Author: United States. Privacy Protection Study Commission
Publisher:
ISBN:
Category :
Languages : en
Pages : 584
Book Description
Appendix to the Report of the Privacy Protection Study Commission: The Privacy act of 1974, and assessment. -5. Technology and privacy
Author: United States. Privacy Protection Study Commission
Publisher:
ISBN:
Category : Privacy, Right of
Languages : en
Pages : 192
Book Description
Publisher:
ISBN:
Category : Privacy, Right of
Languages : en
Pages : 192
Book Description
The Report of the Privacy Protection Study Commission [appendices].
Author: United States. Privacy Protection Study Commission
Publisher:
ISBN:
Category :
Languages : en
Pages : 584
Book Description
Publisher:
ISBN:
Category :
Languages : en
Pages : 584
Book Description
Technology and Privacy
Author: United States. Privacy Protection Study Commission
Publisher:
ISBN:
Category : Computers
Languages : en
Pages : 122
Book Description
Publisher:
ISBN:
Category : Computers
Languages : en
Pages : 122
Book Description
Personal Privacy in an Information Society
Author: United States. Privacy Protection Study Commission
Publisher:
ISBN:
Category : Archives
Languages : en
Pages : 672
Book Description
Publisher:
ISBN:
Category : Archives
Languages : en
Pages : 672
Book Description
Right to Privacy Proposals of the Privacy Protection Study Commission
Author: United States. Congress. House. Committee on Government Operations. Subcommittee on Government Information and Individual Rights
Publisher:
ISBN:
Category : Privacy, Right of
Languages : en
Pages : 722
Book Description
Publisher:
ISBN:
Category : Privacy, Right of
Languages : en
Pages : 722
Book Description
The Five-year Outlook: Source materials
Author: National Science Foundation (U.S.)
Publisher:
ISBN:
Category : Government publications
Languages : en
Pages : 692
Book Description
Publisher:
ISBN:
Category : Government publications
Languages : en
Pages : 692
Book Description
Protecting Individual Privacy in the Struggle Against Terrorists
Author: National Research Council
Publisher: National Academies Press
ISBN: 0309134447
Category : Computers
Languages : en
Pages : 376
Book Description
All U.S. agencies with counterterrorism programs that collect or "mine" personal data-such as phone records or Web sites visited-should be required to evaluate the programs' effectiveness, lawfulness, and impacts on privacy. A framework is offered that agencies can use to evaluate such information-based programs, both classified and unclassified. The book urges Congress to re-examine existing privacy law to assess how privacy can be protected in current and future programs and recommends that any individuals harmed by violations of privacy be given a meaningful form of redress. Two specific technologies are examined: data mining and behavioral surveillance. Regarding data mining, the book concludes that although these methods have been useful in the private sector for spotting consumer fraud, they are less helpful for counterterrorism because so little is known about what patterns indicate terrorist activity. Regarding behavioral surveillance in a counterterrorist context, the book concludes that although research and development on certain aspects of this topic are warranted, there is no scientific consensus on whether these techniques are ready for operational use at all in counterterrorism.
Publisher: National Academies Press
ISBN: 0309134447
Category : Computers
Languages : en
Pages : 376
Book Description
All U.S. agencies with counterterrorism programs that collect or "mine" personal data-such as phone records or Web sites visited-should be required to evaluate the programs' effectiveness, lawfulness, and impacts on privacy. A framework is offered that agencies can use to evaluate such information-based programs, both classified and unclassified. The book urges Congress to re-examine existing privacy law to assess how privacy can be protected in current and future programs and recommends that any individuals harmed by violations of privacy be given a meaningful form of redress. Two specific technologies are examined: data mining and behavioral surveillance. Regarding data mining, the book concludes that although these methods have been useful in the private sector for spotting consumer fraud, they are less helpful for counterterrorism because so little is known about what patterns indicate terrorist activity. Regarding behavioral surveillance in a counterterrorist context, the book concludes that although research and development on certain aspects of this topic are warranted, there is no scientific consensus on whether these techniques are ready for operational use at all in counterterrorism.
The Five-year Outlook
Privacy online fair information practices in the electronic marketplace : a report to Congress
Author:
Publisher: DIANE Publishing
ISBN: 1428958428
Category :
Languages : en
Pages : 208
Book Description
Publisher: DIANE Publishing
ISBN: 1428958428
Category :
Languages : en
Pages : 208
Book Description
Security V. Liberty
Author: Daniel Farber
Publisher: Russell Sage Foundation
ISBN: 1610441931
Category : Political Science
Languages : en
Pages : 251
Book Description
In the weeks following 9/11, the Bush administration launched the Patriot Act, rejected key provisions of the Geneva Convention, and inaugurated a sweeping electronic surveillance program for intelligence purposes—all in the name of protecting national security. But the current administration is hardly unique in pursuing such measures. In Security v. Liberty, Daniel Farber leads a group of prominent historians and legal experts in exploring the varied ways in which threats to national security have affected civil liberties throughout American history. Has the government's response to such threats led to a gradual loss of freedoms once taken for granted, or has the nation learned how to restore civil liberties after threats subside and how to put protections in place for the future? Security v. Liberty focuses on periods of national emergency in the twentieth century—from World War I through the Vietnam War—to explore how past episodes might bear upon today's dilemma. Distinguished historian Alan Brinkley shows that during World War I the government targeted vulnerable groups—including socialists, anarchists, and labor leaders—not because of a real threat to the nation, but because it was politically expedient to scapegoat unpopular groups. Nonetheless, within ten years the Supreme Court had rolled back the most egregious of the World War I restrictions on civil liberties. Legal scholar John Yoo argues for the legitimacy of the Bush administration's War on Terror policies—such as the detainment and trials of suspected al Qaeda members—by citing historical precedent in the Roosevelt administration's prosecution of World War II. Yoo contends that, compared to Roosevelt's sweeping use of executive orders, Bush has exercised relative restraint in curtailing civil liberties. Law professor Geoffrey Stone describes how J. Edgar Hoover used domestic surveillance to harass anti-war protestors and civil rights groups throughout the 1960s and early 1970s. Congress later enacted legislation to prevent a recurrence of the Hoover era excesses, but Stone notes that the Bush administration has argued for the right to circumvent some of these restrictions in its campaign against terrorism. Historian Jan Ellen Lewis looks at early U.S. history to show how an individual's civil liberties often depended on the extent to which he or she fit the definition of "American" as the country's borders expanded. Legal experts Paul Schwartz and Ronald Lee examine the national security implications of rapid advances in information technology, which is increasingly driven by a highly globalized private sector, rather than by the U.S. government. Security v. Liberty shows that civil liberties are a not an immutable right, but the historically shifting result of a continuous struggle that has extended over two centuries. This important new volume provides a penetrating historical and legal analysis of the trade-offs between security and liberty that have shaped our national history—trade-offs that we confront with renewed urgency in a post-9/11 world.
Publisher: Russell Sage Foundation
ISBN: 1610441931
Category : Political Science
Languages : en
Pages : 251
Book Description
In the weeks following 9/11, the Bush administration launched the Patriot Act, rejected key provisions of the Geneva Convention, and inaugurated a sweeping electronic surveillance program for intelligence purposes—all in the name of protecting national security. But the current administration is hardly unique in pursuing such measures. In Security v. Liberty, Daniel Farber leads a group of prominent historians and legal experts in exploring the varied ways in which threats to national security have affected civil liberties throughout American history. Has the government's response to such threats led to a gradual loss of freedoms once taken for granted, or has the nation learned how to restore civil liberties after threats subside and how to put protections in place for the future? Security v. Liberty focuses on periods of national emergency in the twentieth century—from World War I through the Vietnam War—to explore how past episodes might bear upon today's dilemma. Distinguished historian Alan Brinkley shows that during World War I the government targeted vulnerable groups—including socialists, anarchists, and labor leaders—not because of a real threat to the nation, but because it was politically expedient to scapegoat unpopular groups. Nonetheless, within ten years the Supreme Court had rolled back the most egregious of the World War I restrictions on civil liberties. Legal scholar John Yoo argues for the legitimacy of the Bush administration's War on Terror policies—such as the detainment and trials of suspected al Qaeda members—by citing historical precedent in the Roosevelt administration's prosecution of World War II. Yoo contends that, compared to Roosevelt's sweeping use of executive orders, Bush has exercised relative restraint in curtailing civil liberties. Law professor Geoffrey Stone describes how J. Edgar Hoover used domestic surveillance to harass anti-war protestors and civil rights groups throughout the 1960s and early 1970s. Congress later enacted legislation to prevent a recurrence of the Hoover era excesses, but Stone notes that the Bush administration has argued for the right to circumvent some of these restrictions in its campaign against terrorism. Historian Jan Ellen Lewis looks at early U.S. history to show how an individual's civil liberties often depended on the extent to which he or she fit the definition of "American" as the country's borders expanded. Legal experts Paul Schwartz and Ronald Lee examine the national security implications of rapid advances in information technology, which is increasingly driven by a highly globalized private sector, rather than by the U.S. government. Security v. Liberty shows that civil liberties are a not an immutable right, but the historically shifting result of a continuous struggle that has extended over two centuries. This important new volume provides a penetrating historical and legal analysis of the trade-offs between security and liberty that have shaped our national history—trade-offs that we confront with renewed urgency in a post-9/11 world.