{"id":2,"date":"2017-06-18T05:17:03","date_gmt":"2017-06-18T05:17:03","guid":{"rendered":"https:\/\/www.law.georgetown.edu\/privacy-technology-center\/?page_id=2"},"modified":"2025-05-12T11:09:04","modified_gmt":"2025-05-12T15:09:04","slug":"sample-page","status":"publish","type":"page","link":"https:\/\/www.law.georgetown.edu\/privacy-technology-center\/","title":{"rendered":"Home Page"},"content":{"rendered":"<p>Privacy is not a luxury. It is a fundamental right under threat from both government and corporate surveillance, especially for historically marginalized people. Through research and advocacy, we challenge that surveillance and work towards a world where privacy protects everyone.<\/p>\n<ul>\n<li><strong>We undertake rigorous, long-term investigations.<\/strong> We don\u2019t want to react to the policy cycle. We want to create it. Our home in the academy gives us the time and resources we need to do that.<\/li>\n<li><strong>We pair research with action.<\/strong> Our proposals help legislators and affected communities enact transformational privacy and civil rights reforms. We advocate for those ideas alongside the nation\u2019s leading grassroots and civil rights organizations.<\/li>\n<li><strong>We highlight the color of surveillance.<\/strong> Most privacy debates don\u2019t touch on race, class, or power. We unearth and expose the disparate impact of surveillance and amplify the voices of the people being watched.<\/li>\n<li><strong>We educate the next generation of privacy advocates.<\/strong> We train law students to collaborate with computer scientists, engineers, and others. Through that work, they develop a more nuanced view of how technology, law, and society interact.<\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>Privacy is not a luxury. It is a fundamental right under threat from both government and corporate surveillance, especially for historically marginalized people. Through research and advocacy, we challenge that [&hellip;]<\/p>\n","protected":false},"author":5,"featured_media":0,"parent":0,"menu_order":2,"comment_status":"closed","ping_status":"open","template":"","meta":{"_acf_changed":false,"_price":"","_stock":"","_tribe_ticket_header":"","_tribe_default_ticket_provider":"","_tribe_ticket_capacity":"0","_ticket_start_date":"","_ticket_end_date":"","_tribe_ticket_show_description":"","_tribe_ticket_show_not_going":false,"_tribe_ticket_use_global_stock":"","_tribe_ticket_global_stock_level":"","_global_stock_mode":"","_global_stock_cap":"","_tribe_rsvp_for_event":"","_tribe_ticket_going_count":"","_tribe_ticket_not_going_count":"","_tribe_tickets_list":"[]","_tribe_ticket_has_attendee_info_fields":false,"footnotes":"","_tec_slr_enabled":"","_tec_slr_layout":""},"class_list":["post-2","page","type-page","status-publish","hentry"],"acf":[],"ticketed":false,"_links":{"self":[{"href":"https:\/\/www.law.georgetown.edu\/privacy-technology-center\/wp-json\/wp\/v2\/pages\/2","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.law.georgetown.edu\/privacy-technology-center\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.law.georgetown.edu\/privacy-technology-center\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.law.georgetown.edu\/privacy-technology-center\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/www.law.georgetown.edu\/privacy-technology-center\/wp-json\/wp\/v2\/comments?post=2"}],"version-history":[{"count":11,"href":"https:\/\/www.law.georgetown.edu\/privacy-technology-center\/wp-json\/wp\/v2\/pages\/2\/revisions"}],"predecessor-version":[{"id":4901,"href":"https:\/\/www.law.georgetown.edu\/privacy-technology-center\/wp-json\/wp\/v2\/pages\/2\/revisions\/4901"}],"wp:attachment":[{"href":"https:\/\/www.law.georgetown.edu\/privacy-technology-center\/wp-json\/wp\/v2\/media?parent=2"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}