ࡱ> 241y bjbjEE .''   $,,, ,,,,^~H ,l0,C@C,C,@," C : Key to reading Privacy, Information and Technology 1. Before even starting the book, recognize the goal of the seminar is to have you become intellectually curious about how technology affects your privacy and how the government and business use technology to intrude into your lives. This book addresses that but with a very specific legal framework. This book is an abridged version of the same title intended for law schools. So here are some dos and donts to help you get the most out of this book. 2. Most definitely do very carefully pay attention to concepts that relate to what privacy is and how it is breached. Do pay attention to the legal concepts that frame how the government and business can use technology to snoop around your lives. Do pay attention to technology that you can use to either protect your privacy or intrude into others private lives. 3. We simply do not have the time to get bogged down into the specific myriad intricacies of court cases or the specific sections and subsections of the myriad laws you will read. However, do get a sense of how the court cases used illustrate and otherwise help you understand the broader concepts the cases are really about. Similarly, get a sense of what a law is trying to protect, in broad terms, not so much in specific terms. However, do understand basic technology terminology used so you can talk about what technologies are out there, what they do, and how they may intrude into your or someone elses privacy. 4. You will notice that there are several sections within the chapters called Notes and Questions. While I want you to read these, they often focus on many intricate details of the sections preceding them. Dont get too bogged down on these sections but read them to get a perspective of what types of questions and problems arise when you begin to dissect the broader concepts that preceded the Notes and Questions section. We will discuss some of the points in these Notes and Questions sections but generally in the broader context With that said, you need to read the following pages from the assigned chapters: Chapter 1 The whole chapter Chapter 2 pp. 57-83, which focuses on the Constitutional principles of surveillance law pp. 83-112, which focuses on major federal and state statutes that govern government forms of surveillance pp. 113-131, which focuses on how and under what circumstances government can search computers Chapter 3 pp. 159-177, which focuses on how government uses databases to sort us for various purposes  s % 2 Njk8hnQhHhVh(h+&hgT34 n o MNXYklvw0,1h/ =!"#$% ^ 666666666vvvvvvvvv666666>6666666666666666666666666666666666666666666666666hH6666666666666666666666666666666666666666666666666666666666666666662 0@P`p2( 0@P`p 0@P`p 0@P`p 0@P`p 0@P`p 0@P`p8XV~_HmH nH sH tH H`H Normal CJOJQJ_HaJmH sH tH DA D Default Paragraph FontRiR  Table Normal4 l4a (k (No List PK![Content_Types].xmlj0Eжr(΢Iw},-j4 wP-t#bΙ{UTU^hd}㨫)*1P' ^W0)T9<l#$yi};~@(Hu* Dנz/0ǰ $ X3aZ,D0j~3߶b~i>3\`?/[G\!-Rk.sԻ..a濭?PK!֧6 _rels/.relsj0 }Q%v/C/}(h"O = C?hv=Ʌ%[xp{۵_Pѣ<1H0ORBdJE4b$q_6LR7`0̞O,En7Lib/SeеPK!kytheme/theme/themeManager.xml M @}w7c(EbˮCAǠҟ7՛K Y, e.|,H,lxɴIsQ}#Ր ֵ+!,^$j=GW)E+& 8PK!Ptheme/theme/theme1.xmlYOo6w toc'vuر-MniP@I}úama[إ4:lЯGRX^6؊>$ !)O^rC$y@/yH*񄴽)޵߻UDb`}"qۋJחX^)I`nEp)liV[]1M<OP6r=zgbIguSebORD۫qu gZo~ٺlAplxpT0+[}`jzAV2Fi@qv֬5\|ʜ̭NleXdsjcs7f W+Ն7`g ȘJj|h(KD- dXiJ؇(x$( :;˹! I_TS 1?E??ZBΪmU/?~xY'y5g&΋/ɋ>GMGeD3Vq%'#q$8K)fw9:ĵ x}rxwr:\TZaG*y8IjbRc|XŻǿI u3KGnD1NIBs RuK>V.EL+M2#'fi ~V vl{u8zH *:(W☕ ~JTe\O*tHGHY}KNP*ݾ˦TѼ9/#A7qZ$*c?qUnwN%Oi4 =3ڗP 1Pm \\9Mؓ2aD];Yt\[x]}Wr|]g- eW )6-rCSj id DЇAΜIqbJ#x꺃 6k#ASh&ʌt(Q%p%m&]caSl=X\P1Mh9MVdDAaVB[݈fJíP|8 քAV^f Hn- "d>znNJ ة>b&2vKyϼD:,AGm\nziÙ.uχYC6OMf3or$5NHT[XF64T,ќM0E)`#5XY`פ;%1U٥m;R>QD DcpU'&LE/pm%]8firS4d 7y\`JnίI R3U~7+׸#m qBiDi*L69mY&iHE=(K&N!V.KeLDĕ{D vEꦚdeNƟe(MN9ߜR6&3(a/DUz<{ˊYȳV)9Z[4^n5!J?Q3eBoCM m<.vpIYfZY_p[=al-Y}Nc͙ŋ4vfavl'SA8|*u{-ߟ0%M07%<ҍPK! ѐ'theme/theme/_rels/themeManager.xml.relsM 0wooӺ&݈Э5 6?$Q ,.aic21h:qm@RN;d`o7gK(M&$R(.1r'JЊT8V"AȻHu}|$b{P8g/]QAsم(#L[PK-![Content_Types].xmlPK-!֧6 +_rels/.relsPK-!kytheme/theme/themeManager.xmlPK-!Ptheme/theme/theme1.xmlPK-! ѐ' theme/theme/_rels/themeManager.xml.relsPK]   8@0(  B S  ?  NXYv    @ +&68gTqnQVH( @( @UnknownG* Times New Roman5Symbol3. * ArialA BCambria Math"hԼfԼf}}}}!r4 2HX)?gT2!xx2Key to reading Privacy, Information and Technologycoss Ken NugerOh+'0 ,8 X d p|4Key to reading Privacy, Information and TechnologycossNormal Ken Nuger2Microsoft Office Word@Ik@z H@z H}}՜.+,0  hp  sjsu  3Key to reading Privacy, Information and Technology Title  "#$%&'(*+,-./03Root Entry F@H5Data  1TableCWordDocumentZSummaryInformation(!DocumentSummaryInformation8)CompObjy  F'Microsoft Office Word 97-2003 Document MSWordDocWord.Document.89q