Mr. Beat
Why the Principal Can Search Your Purse | New Jersey v. T. L. O.
In episode 52 of Supreme Court Briefs, two students get caught smoking in the high school restroom, and one denies it, so the principal searches her purse.
PBS
How Social Media Keeps You Poor!
Social media has become such a pervasive part of our lives, we're often not even aware of the ways it pushes us to spend more money.
Brainwaves Video Anthology
Tom Kemp - Containing Big Tech: How to Protect Our Civil Rights, Economy, and Democracy
Tom Kemp is a Silicon Valley–based author, entrepreneur, investor, and policy advisor. Tom was the founder and CEO of Centrify (renamed Delinea in 2022), a leading cybersecurity cloud provider that amassed over two thousand enterprise...
Curated Video
Silent Operations of Power
Intellectual historian Quentin Skinner (QMUL), describes how government agents reading our email is actually a diminishment of our civic liberty.
Curated Video
Facial Recognition On Any Photo 😬 | PimEyes Image Search
Turns out you don't need to buy that Clearview AI subscription after all.
Curated Video
Your Identity Is NOT Private
AI can be used to re-identify individuals based on videos, images, and now anonymized data. What can you do to protect yourself, and what is the future of this technology?
Curated Video
Should Your School Track Your Online Activity? | Gaggle + Student Activity Monitoring Software
Should Your School Track Your Online Activity? | Gaggle + Student Activity Monitoring Software
Curated Video
Unintended Consequences from Technology
Unintended Consequences from Technology describes how the use of technology can have unintended consequences on society and the environment.
Curated Video
Differential Privacy + Federated Learning Explained (+ Tutorial) | #AI101
In this month's AI 101, we're learning about differential privacy and federated learning.
Curated Video
Can Federated Learning Improve Internet Privacy? | Google FLoC
Google wants to use federated learning to improve internet privacy. Will it really work?
Curated Video
Does Facial Recognition Work On Face Masks?
Now that we're all wearing masks, we don't have to worry about facial recognition anymore, right? Wrong.
Curated Video
Do Schools Spy on Students' Laptops? | Gaggle AI Student Surveillance
Do Schools Spy on Students' Laptops? | Gaggle AI Student Surveillance
Curated Video
The Lavender Scare
The Lavender Scare was a government clampdown on members of the LGBTQ+ community in the 1940s, 50s and 60s which saw gay and lesbians barred from the federal government for decades.
One Minute History
126 Roe vs Wade - One Minute History
1968 - Norma McCorvey becomes pregnant for a third time and is denied the right to an abortion in her native state of Texas. Under the pseudonym ‘Jane Roe’, McCorvey files suit against the state of Texas and district attorney Henry Wade....
Hip Hughes History
The USA Freedom Act Explained: US History Review
My Social Studies teacher look at how the USA Freedom Act changes the USA Patriot Act. Plus you get to learn what a backronym is.
Curated Video
GDPR Cloud Storage Requirements
This section will provide you with information about the enforcement of GDPR and the significant implications on cloud service providers and their businesses including their implementation of operations and security control mechanisms.
Curated Video
SOC 2 | Everything you need to know
Why is SOC 2 Compliance Important? Compliance with SOC 2 requirements indicates that an organization maintains a high level of information security. Strict compliance requirements (tested through on-site audits) can help ensure sensitive...
Curated Video
Cyber Security Issues
This video sheds the light on some ethical issues of cyber security jobs
Curated Video
Privacy and GDPR
The General Data Protection Regulation (GDPR) is the toughest privacy and security law in the world. Though it was drafted and passed by the European Union (EU), it imposes obligations onto organizations anywhere, so long as they target...
Curated Video
Introduction to IT and Cybersecurity: Privacy and GDPR
Part 16/16 of Introduction to IT and Cybersecurity series: The video is a discussion on the importance of privacy and how it is protected by laws and regulations, particularly the General Data Protection Regulation (GDPR) in the European...
Hip Hughes History
The Ninth Amendment Explained: The Constitution for Dummies Series
Continuing the Constitution for Dummies Series with the Bill of Rights and Amendment 9. Explained simply so you can understand the Constitution of the United States.
National Institute of Standards and Technology
Cybersecurity and Innovation in the Information Economy - Segment 9
As part of its initiative to ensure that the Internet continues to spawn growth and innovation, the U.S. Dept. of Commerce held a symposium on "Cybersecurity and Innovation in the Information Economy" on July 27, 2010 in Washington DC....
The Wall Street Journal
Which Regulations to Worry About
How can you gauge what laws and regulations apply to your type of business? What steps will take account of new state laws and to stay compliant with federal or international laws?