Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
43 Cards in this Set
- Front
- Back
Coders' Rights Project
|
Protects programmers and developers engaged in cutting-edge exploration of technology in our world.
|
|
Digital Rights Management
|
Prevents you from making back ups of your DVDs and music downloaded from online stores, recording your favorite TV programs, using the portable media player of your choice, remixing clips of movies into your own home movies, and much more.
|
|
Patents
|
Designed to promote investment, public disclosure, and most importantly, useful innovation.
|
|
Terms Of (Ab)Use
|
Online service providers can dictate their legal relationship with users through private contracts, rather than rely on the law as written.
|
|
Anti-Counterfeiting Trade Agreement
|
Has several features that raise significant potential concerns for consumers’ privacy and civil liberties, for innovation and the free flow of information on the Internet, legitimate commerce, and for developing countries’ ability to choose policy options that best suit their domestic priorities and level of economic development.
|
|
Communications Assistance for Law Enforcement Act (CALEA)
|
It forced telephone companies to redesign their network architectures to make wiretapping easier.
|
|
Digital Books
|
Could revolutionize reading, making more books more findable and more accessible to more people in a diversity of ways.
|
|
EFF Europe
|
Providing publicity and logistical support for combatting bad European tech policy in co-operation with the many digital rights groups across Europe to fight effectively for consumers' and technologists' interests.
|
|
NSA Spying
|
The U.S. government, with assistance from major telecommunications carriers including AT&T, has engaged in a massive program of illegal dragnet surveillance of domestic communications and communications records of millions of ordinary Americans since at least 2001.
|
|
Cell Tracking
|
Use of cell phone that records to track your physical location without first obtaining a warrant based on probable cause
|
|
Online Behavioral Tracking
|
Countless advertising networks are able to secretly monitor you across multiple websites and build detailed profiles of your behavior and interests.
|
|
Real ID
|
Create grave dangers to privacy and impose massive financial burdens without improving national security in the least.
|
|
RFID
|
A technology that can be used to pinpoint the physical location of whatever item the tags are embedded in.
|
|
Locational Privacy
|
Fighting to protect the privacy and prevent the misuse of this data that users of phones, GPS transmitters and location-based services leak to providers and to the government.
|
|
Search Engines
|
Google, Yahoo, MSN, AOL, etc. records your search queries and maintain massive databases that reach into the most intimate details of your life.
|
|
Social Networks
|
There are countless privacy pitfalls in a world where a near-endless stream of personal bits is indiscriminately posted, indefinitely stored, and quietly collected and analyzed by marketers, identity thieves, and professional government snoops in America and abroad.
|
|
Travel Screening
|
Black mark could follow you for the rest of your life, and there may be little stopping the government from using your data for purposes far outside of travel screening.
|
|
E-Voting Rights
|
EFF provides leadership on several fronts -- litigation, legislation, regulation, independent analysis, advocacy -- to help ensure that your vote counts.
|
|
FOIA Litigation for Accountable Government
|
It aims to expose the government's expanding use of new technologies that invade Americans' privacy.
|
|
Anonimity
|
Instead of using their true names to communicate, these people choose to speak using pseudonyms (assumed names) or anonymously (no name at all).
|
|
What are the bloggers' rights?
|
Bloggers can be journalists (and journalists can be bloggers).
Bloggers are entitled to free speech. Bloggers have the right to political speech. Bloggers have the right to stay anonymous. Bloggers have freedom from liability for hosting speech the same way other web hosts do. |
|
CyberSLAPP
|
These cases all involve defending people's right to remain anonymous when they post comments on message boards, as well as making sure that anonymous speakers' due process rights are respected.
|
|
No Downtime for Free Speech Campaign
|
Whether you are quoting someone on your blog, inserting clips of CNN into your own video news report, or using a song sample in a musical parody, your free speech often depends on incorporating and referencing other people's creations as part of your own.
|
|
Broadcast Flag
|
Hollywood and federal bureaucrats will get a veto over innovative devices and legitimate uses of recorded programming.
|
|
Accessibility for the Reading Disabled
|
Individuals in the disabled community, as those best placed to determine their own needs, should be free to transform copyrighted works into a form most suitable for their use, as well as to innovate new presentation forms which they can share with other members of the community.
|
|
Trusted Computing
|
propose to solve some of today's security problems through hardware changes to the personal computer.
|
|
Digital Radio
|
You shouldn't be able to record individual songs or move content to another player. And many novel uses will simply never be invented; after all, before you could hit record on your boombox or VCR, time-shifting broadcasted content wasn't "customary."
|
|
DMCA
|
A serious threat that jeopardizes fair use, impedes competition and innovation, chills free expression and scientific research, and interferes with computer intrusion laws.
|
|
File Sharing
|
Fighting for a constructive solution that gets artists paid while making file sharing legal.
|
|
No Downtime for Free Speech Campaign
|
Whether you are quoting someone on your blog, inserting clips of CNN into your own video news report, or using a song sample in a musical parody, your free speech often depends on incorporating and referencing other people's creations as part of your own.
|
|
Net Neutrality
|
FCC's efforts to protect Americans from "dirty words" in FCC v. Pacifica Foundation, or its much-criticized deregulation of the media industry, or its narrowly-thwarted attempt to cripple video innovation with the Broadcast Flag.
|
|
Trusted Computing
|
Propose to solve some of today's security problems through hardware changes to the personal computer.
|
|
Free Trade Agreement of the Americas
|
Provision that would require all FTAA countries to ban the circumvention of technological protection measures.
|
|
The Global Network Initiative
|
A coalition of information and communications companies, major human rights organizations, academics, investors and technology leaders to produce guidance and oversight for companies facing civil liberties challenges in the ICT industries.
|
|
WIPO
|
UN agency responsible for treaties involving copyright, patent, and trademark laws.
|
|
Broadcasting Treaty
|
A protection racket for middlemen in the TV and Internet worlds.
|
|
Development Agenda
|
Broader perspective should infuse WIPO's norm-setting activity and the delivery of its technical assistance to developing countries.
|
|
Digital Video
|
Promises a high quality picture and fresh crop of innovative technologies that will give you new options for manipulating video.
|
|
Search Incident to Arrest
|
Enable police officers to find weapons on the arrestee or prevent the destruction of evidence, thus allowing the officers to search the arrestee's person and the area within her immediate control.
|
|
Travel Screening
|
Before you get on an airplane, the government wants to sift through the personal details of your life.
|
|
Pen Trap
|
Federal statutes require that investigators either get a probable cause warrant or use filtering technology to ensure that only dialed phone numbers are collected.
|
|
Cell Tracking
|
Use of cell phone that records to track your physical location without first obtaining a warrant based on probable cause
|
|
Test Your ISP
|
To ensure that the Internet community has the tools and organization to quickly recognize when ISPs engage in interference or protocol discrimination in the future.
|