Question details

1) What is the discovery process and how does e-discovery fit into this process?
$ 15.00

1. Review questions (The length of your answer should be from roughly four or five sentences to a couple of paragraphs for each questions listed below).

  1. 1) What is the discovery process and how does e-discovery fit into this process?
  2. 2) Briefly describe the concept of the right of privacy and information privacy.
  3. 3) Briefly describe how society is struggling to define the extent to which employers should be able to monitor the work-related activities of employees.
  4. 4) Identify three key rules of the Gramm-Leach-Bliley Act that affect personal privacy.
  5. 5) Present a brief argument both for and against the use of advanced surveillance technology.

 

2. 

- Please answer the following questions below. (The length of your answer should be from roughly three or four sentences to a couple of paragraphs for each questions listed below).   https://www.youtube.com/watch?v=smF1ZV7vikw

  1. 1) Why are Facebook’s facial recognition software and policies a potential threat to privacy?
  2. 2) How can using the sharing privacy controls help preserve your privacy on Facebook? In what ways is the sharing control ineffective?
  3. 3) How will changing your Connection settings on Facebook help protect your privacy?
  4. 4) Do people who use Facebook have a legitimate claim to privacy when they themselves are posting information about themselves?

 

3. 

- Please answer the following questions below. (The length of your answer should be from roughly three or four sentences to a couple of paragraphs for each questions listed below). https://www.youtube.com/watch?v=4lKpD7MC22I

  1. 1) Does the Tucson data-mining project inappropriately violate users’ privacy, or is it an acceptable tradeoff to more intelligently combat terrorism? Explain your answer.
  2. 2) Were the local police justified in their handling of Holm? Why or why not? For whichever view you take, briefly describe the opposing viewpoint.
  3. 3) Review the chapter-ending case in Chapter 6 on the FBI terror watch list. What themes do the two cases have in common? How are they different?
  4. 4) What other issues dealing with data and privacy have you encountered on the Web?
  5. 5) What is meant by the “Dark Web”?
Available solutions