Free Speech, Internet Privacy and the 'Right to Be Forgotten'
Advancing the Management Skills of IT Professionals

Free Speech, Internet Privacy and the 'Right to Be Forgotten' - Advancing the Management Skills of IT Professionals
Show More

Related videos

Intoduction to France's "Right to Disconnect" Law - Advancing the Management Skills of IT Professionals
A new law dubbed the, "Right to Disconnect Law," says that French employers must specify certain hours when workers will not have to respond to, or even check, their work email. The French government says the law will "ensure the respect of rest time and vacation, as well as personal…
Europe’s Right to Be Forgotten
Episode 22 of The Surveillance State
Google search results in Europe are different from those in the United States. In Europe, some results are omitted thanks to a "right to be forgotten" principle. Although Europe and America's approach toward privacy is generally similar, here you'll compare the legal state of data collection in both the public…
Emerging IT Trends - And Their Impact on Security Policies
Over the past decade, we have witnessed a true paradigm shift in global computing. This technological revolution has been led by familiar players such as the Internet, wireless communication and Cloud Computing and is complimented by a host of clever devices that keep today's mobile workforce productive and on the…
Eradicating Emotional Blind Spots in Technology Projects - Personal Barriers in Technology
This course discusses the impact of emotional blind spots in technology projects. The Cambridge Dictionary offers us two definitions of the word blind spot. The first being, "an area that you are not able to see, especially the part of a road you cannot see when you are driving, behind…
The Mobile First Approach to Application Development - Information on New Technologies, Techniques and Solution Providers
To help cope with the seemingly insatiable appetite for new mobile applications, as well as reduce development backlogs, enterprises are now looking toward a new process, Mobile First Application Design and Development. Mobile First offers a significant advantage over traditional application design processes. The idea behind the process is simple;…
Internet Surveillance
Episode 15 of The Surveillance State
Shift your attention to electronic surveillance, and see how the monitoring of web searches and emails allows the government to gain insights into potential security risks from abroad. But even though the surveillance program has oversight, some people fear the potential for abuse is high. Look at both sides of…
The Internet of Things
Episode 19 of The Surveillance State
Technology is quickly transforming our lives with marvelous tools: smart thermostats that automatically adjust the temperature of our homes, self-regulating insulin dispensers, medication management systems, and more. But these technologies come with a cost in terms of the data they aggregate. Who owns the data? How can it be used?…
Security, Liberty, or Neither?
Episode 1 of The Surveillance State
Start by considering the tension between surveillance and the rule of law. While the pace of technological change is extremely rapid, laws are slow to keep up. Worse, the institutions responsible for creating laws often have internal conflicts about the role of privacy and security--as illustrated by a dramatic face-off…
The Charlie Hebdo Tragedy
Episode 2 of The Surveillance State
In the wake of the attacks in France, citizens wondered whether their state was taking enough security measures to protect them or doing too much of the wrong thing. In considering this question, review three types of surveillance--physical, electronic and data--and see how each type works. Case studies of the…
East Germany’s Stasi State
Episode 3 of The Surveillance State
Go inside what is likely the most extreme surveillance state in the history of civilization. It is estimated that, when you count casual informants, as many as one in six East Germans was a spy--keeping tabs on neighbors, friends and family. Survey the history of this insidious surveillance state and…
Surveillance in America
Episode 4 of The Surveillance State
See what measures the American government took during the Cold War to prevent our devolution into a Stasi-like state. While the CIA and the FBI had several unauthorized surveillance programs in the 1950s and 1960s, Congress and the Supreme Court stepped in to oversee the intelligence world with several powerful…
Failing to Connect the Dots on 9/11
Episode 5 of The Surveillance State
After 9/11, the CIA and the FBI were faulted for not sharing intelligence in advance of the attacks. But the two agencies faced stringent legal restrictions on sharing information, going back to the 1978 FISA legislation, which erected a "wall" between intelligence gathering and criminal investigations. Review the reasons for…