Guidelines_for_reading_Privacyx_Information_and_Technology

Guidelines_for_reading_Privacyx_Information_and_Technology...

Info iconThis preview shows pages 1–2. Sign up to view the full content.

View Full Document Right Arrow Icon
Key to reading Privacy, Information and Technology 1. Before even starting the book, recognize the goal of the seminar is to have you become intellectually curious about how technology affects your privacy and how the government and business use technology to intrude into your lives. This book addresses that but with a very specific legal framework. This book is an abridged version of the same title intended for law schools. So here are some dos and don’ts to help you get the most out of this book. 2. Most definitely do very carefully pay attention to concepts that relate to what privacy is and how it is breached. Do pay attention to the legal concepts that frame how the government and business can use technology to snoop around your lives. Do pay attention to technology that you can use to either protect your privacy or intrude into others’ private lives. 3. We simply do not have the time to get bogged down into the specific myriad intricacies of court cases or the specific sections and subsections of the myriad
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Image of page 2
This is the end of the preview. Sign up to access the rest of the document.

This note was uploaded on 09/08/2010 for the course POLS 190 at San Jose State.

Page1 / 2

Guidelines_for_reading_Privacyx_Information_and_Technology...

This preview shows document pages 1 - 2. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online