CS294-1 Deeply Embedded Networks Privacy Discussion 11/25/03 David Culler University of California, Berkeley.

Slides:



Advertisements
Similar presentations
TECHNO-TONOMY Privacy & Autonomy in a Networked World Learning Module 2: Legislating Privacy: Your Rights.
Advertisements

PRIVACY ACT OF 1974 OVERVIEW. FAIR INFORMATION PRACTICES The Privacy Act is primarily concerned with fair information practices. The Privacy Act is primarily.
The Law of Privacy Prof. Michael Madison – University of Pittsburgh School of Law – January 22, 2004 [1] What is privacy? [2] What law regulates privacy?
Chapter 14. This ensures citizens fair treatment under the law.
Bill of Rights guarantees personal liberties
US Constitution and Right to Privacy Generally only protects against government action Doesn’t obligate government to do something, but rather to refrain.
Employment Law for BUSINESS sixth edition
Privacy and the Right to Know Grayson Barber, Esq. Grayson Barber, LLC.
Right to Privacy: The Unwritten Right
Privacy Rights Under Pressure  Innovations in technology: photography, audio recording, motion pictures, computers, telecommunications, digital data,
13.1 Chapter 13 Privacy © 2003 by West Legal Studies in Business/A Division of Thomson Learning.
Instructions for using this template. Remember this is Jeopardy, so where I have written “Answer” this is the prompt the students will see, and where.
Insights on the Legal Landscape for Data Privacy in Higher Education Rodney Petersen, J.D. Government Relations Officer and Security Task Force Coordinator.
Privacy and Sensor Networks: Do Sensor Networks fit with Fair Information Practices Deirdre K. Mulligan Acting Clinical Professor of Law Director, Samuelson.
Privacy in Ontario Brian Beamish Office of the Information and Privacy Commissioner/Ontario Presentation to Security Canada Central 2002 International.
3 Ethics and Privacy.
Privacy & Personal Information -- Why do we care or do we?
PROTECTION OF CONSUMER & PROPERTY RIGHTS CE.13E. Question What is the role of the United States government in protecting consumer rights and property.
+ Protecting Individual Liberties Section 1 Chapter 14.
RIGHTS OF THE ACCUSED. I. OVERVIEW A. Due Process: The government, in whatever it does, must act fairly and follow established rules. 1.5 th Amendment:
Unit Five Lesson 31 How do the Fourth and Fifth Amendments Protect Against Unreasonable Law Enforcement Procedures.
Privacy After Nixon's resignation, the govt took control of all of his presidential records, including the tapes, in the Presidential Recordings and Materials.
Ethics Applied to Computerized World “Privacy” (Morality and Machines S. L. Edgar) **** CS575 *** Jules R. NYA BAWEU.
Privacy and Ubiquitous Computing Deirdre K. Mulligan Acting Clinical Professor of Law Director Samuelson Law, Technology & Public Policy Clinic, Boalt.
Privacy Law for Network Administrators Steven Penney Faculty of Law University of New Brunswick.
Anonymity, Security, Privacy and Civil Liberties
Legal aspects Based on Law in the Internet Age Sharon K. Black.
“The Fourth Amendment protects people, not places.”
CSE/ISE 312 Privacy (Part 1). What We Will Cover Privacy risks and principles 4 th Amendment, expectations, and surveillance Business and social sectors.
Bell Work: 5/8/13 What is seditious speech? What is prior restraint?
Complete your chart with the help of this Power Point.
Privacy in computing Material/text on the slides from Chapter 10 Textbook: Pfleeger.
Privacy Professional Practice for Computer Science Guest Lecture, 05 March 2007 Philippa Lawson Director, Canadian Internet Policy & Public Interest Clinic.
1 Ethical Issues in Computer Science CSCI 328, Fall 2013 Session 15 Privacy as a Value.
Bill of Rights 1 st 10 Amendments to the U.S. Constitution.
The Bill of Rights The First Fundamental Changes of the Constitution.
Quiz 10/6 Give one way that power is separated in America. Give one power of the federal government. Give one power of the state government. Give one concurrent.
14.1 Chapter 14 Privacy © 2003 by West Legal Studies in Business/A Division of Thomson Learning.
1 The Broader Picture Laws Governing Hacking and Other Computer Crimes Consumer Privacy Employee Workplace Monitoring Government Surveillance Cyberwar.
Common Law, Due Process & Statutory Protection Students directly benefit from the 14 th Amendment The school, as a governmental agency, will act impartially.
CS 6v Privacy The end of Privacy ?? Dr.Murat Kantarcioglu.
Civil Liberties “Your rights as Americans”. Founding Documents Declaration of Independence - “We hold these truths to be self-evident; that all men are.
Civil Liberties and Public Policy. The Bill of Rights- Then and Now Civil Liberties are individual and legal constitutional protections against the government.
“ Welcome to Seminar 8: Civil Liberties and Civil Rights.
The 4 th amendment. The 4 th amendment prohibits unreasonable searches and seizures and requires any warrant to be judicially sanctioned and supported.
CHAPTER 5 ETHICS & PRIVACY.
4 th Amendment Timothy Bian, Myris Kramsch, Mazen Elhosseiny, Daniel Alday, John Scott, Kartik Raju.
OVERVIEW OF AMENDMENTS FOCUS ON BILL OF RIGHTS + OTHER KEY AMENDMENTS.
AP U.S. GOVERNMENT & POLITICS – Civil Liberties Civil Liberties part 3.
1 Ethics of Computing MONT 113G, Spring 2012 Session 31 Privacy as a value.
School Law for Teachers. Overview Children have constitutional rights Reasonableness standard Clearly communicated policies.
CHAPTER SIXTEEN The Right to Privacy and Other Protections from Employer Intrusions.
LAW RIGHT TO PRIVACY NOTES 1. Def: Right protecting citizens from unreasonable interference by government 2. No right to privacy in the Constitution.
CH DUE PROCESS OF LAW ADVANCED AMERICAN GOVERNMENT CHAPTER 20 – CIVIL LIBERTIES: PROTECTING INDIVIDUAL RIGHTS.
© 2014 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license.
Privacy and the Law.
Constitution Debated.
Bill of Rights.
Surveillance in Society
Bill of Rights.
The First Ten Amendments to the Constitution
Complete your chart with the help of this Power Point.
Understanding Law: Mr Thompson, APT Academy
2.4 Due process.
Constitution Debated.
Civil Liberties: Protecting Individual Liberties
The Bill of Rights.
Computer Security Social Legal and Ethical issues
How does this Constitutional amendment protect Americans?
WARM-UP Why do you think the framers of the constitution felt it necessary to place a “bill of rights” into the document?
Presentation transcript:

CS294-1 Deeply Embedded Networks Privacy Discussion 11/25/03 David Culler University of California, Berkeley

11/25/03 Privacy - a modern legal concept Brandeis and Warren (1890) articulated how rights of privacy were implicit in established body of law –Triggered by perceived violation of privacy, concern about cameras and journalists prying Key cornerstones –1st amendment (Free Speech) »vs laws forbidding anonymous publication »Vs forced disclosure of information –4th amendment (search and seizure) »vs “unreasonable” gov’t search and seizures »Vs federal wiretaps, warrant requirement –Title III (1968) statutory restrictions on wiretapping and elect. surveil –Roe v. Wade: doctor/patient relationships –Privacy act of 1974 »Limits public agency disclosure of personal information Patchwork of laws in US –Credit reporting, Cable television, video rental records, , lie detectors, auto-dialers, junk faxes, …

11/25/03 Privacy of What? Decisional –doctor Property - search & seizure –My body, my car, my house Constitutional –against the gov't –4th amendment unreasonable search and seizure Communication Values /interests that each protect? –Autonomy, physical privacy/intimacy, speech&association, safety, reputation, consumer interests

11/25/03 Concepts of Privacy Fundamental Human Right –vs something that can be commoditized Reinforces social norms of civilized society Rights of individuals vs. government intrusions Context-dependent right to control some uses of personal data (consumer protection) Property-based concepts of privacy Zero Privacy

11/25/03 a little light and temp

11/25/03 Fair Information Practices OECD Guidelines –Collection Limitation –Data Quality –Purpose Specification –Use Limitation –Security Safeguards –Openness –Individual Participation –Accountability –Consent »Opt-in vs opt-out

11/25/03 Questions Are there fundamentally new aspects to privacy in the DENS setting? Are there technical solutions? Relationship of ‘good privacy practice’ and ‘good design practice’