Free Speech, Internet Privacy and the 'Right to Be Forgotten'
Advancing the Management Skills of IT Professionals

Free Speech, Internet Privacy and the 'Right to Be Forgotten' - Advancing the Management Skills of IT Professionals
Show More

Related videos

Intoduction to France's "Right to Disconnect" Law - Advancing the Management Skills of IT Professionals
A new law dubbed the, "Right to Disconnect Law," says that French employers must specify certain hours when workers will not have to respond to, or even check, their work email. The French government says the law will "ensure the respect of rest time and vacation, as well as personal…
Eradicating Emotional Blind Spots in Technology Projects - Personal Barriers in Technology
This course discusses the impact of emotional blind spots in technology projects. The Cambridge Dictionary offers us two definitions of the word blind spot. The first being, "an area that you are not able to see, especially the part of a road you cannot see when you are driving, behind…
The Mobile First Approach to Application Development - Information on New Technologies, Techniques and Solution Providers
To help cope with the seemingly insatiable appetite for new mobile applications, as well as reduce development backlogs, enterprises are now looking toward a new process, Mobile First Application Design and Development. Mobile First offers a significant advantage over traditional application design processes. The idea behind the process is simple;…
Europe’s Right to Be Forgotten
Episode 22 of The Surveillance State
Google search results in Europe are different from those in the United States. In Europe, some results are omitted thanks to a "right to be forgotten" principle. Although Europe and America's approach toward privacy is generally similar, here you'll compare the legal state of data collection in both the public…
Emerging IT Trends - And Their Impact on Security Policies
Over the past decade, we have witnessed a true paradigm shift in global computing. This technological revolution has been led by familiar players such as the Internet, wireless communication and Cloud Computing and is complimented by a host of clever devices that keep today's mobile workforce productive and on the…
Internet Surveillance
Episode 15 of The Surveillance State
Shift your attention to electronic surveillance, and see how the monitoring of web searches and emails allows the government to gain insights into potential security risks from abroad. But even though the surveillance program has oversight, some people fear the potential for abuse is high. Look at both sides of…
The Internet of Things
Episode 19 of The Surveillance State
Technology is quickly transforming our lives with marvelous tools: smart thermostats that automatically adjust the temperature of our homes, self-regulating insulin dispensers, medication management systems, and more. But these technologies come with a cost in terms of the data they aggregate. Who owns the data? How can it be used?…
Technology Outruns the Law
Episode 17 of The Surveillance State
Continue your study of surveillance and the law with a look at constitutional law. After exploring cases from the 1960s and 1970s about privacy and police informants, you'll turn to the computer era. Find out what expectations of privacy we have regarding email and phone metadata, airport travel, and our…
ICT and Business: The Great Revolution
How has information and communications technology changed the world of commerce and industry? This wide-ranging film tells a remarkable story of our times. IMPACT ON WORK: In the 1970s office work was done with typewriters and paper and correcting fluid. Computers were giant devices in air-conditioned rooms. Then in the…
We Live in Public - The Changing Role of Privacy and Technology in Daily Life
In 1999, Internet entrepreneur Josh Harris recruited dozens of young men and women who agreed to live in underground apartments for weeks at a time while their every movement is broadcast online. Soon, Harris and his girlfriend embark on their own subterranean adventure, with cameras streaming live footage of their…
Security, Liberty, or Neither?
Episode 1 of The Surveillance State
Start by considering the tension between surveillance and the rule of law. While the pace of technological change is extremely rapid, laws are slow to keep up. Worse, the institutions responsible for creating laws often have internal conflicts about the role of privacy and security--as illustrated by a dramatic face-off…
The Charlie Hebdo Tragedy
Episode 2 of The Surveillance State
In the wake of the attacks in France, citizens wondered whether their state was taking enough security measures to protect them or doing too much of the wrong thing. In considering this question, review three types of surveillance--physical, electronic and data--and see how each type works. Case studies of the…