Politics, Love, and Death in a World of No Privacy
نویسنده
چکیده
A rticle 20 of the Universal Declaration of Human Rights protects the right to freedom of peaceful assembly and association. In the US, the First Amendment to the Constitution similarly protects freedom of association: “Congress shall make no law respecting an establishment of religion, or prohibiting the free exercise thereof; or abridging the freedom of speech, or of the press; or the right of the people peaceably to assemble, and to petition the Government for a redress of grievances.” The US Supreme Court has strongly protected this right. In the 1950s, the state of Alabama required organizations doing business in the state to give the state their membership lists. The phrase “doing business” was broad enough to include nonprofits involved in political activity. In the mid-1950s, if the National Association for the Advancement of Colored People (NAACP) had handed over its membership lists, the organization would have put members’ lives at risk.1,2 In 1964, in the case of the National Association for the Advancement of Colored People v. Alabama, the Supreme Court ruled that information on with whom you associate is private.3,4 Basing its decision on “the right of the people peaceably to assemble,” the court ruled that the NAACP need not release its membership list to the state of Alabama. Privacy by association was a right with teeth. But is the guarantee of association privacy still real in the US—or anywhere else?
منابع مشابه
Book Review: "New Geographies of Language: Language Culture and Politics in Wales"
The book New Geographies of Language: Language, Culture and Politics in Wales is naturally seeking a very interesting goal rarely been witnessed before. For one thing, it is trying to mix language and linguistics with a totally distinct science, geography. For another, geography happens to be a literally exotic science. Students all around the world might be generally of two types: Those who lo...
متن کاملThe Fourth World and Politics of Social Identity in Margaret Atwood’s MaddAddam Trilogy
With the advent of the 21st century, the way characters and identities interact under the influence of dominant powers has brought a new world into existence, a world dubbed by Manuel Castells as the ‘Fourth World’. Within the Castellsian theoretical matrix of the Fourth World and politics of identity, the present study seeks to investigate the true nature of the futuristic world Margaret Atwoo...
متن کاملThe Different Layers of Islam in Interaction with Politics: a Comparative Analysis of Iran, Saudi Arabia and Turkey
This study attempts to assess the different ways through which Islam as a religion can impact politics. In fact, the notion that is collectively labeled as Islam and its re-interpretation as an escalating presence of religion in politics in today's world has deep layers. To distinguish a variety of these layers, each with different characteristics, they should be defined, and the type of contri...
متن کاملA Sudy on Information Privacy Issue on Social Networks
In the recent years, social networks (SN) are now employed for communication and networking, socializing, marketing, as well as one’s daily life. Billions of people in the world are connected though various SN platforms and applications, which results in generating massive amount of data online. This includes personal data or Personally Identifiable Information (PII). While more and more data a...
متن کاملDigital Privacy - PRIME - Privacy and Identity Management for Europe
We may not be able to make you love reading, but digital privacy prime privacy and identity management for europe 1st edition will lead you to love reading starting from now. Book is the window to open the new world. The world that you want is in the better stage and level. World will always guide you to even the prestige stage of the life. You know, this is some of how reading will give you th...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- IEEE Security & Privacy
دوره 11 شماره
صفحات -
تاریخ انتشار 2013