SOC 2309: Law and Society ~ Exam 3: Part 4: Privacy and Surveillance

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/69

flashcard set

Earn XP

Description and Tags

Chapter 12: Privacy and Surveillance

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

70 Terms

1
New cards

Justifications for Privacy: Does Privacy Matter?

Some people don’t care or are concerned about their privacy. “I have nothing to hide”, “The government knows everything anyways”, “It’s worth it to protect us”. Justice Brandeis described privacy as "the right most valued by civilized men."

2
New cards

What are the Justifications for Privacy?

Anxiety and Pressure, Creativity, Individuality, Democracy, and Security.

3
New cards

What did the ancient Greeks see privacy as?

Privacy as a retreat from involvement in society from the responsibility to make a contribution.

4
New cards

Justifications for Privacy: Anxiety and Pressure

Allows us to free ourselves from the anxiety of always being watched, being able to retreat from the commotion from the everyday world and confusions. We are able to gain a sense of personal balance.

5
New cards

Justifications for Privacy: Creativity

Allows us to think and reflect, exercise our imagination.

6
New cards

Justifications for Privacy: Individuality

Allows us to shape our environments in the way we live without conforming to the crowd. Free from the world; self-expressive.

7
New cards

Justifications for Privacy: Democracy

Allows us to listen and learn from one another.

8
New cards

Justifications for Privacy: Security

Allows us to control personal information from misuse.

9
New cards

Constitutional Law and Privacy: There are compelling state interest in limiting privacy in some cases, what are they?

To protect public safety, to protect public health, in cases of morality, and to promote the public welfare.

10
New cards

Constitutional Law and Privacy: To Protect Public Safety

Require safety belts, prohibiting possession of lethal chemicals.

11
New cards

Constitutional Law and Privacy: To Protect Public Health

Kids having to get vaccinations for school.

12
New cards

Constitutional Law and Privacy: In Cases of Morality

Incest or the sexual abuse of children.

13
New cards

Constitutional Law and Privacy: To Promote Public Welfare

Compulsory Education: The legal requirement for individuals to attend schools before reaching a certain age.

14
New cards

Privacy is a penumbral right, what exactly is a penumbral right?

An implied right

15
New cards

Privacy as a Penumbral Right: The First Amendment

Guaranteed right of association. The right to interact and talk to who we please.

16
New cards

Privacy as a Penumbral Right: The Third Amendment

The right against quartering soldiers in your home (the government cannot intrude).

17
New cards

Privacy as a Penumbral Right: The Fourth Amendment

Prohibition against unreasonable search and seizures, we have a right to be secure in our persons, houses, and papers in effect against unreasonable search and seizures. (The government cannot intrude).

18
New cards

Privacy as a Penumbral Right: The Fifth Amendment

Self-incrimination clause; we have the right to not be compelled to give evidence against ourselves.

19
New cards

Privacy as a Penumbral Right: The Ninth Amendment

We have a rights that are not specifically specified in the constitution, and the government cannot deny these rights just because those rights are not stated.

20
New cards

What do fundamental rights create?

A zone of privacy

21
New cards

The Constitutional right to privacy protects person from unwarranted government intrusions in how many ways?

Four ways

22
New cards

The Constitutional Right to Privacy

Intimate Relationships, Reproductive Right of Women (only at state level), Right to be free from widespread exposure of personal data, and Right to be free from unreasonable searches and seizures.

23
New cards

Federal Laws Protecting Privacy: U.S. Privacy Act of 1974

Requires the government to inform people of the purpose for which that are collecting data. They cannot collect information for one purpose then use it for another purpose.

24
New cards

Federal Laws Protecting Privacy: Medical Records (HIPAA)

Medical providers cannot release sensitive personal medical information.

25
New cards

Federal Laws Protecting Privacy: Children’s Online Protection Act (COPPA)

Social media sites have to maintain private data records for children that are under 12 years old.

26
New cards

Federal Laws Protecting Privacy: Financial Credit and Consumer Records (CCPA)

Protects releasing credit information without your permission.

27
New cards

Federal Laws Protecting Privacy: Educational Records (FERPA)

Schools cannot release certain students records without permission from the student. Applies to students that are 18 and over.

28
New cards

Federal Laws Protecting Privacy: Video Records (VPPA)

Protects video rental records and in some states, bookstore sales and library records.

29
New cards

Federal Laws Protecting Privacy: Consumer Privacy

Only allows companies that does business in California; protects private information.

30
New cards

What is a Panopticon?

Proposed by Jeremy Bentham as a design for a circular prison that allows an observer to monitor all inmates without them knowing if they're being watched.

31
New cards

What is the Panopticon Effect?

Constant behavioral regulation when there is no privacy. For example, this is how people act on TV.

32
New cards

Government Surveillance: Foreign Intelligence Surveillance Act (FISA)

Procedures for electronic surveillance of threats to national security; international threats.

33
New cards

Government Surveillance: Foreign Intelligence Surveillance Court (FISC/FISA Court)

A special court established to oversee requests for surveillance warrants against foreign spies and agents in the United States, operating under the Foreign Intelligence Surveillance Act.

34
New cards

Government Surveillance: USA PATRIOT Act

A bill to intended to make it easier for the government to investigate terrorism by expanding the ability for the government to seize documents and records and wiretap modes of communication. Was passed after 9/11.

Opened the door to the sharing of information and coordination between national security officials and criminal investigators.

Created the National Security Administration and Terrorist Threat Center.

Monitored and detected threats via data valence and data mining.

35
New cards

Government Surveillance: Data-Valence

The reliance on data to track activities of Americans

36
New cards

Government Surveillance: Data Mining

The process of brining information together.

37
New cards

PRISM

Code name for NSA, a collection of internet communications

38
New cards

XKeyscore

A computer system

39
New cards

PRISM and XKeyscore

  • Began in 2007

  • Authorized via FISA and supervised FISC

  • Existence was leaked by Showden

  • Was allowed under section 215 of the PATRIOT Act

40
New cards

Domestic Crime Surveillance: Pervasive Surveillance

Significant numbers of Citizens are routinely monitored

41
New cards

Domestic Crime Surveillance: Predictive Policing

Determines which individuals are likely responsible for the violence in the community and which individuals are likely to be targeted by violence.

42
New cards

What are the various variable that are used to analyze and assign weighs in computing individuals “strategic” scores?

Criminal History, Weapons Offenses, Crimes of Violence, Age of First Arrest, and whether they have been a victim of a shooting.

43
New cards

Strategic Monitoring of Individuals: Hotspots

Using data to locate areas with high crime, which these areas are likely to have crime spikes.

44
New cards

What are other forms of monitoring?

Evidence Based Sentencing, Automated License Plate Readers, Social media Monitoring Software, Cell Phone Data Collection, and Drones

45
New cards

Doorbell Cameras

Partner with police departments to share footage of millions of homeowner internet cameras. Police can request footage within a specific time and area,

46
New cards

What is China’s Social Credit System?

A system that takes peoples everyday behaviors and gives them a score and that impacts some of the befits that you can get within this system.

47
New cards

What is everyday behavior that would boost your score?

Taking care of your family members, doing charity work, positively influencing your neighborhood, picking up trash, etc.

48
New cards

What are everyday behavior that will lower your score?

Traffic offenses (e.g., drunk driving), illegally protesting against the government, if you do not visit your parents regularly, etc.

49
New cards

What benefits could be denied or taken away if you have a low score?

Denied drivers license or permit, exclude from booking flights or train tickets, less access to credit. Could lead to public shaming.

50
New cards

Private Sector Online Data Surveillance

Personal information is a commodity to be bought and sold

51
New cards

Private Sector Online Data Surveillance: Obvious Examples

Credit reporting agencies, CLUE

52
New cards

Private Sector Online Data Surveillance: Less-Obvious Examples

Shopper Loyalty Cards, Social media Sites, Credit Card Companies, Websites (i.e., cookies/browser reporting), Public Information Sharing, GPS Tracking

53
New cards

What does CLUE stand for?

Comprehensive Loss Underwriting Exchange

54
New cards

What is CLUE?

Used by major insurance companies to assign an individually score to their insurance.

55
New cards

What are some examples of CLUE?

Homeowners insurance, Auto Insurance

56
New cards

How does CLUE impact your life?

For example, if your car insurance is really expensive it means you have a bad CLUE score. You have likely been in a lot of accidents or have acquired a lot of traffic tickets.

57
New cards

What are Data Aggregator Firms?

Consumer data collected by companies and sold for the purpose of target marketing. They have a lot of data/information about you; very detailed.

Example: Voluntary Questionnaires “What Harry Potter Character are You?”

58
New cards

Surveillance Capitalisms: In-Home

Google Home/Nest, Amazon Alexa, Facebook’s Portal, Smart Appliances, TV’s

59
New cards

What is some of the information/details that Data Aggregator Firms have on individuals?

Age, Gender, Employment, Incomes, Religion, Health, Interest, etc.

60
New cards

Tailored search results in Google include what?

Location, Search History, Web History, Social Networks

61
New cards

Cybercrime: Identity Theft

Stealing another person’s personal identifying information and using that information to fraudulently establish credit, run up debt, or take over existing financial accounts.

62
New cards

Cybercrime: Hacking

Individual, Corporate, Political

63
New cards

Cybercrime: Attack on A Network:

Viruses, DDoS Attacks, Hacking, Malware

64
New cards

Cybercrime: Crimes Carried Out Thought the Internet:

Identity Theft, Fraud, Phishing, Pretexting, Drug Dealing, Child Pornography, Copyright Infringement

65
New cards

Cybercrime: What is Pretexting?

Creating a false scenario to obtain information.

66
New cards

Other Federal Databases: CODIS

The combined DNA index system. DNA samples can be taken from charged and convicted criminals.

67
New cards

Other Federal Databases: AFIS

Automated Fingerprint Identification System

68
New cards

Other Federal Databases: New Developments

Facial/Iris Rec., Voice Rec., Gait Rec., Heartbeat Signature

69
New cards

How much privacy should we have?

Citizens in the European Union have significantly more privacy right than we do, while some countries have no privacy rights.

70
New cards

What is GDPR?

The General Data Protection Regulation is a European Union law that governs how organizations handle the personal data of EU residents.