• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/42

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

42 Cards in this Set

  • Front
  • Back
Anonymity
Instead of using their true names to communicate, these people choose to speak using pseudonyms (assumed names) or anonymously (no name at all).
RFID
A technology that can be used to pinpoint the physical location of whatever item the tags are embedded in. While RFIDs are a convenient way to track items, they are also a convenient way to do something far less benign: track people and their activities through their belongings.
Digital radio
Digital radio describes radio technologies which carry information as a digital signal, by means of a digital modulation method.
Search engines
Unfortunately, information stored with a third-party is given much weaker legal protection than that on your own computer. It can be all too easy for the government or individual litigants to get access to your search history and connect it with your identity.
Digital Video
Digital video promises a high quality picture and fresh crop of innovative technologies that will give you new options for manipulating video.
Cell tracking
EFF has been asked to serve as a friend of the court in several of these applications, successfully showing judges how and why the government's arguments are baseless
World Intellectual Property Organization
The World Intellectual Property Organization (WIPO) is the UN agency responsible for treaties involving copyright, patent, and trademark laws. WIPO can be a force for progressive change, helping the world take into account public interest and development needs.
Anti-Counterfeiting Trade Agreement
The Anti-Counterfeiting Trade Agreement (ACTA) is a proposed plurilateral trade agreement for establishing international standards on intellectual-property-rights enforcement throughout the participating countries.
patent
A patent (pronounced /ˈpætənt/ or /ˈpeɪtənt/) is a set of exclusive rights granted by a state (national government) to an inventor or their assignee for a limited period of time in exchange for a public disclosure of an invention.
Real ID
The federal government is trying to force states to turn your drivers license into a national ID. Will create grave dangers to privacy and impose massive financial burdens without improving national security in the least.
Bloggers' Rights
Bloggers can be journalists (and journalists can be bloggers).

Bloggers are entitled to free speech. Bloggers have the right to political speech.
Network neutrality
Network neutrality (also net neutrality, Internet neutrality) is a principle proposed for user access networks participating in the Internet that advocates no restrictions on content, sites, or platforms, on the kinds of equipment that may be attached, and on the modes of communication allowed, as well as communication that is not unreasonably degraded by other traffic.
Digital rights management (DRM)
Digital rights management (DRM) is a generic term for access control technologies that can be used by hardware manufacturers, publishers, copyright holders and individuals to impose limitations on the usage of digital content and devices.
CyberSLAPP
involve defending people's right to remain anonymous when they post comments on message boards, as well as making sure that anonymous speakers' due process rights are respected
No Downtime for Free Speech Campaign
The courts call this "fair use", and strong legal precedents exist to protect the limited use of copyrighted material in your work when you do so for expressive purposes.
Accessibility for the Reading Disabled
should be free to transform copyrighted works into a form most suitable for their use, as well as to innovate new presentation forms which they can share with other members of the community.
Trusted Computing
the computer will consistently behave in expected ways, and those behaviors will be enforced by hardware and software
file sharing
the practice of distributing or providing access to digitally stored information, such as computer programs, multi-media (audio, video), documents, or electronic books
Terms of (Ab)use
These "terms" are actually purported legal contracts between the user and the online service provider (websites, MMORPGs, communication services, etc.), despite the fact that users never get a chance to negotiate their contents and can often be entirely unaware of their existence.
Broadcasting Treaty
This newly drafted treaty gives broadcasters (not creators or copyright holders) the right to tie up the use of audiovisual material for 50 years after broadcasting it, even if the programs are in the public domain, Creative Commons licensed, or not copyrightable.
development agenda
aims to ensure that development considerations form an integral part of WIPO’s work. As such, it is a cross-cutting issue which touches upon all sectors of the Organization.
EFF Europe
provides publicity and logistical support for combatting bad European tech policy in co-operation with the many digital rights groups across Europe to fight effectively for consumers' and technologists' interests.
Real ID
Real ID Act will create grave dangers to privacy and impose massive financial burdens without improving national security in the least
Online behavioral tracking
Countless advertising networks are able to secretly monitor you across multiple websites and build detailed profiles of your behavior and interests
NSA spying
NSA is receiving wholesale copies of their telephone and other communications records. All of these surveillance activities are in violation of the privacy safeguards established by Congress and the U.S. Constitution
cell tracking
tracks the current position of a mobile phone even on the move
CALEA
enhance the ability of law enforcement and intelligence agencies to conduct electronic surveillance by requiring that telecommunications carriers and manufacturers of telecommunications equipment modify and design their equipment, facilities, and services to ensure that they have built-in surveillance capabilities, allowing federal agencies to monitor all telephone, broadband internet, and VoIP traffic in real-time.
WIPO
UN agency responsible for treaties involving copyright, patent, and trademark laws.
Global network initiative
is a coalition of information and communications companies, major human rights organizations, academics, investors and technology leaders to produce guidance and oversight for companies facing civil liberties challenges in the ICT industries
What are samples of search engines?
Google, Yahoo, MSN, AOL
Search Incident to Arrest
The Fourth Amendment generally requires law enforcement to obtain a warrant based on probable cause before searching a person, her home, or her belongings. For nearly a century, however, courts have recognized a limited exception when the search is "incident to an arrest." The original justification for this exception was to enable police officers to find weapons on the arrestee or prevent the destruction of evidence, thus allowing the officers to search the arrestee's person and the area within her immediate control. The exception has expanded over the years to allow police under some circumstances to search the contents of containers found on or near the arrestee.
What are samples of social networks?
Facebook and Twitter
Ways EFF is working to protect your privacy as the use of social networks grows
EFF has gone toe-to-toe with the government to uncover hidden details about how they use social networking sites for investigations, data collection, and surveillance.
EFF works to expose issues with social networks as soon as they emerge, from the leaking of information to advertisers or the policies of the sites themselves.
EFF helps savvy users better understand how to strengthen their privacy online.
Travel Screening
The privacy invasions don't stop there. When you cross the U.S. border to come home, you could be singled out for a random, invasive search. A recent court decision allows border agents to search your laptop or other digital device and copy the contents without limitation.
CAPPS II and Secure Flight
CAPPS II was a planned profiling system that would have required airlines to provide personal details about passengers before they boarded their flights. These details would then be combined with government and commercial databases to create a color-coded "score" indicating each person's security risk level. In 2004, American Airlines admitted to providing 1.2 million passenger records to contractors developing prototypes for the program, even though the Transportation Security Administration had denied such a transfer for months.
E-Voting Rights
EFF is protecting your right to vote in the courts while working with legislators and election officials across the country to ensure fair, transparent elections.
FOIA Litigation for Accountable Government
EFF's FOIA Litigation for Accountable Government (FLAG) Project aims to expose the government's expanding use of new technologies that invade Americans' privacy. Through Freedom of Information Act (FOIA) requests, the project helps to protect individual liberties and hold the government accountable.
FOIA
Freedom of Information Act
Pen Trap
In the first ruling of its kind, a federal magistrate judge held that the government must obtain a search warrant to collect the content of a telephone call, even when that content is dialed digits like bank account numbers, social security numbers or prescription refills. The decision from Magistrate Judge Smith in Houston closely followed the reasoning outlined in an amicus brief from EFF and the Center for Democracy and Technology (CDT).
Terms Of (Ab)Use
One cannot go online today without eventually being asked to accept a set of so-called Terms of Service (or TOS). These "terms" are actually purported legal contracts between the user and the online service provider (websites, MMORPGs, communication services, etc.), despite the fact that users never get a chance to negotiate their contents and can often be entirely unaware of their existence.
CDT
Center for Democracy and Technology
Coders' Rights Project
EFF's Coders' Rights Project protects programmers and developers engaged in cutting-edge exploration of technology in our world. Security and encryption researchers help build a safer future for all of us using digital technologies, yet too many legitimate researchers face serious legal challenges that prevent or inhibit their work.