SlideShare une entreprise Scribd logo
1  sur  26
Living in a Wired World Frederick S. Lane St. Michael’s College 24 February 2011 www.FrederickLane.com
Lecture Overview Introduction “So That a Man Can Stand Up” Privacy in the Bill of Rights 1890 – Good or Bad Year for Privacy? The Warren Court and Privacy Our Changing Zone of Privacy The Future of Privacy www.FrederickLane.com
Introduction Attorney, Educational Consultant & Lecturer www.FrederickLane.com
Introduction Attorney, Educational Consultant & Lecturer Author of 5 Books www.FrederickLane.com
Introduction Attorney, Educational Consultant & Lecturer Author of 5 Books Computer Forensics Expert www.FrederickLane.com
Introduction Attorney, Educational Consultant & Lecturer Author of 5 Books Computer Forensics Expert Chair, Burlington (VT) School Board www.FrederickLane.com
Introduction Attorney, Educational Consultant & Lecturer Author of 5 Books Computer Forensics Expert Chair, Burlington (VT) School Board Student Safety & Privacy Advocate www.FrederickLane.com
“So That a Man Can Stand Up” www.FrederickLane.com
Privacy in the Bill of Rights 1st Amendment – Freedoms of speech, religion, association, assembly 2nd Amendment – Right to Bear Arms 3rd Amendment – No quartering of troops 4th Amendment – Freedom from unreasonable search and seizure 5th Amendment – Freedom from self-incrimination 6th Amendment – Right to counsel at trial 9th Amendment – Unenumerated rights reserved www.FrederickLane.com
1890 – Good or Bad Year for Privacy? www.FrederickLane.com
1890 – Good or Bad Year for Privacy? www.FrederickLane.com
1890 – Good or Bad Year for Privacy? www.FrederickLane.com
Punchcards and Privacy www.FrederickLane.com
The Warren Court & Privacy Mapp v. Ohio, 367 U.S. 643 (1961) – exclusionary rule Griswold v. Connecticut, 381 U.S. 479 (1965) – establishing a “right to privacy” Miranda v. Arizona, 384 U.S. 436 (1966) – right to remain silent Katz v. United States, 389 U.S. 347 (1967) – warrantless wiretapping is illegal www.FrederickLane.com
Our Changing Zone of Privacy www.FrederickLane.com
How Private Is Social Media? www.FrederickLane.com
We Are All Branded Now Friends and Family College administration and security Graduate schools and fellowship committees Future romantic partners/spouses Future employers: at least 50% of all employers use Google and Facebook Law Enforcement www.FrederickLane.com
The Wired Workplace The Ethics of Googling Job Applicants Other Types of Background Checks Whose Wires Are They Anyway? Free Speech and Employment Is Your Boss Your “Friend”? www.FrederickLane.com
The Cost of Bad Publicity – Part 1 Stacy Snyder denied teaching license for MySpace photo labeled “Drunken Pirate” Others have lost college admissions, scholarships, fellowships, even jobs At least half of employers cite drinking or provocative photos as red flags www.FrederickLane.com
The Cost of Bad Publicity – Part 2 Ashley Payne, a 24-year-old high school English teacher, traveled to Europe for vacation and posted photos to her Facebook account An anonymous individual forwarded one photo to school officials Payne was summoned to the principal’s office and told to resign or be suspended. www.FrederickLane.com
GeoLocation & Granularity www.FrederickLane.com
Nothing to Hide, Nothing to Fear? www.FrederickLane.com
New Frontiers of Surveillance www.FrederickLane.com
Privacy R.I.P.? www.FrederickLane.com What Is It We’re Trying to Protect? No Single Definition of Privacy Fundamental Concept is Control Switch to “Opt-In” Model Federal Privacy Protection Agency? Education and Self-Control A Transparent Society?
Uncharted Waters www.FrederickLane.com
Living in a Wired World Frederick S. Lane St. Michael’s College 24 February 2011 www.FrederickLane.com

Contenu connexe

Tendances

American Privacy: A History of the Right to Privacy in the United States
American Privacy: A History of the Right to Privacy in the United StatesAmerican Privacy: A History of the Right to Privacy in the United States
American Privacy: A History of the Right to Privacy in the United StatesFrederick Lane
 
Slideshare circusof campusdatingviolence
Slideshare circusof campusdatingviolenceSlideshare circusof campusdatingviolence
Slideshare circusof campusdatingviolencejrodrigue1024
 
2018-06-01 If You Tweet in the Woods, Can You Be Fired?
2018-06-01 If You Tweet in the Woods, Can You Be Fired?2018-06-01 If You Tweet in the Woods, Can You Be Fired?
2018-06-01 If You Tweet in the Woods, Can You Be Fired?Frederick Lane
 
Out & Proud Gay and Lesbian Politicians Are...
Out & Proud Gay and Lesbian Politicians Are...Out & Proud Gay and Lesbian Politicians Are...
Out & Proud Gay and Lesbian Politicians Are...tellingdeity9911
 

Tendances (6)

The State of Women Lawyers
The State of Women LawyersThe State of Women Lawyers
The State of Women Lawyers
 
American Privacy: A History of the Right to Privacy in the United States
American Privacy: A History of the Right to Privacy in the United StatesAmerican Privacy: A History of the Right to Privacy in the United States
American Privacy: A History of the Right to Privacy in the United States
 
Slideshare circusof campusdatingviolence
Slideshare circusof campusdatingviolenceSlideshare circusof campusdatingviolence
Slideshare circusof campusdatingviolence
 
2018-06-01 If You Tweet in the Woods, Can You Be Fired?
2018-06-01 If You Tweet in the Woods, Can You Be Fired?2018-06-01 If You Tweet in the Woods, Can You Be Fired?
2018-06-01 If You Tweet in the Woods, Can You Be Fired?
 
Wednesday's Lesson
Wednesday's LessonWednesday's Lesson
Wednesday's Lesson
 
Out & Proud Gay and Lesbian Politicians Are...
Out & Proud Gay and Lesbian Politicians Are...Out & Proud Gay and Lesbian Politicians Are...
Out & Proud Gay and Lesbian Politicians Are...
 

Similaire à 2011-02-24 Living in a Wired World

2011 02-17 cybertraps for law students and young lawyers
2011 02-17 cybertraps for law students and young lawyers2011 02-17 cybertraps for law students and young lawyers
2011 02-17 cybertraps for law students and young lawyersFrederick Lane
 
2010-10-29 Can You See Me Now?
2010-10-29 Can You See Me Now?2010-10-29 Can You See Me Now?
2010-10-29 Can You See Me Now?Frederick Lane
 
2011-06-23 Privacy, Anonymity, and Intellectual Freedom in the Facebook Era
2011-06-23 Privacy, Anonymity, and Intellectual Freedom in the Facebook Era2011-06-23 Privacy, Anonymity, and Intellectual Freedom in the Facebook Era
2011-06-23 Privacy, Anonymity, and Intellectual Freedom in the Facebook EraFrederick Lane
 
2010-09-09 The World-Wide Bathroom Wall
2010-09-09 The World-Wide Bathroom Wall2010-09-09 The World-Wide Bathroom Wall
2010-09-09 The World-Wide Bathroom WallFrederick Lane
 
2010-11-02 Cybertraps for the Elderly
2010-11-02 Cybertraps for the Elderly2010-11-02 Cybertraps for the Elderly
2010-11-02 Cybertraps for the ElderlyFrederick Lane
 
2010-07-28 Can You See Me Now?
2010-07-28 Can You See Me Now?2010-07-28 Can You See Me Now?
2010-07-28 Can You See Me Now?Frederick Lane
 
Cyberbullying class symposium
Cyberbullying class symposiumCyberbullying class symposium
Cyberbullying class symposiumkschermerhorn
 
English Poem Essay Structure. Online assignment writing service.
English Poem Essay Structure. Online assignment writing service.English Poem Essay Structure. Online assignment writing service.
English Poem Essay Structure. Online assignment writing service.Sarah Meza
 
2013-04-02 Cybertraps for Educators
2013-04-02 Cybertraps for Educators2013-04-02 Cybertraps for Educators
2013-04-02 Cybertraps for EducatorsFrederick Lane
 
Extra Curricular Training 06 03 09
Extra Curricular Training 06 03 09Extra Curricular Training 06 03 09
Extra Curricular Training 06 03 09Brad Domitrovich
 
Toefl Essay Format. Free Sample TOEFL Essays. 20
Toefl Essay Format. Free Sample TOEFL Essays. 20Toefl Essay Format. Free Sample TOEFL Essays. 20
Toefl Essay Format. Free Sample TOEFL Essays. 20Jennifer Gutierrez
 
Myspace Or Yours
Myspace Or YoursMyspace Or Yours
Myspace Or Yourstbiggs6
 
Lis 768 Privacy Presentation
Lis 768 Privacy PresentationLis 768 Privacy Presentation
Lis 768 Privacy PresentationJulia Bryan-Diehl
 
Cyber bullyingchurch
Cyber bullyingchurchCyber bullyingchurch
Cyber bullyingchurchJack Jones
 
The Court and the Cross: Understanding the Separation of Church and State in ...
The Court and the Cross: Understanding the Separation of Church and State in ...The Court and the Cross: Understanding the Separation of Church and State in ...
The Court and the Cross: Understanding the Separation of Church and State in ...Frederick Lane
 
Freakonomics - Review of the Book
Freakonomics - Review of the BookFreakonomics - Review of the Book
Freakonomics - Review of the BookShaer Hassan
 

Similaire à 2011-02-24 Living in a Wired World (20)

2011 02-17 cybertraps for law students and young lawyers
2011 02-17 cybertraps for law students and young lawyers2011 02-17 cybertraps for law students and young lawyers
2011 02-17 cybertraps for law students and young lawyers
 
2010-10-29 Can You See Me Now?
2010-10-29 Can You See Me Now?2010-10-29 Can You See Me Now?
2010-10-29 Can You See Me Now?
 
2011-06-23 Privacy, Anonymity, and Intellectual Freedom in the Facebook Era
2011-06-23 Privacy, Anonymity, and Intellectual Freedom in the Facebook Era2011-06-23 Privacy, Anonymity, and Intellectual Freedom in the Facebook Era
2011-06-23 Privacy, Anonymity, and Intellectual Freedom in the Facebook Era
 
2010-09-09 The World-Wide Bathroom Wall
2010-09-09 The World-Wide Bathroom Wall2010-09-09 The World-Wide Bathroom Wall
2010-09-09 The World-Wide Bathroom Wall
 
2010-11-02 Cybertraps for the Elderly
2010-11-02 Cybertraps for the Elderly2010-11-02 Cybertraps for the Elderly
2010-11-02 Cybertraps for the Elderly
 
2010-07-28 Can You See Me Now?
2010-07-28 Can You See Me Now?2010-07-28 Can You See Me Now?
2010-07-28 Can You See Me Now?
 
Cyberbullying class symposium
Cyberbullying class symposiumCyberbullying class symposium
Cyberbullying class symposium
 
English Poem Essay Structure. Online assignment writing service.
English Poem Essay Structure. Online assignment writing service.English Poem Essay Structure. Online assignment writing service.
English Poem Essay Structure. Online assignment writing service.
 
2013-04-02 Cybertraps for Educators
2013-04-02 Cybertraps for Educators2013-04-02 Cybertraps for Educators
2013-04-02 Cybertraps for Educators
 
Extra Curricular Training 06 03 09
Extra Curricular Training 06 03 09Extra Curricular Training 06 03 09
Extra Curricular Training 06 03 09
 
Toefl Essay Format. Free Sample TOEFL Essays. 20
Toefl Essay Format. Free Sample TOEFL Essays. 20Toefl Essay Format. Free Sample TOEFL Essays. 20
Toefl Essay Format. Free Sample TOEFL Essays. 20
 
Cyberbullying Class
Cyberbullying ClassCyberbullying Class
Cyberbullying Class
 
Myspace Or Yours
Myspace Or YoursMyspace Or Yours
Myspace Or Yours
 
The Now Generation Internet Safety
The Now Generation   Internet SafetyThe Now Generation   Internet Safety
The Now Generation Internet Safety
 
Lis 768 Privacy Presentation
Lis 768 Privacy PresentationLis 768 Privacy Presentation
Lis 768 Privacy Presentation
 
Cyber bullyingchurch
Cyber bullyingchurchCyber bullyingchurch
Cyber bullyingchurch
 
The Court and the Cross: Understanding the Separation of Church and State in ...
The Court and the Cross: Understanding the Separation of Church and State in ...The Court and the Cross: Understanding the Separation of Church and State in ...
The Court and the Cross: Understanding the Separation of Church and State in ...
 
Freakonomics - Review of the Book
Freakonomics - Review of the BookFreakonomics - Review of the Book
Freakonomics - Review of the Book
 
Legalissues
LegalissuesLegalissues
Legalissues
 
Lis580 seminargroup3
Lis580 seminargroup3Lis580 seminargroup3
Lis580 seminargroup3
 

Plus de Frederick Lane

2020-03-03 Privacy and the Ethical Educator
2020-03-03 Privacy and the Ethical Educator2020-03-03 Privacy and the Ethical Educator
2020-03-03 Privacy and the Ethical EducatorFrederick Lane
 
2020-02-25 Cybertraps and Cyberethics for Educators
2020-02-25 Cybertraps and Cyberethics for Educators2020-02-25 Cybertraps and Cyberethics for Educators
2020-02-25 Cybertraps and Cyberethics for EducatorsFrederick Lane
 
2020-02-24 Cultivating a Culture of Cybersecurity
2020-02-24 Cultivating a Culture of Cybersecurity2020-02-24 Cultivating a Culture of Cybersecurity
2020-02-24 Cultivating a Culture of CybersecurityFrederick Lane
 
2020-02-23 Cybersecurity Audits for Tech Directors
2020-02-23 Cybersecurity Audits for Tech Directors2020-02-23 Cybersecurity Audits for Tech Directors
2020-02-23 Cybersecurity Audits for Tech DirectorsFrederick Lane
 
2020-02-22 The Rise of the Digital Mob
2020-02-22 The Rise of the Digital Mob2020-02-22 The Rise of the Digital Mob
2020-02-22 The Rise of the Digital MobFrederick Lane
 
2020-02-14 Using Video Games as a Motivational Tool
2020-02-14 Using Video Games as a Motivational Tool2020-02-14 Using Video Games as a Motivational Tool
2020-02-14 Using Video Games as a Motivational ToolFrederick Lane
 
2020-02-14 The Perils of Social Media
2020-02-14 The Perils of Social Media2020-02-14 The Perils of Social Media
2020-02-14 The Perils of Social MediaFrederick Lane
 
2020-02-14 Cybertraps for Educators
2020-02-14 Cybertraps for Educators2020-02-14 Cybertraps for Educators
2020-02-14 Cybertraps for EducatorsFrederick Lane
 
2020-02-14 Understanding the 4Ps: Personal, Private, Public, and Professional
2020-02-14 Understanding the 4Ps: Personal, Private, Public, and Professional2020-02-14 Understanding the 4Ps: Personal, Private, Public, and Professional
2020-02-14 Understanding the 4Ps: Personal, Private, Public, and ProfessionalFrederick Lane
 
2020-02-13 Teaching Cyberethics to Prospective Teachers
2020-02-13 Teaching Cyberethics to Prospective Teachers2020-02-13 Teaching Cyberethics to Prospective Teachers
2020-02-13 Teaching Cyberethics to Prospective TeachersFrederick Lane
 
2020-02-13 Cyberethics and the MCEE
2020-02-13 Cyberethics and the MCEE2020-02-13 Cyberethics and the MCEE
2020-02-13 Cyberethics and the MCEEFrederick Lane
 
2020-02-13 Teaching Cyberethics to Prospective Teachers
2020-02-13 Teaching Cyberethics to Prospective Teachers2020-02-13 Teaching Cyberethics to Prospective Teachers
2020-02-13 Teaching Cyberethics to Prospective TeachersFrederick Lane
 
2020-02-13 Can You Legislate Cyberethics?
2020-02-13 Can You Legislate Cyberethics?2020-02-13 Can You Legislate Cyberethics?
2020-02-13 Can You Legislate Cyberethics?Frederick Lane
 
2020-02-12 Cybertraps for HR Professionals
2020-02-12 Cybertraps for HR Professionals2020-02-12 Cybertraps for HR Professionals
2020-02-12 Cybertraps for HR ProfessionalsFrederick Lane
 
2020-02-11 Cyberethics and the MCEE
2020-02-11 Cyberethics and the MCEE2020-02-11 Cyberethics and the MCEE
2020-02-11 Cyberethics and the MCEEFrederick Lane
 
2020-02-10 Teaching Cyberethics to Prospective Teachers
2020-02-10 Teaching Cyberethics to Prospective Teachers2020-02-10 Teaching Cyberethics to Prospective Teachers
2020-02-10 Teaching Cyberethics to Prospective TeachersFrederick Lane
 
2020-02-10 Cyberethics and the MCEE
2020-02-10 Cyberethics and the MCEE2020-02-10 Cyberethics and the MCEE
2020-02-10 Cyberethics and the MCEEFrederick Lane
 
2020-01-29 Politics and the Ethical Educator: How to Survive the 2020 Electio...
2020-01-29 Politics and the Ethical Educator: How to Survive the 2020 Electio...2020-01-29 Politics and the Ethical Educator: How to Survive the 2020 Electio...
2020-01-29 Politics and the Ethical Educator: How to Survive the 2020 Electio...Frederick Lane
 
2019-06-24 Humans and Social Media: Cyberrisks, Cybertraps & Cybersecurity
2019-06-24 Humans and Social Media: Cyberrisks, Cybertraps & Cybersecurity2019-06-24 Humans and Social Media: Cyberrisks, Cybertraps & Cybersecurity
2019-06-24 Humans and Social Media: Cyberrisks, Cybertraps & CybersecurityFrederick Lane
 
2019-06-25 Cybertraps for Educators: Don't Get Caught
2019-06-25 Cybertraps for Educators: Don't Get Caught2019-06-25 Cybertraps for Educators: Don't Get Caught
2019-06-25 Cybertraps for Educators: Don't Get CaughtFrederick Lane
 

Plus de Frederick Lane (20)

2020-03-03 Privacy and the Ethical Educator
2020-03-03 Privacy and the Ethical Educator2020-03-03 Privacy and the Ethical Educator
2020-03-03 Privacy and the Ethical Educator
 
2020-02-25 Cybertraps and Cyberethics for Educators
2020-02-25 Cybertraps and Cyberethics for Educators2020-02-25 Cybertraps and Cyberethics for Educators
2020-02-25 Cybertraps and Cyberethics for Educators
 
2020-02-24 Cultivating a Culture of Cybersecurity
2020-02-24 Cultivating a Culture of Cybersecurity2020-02-24 Cultivating a Culture of Cybersecurity
2020-02-24 Cultivating a Culture of Cybersecurity
 
2020-02-23 Cybersecurity Audits for Tech Directors
2020-02-23 Cybersecurity Audits for Tech Directors2020-02-23 Cybersecurity Audits for Tech Directors
2020-02-23 Cybersecurity Audits for Tech Directors
 
2020-02-22 The Rise of the Digital Mob
2020-02-22 The Rise of the Digital Mob2020-02-22 The Rise of the Digital Mob
2020-02-22 The Rise of the Digital Mob
 
2020-02-14 Using Video Games as a Motivational Tool
2020-02-14 Using Video Games as a Motivational Tool2020-02-14 Using Video Games as a Motivational Tool
2020-02-14 Using Video Games as a Motivational Tool
 
2020-02-14 The Perils of Social Media
2020-02-14 The Perils of Social Media2020-02-14 The Perils of Social Media
2020-02-14 The Perils of Social Media
 
2020-02-14 Cybertraps for Educators
2020-02-14 Cybertraps for Educators2020-02-14 Cybertraps for Educators
2020-02-14 Cybertraps for Educators
 
2020-02-14 Understanding the 4Ps: Personal, Private, Public, and Professional
2020-02-14 Understanding the 4Ps: Personal, Private, Public, and Professional2020-02-14 Understanding the 4Ps: Personal, Private, Public, and Professional
2020-02-14 Understanding the 4Ps: Personal, Private, Public, and Professional
 
2020-02-13 Teaching Cyberethics to Prospective Teachers
2020-02-13 Teaching Cyberethics to Prospective Teachers2020-02-13 Teaching Cyberethics to Prospective Teachers
2020-02-13 Teaching Cyberethics to Prospective Teachers
 
2020-02-13 Cyberethics and the MCEE
2020-02-13 Cyberethics and the MCEE2020-02-13 Cyberethics and the MCEE
2020-02-13 Cyberethics and the MCEE
 
2020-02-13 Teaching Cyberethics to Prospective Teachers
2020-02-13 Teaching Cyberethics to Prospective Teachers2020-02-13 Teaching Cyberethics to Prospective Teachers
2020-02-13 Teaching Cyberethics to Prospective Teachers
 
2020-02-13 Can You Legislate Cyberethics?
2020-02-13 Can You Legislate Cyberethics?2020-02-13 Can You Legislate Cyberethics?
2020-02-13 Can You Legislate Cyberethics?
 
2020-02-12 Cybertraps for HR Professionals
2020-02-12 Cybertraps for HR Professionals2020-02-12 Cybertraps for HR Professionals
2020-02-12 Cybertraps for HR Professionals
 
2020-02-11 Cyberethics and the MCEE
2020-02-11 Cyberethics and the MCEE2020-02-11 Cyberethics and the MCEE
2020-02-11 Cyberethics and the MCEE
 
2020-02-10 Teaching Cyberethics to Prospective Teachers
2020-02-10 Teaching Cyberethics to Prospective Teachers2020-02-10 Teaching Cyberethics to Prospective Teachers
2020-02-10 Teaching Cyberethics to Prospective Teachers
 
2020-02-10 Cyberethics and the MCEE
2020-02-10 Cyberethics and the MCEE2020-02-10 Cyberethics and the MCEE
2020-02-10 Cyberethics and the MCEE
 
2020-01-29 Politics and the Ethical Educator: How to Survive the 2020 Electio...
2020-01-29 Politics and the Ethical Educator: How to Survive the 2020 Electio...2020-01-29 Politics and the Ethical Educator: How to Survive the 2020 Electio...
2020-01-29 Politics and the Ethical Educator: How to Survive the 2020 Electio...
 
2019-06-24 Humans and Social Media: Cyberrisks, Cybertraps & Cybersecurity
2019-06-24 Humans and Social Media: Cyberrisks, Cybertraps & Cybersecurity2019-06-24 Humans and Social Media: Cyberrisks, Cybertraps & Cybersecurity
2019-06-24 Humans and Social Media: Cyberrisks, Cybertraps & Cybersecurity
 
2019-06-25 Cybertraps for Educators: Don't Get Caught
2019-06-25 Cybertraps for Educators: Don't Get Caught2019-06-25 Cybertraps for Educators: Don't Get Caught
2019-06-25 Cybertraps for Educators: Don't Get Caught
 

Dernier

08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?XfilesPro
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 

Dernier (20)

08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 

2011-02-24 Living in a Wired World

  • 1. Living in a Wired World Frederick S. Lane St. Michael’s College 24 February 2011 www.FrederickLane.com
  • 2. Lecture Overview Introduction “So That a Man Can Stand Up” Privacy in the Bill of Rights 1890 – Good or Bad Year for Privacy? The Warren Court and Privacy Our Changing Zone of Privacy The Future of Privacy www.FrederickLane.com
  • 3. Introduction Attorney, Educational Consultant & Lecturer www.FrederickLane.com
  • 4. Introduction Attorney, Educational Consultant & Lecturer Author of 5 Books www.FrederickLane.com
  • 5. Introduction Attorney, Educational Consultant & Lecturer Author of 5 Books Computer Forensics Expert www.FrederickLane.com
  • 6. Introduction Attorney, Educational Consultant & Lecturer Author of 5 Books Computer Forensics Expert Chair, Burlington (VT) School Board www.FrederickLane.com
  • 7. Introduction Attorney, Educational Consultant & Lecturer Author of 5 Books Computer Forensics Expert Chair, Burlington (VT) School Board Student Safety & Privacy Advocate www.FrederickLane.com
  • 8. “So That a Man Can Stand Up” www.FrederickLane.com
  • 9. Privacy in the Bill of Rights 1st Amendment – Freedoms of speech, religion, association, assembly 2nd Amendment – Right to Bear Arms 3rd Amendment – No quartering of troops 4th Amendment – Freedom from unreasonable search and seizure 5th Amendment – Freedom from self-incrimination 6th Amendment – Right to counsel at trial 9th Amendment – Unenumerated rights reserved www.FrederickLane.com
  • 10. 1890 – Good or Bad Year for Privacy? www.FrederickLane.com
  • 11. 1890 – Good or Bad Year for Privacy? www.FrederickLane.com
  • 12. 1890 – Good or Bad Year for Privacy? www.FrederickLane.com
  • 13. Punchcards and Privacy www.FrederickLane.com
  • 14. The Warren Court & Privacy Mapp v. Ohio, 367 U.S. 643 (1961) – exclusionary rule Griswold v. Connecticut, 381 U.S. 479 (1965) – establishing a “right to privacy” Miranda v. Arizona, 384 U.S. 436 (1966) – right to remain silent Katz v. United States, 389 U.S. 347 (1967) – warrantless wiretapping is illegal www.FrederickLane.com
  • 15. Our Changing Zone of Privacy www.FrederickLane.com
  • 16. How Private Is Social Media? www.FrederickLane.com
  • 17. We Are All Branded Now Friends and Family College administration and security Graduate schools and fellowship committees Future romantic partners/spouses Future employers: at least 50% of all employers use Google and Facebook Law Enforcement www.FrederickLane.com
  • 18. The Wired Workplace The Ethics of Googling Job Applicants Other Types of Background Checks Whose Wires Are They Anyway? Free Speech and Employment Is Your Boss Your “Friend”? www.FrederickLane.com
  • 19. The Cost of Bad Publicity – Part 1 Stacy Snyder denied teaching license for MySpace photo labeled “Drunken Pirate” Others have lost college admissions, scholarships, fellowships, even jobs At least half of employers cite drinking or provocative photos as red flags www.FrederickLane.com
  • 20. The Cost of Bad Publicity – Part 2 Ashley Payne, a 24-year-old high school English teacher, traveled to Europe for vacation and posted photos to her Facebook account An anonymous individual forwarded one photo to school officials Payne was summoned to the principal’s office and told to resign or be suspended. www.FrederickLane.com
  • 21. GeoLocation & Granularity www.FrederickLane.com
  • 22. Nothing to Hide, Nothing to Fear? www.FrederickLane.com
  • 23. New Frontiers of Surveillance www.FrederickLane.com
  • 24. Privacy R.I.P.? www.FrederickLane.com What Is It We’re Trying to Protect? No Single Definition of Privacy Fundamental Concept is Control Switch to “Opt-In” Model Federal Privacy Protection Agency? Education and Self-Control A Transparent Society?
  • 26. Living in a Wired World Frederick S. Lane St. Michael’s College 24 February 2011 www.FrederickLane.com