Skip to main content

Home/ ITGSopedia/ Group items tagged laws

Rss Feed Group items tagged

Barbara Stefanics

The Legal Implications of Surveillance Cameras | District Administration Magazine - 0 views

  •  
    "The Legal Implications of Surveillance Cameras District administrators need to know the law and make these policies clear. By: Amy M. Steketee District Administration, February 2012 undefined The nature of school security has changed dramatically over the last decade. Schools employ various measures, from metal detectors to identification badges to drug testing, to promote the safety and security of staff and students. One of the increasingly prevalent measures is the use of security cameras. In fact, the U.S. Department of Education reported that more than half of all public schools used security cameras during the 2007-2008 school year to monitor students, a 30 percent increase over eight years prior. While security cameras can be useful in addressing and deterring violence and other misconduct, they also raise several legal issues that can leave school administrators in a quandary. Does the use of surveillance cameras to capture images violate a student or staff member's right of privacy? If the images captured on a surveillance recording are of a student violating school rules, may district administrators use the recording in a disciplinary proceeding? If so, are parents of the accused student entitled to review the footage? What about parents of other students whose images are captured on the recording? How should schools handle inquiries from media about surveillance footage? Can administrators use surveillance cameras to monitor staff? I outline the overriding legal principles, common traps for the unwary and practical considerations. Advertisement Legal Principles Fourth Amendment to the U.S. Constitution. The Fourth Amendment prohibits the government, including public schools, from conducting unreasonable searches or seizures. Courts have generally held, however, that what an individual knowingly exposes in plain view to the public will not trigger Fourth Amendment protection because no search has occurred. Someone who is videotaped in public has n
Elizabeth Schloeffel

YouTube Sentences Copyright Offenders to School - NYTimes.com - 1 views

  • In many countries around the world, if you break the law by stealing copyrighted content you can be sentenced to prison and heavily fined. But if Google catches you breaking copyright laws, the punishment is more akin to being caught smoking in the boys room in high school: You’re forced to take an online class at YouTube’s Copyright School.
  •  
    "In many countries around the world, if you break the law by stealing copyrighted content you can be sentenced to prison and heavily fined. But if Google catches you breaking copyright laws ....You're forced to take an online class at YouTube's Copyright School."
Mark Brookes

How will data retention laws cope with the internet of things? - 0 views

  •  
    "How will data retention laws cope with the internet of things?"
Barbara Stefanics

Digital Millenium Copyright Act: Home - 0 views

  •  
    "The distribution of copyrighted materials without permission (over the internet) can be a violation of federal law. The law is known as the Digital Millennium Copyright Act of 1998 ("DMCA")."
Barbara Stefanics

Police Department, Law Enforcement Agency, Police Officer, FOP, Laws & Codes Links from... - 0 views

  •  
    links to international agencies, associations and organizations, laws and codes
Madeleine Brookes

Living Under Drones - YouTube - 0 views

  •  
    "http://www.warcosts.com Since 2004, up to 884 innocent civilians, including at least 176 children, have died from US drone strikes in the North Waziristan region of Pakistan. A new report from the Stanford and New York University law schools finds drone use has caused widespread post-tramatic stress disorder and an overall breakdown of functional society in North Waziristan. In addition, the report finds the use of a "double tap" procedure, in which a drone strikes once and strikes again not long after, has led to deaths of rescuers and medical professionals. Many interviewees told the researchers they didn't know what America was before drones. Now what they know of America is drones, death and terror. Follow the conversation @WarCosts #UnderDrones"
Sandra Stark

Consumer Data Protection Laws, an Ocean Apart - NYTimes.com - 0 views

  •  
    Useful international perspective.
Madeleine Brookes

Apple - Supplier Responsibility - Code of Conduct - Labor and Human Rights - 0 views

  •  
    Apple prohibits practices that threaten the rights of workers - even when local laws and customs permit such practices. We've taken action toward ending excessive recruitment fees, preventing the hiring of underage workers, and prohibiting discriminatory policies at our suppliers. There's still work to be done, but we're encouraged by the progress we've made thus far. Refer to the chart below to learn more.
Madeline Brownstone

Authorities Worry 3-D Printers May Undermine Europe's Gun Laws - 0 views

  •  
    "Law enforcement agencies across Europe are on alert over the proliferation of gun-making software that is easily found on the Internet and can be used to make a weapon on a consumer-grade 3-D printer. "
Elizabeth Schloeffel

NSW Government recording features for facial recognition | News.com.au - 0 views

  •  
    "THE New South Wales Government is quietly compiling a mathematical map of almost every adult's face, sharing information that allows law enforcement to track people by CCTV. "
Madeleine Brookes

Tor: anonymity online - 0 views

  •  
    Tor is free software and an open network that helps you defend against a form of network surveillance that threatens personal freedom and privacy, confidential business activities and relationships, and state security known as traffic analysis. Tor protects you by bouncing your communications around a distributed network of relays run by volunteers all around the world: it prevents somebody watching your Internet connection from learning what sites you visit, and it prevents the sites you visit from learning your physical location. Tor works with many of your existing applications, including web browsers, instant messaging clients, remote login, and other applications based on the TCP protocol. Hundreds of thousands of people around the world use Tor for a wide variety of reasons: journalists and bloggers, human rights workers, law enforcement officers, soldiers, corporations, citizens of repressive regimes, and just ordinary citizens. (Note: sometimes ITGS students need to be able to access sites that are sometimes blocked)
Barbara Stefanics

POLICE TECHNOLOGY - PUBLIC SAFETY TECHNOLOGY - 1 views

  •  
    "police technology, law enforcement technology, criminal justice technology, public safety technology and homeland security technology"
Barbara Stefanics

National Crime Information Center (NCIC) - FBI Information Systems - 0 views

  •  
    "NCIC is a computerized index of criminal justice information (i.e.- criminal record history information, fugitives, stolen properties, missing persons). It is available to Federal, state, and local law enforcement and other criminal justice agencies and is operational 24 hours a day, 365 days a year. "
Sandra Stark

Smuggling Europe's Waste to Poorer Countries - NYTimes.com - 1 views

  •  
    Exporting waste illegally to poor countries has become a vast and growing international business, as companies try to minimize the costs of new environmental laws, like those here, that tax waste or require that it be recycled or otherwise disposed of in an environmentally responsible way.
Sandra Stark

Police Department integrates technology, conferencing in battle against crime - JSOnline - 2 views

  •  
    Detailed description of the use of technology in law enforcement. Mapping of crime locations etc. Department officials say a new commitment to technology is a key factor behind police statistics that show a 40.2% drop in reported violent crime in Milwaukee for the first quarter of 2010 when compared with the first quarter three years ago.
samaraad

BBC News - Arrest made in Hollywood hacking probe - 1 views

  •  
    "The FBI has arrested and charged a Florida man in a probe of email hacking that targeted Hollywood celebrities, US law enforcement officials say."
1 - 20 of 35 Next ›
Showing 20 items per page