Term
| What two questions (Katz test) do you ask to determine a "reasonable expectation of privacy"? |
|
Definition
1. Does conduct reflect an expectation of privacy? 2. Would society recognize the conduct as reasonable? |
|
|
Term
| List some reasonable examples of privacy |
|
Definition
| home, phone booth, opaque containers |
|
|
Term
| List some unreasonable examples of privacy |
|
Definition
| Open fields, garbage on the curb, strangers house during theft |
|
|
Term
| When are the contents of an email considered private and when are they not? |
|
Definition
| Private during transport. Once received by intended recipient, not private. |
|
|
Term
| One part of the O'Conner test is "do actual office practices and procedures reinforce the no reasonable expectation of privacy (banners)". What is the other part of the test? |
|
Definition
| Is info so open to fellow employees or to the public that no expectation of privacy is reasonable. |
|
|
Term
| Which part of the ECPA addresses/updated concerns for the CONTENTS of wire & electronic communications? |
|
Definition
|
|
Term
| Which part of the ECPA deals with concerns for the ADDRESSING of wire & electronic communications? |
|
Definition
|
|
Term
| What is the difference between Pen & Traps/Trace? |
|
Definition
| Pen deals with devices connected to the SOURCE while Traps/Trace deals with devices that record INCOMING signals. |
|
|
Term
| Can law enforcement direct or ask sys ads to monitor communications for law enforcement purposes? |
|
Definition
|
|
Term
| Can data collected from TMAP be used for disciplinary actions? |
|
Definition
|
|
Term
| What must be masked in TMAP data? |
|
Definition
| names, office symbols, phone numbers or anthing else that can indentify them |
|
|
Term
|
Definition
protection of an expression (the documentation of an idea). Doesn't protect the idea until it's documented (even on a napkin) |
|
|
Term
|
Definition
| Protects marks used by businesses to distinguish themselves (logo, name, sound) |
|
|
Term
|
Definition
| Protects useful inventions and processes |
|
|
Term
|
Definition
|
|
Term
| List the four safe harbors that limit liability for copyright infringement for ISPs |
|
Definition
Conduit Cache Hosting Search Engines |
|
|
Term
| Violations of ______ include Slavery, genocide and crimes against humanity |
|
Definition
| Peremptory Norms (jus cogens) |
|
|
Term
| List 3 types of participants in armed conflicts and give examples of each |
|
Definition
Combatant-Regular Armed Forces, Militia Noncombatants-Civilians, protected (medical, chaplains, POWs, Wounded) Unlawful Combatant-Fighting Noncombatants |
|
|
Term
| List the 5 principles of LOAC |
|
Definition
Military Necessity Distinction Proportionality Humanity Chivalry |
|
|
Term
| What is the difference between Military Necessity & Humanity? |
|
Definition
| Military Necessity ALLOWS the correct amount of force, while Humanity PROHIBITS any force not necessary for the purpose of the war. |
|
|