Ethics and Legal Issues in Computing

Slides:



Advertisements
Similar presentations
Privacy & Other Issues. Acceptable Use Policies When you sign up for an account at school or from an Internet Service Provider, you agree to their rules.
Advertisements

Providing protection from potential security threats that exist for any internet-connected computer is termed e- security. It is important to be able to.
Unit 1 Living in the Digital WorldChapter 1 Lets Communicate Internet Safety.
Online Safety. Introduction The Internet is a very public place Need to be cautious Minimize your personal risk while online Exposure to: viruses, worms,
SPYWARE Presented by The State Security Office November 17, 2004.
Copyright © 2006 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill Technology Education Copyright © 2006 by The McGraw-Hill Companies,
1 COMPUTER SECURITY AND ETHICS Chapter Five. Computer Security Risks 2.
Class 11: Information Systems Ethics and Crime MIS 2101: Management Information Systems Based on material from Information Systems Today: Managing in the.
Chapter 4 McGraw-Hill/Irwin Copyright © 2011 by The McGraw-Hill Companies, Inc. All rights reserved. Ethics and Information Security.
Privacy MGMT Summer 2012, Dannelly Night 3, Lecture Part 2.
Internet Safety Basics Never share names, schools, ages, phone numbers, or addresses. Never open an from a stranger – it may contain viruses that.
Security, Privacy, and Ethics Online Computer Crimes.
MIS PERSONAL, LEGAL, ETHICAL, AND ORGANIZATIONAL ISSUES OF INFORMATION SYSTEMS CHAPTER 4 Hossein BIDGOLI Phishing that bites Paying for Privacy Pirates.
Chapter 10 Privacy and Security McGraw-Hill
Copyright © 2006 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill Technology Education Copyright © 2006 by The McGraw-Hill Companies,
1 McGraw-Hill/Irwin Copyright © 2004, The McGraw-Hill Companies, Inc. All rights reserved. Ethical Challenges Ethics Principles of right and wrong that.
Privacy & Security By Martin Perez. Introduction  Information system - People : meaning use, the people who use computers. - Procedures : Guidelines.
1010 CHAPTER PRIVACY AND SECURITY. © 2005 The McGraw-Hill Companies, Inc. All Rights Reserved Competencies Describe concerns associated with computer.
Title: The Internet LO: Security risks. Security risks Types of risks: 1.Phishing 2.Pharming 3.Spamming 4.Spyware 5.Cookies 6.Virus.
MIS PERSONAL, LEGAL, ETHICAL, AND ORGANIZATIONAL ISSUES OF INFORMATION SYSTEMS CHAPTER 4 LO1 Describe information technologies that could be used in computer.
Internet Safety Basics Being responsible -- and safer -- online Visit age-appropriate sites Minimize chatting with strangers. Think critically about.
Course: Introduction to Computers Lecture: 6.  Commercial software is covered by Copyrights.  You have to pay for it and register to have the license.
Chapter 11 Security and Privacy: Computers and the Internet.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Chapter 17.3 Regulating the Internet. Internet Speech ► Free speech is a key democratic right. The Internet promotes free speech by giving all users a.
Copyright © 2008 by West Legal Studies in Business A Division of Thomson Learning Chapter 11 Cyberlaw Twomey Jennings Anderson’s Business Law and the Legal.
Computers and the Internet. Key Information: Key Information: Even if you delete your mail, messages may remain on servers or backup devices for.
Computer Programming I
Cyber crime & Security Prepared by : Rughani Zarana.
Staying Safe Online Keep your Information Secure.
Online Privacy, Government, and Intellectual Property Rouda’s CSCI 101 class.
Component 4: Introduction to Information and Computer Science Unit 2: Internet and the World Wide Web 1 Component 4/Unit 2Health IT Workforce Curriculum.
Computing Essentials 2014 Privacy, Security and Ethics © 2014 by McGraw-Hill Education. This proprietary material solely for authorized instructor use.
Chapter 12 by Lisa Reeves Bertin Securing Information in a Network.
COMPUTER ETHICS Do you know the difference between right and wrong?
ED 505 Educational Technology By James Moore.  What is the definition of Netiquette and how does it apply to social media sites? ◦ Netiquette is the.
Chapter 5: General Computer Topics Department of Computer Science Foundation Year Program Umm Alqura University, Makkah Computer Skills /1436.
Chapter 18 Technology in the Workplace Section 18.2 Internet Basics.
File Sharing Networks: Sony, Napster, Grokster, Bit Torrent Richard Warner.
COPYRIGHT © 2011 South-Western/Cengage Learning. 1 Click your mouse anywhere on the screen to advance the text in each slide. After the starburst appears,
Educational Computing David Goldschmidt, Ph.D. Computer Science The College of Saint Rose CIS 204 Spring 2009.
Crime committed using a computer and the internet to steal a person’s identity or illegal imports or malicious programs cybercrime is nothing but where.
SPYWARE Spyware, a new class of malicious programs, is just as dangerous as viruses but generally Is underreported. The issues are no longer those of privacy,
© 2010 Pearson Education, Inc., publishing as Prentice-Hall 1 INTERNET LAW AND E-COMMERCE © 2010 Pearson Education, Inc., publishing as Prentice-Hall CHAPTER.
© 2004 West Legal Studies in Business A Division of Thomson Learning BUSINESS LAW Twomey Jennings 1 st Ed. Twomey & Jennings BUSINESS LAW Chapter 11 Cyberlaw.
Cyber Safety Mohammad Abbas Alamdar Teacher of ICT STS Ajman – Boys School.
Digital Citizenship By Lisa Brackett ED 505. Netiquette on Social Media Sites What is it? “Netiquette is the etiquette guidelines that govern behavior.
LESSON 5-2 Protecting Your Computer Lesson Contents Protecting Your Computer Best Practices for Securing Online and Network Transactions Measures for Securing.
Security and Ethics Safeguards and Codes of Conduct.
ICT and the Law Mr Conti. Did you see anything wrong with that? Most people wouldn’t want that sort of information posted in a public place. Why? Because.
Slides prepared by Cyndi Chie and Sarah Frye1 A Gift of Fire Third edition Sara Baase Chapter 4: Intellectual Property.
1 Law, Ethical Impacts, and Internet Security. 2 Legal Issues vs. Ethical Issues Ethics — the branch of philosophy that deals with what is considered.
Any criminal action perpetrated primarily through the use of a computer.
Security Issues and Ethics in Education Chapter 8 Brooke Blanscet, Morgan Chatman, Lynsey Turner, Bryan Howerton.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Computers Are Your Future Eleventh Edition Chapter 9: Privacy, Crime, and Security Copyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall1.
11-1 McGraw-Hill/Irwin Copyright © 2007 by The McGraw-Hill Companies, Inc. All rights reserved.
Internet Privacy Define PRIVACY? How important is internet privacy to you? What privacy settings do you utilize for your social media sites?
Remember effective ways to search +walk (includes words) Intitle:iPad Intext:ipad site:pbs.org Site:gov filetype:jpg.
Web bugs are tiny graphic files embedded in messages and Web pages that are designed to monitor who is reading the message or Web page and.
Chapter 9: Internet Law, Social Media, and Privacy
DIGITAL CITIZENSHIP What You Should Know!.
Computer Security INSM 180- Belasco Bryant and Stratton Fall 2011
IT Security  .
BCT 2.00 Analyze Technology Issues
Computers and the Internet
Computer Programming I
Essentials of the legal environment today, 5e
File Sharing Networks: Sony, Napster, Grokster, Bit Torrent
Presentation transcript:

Ethics and Legal Issues in Computing Dannelly's CSCI 101 class

Ethics - SPAM Costs CAN SPAM Act of 2003 Ethics Issues Ethics - SPAM www.spam-uk.com/images/BlackPepperCan.jpg Costs 40% of email is SPAM consumes lots of disk space!!! bandwidth? CAN SPAM Act of 2003 The bill permits e-mail marketers to send unsolicited commercial e-mail as long as it contains all of the following: an opt-out mechanism; a valid subject line and header (routing) information; the legitimate physical address of the mailer; and a label if the content is adult http://en.wikipedia.org/wiki/Can_Spam_Act_of_2003

Ethics - Web Censorship Ethics Issues Ethics - Web Censorship The US government does not censor content several anti-web-porn laws have been struck down as unconstitutional CIPA requires libraries to install filter software Many Foreign governments do censor web content Are ISPs responsible for what their users' post? maybe

Ethics - Online Privacy Q: Does shopping online at home give you more or less privacy? more privacy - your neighbors will not see you there less privacy - online shopping gives the company much more info about you (exactly what you looked at, how long you looked, other places that you shop, etc…) Beware of those cookies!

Online Privacy Example Ethics Issues Online Privacy Example DoubleClick.com gathers cookie data from advertising banners placed on many web sites DC can cross-reference data to build profiles of individual users' surfing habits DC owns Abacus Inc., a consumer database company containing the names, addresses, phone numbers, etc... of 90% of American Households

Legal Issue: Workplace Privacy Legal Issues Legal Issue: Workplace Privacy Question: How much privacy are you entitled to at work? Is your company allowed to read your email? … Answer: They can do almost anything. It is their office, their phone, their computer, etc.

Privacy v. Government Katz v US USA PATRIOT Act Legal Issues Privacy v. Government Katz v US police must have a warrant to eavesdrop and record a phone conversation USA PATRIOT Act warrants to monitor phones and email are VERY easy to get

Legal Issues Katz v United States without a warrant, police placed a bug on the outside of a public phone booth used by Katz to make illegal bets In 1967, the US Supreme Court ruled Katz's rights were violated. Katz reasonably thought his conversation was private, hence the recording was an illegal search and seizure the 4th amendment protects people, not places the 4th amendment governs seizure of tangible items, as well as recording of oral statements

Legal Issues Patriot Act Uniting and Strengthening America by Providing Appropriate Tools Required to Intercept and Obstruct Terrorism (USA PATRIOT) allows officials to track emails without showing probable cause allows roving surveillance for intelligence (not just crime investigation) tapped device does not have to be owned by the suspect search warrants no longer have to be served warrants for records do not require probable cause …

Legal Issues - Intellectual Property Intellectual Property is any unique product of the human intellect that has commercial value. For example: books, songs, movies, software No Electronic Theft Act of 1997 illegal to reproduce or distribute (even without profit) more than $1,000 worth of copyrighted material in 6 months.

Opinion Homework Dannelly Software Inc. created software to allow researchers to share data files over the internet. Should Dannelly Software Inc be held responsible if you use its software to illegally share files over the internet?

Sony v Universal Studios Legal Issues Sony v Universal Studios In 1976, Universal and Disney sued Sony stating that the Betamax enabled people to copy copyrighted material. In 1983, the supreme court ruled 5-4 that the private, noncommercial use of copyrighted material is "fair use". Also, the Betamax machine could copy non-copyrighted as well as copyrighted material.

Legal Issues MGM v Grokster MGM et.al. sued because 90% of Grokster content was copyrighted. Lower court judge quickly ruled in favor of Grokster. citing Sony v Universal, Grokster has "substantial noninfringing uses" August 2004 Supreme Court overruled in favor of MGM et.al. "We hold that one who distributes a device with the object of promoting its use to infringe copyright, as shown by clear expression or other affirmative steps taken to foster infringement, is liable for the resulting acts of infringement by third parties." June 2005, vote count was 9-0

Digital Millennium Copyright Act Legal Issues Digital Millennium Copyright Act illegal to possess the technology to circumvent copyright protection technology eg. figuring out how to decode a DVD that you own is illegal making any copy of a digital copyrighted work is prohibited eg. making a backup copy of a software application is illegal (unless the maker says okay).

Computer Crime Most corporate computer crime is done by employees Legal Issues Computer Crime Most corporate computer crime is done by employees 58% unauthorized employees 24% authorized employees 13% outside hacker 5% other

Computer Crime Stealing Corporate Data Destroying Corporate Data Legal Issues Computer Crime Stealing Corporate Data Destroying Corporate Data Denial of Service Attack you can shut down cnn.com by quickly hitting it with thousands of bogus requests Making and Spreading Viruses

Harmful Software Virus Worm usually destroys files copies itself Viruses Harmful Software Virus usually destroys files copies itself ex - a MSWord macro sent via email Worm objective: destroy the network, not your PC copies itself via network connections

Harmful Software Trojan Horse Spyware arrives inside something else Viruses Harmful Software Trojan Horse arrives inside something else replicates itself the really bad ones wait for a particular date Spyware objective: steal information personal information (bank account info, …) passwords monitor and transmit web activity

Virus Protection Anti-Virus Software Firewalls Be Careful of Cookies Viruses Virus Protection Anti-Virus Software looks for known viruses and common virus formats Firewalls prohibits unauthorized external access good for cable modem users who leave their machine on Be Careful of Cookies

Next Classes… Next Week: Storing Information Two Weeks from Today: media : flash drives, CDs, … image and movie files the defrag program etc... Two Weeks from Today: Midterm Exam