Computers, Privacy & the Constitution

CompPrivConst Web Changed By
CalvinLeeFirstPaper 02 May 2022 - 14:14 CalvinLee
How We Sign Away Our Privacy By CalvinLee 10 Mar 2022 Introduction Modern privacy policies have become increasingly thorough and expansive, creating a huge ...
CarolineVisentiniFirstPaper 26 Jun 2015 - 19:50 MarkDrake
Prublic (second draft) CarolineVisentini 26 Apr 2015 Private public Prublic. I think that it is where our society is situated today. Over the course of the ...
CarolineVisentiniSecondPaper 30 Jun 2015 - 14:22 MarkDrake
Goodwill data sharing CarolineVisentini 24 Apr 2015 On March 24, 2015 Andreas Lubitz deliberately crashed a passenger jet into the French Alps. One hundred and ...
ChelsiDeTurkJournal 01 Apr 2020 - 15:47 ChelsiDeTurk
ChelsiDeTurk's Journal Thoughts from 3/25: Social Accommodation what are we willing to sacrifice for the collective good? Social control as benevolent? Does this ...
ChengyuTanFirstPaper 05 May 2021 - 19:26 ChengyuTan
The Third party Doctrine: protect us or others? By ChengyuTan 12 Mar 2021 The Fourth Amendment of the United States Constitution protects the right of the people ...
ChengyuTanSecondPaper 05 May 2021 - 07:13 ChengyuTan
Will the impartiality of the jury be protected or destroyed by big data? By ChengyuTan 13 Apr 2021 An interesting report "Harvey Weinstein jury selection: bias ...
ChenyeNiSecondPaper 02 May 2017 - 18:55 ChenyeNi
Cyber Space in China: What the Government can Do When we are talking about the Constitution #8217;s response to the protection over people #8217;s privacy in the Internet ...
ChristineOttoFirstPaper 19 Mar 2020 - 19:24 ChristineOtto
Mass Video Surveillance #8211; A Threat to Democracy? Growing surveillance by video cameras or closed circuit television (CCTV) has become a widespread normality ...
ChristineOttoJournal 16 Apr 2020 - 09:46 ChristineOtto
ChristineOtto's Journal March 25 class: Course related work: read news articles on the Radar ("As Coronavirus Surveillance Escalates, Personal Privacy Plummets ...
ChristopheWassafFirstPaper 12 May 2016 - 14:14 EbenMoglen
U.S. Privacy Laws and Facial Recognition Technology By ChristopheWassaf 16 Mar 2016 The use of biometric software for facial recognition has grown in recent years ...
ChristopherPistrittoFirstPaper 05 May 2017 - 22:00 ChristopherPistritto
The Chilling Effect of Surveillance By ChristopherPistritto Introduction The #8220;chilling effect #8221; on free speech brought about by vague and overbroad ...
ClaireCatonFirstPaper 05 May 2021 - 01:39 ClaireCaton
National Security versus the People #8217;s right to know By ClaireCaton 12 Mar 2021 2nd draft 4 May 2021 National security can be defined as the safekeeping ...
ClaireCatonJournal 01 May 2021 - 05:20 ClaireCaton
ClaireCaton's Journal ClaireCaton 01 May 2021 ClaireCaton 01 May 2021 My first essay appears under: CompPrivConst FirstPaper ClaireCatonFirstPaper However ...
ClaireCatonSecondPaper 05 May 2021 - 05:01 ClaireCaton
Presumption of innocence, pre trial media and social media coverage By ClaireCaton 16 April 2021 2nd draft 4 May 2021 All defendants in criminal cases are ...
ClaritySoughtOnElectronicsSearches-WashingtonPost 14 Jan 2015 - 22:42 IanSullivan
ChristopherCoverdale 07 Feb 2008 This story ran today, 2/7/08 http://www.washingtonpost.com/wp dyn/content/article/2008/02/06/AR2008020604763.html?wpisrc newsletter ...
ClassAudio 01 May 2022 - 14:03 EbenMoglen
Class Audio Jan 19 Jan 26 Feb 2 Feb 9 Feb 16 Feb 23 Mar 2 Mar 9 Mar 23 Mar 30 Apr 6 Apr 13 Apr 20 Apr 27
ClassNotes 17 Jan 2012 - 18:01 IanSullivan
Class Notes This topic is a container for notes of our class meetings. Sign up for taking notes by adding your name to the chart. Be sure your classnotes pages have ...
ClassNotes03Apr08 17 Jan 2012 - 17:49 IanSullivan
So what about Confrontation? (aka PartSix) Does it limit what technology judges and lawyers can use in a courtroom, when they'd otherwise use lots more technology ...
ClassNotes10Apr08 17 Jan 2012 - 17:49 IanSullivan
GerryMoody 11 Apr 2008 Could there be benefits from the technological system #8212;to expand procedure in courts in light of technology so as to derive more technological ...
ClassNotes13Mar08 17 Jan 2012 - 17:49 IanSullivan
Anonymity GGM: lost 'two most fundamental rights of man: to sleep with a woman other than his wife and the right to lie about it.' Spitzer similarly keeping it secret ...
ClassNotes14Feb08 17 Jan 2012 - 17:49 IanSullivan
LuisVilla 14 Feb 2008 Or Of The Press One (of Eben's three) web servers got cut off by the university last week. So if Eben's web server gets cut off (presume a public ...
ClassNotes17Jan08 17 Jan 2012 - 17:49 IanSullivan
General Course Background Note taking will be rotated and in the wiki. (I'd put in the wiki URL, but you're already here.) Course requirements/Grading two ...
ClassNotes2008And2009 17 Jan 2012 - 18:02 IanSullivan
Class Notes This topic is a container for notes of our class meetings. Sign up for taking notes by adding your name to the chart. Be sureyour classnotes pages have ...
ClassNotes21Feb08 17 Jan 2012 - 17:49 IanSullivan
second part of the 'of the press' argument summarizes last week as arguing that 'the press' is about publication as a mechanism of speech, rather than of a distinct ...
ClassNotes24Jan08 17 Jan 2012 - 17:49 IanSullivan
Privacy and Surveillance: (Ancient) Historical Perspective As the Supreme Court sees it in Olmstead, the common law is not open to the development of new privacies ...
ClassNotes27Mar08 17 Jan 2012 - 17:49 IanSullivan
GerryMoody 28 Mar 2008 Problems in Tibet. There has been a bust up in the net. The firewall tightening inside China is a further example of a concerted attempt to ...
ClassNotes28Feb08 17 Jan 2012 - 17:49 IanSullivan
GerryMoody 29 Feb 2008 Professor Moglen continues to make the same "unpopular" argument. Next week there is no class because he will be at a Google event at Stanford ...
ClassNotes31Jan08 17 Jan 2012 - 17:49 IanSullivan
Misc Links CNN, Memo: Don't Use Obscene Check to Pay Parking Ticket, Jan. 12 2008 JulianM 31 Jan 2008
ClassPad2021Feb2 03 Feb 2021 - 15:06 EbenMoglen
Reconstructed Class Pad: Feb 2, 2021 Computers, Privacy, and the Constitution February 2, 2021, 3:15pm EST Please remember to click on the color square in the ...
ClassPads 13 Apr 2021 - 17:53 EbenMoglen
Class Pads Jan 19 Jan 26 Feb 2 (reconstructed from crashed pad) Feb 9 Feb 16 Feb 23 Mar 9 Mar 16 Mar 23 Mar 30 Apr 6 Apr 13
Classnotes13Feb2009 17 Jan 2012 - 17:49 IanSullivan
Part 4 was the problem of constitutional rights defined as freedom from government activity from unreasonable searches and seizures in the context of technological ...
Classnotes16Jan2009 17 Jan 2012 - 17:49 IanSullivan
Lecture Notes for Jan 16, 2009 #8226; The course started in 1997, and the course has never stayed the same from year to year #8226; Intended to explain the relationship ...
Classnotes19Jan2012 30 Jan 2015 - 15:55 MatthieuWharmby
MatthieuWharmby 27 Jan 2015
Classnotes20Feb2009 17 Jan 2012 - 17:49 IanSullivan
Classnotes23Jan2009 17 Jan 2012 - 17:49 IanSullivan
Weekly news items coming alongside our concerns: Reports of use of location based information to assist in political protest or counter force with those who contributed ...
Classnotes30Jan2009 17 Jan 2012 - 17:49 IanSullivan
The Framers of the U.S. Constitution took their understanding of the problems to be solved perceived the primary goal of the protection against search, seizure and ...
Classnotes6Feb2009 17 Jan 2012 - 17:49 IanSullivan
Historical 4th Amendment has vanished as a useful proposition because technological change outran the judge #8217;s enthusiasm for enforcing or expanding the protection ...
ColinSylvesterFirstPaper 13 May 2022 - 16:54 ColinSylvester
ColinSylvester 06 May 2022 Introduction The Enlightenment principles that inspired the drafters of the Constitution presume the existence of a social contract between ...
ColinSylvesterSecondPaper 13 May 2022 - 16:57 ColinSylvester
ColinSylvester 13 May 2022 Over the past two decades, human interaction has increasingly moved from the physical space to cyberspace. Computing advances facilitated ...
CompletelyBlackmail 11 Jun 2018 - 12:02 JoeBruner
Completely Blackmail: The Other Foot Dropping This was inspired by the ending of Matt Conroy's paper. Over the course of my return to North Carolina, I have already ...
ComplicityCrueltyAndCompliance 11 May 2018 - 09:47 JoeBruner
Complicity, Cruelty, and Compliance Genocide Accomplice Liability In The Age Of Platform Companies To avoid running afoul of University self plagiarism guidelines ...
ComputerPrivacyNews 14 Feb 2008 - 21:36 LuisVilla
Some recent relevant news items: SenateAuthorizesBroadExpansionOfSurveillanceAct RethinkingSurveillance HowStickyIsMembershipOnFacebookJustTryBreakingFree ...
ConvenienceAndUnreason 17 May 2018 - 05:51 JoeBruner
some formatting broke, working on that Convenience And Chaucer The class is over. I didn't reach a satisfactory understanding of this strange convenience emotion ...
CorinneShimFirstPaper 25 Jul 2017 - 14:21 EbenMoglen
An Introduction to how Personal Privacy and Personal Autonomy Have Changed with Technology By CorinneShim 22 Mar 2017 Introduction We currently live in a society ...
CorinneShimSecondPaper 01 Oct 2017 - 20:14 CorinneShim
It is strongly recommended that you include your outline in the body of your essay by using the outline as section titles. The headings below are there to remind ...
CorinneShimSecondPaper2012 26 Sep 2017 - 15:16 CorinneShim
It is strongly recommended that you include your outline in the body of your essay by using the outline as section titles. The headings below are there to remind ...
CoryNelsonFirstPaper 14 Jan 2015 - 22:44 IanSullivan
A Lawyer's Professional Responsibility Duty of Confidentiality in a World of Technology By CoryNelson 24 Mar 2013 Introduction Lawyers are increasingly practicing ...
CoryNelsonSecondPaper 14 Jan 2015 - 22:44 IanSullivan
The Cyber Intelligence Sharing and Protection Act I. Introduction This Article will explain the proposed Cyber Intelligence Sharing and Protection Act ( #8220;CISPA ...
CuriousBritain 11 Jan 2013 - 21:30 IanSullivan
Britain has decided that an effective way to combat terrorism is to monitor all phone calls, text messages, emails, and web browsing. With luck, Britain will find ...
Found 49 topics
This site is powered by the TWiki collaboration platform.
All material on this collaboration platform is the property of the contributing authors.
All material marked as authored by Eben Moglen is available under the license terms CC-BY-SA version 4.
Syndicate this site RSSATOM