|
Privacy Rights
Fetch Headings.ExtraData
Below are groups and resources (books, articles, websites, etc.) related to this topic. Click on an item’s title to go its resource page with author, publisher, description/abstract and other details, a link to the full text if available, as well as links to related topics in the Subject Index. You can also browse the Title, Author, Subject, Chronological, Dewey, LoC, and Format indexes, or use the Search box. Results43 Connexions Library1 Connexions Directory of Groups & Websites 1 Sources Experts & Spokespersons 17 Sources Library 2 From the Connexions Archives Connexions LibraryThe Absurd Consequences of a "Right to Privacy" Knapp, Thomas Article 2017 British MP David Davis’s text messages poking fun at the appearance of a female colleague make him the latest whipping boy for those determined to root out sexism and misogyny in public life, the Dail... Capitalist Surveillance State: Everyone's a Target: Threatening Reporters, Spying on Public Article 2013 There is an inherent tendency for the state, which governs on behalf of a minuscule, ruthless class of obscenely wealthy exploiters, to attempt to amass ever greater power to control the population be... Connexions: Volume 4, Number 1 - February 1979 - National Security/Securite Nationale Serial Publication (Periodical) 1979 Connexions: Volume 5, Number 1 - January 1980 - Literacy/Alphabetisation Serial Publication (Periodical) 1980 Connexions: Volume 9, Number 2 - Summer 1984 - Rights and Liberties - A Digest of Resources & Groups for Social Serial Publication (Periodical) 1984 Connexions Digest: Issue 54 - February 1992- A Social Change Sourcebook Serial Publication (Periodical) 1992 Connexions Library: Human Rights and Civil Liberties Focus Website Selected articles, books, websites and other resources on civil liberties and human rights. Corporate Coercion and the Drive to Eliminate Buying with Cash Nader, Ralph Article 2018 Consumer freedom and privacy are examined as coercive commercialism quickly moves toward a cashless economy, when all consumers are forced into corporate payment systems from credit/debit cards, mobil... Eavesdropping on the Planet: The Inalienable Right to Snoop? Blum, William Article 2013 Like a mammoth vacuum cleaner in the sky, the National Security Agency (NSA) sucks it all up: home phone, office phone, cellular phone, email, fax, telex … satellite transmissions, fiber-optic communi... Edward Snowden's Warning to Canada Snowden, Edward Article 2015 Whistleblower Edward Snowden talks about Bill C-51 and the weak oversight of Canada's intelligence agencies. Eyes Wide Open Article 2013 The recent revelations, made possible by NSA-whistleblower Edward Snowden, of the reach and scope of global surveillance practices have prompted a fundamental reexamination of the role of intelligence... The FBI's secret biometrics database they don't want you to see Article 2016 The Federal Bureau of Investigation (FBI) wants to prevent information about its creepy biometric database, which contains fingerprint, face, iris, and voice scans of millions of Americans, from getti... Genetic Testing of Citizens Is a Backdoor into Total Population Surveillance by Governments and Companies Wallace, Helen Article 2014 The new Chief Executive of the National Health Service (NHS) in England, Simon Stevens, was recently reported arguing that the NHS must be transformed to make people’s personal genetic information the... Google's 'Smart City of Surveillance' Faces New Resistance in Toronto Kofman, Ava Article 2018 A plan to develop 12 acres of the valuable waterfront just southeast of downtown Toronto
by the government agency Waterfront Toronto and Sidewalk Labs, owned by Google’s parent company Alphabet Inc. ... If U.S. Mass Media Were State-Controlled, Would They Look Any Different?: Snowden Coverage Cohen, Jeff Article 2013 The Edward Snowden leaks have revealed a U.S. corporate media system at war with independent journalism. Many of the same outlets that missed the Wall Street meltdown and cheer-led the Iraq invasion h... The Institutionalization of Tyranny: When Victory Has Nothing to do With Justice Roberts, Paul Craig Article 2013 Republicans and conservative Americans are still fighting Big Government in its welfare state form. Apparently, they have never heard of the militarized police state form of Big Government, or, if the... The Intercept Website A platform to report on the documents previously provided by NSA whistleblower Edward Snowden, with a long-term mission is to produce fearless, adversarial journalism across a wide range of issues. Internet Companies: Confusing Consumers for Profit Cordozo, Nate Article 2015 In the age of information, companies are hungry for your data. They want it - even if it means resorting to trickery. 'I've Got Nothing to Hide' and Other Misunderstandings of Privacy Solove, Daniel J. Article 2007 According to the nothing to hide argument, there is no threat to privacy unless the government uncovers unlawful activity, in which case a person has no legitimate justification to claim that it remai... Lessons of the Snowden Revelations: You are the Target! Lopez, Alfredo Article 2013 We in the Left have long worried about “police state tactics”. Now we have to confront the police state structure. It’s here and it can morph into a real police state with very little effort. Opposing... No Child Left Un-Mined? Student Privacy at Risk in the Age of Big Data Chideya, Farai Article 2015 Chideya discusses the implications of the compilation of big data trails containing information about children's performance in school. No Safe Harbor: How NSA Spying Undermined U.S. Tech and Europeans' Privacy O'Brien, Danny Article 2015 The spread of knowledge about the NSA's surveillance programs has shaken the trust of customers in U.S. Internet companies like Facebook, Google, and Apple: especially non-U.S. customers who have disc... NSA, GCHQ mapping "political alignment" of cellphone users: New report reveals London, Eric Article 2014 New information made public by Edward Snowden reveals that the governments of the United States and United Kingdom are trawling data from cellphone “apps” to accumulate dossiers on the “political alig... The NSA Has Effectively Destroyed Internet Privacy: Snowden's Latest Lopez, Alfredo Article 2013 Whistle-blower Edward Snowden prove that the NSA, working with its British counterpart the Government Communications Headquarters has conducted an intentional and largely sucessful campaign to destroy... The NSA's Invasion of Google and Yahoo Servers: Your Email is Likely Being Monitored Lopez, Alfredo Article 2013 The American National Security Agency (NSA) has been intercepting information coming in and out of Google and Yahoo servers over non-public, internal network fibre optic lines. In December, 2012 alone... The Obliteration of Privacy: Snowden and the NSA Kandutsch, Carl E Article 2014 It’s remarkable how little outrage Edward Snowden’s NSA revelations have provoked in the American public. One often heard response is something like, “Well, I don’t have anything to hide, so I don’t c... On Locational Privacy, and How to Avoid Losing it Forever Blumberg, Andrew J.; Eckersley, Peter Article 2009 Over the next decade, systems which create and store digital records of people's movements through public space will be woven inextricably into the fabric of everyday life. We are already starting to ... Other Voices: The Connexions Newsletter - July 22, 2017: Secrecy and Power Diemer, Ulli (ed.) Serial Publication (Periodical) 2017 Secrecy is a weapon the powerful use against their enemies: us. This issue of Other Voices explores the relationship of secrecy and power. Police Go on Fishing Expedition, Search the Home of Seattle Privacy Activists Who Maintain Tor Network Herz, Ansel Article 2016 Seattle police descended on the Queen Anne condo of two outspoken privacy activists with a search warrant early this morning, leaving them shaken and upset. Jan Bultmann and David Robinson, a married ... Preparing for a Digital 9/11 Greenberg, Karen Article 2012 In recent years, in one of the more dangerous, if largely undiscussed, developments of our time, the Bush and then Obama administrations have launched the first state-planned war in cyber space. First... Privacy For Sale: How Computerization Has Made Everyone's Private Life an Open Secret Rothfeder, Jeffrey Book 1992 Privacy tapped out Price, David Article 2013 For over a century, Americans and their judiciary fiercely fought any attempt by security agencies and law enforcement to listen in on private electronic communications. Now they’ve stopped fighting, ... Revealed: How DOJ Gagged Google over Surveillance of WikiLeaks Volunteer Gallagher, Ryan Article 2015 The Obama administration fought a legal battle against Google to secretly obtain the email records of a security researcher and journalist associated with WikiLeaks. The Soft Cage: Surveillance in America from Slavery to the War on Terror Parenti, Christian; Rossetti, Chip (eds.) Book 2004 Parenti explores the history of American surveillance from colonial times to the present. What this historical evidence clearly reveals is a continuum of the culture of surveillance. The weakest, most... Spies Hacked Computers Thanks to Sweeping Secret Warrants, Aggressively Stretching U.K. Law Fishman, Andrew; Greenwald, Glenn Article 2015 British spies have received government permission to intensively study software programs for ways to infiltrate and take control of computers. The GCHQ spy agency was vulnerable to legal action for th... Spying by the Numbers: Hundreds of Thousands Subject to Government Surveillance and No Real Protection Quigley, Bill Article 2013 Thanks to NSA whistleblower Edward Snowden many more people in the US and world-wide are learning about extensive US government surveillance and spying. There are publicly available numbers which sho... Surveillance USA: NSA and the PRISM Project Kampmark, Binoy Article 2013 The government is merrily going about its business of keeping tabs on you in virtually every conceivable way. Think the Left Won the Culture War? Think Again deBoer, Fredrik Article 2015 With the recent AshleyMadison leak and Gawker.com's notorious naming and shaming of an obscure, married publishing executive, deBoer questions who really won in this culture war. Thousands Join Legal Fight Against UK Surveillance — And You Can, Too Gallagher, Ryan Article 2015 Thousands of people are signing up to join an unprecedented legal campaign against the United Kingdom’s leading electronic surveillance agency. Three Leaks, Three Weeks, and What We've Learned About the US Government's Other Spying Authority: Executive Order 12333 Jaycox, Mark M. Article 2013 The National Security Agency has been siphoning off data from the links between Yahoo and Google data centers, which include the fiber optic connections between company servers at various points aroun... Uber Plans to Track Users Should Not Be Allowed, Says Privacy Group Chatterjee, Pratap Article 2015 A formal complaint has been filed against Uber, the car ride company, by the Electronic Privacy Information Center (EPIC), a non-profit advocacy group. The NGO says Uber plans to use their smart phone... U.N. Report Asserts Encryption as a Human Right in the Digital Age Froomkin, Dan Article 2015 Encryption is not the refuge of scoundrels, as Obama administration law-enforcement officials loudly proclaim – it is an essential tool needed to protect the right of freedom of opinion and expression... Le Viol du Courier/Violation of the Mail Article The League on Human Rights presents arguments against the legality and acceptability of Bill C-26. This bill, introduced to Parliament in February 1978, aims to authorize the opening of first-class ma... Connexions Directory of Groups & WebsitesConnexions Archive & Library The Connexions Archive & Library is Toronto-based project dedicated to keeping alive the rich history of grassroots movements for social justice.
Connexions preserves 'alternative' histories that r... Sources Experts & SpokespersonsSources LibraryAustralia: Journalists' sources under threat with data retention regime Sources News Release 2015 The International Federation of Journalists (IFJ) joins its affiliate the Media, Entertainment & Arts Alliance (MEAA) in condemning the commencement of new data retention laws in Australia. The Devil Is In the Details: How Patients' Mental Health Data Is At Risk Chideya, Farai 2015 It seems like "Patient doctor confidentiality" doesn’t apply to other doctors. Overly diligent doctors are free to snoop around in the psychiatric medical records of their patients. As if that weren't... Email privacy Wikipedia article 2012 Email privacy is the broad topic dealing with issues of unauthorized access and inspection of electronic mail. This unauthorized access can happen while an email is in transit, as well as when it is s... Free Speech Groups Issue New Guide to the International 'Necessary & Proportionate Principles' Sources News Release 2014 EFF and ARTICLE 19 Urges Governments to Preserve Fundamental Freedoms in the Age of Mass Surveillance Get your head out of the clouds If we allow our personal data to be stored in giant electornic centres, we deserve what we get Harris, John 2011 Appraising the risks to personal data held in cloud computing systems. Hillary Clinton on the Sanctity of Protecting Classified Information Greenwald, Glenn 2015 It turns out that at least two of the emails which traversed Hillary Clinton’s personal email account and server were "top secret," according to the inspector general for the Intelligence Community. T... Journalists Welcome European Call to Review Anti-Terrorism Laws Sources News Release 2009 Ministers of the human rights network of the Council of Europe have called on their governments to review anti-terrorism laws in the face of strong criticism from journalists that some laws are in pra... Obama defiant over NSA revelations ahead of summit with Chinese premier Ackerman, Spencer; Roberts, Dan 2013 President says oversight of NSA surveillance programme should be left to Congress in comments criticising media 'hype.' The Peruvian "Stalker Law" Will Be Reviewed By Congress, We Can Still Stop It Bogado, David; Rodriguez, Katitza 2015 Bogado and Rodriguez discuss the new decree in Peru known as "Ley Acosadora", or "the Stalker Law", allows warrantless access to Peruvians' location data and creates a new power for the government to ... Protecting the Choice to Speak Anonymously Is Key to Fighting Online Harassment Sources News Release 2016 EFF Urges Department of Education to Uphold First Amendment Rights in University Anti-Harassment Policies Raleigh police are asking Google to provide user data for all people near crime scenes 2018 Police in Raleigh, North Carolina, have presented Google with warrants to obtain data from mobile phones from not just specific suspects who were in a crime scene area, but from the mobile phones of a... Reporters Without Borders and Torservers.net, partners against online surveillance and censorship Sources News Release 2014 Reporters Without Borders and Torservers.net have joined forces to create and maintain 250 additional relays for the Tor network. San Diego's Facial Recognition Program Shows Why We Need Records on Police Use of Mobile Biometric Technology Maass, David 2015 The New York Times has a story out on how San Diego police use mobile facial recognition devices in the field, including potentially on non-consenting residents who aren't suspected of a crime. One ac... Software that tracks people on social media created by defence firm Gallagher, Ryan 2013 Raytheon's Riot program mines social network data like a 'Google for spies', drawing ire from civil rights groups. The Stasi could only dream of such data Britain, the birthplace of liberalism, has become the database state Ash, Timothy Garton 2008 As technology increases the flow of stored data about individual actions, assurances of the "right to informational self-determination" must be hard won from governments. Government surveillance of ci... UN slams UK surveillance law, calls for privacy reforms in Canada, France and Macedonia 2015 In yet another blow to the UK's surveillance proponents, the UN Human Rights Committee has criticised the British legal regime governing the interception of communications, observing that it allows fo... The use of encryption tools and the protection of anonymity online as safeguards for freedom of the press Kaye, David 2015 David Kaye is the UN Special Rapporteur on the promotion and protection of the right to freedom of expression. In his latest report, he stressed that governments are obligated to protect encryption to... From the Connexions ArchivesIntelligentSearch.ca Website 2017 A web portal featuring topics related to research and the Internet. The home page features a selection of recent and important articles. A search feature, subject index, and other research tools make ... Privacy Journal Smith, Robert Ellis Serial Publication (Periodical) 1978 A monthly newsletter that is, "...filled with American and Canadian news about the confidentiality of personal information." It describes, "...record-keeping in government and business, new invasions ... |