Checkpoints in Cyberspace


Book Description

This book maps the risk points that are emerging for cross-border corporate transactions in the digital and Internet eras and in the new enforcement environment, and explains the best practices to avert liability in cross-border transactions.










Human Rights in the 'War on Terror'


Book Description

This book asks whether human rights, since the 9/11 attacks and the 'war on terror,' are a luxury we can no longer afford, or rights that must always remain a fundamental part of democratic politics, in order to determine the boundary between individual freedom and government tyranny. This volume brings together leading international lawyers, policy-makers, scholars and activists in the field of human rights to evaluate the impact of the 'war on terror' on human rights, as well as to develop a counter-terror strategy which takes human rights seriously. While some contributors argue that war is necessary in defense of liberal democracy, others assert that it is time to move away from the war model towards a new paradigm based upon respect for human rights, an internationally-coordinated anti-terror justice strategy, and a long-term political vision that can reduce the global tensions that generate a political constituency for terrorists.




Privacy and Technologies of Identity


Book Description

Privacy and Technologies of Identity: A Cross-Disciplinary Conversation provides an overview of ways in which technological changes raise privacy concerns. It then addresses four major areas of technology: RFID and location tracking technology; biometric technology, data mining; and issues with anonymity and authentication of identity. Many of the chapters are written with the non-specialist in mind, seeking to educate a diverse audience on the "basics" of the technology and the law and to point out the promise and perils of each technology for privacy. The material in this book provides an interface between legal and policy approaches to privacy and technologies that either threaten or enhance privacy. This book grew out of the Fall 2004 CIPLIT(r) Symposium on Privacy and Identity: The Promise and Perils of a Technological Age, co-sponsored by DePaul University's College of Law and School of Computer Science, Telecommunications and Information Systems. The Symposium brought together leading researchers in advanced technology and leading thinkers from the law and policy arenas, many of whom have contributed chapters to the book. Like the Symposium, the book seeks to contribute to a conversation among technologists, lawyers, and policymakers about how best to handle the challenges to privacy that arise from recent technological advances.




Safeguarding Privacy in the Fight Against Terrorism


Book Description

The United States faces, in the words of British Prime Minister Tony Blair, "a new and deadly virus."1 That virus is "terrorism, whose intent to inflict destruction is unconstrained by human feeling and whose capacity to inflict it is enlarged by technology."2 As the murderous attacks of September 11 painfully demonstrated, this new threat is unlike anything the nation has faced before. The combination of coordinated, well-financed terrorists, willing to sacrifice their lives, potentially armed with weapons of mass destruction, capable of operating within our own borders poses extraordinary risks to our security, as well as to our constitutional freedoms, which could all too easily be compromised in the fight against this new and deadly terrorist threat.







The NSA Report


Book Description

The official report that has shaped the international debate about NSA surveillance "We cannot discount the risk, in light of the lessons of our own history, that at some point in the future, high-level government officials will decide that this massive database of extraordinarily sensitive private information is there for the plucking. Americans must never make the mistake of wholly 'trusting' our public officials."—The NSA Report This is the official report that is helping shape the international debate about the unprecedented surveillance activities of the National Security Agency. Commissioned by President Obama following disclosures by former NSA contractor Edward J. Snowden, and written by a preeminent group of intelligence and legal experts, the report examines the extent of NSA programs and calls for dozens of urgent and practical reforms. The result is a blueprint showing how the government can reaffirm its commitment to privacy and civil liberties—without compromising national security.