Term
What two questions (Katz test) do you ask to determine a "reasonable expectation of privacy"? |
|
Definition
1. Does conduct reflect an expectation of privacy? 2. Would society recognize the conduct as reasonable? |
|
|
Term
List some reasonable examples of privacy |
|
Definition
home, phone booth, opaque containers |
|
|
Term
List some unreasonable examples of privacy |
|
Definition
Open fields, garbage on the curb, strangers house during theft |
|
|
Term
When are the contents of an email considered private and when are they not? |
|
Definition
Private during transport. Once received by intended recipient, not private. |
|
|
Term
One part of the O'Conner test is "do actual office practices and procedures reinforce the no reasonable expectation of privacy (banners)". What is the other part of the test? |
|
Definition
Is info so open to fellow employees or to the public that no expectation of privacy is reasonable. |
|
|
Term
Which part of the ECPA addresses/updated concerns for the CONTENTS of wire & electronic communications? |
|
Definition
|
|
Term
Which part of the ECPA deals with concerns for the ADDRESSING of wire & electronic communications? |
|
Definition
|
|
Term
What is the difference between Pen & Traps/Trace? |
|
Definition
Pen deals with devices connected to the SOURCE while Traps/Trace deals with devices that record INCOMING signals. |
|
|
Term
Can law enforcement direct or ask sys ads to monitor communications for law enforcement purposes? |
|
Definition
|
|
Term
Can data collected from TMAP be used for disciplinary actions? |
|
Definition
|
|
Term
What must be masked in TMAP data? |
|
Definition
names, office symbols, phone numbers or anthing else that can indentify them |
|
|
Term
|
Definition
protection of an expression (the documentation of an idea). Doesn't protect the idea until it's documented (even on a napkin) |
|
|
Term
|
Definition
Protects marks used by businesses to distinguish themselves (logo, name, sound) |
|
|
Term
|
Definition
Protects useful inventions and processes |
|
|
Term
|
Definition
|
|
Term
List the four safe harbors that limit liability for copyright infringement for ISPs |
|
Definition
Conduit Cache Hosting Search Engines |
|
|
Term
Violations of ______ include Slavery, genocide and crimes against humanity |
|
Definition
Peremptory Norms (jus cogens) |
|
|
Term
List 3 types of participants in armed conflicts and give examples of each |
|
Definition
Combatant-Regular Armed Forces, Militia Noncombatants-Civilians, protected (medical, chaplains, POWs, Wounded) Unlawful Combatant-Fighting Noncombatants |
|
|
Term
List the 5 principles of LOAC |
|
Definition
Military Necessity Distinction Proportionality Humanity Chivalry |
|
|
Term
What is the difference between Military Necessity & Humanity? |
|
Definition
Military Necessity ALLOWS the correct amount of force, while Humanity PROHIBITS any force not necessary for the purpose of the war. |
|
|