Security, Privacy, and Ethics Marsha Woodbury, Ph.D. University of Illinois, Urbana-Champaign

Slides:



Advertisements
Similar presentations
TECHNO-TONOMY Privacy & Autonomy in a Networked World Learning Module 2: Legislating Privacy: Your Rights.
Advertisements

MEDICAL ETHICS TT Wong THE FOUR PRINCIPLES.
Good Medical Practice Evidence to use for Appraisal Good Medical Practice 2006.
INTERNET SAFETY FOR STUDENTS
MODULE TWO Ethical and Legal Issues. Objectives: Particpants will: Understand privacy, confidentiality and ethics as they relate to being a volunteer.
CORE VALUES CODE OF CONDUCT.
ETHICS In Field Of Dental Hygiene BY Dr. Shahzadi Tayyaba Hashmi.
PROJECT MANAGEMENT ETHICS
Chapter 29 Ethics in Accounting
Internet Privacy Jillian Brinberg, Maggie Kowalski, Sylvia Han, Isabel Smith-Bernstein, Jillian Brinberg.
Behind the Machine “The Good, The Bad, and the Ugly” Copyright © 2008 by Helene G. Kershner.
Do you know how to keep yourself safe?
INTERNET SAFETY FOR STUDENTS
24 Legal and Ethical Considerations. 24 Legal and Ethical Considerations.
1 When hate speech tangles privacy... When hate speech tangles privacy...
PRIVACY. In pairs Work out a definition of the word PRIVACY that you think makes sense You’ve got about 7 minutes...
Digital Citizenship Texting vs. Sexting Cyberbullying.
Legal and Ethical Issues. Major Topics Protecting Programs and Data Information and the Law Rights of Employees and Employers Software Failures Computer.
The Universal Declaration of Human Rights
Staying Safe Online Keep your Information Secure.
Personal Safety Unit - Level 7. The Internet is not anonymous. Your address, screen name, and password serve as barriers between you and others.
Ethics/Legal 6.03 Evaluate ethical and professional standards in a health care setting.
STANDARD 5.3 Objective 3 Students will explain and understand the need for confidentiality.
Health research and the protection of personal information rights in international ethics and human rights law Colin M Harper Promoting Health Research.
Component 4: Introduction to Information and Computer Science Unit 2: Internet and the World Wide Web 1 Component 4/Unit 2Health IT Workforce Curriculum.
Professionalism and Ethics. Engineering Profession  Engineering is... “the profession in which a knowledge of the mathematical and natural sciences gained.
Ch. 24: Social and Ethical Responsibility. Social Responsibility  What is Social Responsibility?  More than running your enterprise responsibility every.
Do you believe in this? Due to its very nature, the Internet is NOT a safe or secure environment. It is an ever-changing medium where anyone and everyone.
Information Ethics Prof. Madya Dr. Rozinah Jamaludin 11 March 2010.
IBT - Electronic Commerce Privacy Concerns Victor H. Bouganim WCL, American University.
© 2010 Delmar, Cengage Learning. ALL RIGHTS RESERVED. Chapter 2 Ethics in Pharmacy Practice Jahangir Moini, MD, MPH, CPhT.
Medical Law and Ethics, Third Edition Bonnie F. Fremgen Copyright ©2009 by Pearson Education, Inc. Upper Saddle River, New Jersey All rights reserved.
ETHICS and COMPUTERS An Overview 23/04/2017.
CODE OF CONDUCT TRAINING. We conduct our global business honestly, ethically and legally, believing that good ethics is good business. The Company’s Philosophy.
Security Policies and Procedures. cs490ns-cotter2 Objectives Define the security policy cycle Explain risk identification Design a security policy –Define.
MODULE TWO: Ethical and Legal Issues. Objectives: Students will: Understand privacy, confidentiality and ethics as they relate to being a volunteer. Define.
Privacy, Confidentiality, and Security Unit 8: Professional Values and Medical Ethics Lecture 2 This material was developed by Oregon Health & Science.
A (very incomplete) talk on digital security A couple of basics Your Your phone Browsing.
Ethics Business Ethics  Unit Essential Question: How does ethical behavior affect my business decisions?  EQ: How does a business monitor itself to ensure.
Copyright © 2012 Brooks/Cole, a division of Cengage Learning, Inc. Professional Concerns Chapter Nine.
HIPAA LAWS.  Under the privacy rule, the patient must give consent to use his or her Protected Health Information.  Examples in which consent must be.
Ethics. Technology  Technology is not an immutable force – people make decisions about what technologies and products to develop and how to use them.
HOSPITALITY & TOURISM 5.02A Interpret the nature of business ethics and social responsibility 5.02B Exemplify legal issues affecting businesses.
James Fox Shane Stuart Danny Deselle Matt Baldwin Acceptable Use Policies.
Article 1:  All human beings are born free and equal in dignity and rights. They should act towards one another in a spirit of brotherhood.
Strategic Agenda We want to be connected to the internet……… We may even want to host our own web site……… We must have a secure network! What are the.
Johan HolmqvistProfessional Ethics Mälardalens högskola Västerås,
Patient Rights and Legal Issues Chapter 4. Patient Rights Bill of Rights – Necessary because of vulnerability to abuse and mistreatment – Universal Bill.
HIPAA for Students Health Insurance Portability and Accountability Act.
Strategies to overcome barriers to communication To ensure good communication in a Health and/or Social Care setting.
Clark Holt Limited (Co. No ), Hardwick House, Prospect Place, Swindon, SN1 3LJ Authorised and regulated by the Solicitors Regulation.
DIGITAL FOOTPRINTS 11 TIPS FOR MONITORING YOUR DIGITAL FOOTPRINT AND 5 TIPS TO MAKE IT POSITIVE.
THE HUMAN RIGHTS. THE RIGHT TO PRIVACY No one shall be subjected to arbitrary interference with his privacy, family, home or correspondence, nor to attacks.
Privacy, anonymity and other confusing words Przemek Jaroszewski CERT Polska/NASK.
Online Reputation A guide for children aged 7+
Creating your online identity
CHAPTER 4 LEGAL AND ETHICAL PRINCIPLES
Ethical, Social, and Political Issues in E-commerce
Ethics/Legal 6.03 Evaluate ethical and professional standards in a health care setting.
CHAPTER 4 LEGAL AND ETHICAL PRINCIPLES
Hospitality & Tourism 5.02A Interpret the nature of business ethics and social responsibility 5.02B Exemplify legal issues affecting businesses.
Digital Citizenship by Jeremy Head.
PowerPoint® Slides to Accompany
Done BY: Zainab Sulaiman AL-Mandhari Under Supervisor: Dr.Tarek
Information Security Footprint.
Module 2: Legal and Ethical Issues
The Psychology of Security
Behind the Machine “The Good, The Bad, and the Ugly”
Universal Declaration of Human Rights
Non-statistical use of census enumeration
Presentation transcript:

Security, Privacy, and Ethics Marsha Woodbury, Ph.D. University of Illinois, Urbana-Champaign

Let’s start with a punch pbKKLRGg pbKKLRGg pbKKLRGg pbKKLRGg

Roadmap What is ethics? What is ethics? What does a code of ethics look like? What does a code of ethics look like? What are laws? What are laws? What is privacy? What is privacy? What is security? What is security? Discussion of issues that face us now and in the future Discussion of issues that face us now and in the future

Ethical Issues Privacy and confidentiality Privacy and confidentiality Integrity of information over time Integrity of information over time Unimpaired and consistent service Unimpaired and consistent service Controlling access to resources Controlling access to resources Serving people and society Serving people and society

What is Ethics? Figuring out, defending, and recommending concepts of right and wrong behavior. Usually refers to actions not done while a gun is pointed at your head.

Ethics Made Simple Is the action legal? Is the action legal? What would your parents say? What would your parents say? If you do it, will you feel bad? If you do it, will you feel bad? How will it look in the newspaper? How will it look in the newspaper? Is there a shusher in the group? Is there a shusher in the group? Does it pass the smell test? Does it pass the smell test?

The Code of Ethics (edited by your speaker) We must take care not to endanger the life, health, safety, and welfare of the public. We must take care not to endanger the life, health, safety, and welfare of the public. We should demonstrate competence and due care in our technical duties. We should demonstrate competence and due care in our technical duties. We must maintain and update our technical skills. We must maintain and update our technical skills.

Another code of ethics Computer Forensics: 4. I will be honest and forthright in my dealings with others. 4. I will be honest and forthright in my dealings with others. 6. I will not accept compensation for my services based on contingency. 6. I will not accept compensation for my services based on contingency.

A Point to Ponder A Point to Ponder Humans Mental health is very important. Privacy and other rights need to be considered.

Laws vs. Ethics The legal system takes time to evolve, lays out what is acceptable and unacceptable behavior, establishes penalties. 12

Example of a Law Ryan Haight Online Pharmacy Consumer Protection Act Defines "online pharmacy" Defines "online pharmacy" Requires at least one face-to-face patient medical evaluation Requires at least one face-to-face patient medical evaluation Requires registration for online pharmacies Requires registration for online pharmacies

Chilling Effects Law--Example Digital Millennium Copyright Act DMCA Safe Harbor—ISP takes down material immediately once it is notified, whether there is just cause or not DMCA Safe Harbor—ISP takes down material immediately once it is notified, whether there is just cause or not

DMCA, cont. DMCA Subpoenas Anyone who has written something is a copyright holder Anyone who has written something is a copyright holder Anyone who has written something is a copyright holder Anyone who has written something is a copyright holder Law enforcement might use the Section 512(h) subpoena other than for vindicating copyright right Law enforcement might use the Section 512(h) subpoena other than for vindicating copyright right No judge reviews the subpoena No judge reviews the subpoena

Is that ethical?

Typical Problems: Medical Records b9Zn5glnw b9Zn5glnw b9Zn5glnw b9Zn5glnw

Privacy What is the right to privacy? What is the right to privacy? 70aUDYaM 70aUDYaM 70aUDYaM 70aUDYaM

Privacy Article 12: No one shall be subject to arbitrary interference with his privacy, family, home or correspondence, nor to attacks upon his honor and reputation. Everyone has the right to the protection of the law against such interference or attacks. Article 12: No one shall be subject to arbitrary interference with his privacy, family, home or correspondence, nor to attacks upon his honor and reputation. Everyone has the right to the protection of the law against such interference or attacks. United Nations, Universal Declaration Of Human Rights

Security Measures taken as a precaution against theft or espionage or sabotage, etc. Measures taken as a precaution against theft or espionage or sabotage, etc. Freedom from anxiety or fear Freedom from anxiety or fear Often thwarted by users leaving passwords on sticky notes Often thwarted by users leaving passwords on sticky notes

Internet Privacy/Security Issues University Sites and Personal Data Accidents University Sites and Personal Data Accidents Identity Theft and Identity Loss Identity Theft and Identity Loss

And a few more Cybercafes Cybercafes Google's Gmail Google's Gmail Online Dating Online Dating

Anonymity Bad uses money laundering drug trading terrorism preying upon the vulnerable Good uses security mental health self-fulfillment peace of mind

Ethical Issues Privacy and confidentiality Privacy and confidentiality Integrity of information over time Integrity of information over time Unimpaired and consistent service Unimpaired and consistent service Controlling access to resources Controlling access to resources Serving people and society Serving people and society (NSA spying on Americans) (NSA spying on Americans)NSA spying on AmericansNSA spying on Americans

Good Luck!! Remember, You have access to data (!) You have access to data (!) Make sure we can trust you Make sure we can trust you Contact me: