{"id":27136,"date":"2017-05-12T05:34:17","date_gmt":"2017-05-12T10:34:17","guid":{"rendered":"http:\/\/fourthamendment.com\/?p=27136"},"modified":"2017-05-12T05:34:17","modified_gmt":"2017-05-12T10:34:17","slug":"constitution-center-a-twenty-first-century-framework-for-digital-privacy","status":"publish","type":"post","link":"http:\/\/fourthamendment.com\/?p=27136","title":{"rendered":"Constitution Center: A Twenty-First Century Framework for Digital Privacy"},"content":{"rendered":"<p>Constitution Center: <a href=\"https:\/\/constitutioncenter.org\/media\/files\/rosenfinal5.pdf\">A Twenty-First Century Framework for Digital Privacy: Balancing Privacy and Security in the Digital <\/a>Age by Jeffrey Rosen:<br \/>\nIntroduction: A Twenty-First Century Framework for Digital Privacy<\/p>\n<blockquote><p>At the beginning of the twenty-first century, breathtaking changes in technology pose stark challenges to privacy and security.  Private companies collect massive amounts of consumer data\u2014information that often contains intimate details about our personal lives, from the people that we email to the apps that we use to the websites that we visit.  Law enforcement often seeks to access this information when investigating suspected criminals and terrorists, and the data itself is highly mobile, with companies able to send it across borders at the tap of a button.  At the same time, hackers threaten our personal data through cyberattacks, and sophisticated users shield the contents of their data from law enforcement through the use of cutting-edge encryption tools.<\/p><\/blockquote>\n","protected":false},"excerpt":{"rendered":"<p>Constitution Center: A Twenty-First Century Framework for Digital Privacy: Balancing Privacy and Security in the Digital Age by Jeffrey Rosen: Introduction: A Twenty-First Century Framework for Digital Privacy At the beginning of the twenty-first century, breathtaking changes in technology pose &hellip; <a class=\"more-link\" href=\"http:\/\/fourthamendment.com\/?p=27136\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[12,25],"tags":[],"class_list":["post-27136","post","type-post","status-publish","format-standard","hentry","category-computer-searches","category-e-mail"],"_links":{"self":[{"href":"http:\/\/fourthamendment.com\/index.php?rest_route=\/wp\/v2\/posts\/27136","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/fourthamendment.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/fourthamendment.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/fourthamendment.com\/index.php?rest_route=\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"http:\/\/fourthamendment.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=27136"}],"version-history":[{"count":1,"href":"http:\/\/fourthamendment.com\/index.php?rest_route=\/wp\/v2\/posts\/27136\/revisions"}],"predecessor-version":[{"id":27137,"href":"http:\/\/fourthamendment.com\/index.php?rest_route=\/wp\/v2\/posts\/27136\/revisions\/27137"}],"wp:attachment":[{"href":"http:\/\/fourthamendment.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=27136"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/fourthamendment.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=27136"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/fourthamendment.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=27136"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}