give more information than just a URL. First, some title ...
TimothyKimFirstPaper 15 May 2016 - 12:36 TimothyKim
TimothyKim 30 Apr 2016 BIG DATA, SOCIAL MEDIA, AND THE FUTURE OF AMERICAN DEMOCRACY The Rise of the Internet in Establishment Politics In the midterm elections ...
TomLawrenceFirstPaper 26 Jun 2015 - 20:25 MarkDrake
Last week, the Supreme Court denied certiorari in Raynor v. Maryland , a case challenging the constitutionality of a conviction based on DNA evidence obtained without ...
TomLawrenceSecondPaper 29 Jun 2015 - 15:34 MarkDrake
In 1991, Harvard Law Professor Laurence Tribe proposed a new constitutional amendment for the emerging digital era. #8220;Tribe #8217;s Amendment, #8221; as I will ...
TomasHolguinFirstPaper 26 Jun 2015 - 20:26 MarkDrake
The weight of videos in trials 1. Introduction Since its beginnings, photography has been the subject of several discussions. While many considered photography ...
TomasHolguinSecondPaper 30 Jun 2015 - 14:26 MarkDrake
TomasHolguin 27 Apr 2015 How Colombia adopted a so detailed Data Protection Regulation that ended up protecting Facebook Introduction: Colombian Congress recently ...
TrackingStudentsOrSiblings 11 Jan 2013 - 21:29 IanSullivan
This is most interesting. Do students have a right to privacy? If so, is such right completely subordinated to parental discretion and responsibility? If it were my ...
TracyRizkFirstPaper 08 May 2017 - 04:04 TracyRizk
The #8220;Right to Be Forgotten #8221; as a Protection for Freedom of Thought By TracyRizk 8 May 2017 A bill in the New York State Assembly proposes the establishment ...
USSpyAgenciesSpyingOnYou 14 Jan 2015 - 22:34 IanSullivan
I just came across an article about something that was mentioned in class, and wanted to add it to the Wiki. article discusses how the Obama Administration is currently ...
UdiKarklinskyFirstPaper 30 Apr 2017 - 22:11 EbenMoglen
Complementing Notice with Periodic Disclosures Introduction Privacy policies or terms of use agreements ( #8220;notices #8221;) are too long, time consuming, and ...
UdiKarklinskySecondPaper 29 Jun 2015 - 15:35 MarkDrake
Why is it that Israelis, Despite Their #8220;Rich Experience, #8221; are Just as Negligent as Anyone Else About Their Privacy? By UdiKarklinsky 02 May 2015 Introduction ...
UnderstandingSSLSecurity 14 Jan 2015 - 22:41 IanSullivan
Background Emerging Threats to Online Trust: The Role of Public Policy and Browser Certificates, Presentation, transcript, slides(pdf). October 22, 2010 Declan !McCullagh ...
UriHacohenFirstPaper 26 Jun 2015 - 20:26 MarkDrake
Once Bitten Twice Shy On The Eroding Standard for Privacy With Regard To Israel's Internal Affairs By UriHacohen 22 Feb 2015 The Israeli public has accepted over ...
UriHacohenSecondPaper 29 Jun 2015 - 15:35 MarkDrake
Surveillance at will On Surveillance in the Workplace By UriHacohen 30 April 2015 Not too long ago, it was reasonable to assume that only behavior in the net ...
UsmanArainSecondPaper 17 Jan 2012 - 17:48 IanSullivan
Feedback welcome! Marketing The Privacy Right By UsmanArain 02 May 2010 Part I: Thinking About Aims and Goals #8220;A liberal is a conservative who #8217 ...
VanessaWFirstPaper 14 Jan 2015 - 22:44 IanSullivan
The United States Electronic Postal Service By VanessaW 05 Mar 2013 Introduction Long before the internet created the possibility of an instantaneous and convenient ...
VanessaWSecondPaper 14 Jan 2015 - 22:44 IanSullivan
Her Story to Tell By VanessaW 11 May 2013 Introduction I found out my junior year of high school that one of my friends was being abused at home. I pleaded with ...
VictorAFirstPaper 14 Jan 2015 - 22:44 IanSullivan
Forced Decryption and the 5th Amendment On February 23, 2012, the Street Journal and Conspiracy reported that the Court of Appeals for the Eleventh Circuit decided ...
VictorAuFirstPaper 14 Jan 2015 - 22:44 IanSullivan
Forced Decryption and the 5th Amendment By VictorA 03 Mar 2013 On February 23, 2012, the Street Journal and Conspiracy reported that the Court of Appeals for ...
VictorAuSecondPaper 14 Jan 2015 - 22:44 IanSullivan
"Authorized Access" under the CFAA: An Analysis of the 9th Circuit's Opinion in U.S. v. Nosal By VictorA 01 May 2013 Two years ago, the U.S. Court of Appeals ...
WardBensonFirstPaper 05 Jan 2010 - 22:31 IanSullivan
Bringing the Right on Board By WardBenson 23 Mar 2009 Even though all Americans consider freedom and privacy to be fundamental to our way of life, many on the ...
WardBensonSecondPaper 05 Jan 2010 - 22:33 IanSullivan
WardBenson 27 May 2009 A Return to Calvinist America During a recent argument I had some difficulty defending the anti data mining cause. Ok says the 1L, putting ...
WebAtom 24 Jan 2006 - 06:07 TWikiContributor
TWiki's CompPrivConst web
WebChanges 15 Nov 2006 - 19:43 TWikiContributor
WebHome 30 Apr 2017 - 18:51 EbenMoglen
Computers, Privacy, the Constitution Office hours the week of May 1 will be held from 2 6pm, Wednesday 3 May. Graduating students' revisions to essays are due ...
WebIndex 15 Nov 2006 - 19:43 TWikiContributor
WebLeftBar 28 Mar 2005 - 09:40 TWikiContributor
" warn "off"}%
WebNotify 05 Mar 2017 - 05:01 ShayaAfshar
AmandaFerber EbenMoglen LeonHuang MalcolmEvans StephanieKato WhitneyLee .WebChangesAlert, ., .TWikiRegistration
WebPreferences 15 Jun 2010 - 14:24 EbenMoglen
CompPrivConst Web Preferences The following settings are web preferences of the CompPrivConst web. These preferences overwrite the site level preferences in ...
WebRss 28 Mar 2005 - 09:40 TWikiContributor
" else "TWiki's CompPrivConst web"}% /CompPrivConst
WebSearch 15 Nov 2006 - 19:43 TWikiContributor
WebSearchAdvanced 15 Nov 2006 - 19:43 TWikiContributor
WebTopicCreator 15 Nov 2006 - 19:43 TWikiContributor
WebTopicEditTemplate 10 Jan 2008 - 20:26 EbenMoglen
WebTopicList 24 Jan 2009 - 21:47 EbenMoglen
!CompPrivConst Web Topic List Topics by Hierarchical Relationship open all close all %TREEBROWSER{ theme "file" shared "tree" title "" openTo "1" ...
WhatYouDidnTPostFacebookMayStillKnow 14 Jan 2015 - 22:34 IanSullivan
What You Didn #8217;t Post, Facebook May Still Know Interesting and relevant article. The comments after the article are pretty good too. Here's an excerpt: "In ...
WillPalmerFirstPaper 26 Jun 2015 - 20:27 MarkDrake
The Need for A Property Based Approach to Data Privacy By WillPalmer 06 Mar 2015 Section I: Fourth Amendment Protection Expanded from Physical Places to Include ...
WillPalmerSecondPaper 29 Jun 2015 - 15:36 MarkDrake
Big Data and Predictive Policing By WillPalmer 15 May 2015 Section I: What is Predictive Policing policing is a method of law enforcement that relies on the use ...
WilliamCoombsFirstPaper 23 Mar 2017 - 02:18 WilliamCoombs
Freedom of Thought Through Credit and Creativity By WilliamCoombs 23 Mar 2017 Social norms greatly influence individual behavior. Our #8220;right to privacy ...
WilliamCorsoFirstPaper 11 Jan 2013 - 21:48 IanSullivan
Encryption, Common Use Assumptions, the 5th Amendment of the U.S. Constitution Section I The 5th Amendment The 5th Amendment of the United States Constitution ...
WookJinRhaFirstPaper 17 Jan 2012 - 17:48 IanSullivan
Ready for Review Issues Surrounding Internet #8220;Real Name #8221; System in Korea By WookJinRha 27 Apr 2010 I. Adoption of Internet #8220;Real Name #8221 ...
WookJinRhaSecondPaper 17 Jan 2012 - 17:48 IanSullivan
Ready for Review Surveillance Camera Issues in Korea By WookJinRha 27 Apr 2010 Surveillance cameras secretly watching people #8217;s every move has become ...
XiyunYangFirstPaper 14 Jan 2015 - 22:44 IanSullivan
Act V: The Decay of Privacy and the Sprouts of Chinese Democracy By XiyunYang 04 Mar 2013 Act IV Scene i: Decay The bodies are strewn, bloodied and accusatory ...
XiyunYangSecondPaper 14 Jan 2015 - 22:44 IanSullivan
The Transparent World By XiyunYang 22 May 2013 Almost two centuries ago, the factories churned and drew us away from our land and our communities. We left for ...
YinHuangFirstPaper 11 Jan 2013 - 21:48 IanSullivan
By YinHuang 23 Feb 2012 Surveillance has quietly undergone a dramatic change. Thanks to the technological developments of the past half century, governments can ...
YukoKawaiFirstPaper 14 Jan 2015 - 22:44 IanSullivan
Dead Men Floating through Internet Introduction Generally, people are represented in society through everything we do, everyone we've known, everywhere we've left ...
YukoKawaiSecondPaper 14 Jan 2015 - 22:44 IanSullivan
Online election campaign in Japan Introduction A revision to the Japanese Public Offices Election Act ( #8220;POEA #8221;) to allow online election campaigning was ...
YulingHuFirstPaper 14 Jan 2015 - 22:44 IanSullivan
The New Personal Data Protection Act in Taiwan Overview Taiwan's new Personal Data Protection Act ("PDPA") became effective on October 1, 2012. Being called "the ...
YulingHuSecondPaper 14 Jan 2015 - 22:44 IanSullivan
Real Name Policy: An End to Free Speech? In the U.S., real name policies have become important tools used by both Facebook and Google to create a "real world" environment ...
YuwenHuangFirstPaper 14 Jan 2015 - 22:44 IanSullivan
YuwenHuang 04 Mar 2013 Recently, Google revealed the transparency report which shows information about requests from government s or courts around the world to hand ...
YuwenHuangSecondPaper 12 May 2013 - 19:25 EbenMoglen
About 3 months ago, Aaron Swartz, a 27 year old computer hacker committed suicide. Before his death, he was indicted on 13 felony counts of wire fraud and violations ...
ZebJohnsonFirstPaper 24 Apr 2017 - 22:51 ZebulunJohnson
ZebulunJohnson 05 Apr 2017 The Limitations of the 4th Amendment #8211; What it Can and Cannot Do As we #8217;ve discussed in class, the threat posed to individuals ...
ZebulunJohnsonFirstPaper 19 Sep 2017 - 15:21 ZebulunJohnson
ZebulunJohnson 19 Sep 2017 Introduction As a child, I often went to hidden places at quiet times to read books my parents had deemed #8220;inappropriate #8221; ...
ZhouZhouFirstPaper 11 Jan 2013 - 21:48 IanSullivan
CISPA and the Corporate Big Brother By ZhouZhou A bill called the Cyber Intelligence Sharing and Protection Act (CISPA) was recently passed in the House of Representatives ...
Found 438 topics

See also the faster WebTopicList

Navigation

Webs Webs

r4 - 15 Nov 2006 - 19:43:52 - TWikiContributor
This site is powered by the TWiki collaboration platform.
All material on this collaboration platform is the property of the contributing authors.
All material marked as authored by Eben Moglen is available under the license terms CC-BY-SA version 4.
Syndicate this site RSSATOM