Law 897: The Law in Cyberspace Seminar
Richard Marsh - Assignment for November 6, 2008
Online Profiling
- For
a brief introduction, follow this link for
a short, html-based, role-playing introduction.
I. Who is involved?
- Next,
get to know Phorm (they may already
know you!), especially their FAQ.
- By
the way, this is my favorite frequently-asked-question: Is what you are
doing legal?
II. Parade of Horribles
III. Congressional Response
- Read
this
letter from the House of Representatives Committee on Energy and
Commerce to various network operators. Then read the Google
response.
- Read
this statement on the Personal Data
Privacy and Security act of 2007. Then focus on the table of contents,
section 301, and section 302 of the bill, located here.
What does it try to protect, and how does it propose to protect the
public? Do you think it will actually work? Will is be enforceable?
IV. Self Regulation
V. Existing Law
Return to the syllabus