1. Review questions (The length of your answer should be from roughly four or five sentences to a couple of paragraphs for each questions listed below).
- 1) What is the discovery process and how does e-discovery fit into this process?
- 2) Briefly describe the concept of the right of privacy and information privacy.
- 3) Briefly describe how society is struggling to define the extent to which employers should be able to monitor the work-related activities of employees.
- 4) Identify three key rules of the Gramm-Leach-Bliley Act that affect personal privacy.
- 5) Present a brief argument both for and against the use of advanced surveillance technology.
2. - Please answer the following questions below. (The length of your answer should be from roughly three or four sentences to a couple of paragraphs for each questions listed below). https://www.youtube.com/watch?v=smF1ZV7vikw
- 1) Why are Facebook's facial recognition software and policies a potential threat to privacy?
- 2) How can using the sharing privacy controls help preserve your privacy on Facebook? In what ways is the sharing control ineffective?
- 3) How will changing your Connection settings on Facebook help protect your privacy?
- 4) Do people who use Facebook have a legitimate claim to privacy when they themselves are posting information about themselves?
3. - Please answer the following questions below. (The length of your answer should be from roughly three or four sentences to a couple of paragraphs for each questions listed below). https://www.youtube.com/watch?v=4lKpD7MC22I
- 1) Does the Tucson data-mining project inappropriately violate users' privacy, or is it an acceptable tradeoff to more intelligently combat terrorism? Explain your answer.
- 2) Were the local police justified in their handling of Holm? Why or why not? For whichever view you take, briefly describe the opposing viewpoint.
- 3) Review the chapter-ending case in Chapter 6 on the FBI terror watch list. What themes do the two cases have in common? How are they different?
- 4) What other issues dealing with data and privacy have you encountered on the Web?
- 5) What is meant by the "Dark Web"?