PowerPoint® Slides to Accompany

Slides:



Advertisements
Similar presentations
From Real-Time Intercepts to Stored Records: Why Encryption Drives the Government to Seek Access to the Cloud Peter Swire Moritz College of Law Ohio State.
Advertisements

A Gift of Fire, 2edChapter 8: Computers and Work1 PowerPoint ® Slides to Accompany A Gift of Fire : Social, Legal, and Ethical Issues for Computers and.
A Gift of Fire, 2edChapter 4: Can We Trust the Computer?1 PowerPoint ® Slides to Accompany A Gift of Fire : Social, Legal, and Ethical Issues for Computers.
PowerPoint Presentation by Charlie Cook The University of West Alabama 1 Human Resource Management ELEVENTH EDITION G A R Y D E S S L E R © 2008 Prentice.
Security Vulnerabilities and Conflicts of Interest in the Provider-Clearinghouse*-Payer Model Andy Podgurski and Bret Kiraly EECS Department & Sharona.
Controlling. Copyright © 2005 Prentice Hall, Inc. All rights reserved. 18–2 L E A R N I N G O U T L I N E Follow this Learning Outline as you read and.
Ethical and Social...J.M.Kizza 1 Module 5: Anonymity, Security, Privacy and Civil Liberties IntroductionAnonymitySecurityPrivacy Ethical and Social Issues.
CALEA Compliance in 2006 H. Michael Warren Vice President, Fiduciary Services NeuStar, Inc February 2006.
Patriot Act October 26, United (and) Strengthening America (by) Providing appropriate tools required (to) intercept (and) obstruct Terrorism Act.
A Gift of Fire, 2edChapter 3: Encryption and Interception of Communications1 PowerPoint ® Slides to Accompany A Gift of Fire : Social, Legal, and Ethical.
A Gift of Fire, 2edChapter 10: Professional Ethics and Responsibilities1 PowerPoint ® Slides to Accompany A Gift of Fire : Social, Legal, and Ethical Issues.
Slides prepared by Cyndi Chie and Sarah Frye1 A Gift of Fire Third edition Sara Baase Chapter 4: Intellectual Property.
Patents Copyright © Jeffrey Pittman. Pittman - Cyberlaw & E- Commerce 2 Legal Framework of Patents The U.S. Constitution, Article 1, Section 8:
Chapter 17 Controls and Security Measures
Insights on the Legal Landscape for Data Privacy in Higher Education Rodney Petersen, J.D. Government Relations Officer and Security Task Force Coordinator.
A Gift of Fire, 2edChapter 9: Broader Issues on the Impact and Control of Computers1 PowerPoint ® Slides to Accompany A Gift of Fire : Social, Legal, and.
A Gift of Fire, 2edChapter 3: Encryption and Interception of Communications1 PowerPoint ® Slides to Accompany A Gift of Fire : Social, Legal, and Ethical.
A Gift of Fire, 2edChapter 5: Freedom of Speech in Cyberspace1 PowerPoint ® Slides to Accompany A Gift of Fire : Social, Legal, and Ethical Issues for.
Encryption and Interception of Communications Presented by: Emmanuel Sotelo Sassja Ceballos Chapter 3.
Statement of Christopher Humphrey Section Chief, Cyber Division
INTERNET and CODE OF CONDUCT
Information Systems Controls for System Reliability -Information Security-
©2003 Prentice Hall, Inc.To accompany A Framework for Marketing Management, 2 nd Edition Slide 0 in Chapter 7 Chapter 7 Analyzing Business Markets and.
Ethical Issues with Cryptography Regulation  Assistance to law enforcement AND  Threats to privacy  Unfair search of property  Obstruction of free.
1–11–1 1-1 Copyright © 2012 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill/Irwin.
PowerPoint Presentation by Charlie Cook Copyright © 2005 Prentice Hall, Inc. All rights reserved. Chapter 13 Information Technology for Business.
Protecting Intellectual Property (IP) Evan Kuenzli Grant Miller.
Chapter 17.3 Regulating the Internet. Internet Speech ► Free speech is a key democratic right. The Internet promotes free speech by giving all users a.
CS 4001Mary Jean Harrold1 Class 8 ŸQuestions about term paper—list of possible topics available later today ŸCommunications discussion ŸCommunications.
HIPAA PRIVACY AND SECURITY AWARENESS.
1 Introduction to Security Chapter 5 Risk Management: The Foundation of Private Security.
Defining Computer Security cybertechnology security can be thought of in terms of various counter measures: (i) unauthorized access to systems (ii) alteration.
Deep Packet Inspection Matthew Carson. What is Deep Packet Inspection? A form of packet filtering which examines the data portion of an internet packet.
CALEA Discussion Internet2 Joint Techs July 19, 2006 Doug Carlson Executive Director, Communications & Computing Services New York University
A Gift of Fire, 2edChapter 1: Unwrapping the Gift1 PowerPoint ® Slides to Accompany A Gift of Fire : Social, Legal, and Ethical Issues for Computers and.
Chapter 11 Interorganizational and International Information Systems.
DC and Gun Control Alex Peck Arthur Koner Period 5.
Prentice Hall © PowerPoint Slides to accompany The Legal Environment of Business and Online Commerce 4E, by Henry R. Cheeseman Chapter 9 International.
1 University of Palestine Information Security Principles ITGD 2202 Ms. Eman Alajrami 2 nd Semester
©2003 Prentice Hall, Inc.To accompany A Framework for Marketing Management, 2 nd Edition Slide 0 in Chapter 7 PowerPoint by Karen E. James Louisiana State.
CS 4001Mary Jean Harrold1 Intercepting Communications Thanks to Sherry Clark for her notes.
Chapter Six Collective Bargaining
Management Information Systems, 3 rd Edition Effy Oz 1 Chapter 11 EDI, Supply Chain Management, and Global Information Systems.
1 EDI, Supply Chain Management, and Global Information Systems Chapter 11.
1. Is defined as the large area of law covering all aspects of the employer and employee relationship Is important to know from both sides: as an employee.
Prentice Hall © PowerPoint Slides to accompany The Legal Environment of Business and Online Commerce 4E, by Henry R. Cheeseman Chapter 8 Intellectual.
Well, sir, from the sounds of it, you've got yourself some pirated software. I'm afraid there's nothing we can do to help you.`
Slides prepared by Cyndi Chie and Sarah Frye1 A Gift of Fire Third edition Sara Baase Chapter 4: Intellectual Property.
The Business Research Company Technology. Technology Industry Taxonomy TBRC Business Research. All Rights Reseserved 2 Technology Computer Hardware &
Government Protection Consumers protected by both laws and agencies at different levels Look at table on page 30.
1 HIPAA’s Impact on Depository Financial Institutions 2 nd National Medical Banking Institute Rick Morrison, CEO Remettra, Inc.
A Gift of Fire, 2edChapter 7: Computer Crime1 PowerPoint ® Slides to Accompany A Gift of Fire : Social, Legal, and Ethical Issues for Computers and the.
Labor Relations and Collective Bargaining
A Gift of Fire Third edition Sara Baase
PowerPoint® Slides to Accompany
PowerPoint® Slides to Accompany
PowerPoint® Slides to Accompany
Intercepting Communications
BIS 221 RANK Education Your Life--
BIS 221 MENTOR Lessons in Excellence- -bis221mentor.com.
BIS 221 MENTOR Education for Service- -bis221mentor.com.
BIS 221 RANK Education for Service-- bis221rank.com.
Wiretapping and Encryption
PowerPoint® Slides to Accompany
A Gift of Fire Third edition Sara Baase
Chapter 9 Internet Law and Intellectual Property
BIS 221 Great Wisdom/tutorialrank.com. BIS 221 All Assignments For more course tutorials visit BIS 221 Week 2 Assignment Business.
Labor Relations and Collective Bargaining
The Legalities of Technicalities task 4
BIS 221 RANK best future education / bis221rank.com.
Presentation transcript:

PowerPoint® Slides to Accompany A Gift of Fire: Social, Legal, and Ethical Issues for Computers and the Internet (2nd Edition) by Sara Baase San Diego State University PowerPoint slides created by Sherry Clark Modified and presented by Cuong Tham Copyright 2003 Prentice Hall

Discussion Topic Asmt. 1: Encryption Control Act Suppose Congress is debating the following proposed law: (1) All encryption products manufactured or imported for sale or use in the United States must include features that permit immediate decryption of the encrypted data upon the receipt of a valid court order. (2) Whoever knowingly manufactures, imports, or sells an encryption product that does not meet the requirements of this Act shall be subject to a term of imprisonment of not more than five years, a fine of not more than two hundred fifty thousand dollars, or both. (3) It shall NOT be unlawful to use any encryption product purchased or in use prior to January 31 of the year following passage of this Act.

Views From Different Groups about the Act The groups are presenting arguments to Congress and the news media. Group 1: Representatives of the FBI, CIA, and Homeland Security Dept. (in favor) Group 2: Representatives of the American Civil Liberties Union (ACLU) (against) Group 3: Representatives of police departments (in favor) Group 4: Representatives of the computer equipment and telecommunications industries (against)

Role: computer equipment and telecommunications industries Against Encryption Control Act Arguments: The cost is too high for the companies to modify and redesign all the hardware and software to meet law demand Privacy concern could result of losing potential customers Financial lost due to unable to sell already manufactured products The act prevents potential improvements in communications technology from being implemented

Industries countered that the actual cost would be in billions. The cost is too high for the companies to modify and redesign all the hardware and software to meet law demand US passed a similar Act, the Communications Assistance for Law Enforcement Act of 1994 (CALEA) In response to high cost of modification of existing software and hardware, CALEA authorized $500, 000, 000 to resolve matter Industries countered that the actual cost would be in billions. Companies could suffer the same difficulties from the Encryption Control Act

Privacy concern resulting of losing potential customers If the communication equipment were designed for interception by government agencies (require a court order), it is possible for unauthorized parties to intercept the communication, thus reduce the security Because of the security concern, customers were choosing to use the equipment or application for communications may decide to use other alternatives.

Privacy concern resulting of losing potential customers Eg., encryption products produced by US companies for export were less completive than those foreign companies that used better encryption.

Financial lost due to unable to sell already manufactured products The act only allow one to use any encryption product purchased or in use prior to January 31 of the year following passage of this Act. As result, the manufactured products that does not meat requirement of the Act have to be either modified according to the requirement or to be recycled.

The act prevents potential improvements in communications technology from being implemented Technology is available to make communications more secure. However, in order meet the law requirement, such technology can not be implements.