5.4
Two web-sites that are blocked by filters that are not the kind of sites filters are intended to block are all student organizations at Carnegie Mellon University and A map of Disney World.
5.5
Two methods used by some governments to control access to information are the censorship of sites to help control material available to children by the Communications Decency Act of 1996, and the Child Online Protection Act which made it a federal crime for commercial Web sites to make available to minors material "harmful to minors".
5.7
Two reasons people object to spam are the content that they contain and the way it is sent. The content is usually advertising, and many people do not want any unsolicited ads or announcements. Also, spammers disguise their email return address so that they do not have to respond to complaints.
5.11
The policy for internet access that is appropriate for elementary schools is the restricted access of explicit material containing bad language as well as pornography and racist materials. For elementary school, only limited access is needed. For high schools explicit material should be granted access because of the maturity level being higher. High Schoolers should have more freedom with what they are able to view, but pornography should still be off-limits. Racist content is useful for research projects and showing different points of view.
5.14
His comments about his intentions of not hurting people and being a regular kid are all not true and blatant lies. Regular children do not set off bombs in school hallways, and then say they did not want to hurt anybody. If they did not want to hurt anybody, they would have set it off in a remote location. Blaming the internet for making him set this bomb off is not right, because although the internet grants access to all this information it is your responsibility to use your common sense and reason when it comes to using it or not. For instance, if you watched a video of how to use a knife and then stabbed somebody and blamed this on the internet site and said that hes just a normal kid without any intentions of hurting anyone, nobody would believe him because there is no way it is true.
5.17
The issues that are raised from this problems is that the satelites become useless if everybody knows about them. It alerts the enemy that they are trying to spy on, and without the element of surprise they will not catch what they want to catch. This should be illegal because this makes the satellites less effective and they are used by the government. Therefore, i think that the information that is found by the satellites should be released, time-sensitively, so that the information can still be gathered effectively. The argument for telling where these satellites orbit is weak because although people should know if they are being watched, if they are doing nothing wrong they do not have anything to worry about.
5.18
The arguments for Harris Interactive's law suit are that their inclusion on the list cut it off from about half of the survey participants. They had told these people that they were signing up for these surveys as well. The argument against them is that they were not giving the people signing up enough information to know what they were getting into. The list was published that showed the criteria, and so if they wanted to not be on the list they would just have to meet the criteria.
Wednesday, December 15, 2010
Monday, December 6, 2010
1.15. 3.9-3.11, 3.16
1.15
a)The people are interpreting the right being claimed as a positive right because he is imposing the obligation on the insurance company that they are obligated to pay for his viagra, in order to insure he has a happy sex life. This should be a positive right because it is in an obligation for the insurance to company to provide this man with medication, in this case viagra.
b) The people are interpreting the right being claimed as a negative right because they are saying that the ads that criticized them impeded their rights to act peacefully without interference. The ad organizations were interfering with his right to hold office. This should be a negative right because the ad organizations are interfering with this mans right to run peacefully without interference.
3.9
The online bookseller that provided the email service was not respecting its users privacy by saving their emails and analyzing them. In this case this is illegal because it is accessing their personal information, and unless they were informed and provided their consent for the email service to do this in something like a terms of use section, this is not legal.
3.10
The worst threat that the act is supposed to protect us from is the threat of people being able to steal things from internet companies. The arguments against this act that are the strongest is that it allows the government to access our communications which should be private. This means they are not respecting our right to privacy.
3.11
Carnivore is needed because of differences in the technology of old-time analog phones and modern email, and that interception email is more difficult now than telephones were. The main threats from it are that when the system is installed on the computer, the FBI can extract anyone's mail. There is insufficient protection to prevent the violation of the Fourth Amendment and the Electronic Communications Privacy Act.
3.16
The right to send email in encrypted form means as a negative right that people have the right to send their emails without interference and have the right to encrypt them so they cannot be interfered with. As a positive right it means that the people have a right to have people not be able to read their emails by having the right to encrypt them.
a)The people are interpreting the right being claimed as a positive right because he is imposing the obligation on the insurance company that they are obligated to pay for his viagra, in order to insure he has a happy sex life. This should be a positive right because it is in an obligation for the insurance to company to provide this man with medication, in this case viagra.
b) The people are interpreting the right being claimed as a negative right because they are saying that the ads that criticized them impeded their rights to act peacefully without interference. The ad organizations were interfering with his right to hold office. This should be a negative right because the ad organizations are interfering with this mans right to run peacefully without interference.
3.9
The online bookseller that provided the email service was not respecting its users privacy by saving their emails and analyzing them. In this case this is illegal because it is accessing their personal information, and unless they were informed and provided their consent for the email service to do this in something like a terms of use section, this is not legal.
3.10
The worst threat that the act is supposed to protect us from is the threat of people being able to steal things from internet companies. The arguments against this act that are the strongest is that it allows the government to access our communications which should be private. This means they are not respecting our right to privacy.
3.11
Carnivore is needed because of differences in the technology of old-time analog phones and modern email, and that interception email is more difficult now than telephones were. The main threats from it are that when the system is installed on the computer, the FBI can extract anyone's mail. There is insufficient protection to prevent the violation of the Fourth Amendment and the Electronic Communications Privacy Act.
3.16
The right to send email in encrypted form means as a negative right that people have the right to send their emails without interference and have the right to encrypt them so they cannot be interfered with. As a positive right it means that the people have a right to have people not be able to read their emails by having the right to encrypt them.
Monday, October 25, 2010
2.1-2.17
2.1- Personal information means any information relating to or traceable to an individual person.
2.2- The term invisible information gathering describes collection of personal information about someone without the person’s knowledge, and an example of it is when a supermarket club kept a record of everything people bought with the club cards.
2.6- Two tools that people can use to protect their privacy on the web are using proxies and blocking cookies on your computer.
2.7- The difference between opt in and opt out policies are that under an opt-out policy one must check a box on a contract, membership form, or agreement, or call or write to the organization to request removal from distribution, while under an opt-in policy, personal information is not distributed to other businesses unless the consumer has specifically permitted disclosure.
2.8- Two government databases that probably have information about me are SSN database and the police database, and the benefits I get from these are that I can distinguish myself from others with my social security number, and they can tell I didn’t do a crime because they have me in the police database.
2.9- Two private databases that probably have information about me are the google database which logs the searches that I make, and my isps database which logs where I have been on the internet. The benefit I get from being in the google database is they know what to suggest to me for searches so I can be more efficient, and the same goes for the isp’s database as well as the fact that their advertising can be related to what I look at on the internet.
2.10- This was not a privacy violation because no specific information was given about any individual child or school and it was just done as a statistic of the whole, and it was probably used in a good way to make sure that children were not accessing sites that they were not supposed to. The filtering software has access to that data and it is not private.
2.11- The policy is good because where you live is very personal information that you would not want every person to know, which would be possible if they were able to reverse search your phone number. Also, a person’s cell phone is used for mostly private reasons and it should not be public information. The downsides are that it would be convenient to be able to get anybody’s cell phone off the internet. The availability to the web would make it available to everybody whereas a book could be more private.
2.12- This is less likely because computer files are easier to get than files on paper. Internet files are very easy to access and therefore easier to copy and get for personal use whereas paper files are more secure. The leakage could be prevented by a password being put on the files or the files could be encrypted.
2.13- The arguments in favor of the city government for this action would be that the city has the right to see who is not paying the license because they are violating the license policy and breaking the law. This is just a way to track down people who are not obeying the rules. The arguments against it would be that it was going into people private information, and it was going through individuals irs records which are personal to them. This application of computer matching should be permitted because if one person has to pay the license fee than everybody should and they should be able to know who does and who doesn’t.
2.14- I think that the arguments for this would be that the politicians views should be available to the people and that it would be able to show people what they actually support versus what they are saying they support to the people. The arguments are that the persons personal views are being exposed and they are supposed to be private, and also the information about how they feel about gay marriage could be used against them. I think the side against this is stronger because this is personal information about a person and their views and it should not be available to everybody. It would result in hate campaigns if their views were showed to the public.
2.15- Some advantages of the expanded databases are that the law enforcement would have information to all the insurance claims and so they would be able to see if anybody was doing insurance fraud or making bogus claims. This way its not restricted to just a certain number of people which makes it less objectable to claims of discrimination. The downsides are that even law enforcement would have information about your insurance claims and it is making this data able to be viewed by a lot of people rather than having it be private. If you are not doing anything wrong they still have information about the things that you needed to be covered by insurance which is personal to you.
2.16- The possible reasons for this could be that they would make sure only legal occupants of the United States were using the airlines of the country, and by having their social security number they would be able to evaluate if they were a flight risk. The risks are that they would essentially be able to track where you go if they know exactly who you are and they know where your flights go, and also the more people that have your social security number the more likely that it will get out and be leaked.
2.17- An example of a database whose access by law-enforcement agents without a court order seems inconsistent with the 4th amendment of the constitution would be the access to the insurance claims by a private investigator because those are supposed to be private.
2.2- The term invisible information gathering describes collection of personal information about someone without the person’s knowledge, and an example of it is when a supermarket club kept a record of everything people bought with the club cards.
2.6- Two tools that people can use to protect their privacy on the web are using proxies and blocking cookies on your computer.
2.7- The difference between opt in and opt out policies are that under an opt-out policy one must check a box on a contract, membership form, or agreement, or call or write to the organization to request removal from distribution, while under an opt-in policy, personal information is not distributed to other businesses unless the consumer has specifically permitted disclosure.
2.8- Two government databases that probably have information about me are SSN database and the police database, and the benefits I get from these are that I can distinguish myself from others with my social security number, and they can tell I didn’t do a crime because they have me in the police database.
2.9- Two private databases that probably have information about me are the google database which logs the searches that I make, and my isps database which logs where I have been on the internet. The benefit I get from being in the google database is they know what to suggest to me for searches so I can be more efficient, and the same goes for the isp’s database as well as the fact that their advertising can be related to what I look at on the internet.
2.10- This was not a privacy violation because no specific information was given about any individual child or school and it was just done as a statistic of the whole, and it was probably used in a good way to make sure that children were not accessing sites that they were not supposed to. The filtering software has access to that data and it is not private.
2.11- The policy is good because where you live is very personal information that you would not want every person to know, which would be possible if they were able to reverse search your phone number. Also, a person’s cell phone is used for mostly private reasons and it should not be public information. The downsides are that it would be convenient to be able to get anybody’s cell phone off the internet. The availability to the web would make it available to everybody whereas a book could be more private.
2.12- This is less likely because computer files are easier to get than files on paper. Internet files are very easy to access and therefore easier to copy and get for personal use whereas paper files are more secure. The leakage could be prevented by a password being put on the files or the files could be encrypted.
2.13- The arguments in favor of the city government for this action would be that the city has the right to see who is not paying the license because they are violating the license policy and breaking the law. This is just a way to track down people who are not obeying the rules. The arguments against it would be that it was going into people private information, and it was going through individuals irs records which are personal to them. This application of computer matching should be permitted because if one person has to pay the license fee than everybody should and they should be able to know who does and who doesn’t.
2.14- I think that the arguments for this would be that the politicians views should be available to the people and that it would be able to show people what they actually support versus what they are saying they support to the people. The arguments are that the persons personal views are being exposed and they are supposed to be private, and also the information about how they feel about gay marriage could be used against them. I think the side against this is stronger because this is personal information about a person and their views and it should not be available to everybody. It would result in hate campaigns if their views were showed to the public.
2.15- Some advantages of the expanded databases are that the law enforcement would have information to all the insurance claims and so they would be able to see if anybody was doing insurance fraud or making bogus claims. This way its not restricted to just a certain number of people which makes it less objectable to claims of discrimination. The downsides are that even law enforcement would have information about your insurance claims and it is making this data able to be viewed by a lot of people rather than having it be private. If you are not doing anything wrong they still have information about the things that you needed to be covered by insurance which is personal to you.
2.16- The possible reasons for this could be that they would make sure only legal occupants of the United States were using the airlines of the country, and by having their social security number they would be able to evaluate if they were a flight risk. The risks are that they would essentially be able to track where you go if they know exactly who you are and they know where your flights go, and also the more people that have your social security number the more likely that it will get out and be leaked.
2.17- An example of a database whose access by law-enforcement agents without a court order seems inconsistent with the 4th amendment of the constitution would be the access to the insurance claims by a private investigator because those are supposed to be private.
Wednesday, September 22, 2010
Privacy B Log
http://articles.latimes.com/2010/jun/11/local/la-me-ucla-privacy-20100611
This tells about how a UCLA hospital was fined over privacy breaches containing MJ's records. State health regulators fined the hospital almost 100 thousand dollars. Privacy is defined as The quality or condition of being secluded from the presence or view of others. This applies to the organizational policies and standards because unauthorized employees were able to access Michael Jacksons medical records. The drawback of the employees being able to acess all the records are that this can happen, which is that people can find out and the hospital can be fined.
http://gawker.com/5548496/facebooks-new-privacy-controls-the-good-and-the-shameful
Also, pertaining to the new changes to the facebook privacy system, there are pros and cons. The good was that the controls were consolidated and people were able to turn off sharing to 3rd party companies, But the bad is that facebook already took away privacies, and now they are not giving them back automatically. This refers to the managing of data because facebook shared peoples information with 3rd parties for a while until this happened, which was not good.
http://www.privacyrights.org/fs/fs7-work.htm
This website is about monitoring at work, which pertains to the ability to monitor users (surveillance); concerns of people regarding monitoring. People are concerned that the company can monitor all their phone conversations as well as computer and video monitoring in the workplace. With this, virtually all privacy would be taken away when somebody is at work. Employers are able to record phone calls as well as get the records of the numbers that somebody has called or received calls from. Voicemails can be monitored and are not private as well as them being able to see your text messages. Video monitoring is also allowed. There are very few laws that protect peoples privacy in the workplace, and with all these things listed above being perfectly legal and also being done, there is virtually no privacy in the workplace.
This tells about how a UCLA hospital was fined over privacy breaches containing MJ's records. State health regulators fined the hospital almost 100 thousand dollars. Privacy is defined as The quality or condition of being secluded from the presence or view of others. This applies to the organizational policies and standards because unauthorized employees were able to access Michael Jacksons medical records. The drawback of the employees being able to acess all the records are that this can happen, which is that people can find out and the hospital can be fined.
http://gawker.com/5548496/facebooks-new-privacy-controls-the-good-and-the-shameful
Also, pertaining to the new changes to the facebook privacy system, there are pros and cons. The good was that the controls were consolidated and people were able to turn off sharing to 3rd party companies, But the bad is that facebook already took away privacies, and now they are not giving them back automatically. This refers to the managing of data because facebook shared peoples information with 3rd parties for a while until this happened, which was not good.
http://www.privacyrights.org/fs/fs7-work.htm
This website is about monitoring at work, which pertains to the ability to monitor users (surveillance); concerns of people regarding monitoring. People are concerned that the company can monitor all their phone conversations as well as computer and video monitoring in the workplace. With this, virtually all privacy would be taken away when somebody is at work. Employers are able to record phone calls as well as get the records of the numbers that somebody has called or received calls from. Voicemails can be monitored and are not private as well as them being able to see your text messages. Video monitoring is also allowed. There are very few laws that protect peoples privacy in the workplace, and with all these things listed above being perfectly legal and also being done, there is virtually no privacy in the workplace.
Monday, September 13, 2010
News Stories
http://www.nytimes.com/2010/03/17/technology/17privacy.html
This article shows how privacy online is virtually nonexistant because they were able to identify 1/3 of the users using their facebook or twitter, and netflix used it as well.
http://www.thoroughbredtimes.com/national-news/2010/May/02/Apparent-network-failure-shuts-out-potential-Derby-bettors.aspx
This shows network failure which is under the category of security. Because of the network failure the people who were going to bet on the Derby were not able to and were shut out. It pertains to the greater dependance on IT because the betting could not take place if the network was down, as well as showing the implications of network failure.
http://www.nj.com/business/index.ssf/2009/12/expect_new_evolving_computer_v.html
This link shows about types of intrusion and issues related to viruses. Mcafee is talking about new evolving computer viruses that are able to get through security and to watch out for. Social networks will be used as the vehicle for the the viruses. Using peoples facebooks makes them more open.
This article shows how privacy online is virtually nonexistant because they were able to identify 1/3 of the users using their facebook or twitter, and netflix used it as well.
http://www.thoroughbredtimes.com/national-news/2010/May/02/Apparent-network-failure-shuts-out-potential-Derby-bettors.aspx
This shows network failure which is under the category of security. Because of the network failure the people who were going to bet on the Derby were not able to and were shut out. It pertains to the greater dependance on IT because the betting could not take place if the network was down, as well as showing the implications of network failure.
http://www.nj.com/business/index.ssf/2009/12/expect_new_evolving_computer_v.html
This link shows about types of intrusion and issues related to viruses. Mcafee is talking about new evolving computer viruses that are able to get through security and to watch out for. Social networks will be used as the vehicle for the the viruses. Using peoples facebooks makes them more open.
Subscribe to:
Posts (Atom)