34:2 Berkeley Technology Law Journal
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
18734 Homework 3
18734 Homework 3 Released: October 7, 2016 Due: 12 noon Eastern, 9am Pacific, Oct 21, 2016 1 Legalease [20 points] In this question, you will convert a simple policy into the Legalease language. To review the Legalease language and its grammar, refer to the lecture slides from September 28. You may find it useful to go through a simple example provided in Section III.C in the paper Bootstrapping Privacy Compliance in Big Data Systems 1. A credit company CreditX has the following information about its customers: • Name • Address • PhoneNumber • DateOfBirth • SSN All this information is organized under a common table: AccountInfo. Their privacy policy states the following: We will not share your SSN with any third party vendors, or use it for any form of advertising. Your phone number will not be used for any purpose other than notifying you about inconsistencies in your account. Your address will not be used, except by the Legal Team for audit purposes. Convert this statement into Legalease. You may use the attributes: DataType, UseForPur- pose, AccessByRole. Relevant attribute-values for DataType are AccountInfo, Name, Address, PhoneNumber, DateOfBirth, and SSN. Useful attribute-values for UseForPurpose are ThirdPar- tySharing, Advertising, Notification and Audit. One attribute-value for AccessByRole is LegalTeam. 1http://www.andrew.cmu.edu/user/danupam/sen-guha-datta-oakland14.pdf 1 2 AdFisher [35=15+20 points] For this part of the homework, you will work with AdFisher. AdFisher is a tool written in Python to automate browser based experiments and run machine learning based statistical analyses on the collected data. 2.1 Installation AdFisher was developed around 2014 on MacOS. -
North Dakota Homeland Security Anti-Terrorism Summary
UNCLASSIFIED North Dakota Homeland Security Anti-Terrorism Summary The North Dakota Open Source Anti-Terrorism Summary is a product of the North Dakota State and Local Intelligence Center (NDSLIC). It provides open source news articles and information on terrorism, crime, and potential destructive or damaging acts of nature or unintentional acts. Articles are placed in the Anti-Terrorism Summary to provide situational awareness for local law enforcement, first responders, government officials, and private/public infrastructure owners. UNCLASSIFIED UNCLASSIFIED NDSLIC Disclaimer The Anti-Terrorism Summary is a non-commercial publication intended to educate and inform. Further reproduction or redistribution is subject to original copyright restrictions. NDSLIC provides no warranty of ownership of the copyright, or accuracy with respect to the original source material. Quick links North Dakota Energy Regional Food and Agriculture National Government Sector (including Schools and Universities) International Information Technology and Banking and Finance Industry Telecommunications Chemical and Hazardous Materials National Monuments and Icons Sector Postal and Shipping Commercial Facilities Public Health Communications Sector Transportation Critical Manufacturing Water and Dams Defense Industrial Base Sector North Dakota Homeland Security Emergency Services Contacts UNCLASSIFIED UNCLASSIFIED North Dakota Nothing Significant to Report Regional (Minnesota) Hacker charged over siphoning off funds meant for software devs. An alleged hacker has been charged with breaking into the e-commerce systems of Digital River before redirecting more than $250,000 to an account under his control. The hacker, of Houston, Texas, 35, is charged with fraudulently obtaining more than $274K between December 2008 and October 2009 following an alleged hack against the network of SWReg Inc, a Digital River subsidiary. -
Blog Title Blog URL Blog Owner Blog Category Technorati Rank
Technorati Bloglines BlogPulse Wikio SEOmoz’s Blog Title Blog URL Blog Owner Blog Category Rank Rank Rank Rank Trifecta Blog Score Engadget http://www.engadget.com Time Warner Inc. Technology/Gadgets 4 3 6 2 78 19.23 Boing Boing http://www.boingboing.net Happy Mutants LLC Technology/Marketing 5 6 15 4 89 33.71 TechCrunch http://www.techcrunch.com TechCrunch Inc. Technology/News 2 27 2 1 76 42.11 Lifehacker http://lifehacker.com Gawker Media Technology/Gadgets 6 21 9 7 78 55.13 Official Google Blog http://googleblog.blogspot.com Google Inc. Technology/Corporate 14 10 3 38 94 69.15 Gizmodo http://www.gizmodo.com/ Gawker Media Technology/News 3 79 4 3 65 136.92 ReadWriteWeb http://www.readwriteweb.com RWW Network Technology/Marketing 9 56 21 5 64 142.19 Mashable http://mashable.com Mashable Inc. Technology/Marketing 10 65 36 6 73 160.27 Daily Kos http://dailykos.com/ Kos Media, LLC Politics 12 59 8 24 63 163.49 NYTimes: The Caucus http://thecaucus.blogs.nytimes.com The New York Times Company Politics 27 >100 31 8 93 179.57 Kotaku http://kotaku.com Gawker Media Technology/Video Games 19 >100 19 28 77 216.88 Smashing Magazine http://www.smashingmagazine.com Smashing Magazine Technology/Web Production 11 >100 40 18 60 283.33 Seth Godin's Blog http://sethgodin.typepad.com Seth Godin Technology/Marketing 15 68 >100 29 75 284 Gawker http://www.gawker.com/ Gawker Media Entertainment News 16 >100 >100 15 81 287.65 Crooks and Liars http://www.crooksandliars.com John Amato Politics 49 >100 33 22 67 305.97 TMZ http://www.tmz.com Time Warner Inc. -
Zencam: Context-Driven Control of Continuous Vision Body Cameras
UI*OUFSOBUJPOBM$POGFSFODFPO%JTUSJCVUFE$PNQVUJOHJO4FOTPS4ZTUFNT %$044 ZenCam: Context-Driven Control of Continuous Vision Body Cameras Shiwei Fang Ketan Mayer-Patel Shahriar Nirjon UNC Chapel Hill UNC Chapel Hill UNC Chapel Hill [email protected] [email protected] [email protected] Abstract—In this paper, we present — ZenCam, which is an this design suits the purpose in an ideal scenario, in many always-on body camera that exploits readily available information situations, the wearer (e.g., a law-enforcement officer) may in the encoded video stream from the on-chip firmware to not be able to predict the right moment to turn the camera on classify the dynamics of the scene. This scene-context is further combined with simple inertial measurement unit (IMU)-based or may completely forget to do so in the midst of an action. activity level-context of the wearer to optimally control the camera There are some cameras which automatically turns on at an configuration at run-time to keep the device under the desired event (e.g., when a gun is pulled), but they miss the “back- energy budget. We describe the design and implementation of story,” i.e., how the situation had developed. ZenCam and thoroughly evaluate its performance in real-world We advocate that body cameras should be always on so that scenarios. Our evaluation shows a 29.8-35% reduction in energy consumption and 48.1-49.5% reduction in storage usage when they are able to continuously capture the scene for an extended compared to a standard baseline setting of 1920x1080 at 30fps period. -
Electronic Communications Surveillance
Electronic Communications Surveillance LAUREN REGAN “I think you’re misunderstanding the perceived problem here, Mr. President. No one is saying you broke any laws. We’re just saying it’s a little bit weird that you didn’t have to.”—John Oliver on The Daily Show1 The government is collecting information on millions of citizens. Phone, Internet, and email habits, credit card and bank records—vir- tually all information that is communicated electronically is subject to the watchful eye of the state. The government is even building a nifty, 1.5 million square foot facility in Utah to house all of this data.2 With the recent exposure of the NSA’s PRISM program by whistleblower Edward Snowden, many people—especially activists—are wondering: How much privacy do we actually have? Well, as far as electronic pri- vacy, the short answer is: None. None at all. There are a few ways to protect yourself, but ultimately, nothing in electronic communications is absolutely protected. In the United States, surveillance of electronic communications is governed primarily by the Electronic Communications Privacy Act of 1986 (ECPA), which is an extension of the 1968 Federal Wiretap act (also called “Title III”) and the Foreign Intelligence Surveillance Act (FISA). Other legislation, such as the USA PATRIOT Act and the Communications Assistance for Law Enforcement Act (CALEA), sup- plement both the ECPA and FISA. The ECPA is divided into three broad areas: wiretaps and “electronic eavesdropping,” stored messages, and pen registers and trap-and-trace devices. Each degree of surveillance requires a particular burden that the government must meet in order to engage in the surveillance. -
A Critique of Vicarious Liability in the Medical Malpractice Context
THE BUCK STOPS WHERE? A CRITIQUE OF VICARIOUS LIABILITY IN THE MEDICAL MALPRACTICE CONTEXT C. J. COLWELL† In Canadian tort law, liability is almost always linked to some notion of fault, save for a few well-established exceptions. By far the most common exception is vicarious liability, i.e. the liability of employers for the torts of their employees. In its 1999 ruling in Bazley v. Curry, the Supreme Court of Canada articulated 2008 CanLIIDocs 35 exactly why this kind of faultless liability exists in Canada, and how it is justifed. In medical malpractice cases involving teaching hospitals, there are usually three possible defendants to a negligence action: the attending physician, the treating resident, and the hospital. Due to the legal nature of their employment relationship, if the resident is found liable, so too is her employer, the hospital. Tis liability is regardless of fault. Te attending physician, on the other hand, can only be held liable with fault. Tis paper proposes that imposing vicarious liability on the hospital or any other party in this type of action is inconsistent with the justifcations outlined in Bazley v. Curry. Liability in this particular context, it is argued, should be limited to liability with fault. Tis paper also briefy explores possible reasons why the courts have demonstrated a general preference to have hospitals, rather than attending physicians, pay judgments to injured plaintifs. It takes notice of a newly emerging non-delegable duty of care owed by hospitals to patients, and further points out the unique public source of funding for malpractice judgments regardless of who is liable. -
Corporate Liability for Economic Crime, Call for Evidence
Corporate Liability for Economic Crime Call for evidence This Call for Evidence begins on 13 January 2017 This Call for Evidence ends on 24 March 2017 Corporate Liability for Economic Crime Call for evidence Presented to Parliament by the Lord Chancellor and Secretary of State for Justice by Command of Her Majesty January 2017 Cm 9370 © Crown copyright 2017 This publication is licensed under the terms of the Open Government Licence v3.0 except where otherwise stated. To view this licence, visit nationalarchives.gov.uk/doc/open-government- licence/version/3 or write to the Information Policy Team, The National Archives, Kew, London TW9 4DU, or email: [email protected]. Where we have identified any third party copyright information you will need to obtain permission from the copyright holders concerned. This publication is available at https://consult.justice.gov.uk/ Any enquiries regarding this publication should be sent to Criminal Law & Sentencing Policy Unit at [email protected] Print ISBN 9781474139052 Web ISBN 9781474139069 ID 181116 01/17 Printed on paper containing 75% recycled fibre content minimum. Printed in the UK by the Williams Lea Group on behalf of the Controller of Her Majesty’s Stationery Office About this call for evidence To: This call for evidence invites academics, business, civil society, lawyers and other interested parties across the UK to consider whether there is a case for changes to the regime for corporate criminal liability for economic crime in the United Kingdom. Duration: -
Modified Roomba Det
Robots: Modified Roomba Detects Stress, Runs Away When It Thinks Y... http://i.gizmodo.com/5170892/modified-roomba-detects-stress-runs-awa... IPHONE 3.0 GIZ EXPLAINS PHOTOSHOP APPLE LUNCH NSFW iPhone 3.0 Beta Giz Explains: CONTEST iPhone 3.0 OS The Genius iPhone OS 3.0 OS Walkthrough What Makes The 42 Even More Guide: Behind Will Turn Your Video Five Smartphone Ludicrous Everything You Scanwiches.com's Phone Into a Platforms Control Schemes Need to Know Juicy Sandwich Revolutionary Different Apple Might Just Porn Sex Toy Try Gizmodo ROBOTS Modified Roomba Detects Stress, Runs Away When It Thinks You Might Abuse It By Sean Fallon, 4:40 PM on Mon Mar 16 2009, 7,205 views The last thing you need when you get home is something making noise and hovering underfoot. This modified Roomba avoids users when it detects high levels of stress. Designed by researchers at the University of Calgary, this Roomba interacts with a commercial headband for gamers that detects muscle tension in the face. The more tension it detects, the farther away the Roomba will hover from the subject. The purpose of this rather simple device is to explore the potential of human and machine interaction on an emotional level. The researchers envision gadgets that approach you like a pet when it detects that you are lonely and in need of comfort. Conversely, the Roomba model could be taken a step further—imagine if it cowered under the bed when you came home drunk and angry. Then, fearing for it's life, the Roomba calls 911 and gets you thrown in the slammer for appliance abuse. -
The Knowledge Standard for ISP Copyright and Trademark Secondary Liability: a Comparative Study on the Analysis of US and EU Laws
The Knowledge Standard for ISP Copyright and Trademark Secondary Liability: A Comparative Study on the Analysis of US and EU Laws A Thesis Submitted for the Degree of Doctoral of Philosophy in Law By: Mohammad Sadeghi 1002256 School of Law Brunel University London 2013 i Declaration I declare that the work presented in this thesis is my own except where it is stated otherwise. Mohammad Sadeghi i Abbreviations Used DMCA: Digital Millennium Copyright Act ECD: Electronic Commerce Directive ECJ: European Court of Justice Electronic Commerce Directive: Directive 2000/31/ EC of the European Parliament and of the Council of 8 June 2000 on Certain Legal Aspects of Information Society Services, in Particular Electronic Commerce, in the Internal Market UK CDPA: The Copyright, Designs and Patents Act 1988 UK: United Kingdom US: United States of America ii Abstract Holders of rights sue ISPs for copyright and trademark infringement: specifically, for contributory liability through the ISP’s knowledge of user infringement. Knowledge about user infringement has been prevalently recognised as a crucial element of ISPs’ secondary liability, but the approaches concerning the knowledge standard are different in US copyright case law (traditional tort), the US Digital Millennium Copyright Act, the US Lanham Act, US trademark case law, and the EU Electronic Commerce Directive. Their differences have posed questions on the efficacy of the current knowledge standards and case law interpretations to omit legal ambiguities and offer appropriate guidance for tackling issues. This research presents that the US knowledge standards and the ECD knowledge standard apply broad knowledge standards to evaluate ISPs’ knowledge but they differ in terms of their elements and conditions for permitting ISPs and copyright holders to co-exist and combat copyright infringement. -
Rule Breaches in NUS Referendum Spark Controversy
!ZPSLOPVTFt ZPSLOPVTFt @yorknouse twww.nouse.co.uk Meet the Ready for the Ball? new socs Get inspired for the Summer Ball with The Shoot M.10 From drones to Game of Thrones M.4 Shortlisted for Guardian Student Publication of the Year 2015 Est. 1964 Sponsored by Nouse Tuesday 07 June 2016 Rule breaches in NUS Referendum spark controversy The NUS has come under fire for 3rd party campaigning student members.” Amy Gibbons and Ben Rowden Campaigners on both sides DEP EDITOR AND NEWS EDITOR have taken starkly opposing views on the matter, with ambiguity about whether the email counted as ‘third party campaigning’ proving a con- THE NATIONAL UNION of Stu- tentious issue. Such ambiguity has dents has been accused of unau- left questions open as to how clearly thorised third party campaigning rules have been established between in the NUS Referendum at York stakeholders in the campaign. following an email that was sent out Lucas North, on behalf of ‘York to NUS Extra customers last week, Says Yes to NUS’, told Nouse: “‘Yes urging them to vote Remain. to NUS’ do not consider the email The email, which was sent on sent to students a breach of the Wednesday, listed eight reasons campaign rules, this is because they why customers should vote to re- are an external party who are not main in the NUS, in addition to the bound by the rules, and students benefits assumed from owning an who received it opted in to receiving NUS Extra card. communication from NUS Extra. It read: “NUS is more than just “To my understanding, person- a discount card, it is an organisation ally, both the ‘Yes’ and ‘No’ cam- dedicated to making a better life for paigns were made aware of the cam- all students [...] Make sure you vote paign rules. -
Bountiful Harvest: Essays in Honor of S. Kent Brown Andrew C
Brigham Young University BYU ScholarsArchive Maxwell Institute Publications 2011 Bountiful Harvest: Essays in Honor of S. Kent Brown Andrew C. Skinner D. Morgan Davis Carl Griffin Follow this and additional works at: https://scholarsarchive.byu.edu/mi Part of the Religious Education Commons Recommended Citation Skinner, Andrew C.; Davis, D. Morgan; and Griffin,a C rl, "Bountiful Harvest: Essays in Honor of S. Kent Brown" (2011). Maxwell Institute Publications. 17. https://scholarsarchive.byu.edu/mi/17 This Book is brought to you for free and open access by BYU ScholarsArchive. It has been accepted for inclusion in Maxwell Institute Publications by an authorized administrator of BYU ScholarsArchive. For more information, please contact [email protected], [email protected]. bountiful harvest bountiful harvest essays in honor of s. kent brown Edited by Andrew C. Skinner, D. Morgan Davis, and Carl Griffin Cover design by Stephen Hales Creative, Inc. Frontispiece by Mark A. Philbrick Neal A. Maxwell Institute for Religious Scholarship Brigham Young University Provo, UT 84602 maxwellinstitute.byu.edu © 2011 The Neal A. Maxwell Institute for Religious Scholarship All rights reserved Printed in the United States of America 10 9 8 7 6 5 4 3 2 1 Library of Congress Cataloging-in-Publication Data Bountiful harvest : essays in honor of S. Kent Brown / edited by Andrew C. Skinner, D. Morgan Davis, and Carl Griffin. p. cm. Includes bibliographical references and index. ISBN 978-0-8425-2804-7 (alk. paper) 1. Theology. 2. Church of Jesus Christ of Latter-day Saints. I. Brown, S. Kent. II. Skinner, Andrew C., 1951- III. -
The Usa Patriot Act Sunset Extension Act of 2011
Calendar No. 18 112TH CONGRESS REPORT " ! 1st Session SENATE 112–13 THE USA PATRIOT ACT SUNSET EXTENSION ACT OF 2011 APRIL 5, 2011.—Ordered to be printed Mr. LEAHY, from the Committee on the Judiciary, submitted the following R E P O R T together with MINORITY VIEWS [To accompany S. 193] [Including cost estimate of the Congressional Budget Office] The Committee on the Judiciary, to which was referred the bill (S. 193), to extend the sunset of certain provisions of the USA PA- TRIOT Act and the authority to issue national security letters, and for other purposes, having considered the same, reports favorably thereon, with amendments, and recommends that the bill, as amended, do pass. CONTENTS Page I. Background and Purpose of The USA PATRIOT Act Sunset Extension Act of 2011 .................................................................................................. 2 II. History of the Bill and Committee Consideration ....................................... 20 III. Section-by-Section Summary of the Bill ...................................................... 22 IV. Congressional Budget Office Cost Estimate ................................................ 27 V. Regulatory Impact Evaluation ...................................................................... 31 VI. Conclusion ...................................................................................................... 31 VII. Minority Views ............................................................................................... 32 VIII. Changes to Existing Law Made