Chapter 21 E-Policy The debate rages. Cryptography Policy What do you think about: Who controls the keys? Public opinion with government IT, civil liberty.

Slides:



Advertisements
Similar presentations
Principles of Information Systems
Advertisements

Security and Control Soetam Rizky. Why Systems Are Vulnerable ?
“Encryption’s Vital Role in Safeguarding the Digital Economy” Professor Peter Swire Ohio State University ASSOCHAM International Conference Safeguarding.
USA PATRIOT ACT: Is it a legitimate law to protect national security or is it a violation of your Civil Liberties? Essential Question:
Chapter 17 Law and Terrorism.
SoberIT Software Business and Engineering Institute HELSINKI UNIVERSITY OF TECHNOLOGY Carnivore, an assault against privacy From Action to Reaction Herkko.
Encryption and Globalization Professor Peter Swire IP Scholars Conference Chicago August 11, 2011.
The Anti-Piracy Campaign: The Drag Behind Their Efforts Jamal Haskin.
A Gift of Fire, 2edChapter 3: Encryption and Interception of Communications1 PowerPoint ® Slides to Accompany A Gift of Fire : Social, Legal, and Ethical.
Information security An introduction to Technology and law with focus on e-signature, encryption and third party service Yue Liu Feb.2008.
Chapter 17 Controls and Security Measures
A Gift of Fire, 2edChapter 3: Encryption and Interception of Communications1 PowerPoint ® Slides to Accompany A Gift of Fire : Social, Legal, and Ethical.
Foundations of Network and Computer Security J J ohn Black CSCI 6268/TLEN 5831, Fall 2004.
Slides prepared by Cyndi Chie and Sarah Frye A Gift of Fire Third edition Sara Baase Chapter 2: Privacy.
1 McGraw-Hill/Irwin Copyright © 2004, The McGraw-Hill Companies, Inc. All rights reserved. Ethical Challenges Ethics Principles of right and wrong that.
CS155a: E-Commerce Lecture 2: Sept. 11, 2001 Course Overview.
Foundations of Network and Computer Security J J ohn Black CSCI 6268/TLEN 5831, Fall 2007.
Ethical Issues with Cryptography Regulation  Assistance to law enforcement AND  Threats to privacy  Unfair search of property  Obstruction of free.
Slides prepared by Cyndi Chie and Sarah Frye A Gift of Fire Third edition Sara Baase Chapter 2: Privacy.
Chapter 1. Electronic Commerce  Brief History of Commerce and Communication  Introduction to Electronic Commerce  Laws Guiding E-commerce  Are we.
Chapter 17.3 Regulating the Internet. Internet Speech ► Free speech is a key democratic right. The Internet promotes free speech by giving all users a.
Reducing Crime in Cyberspace: A Privacy Industry View Stephanie Perrin Adam Shostack Zero-Knowledge Systems, Inc.
CCTV AND IT’S FUTURE SAMPLEPRESENTATION CCTV What are we doing with CCTV? What will CCTV be like in 10 Years? How about tomorrow?
CS 4001Mary Jean Harrold1 Class 8 ŸQuestions about term paper—list of possible topics available later today ŸCommunications discussion ŸCommunications.
Anonymity, Security, Privacy and Civil Liberties
Chapter 17 Objectives: 6.04, 6.05, 10.05, Using the Internet Web sites: pages on the World Wide Web that contain text, images, audio, and video.
Slides prepared by Cyndi Chie and Sarah Frye1 A Gift of Fire Third edition Sara Baase Chapter 2: Privacy.
Slides prepared by Cyndi Chie and Sarah Frye1 A Gift of Fire Third edition Sara Baase Chapter 2: Privacy.
Slides prepared by Cyndi Chie and Sarah Frye1 A Gift of Fire Third edition Sara Baase Chapter 2: Privacy.
Computer and Internet privacy (2) University of Palestine University of Palestine Eng. Wisam Zaqoot Eng. Wisam Zaqoot Feb 2011 Feb 2011 ITSS 4201 Internet.
Steve Wicker Cornell University 1 TRUST Autumn 2011 Conference.
E-Commerce Course Overview. Telephone Network Connection-based Admission control Intelligence is “in the network” Traffic carried by relatively few, “well-known”,
Lecture 11: Law and Ethics
© 2015 albert-learning.com Unavoidable ethical questions about search engines UNAVOIDABLE ETHICAL QUESTIONS ABOUT SEARCH ENGINES.
Protecting Privacy “Most people have figured out by now you can’t do anything on the Web without leaving a record” - Holman W. Jenkins, Jr
A Gift of Fire Third edition Sara Baase Chapter 2: Privacy.
Complying with Acceptable Use Policies.  AUP  Code of Conduct for Internet Use  Used by Organizations and Businesses  Outlines agreement in writing.
COEN 350 Network Security Introduction. Computer Networks OSI Reference Model Application Layer Presentation Layer Session Layer Transport Layer Network.
Foundations of Network and Computer Security J J ohn Black CSCI 6268/TLEN 5550, Spring 2015.
CS 4001Mary Jean Harrold1 Intercepting Communications Thanks to Sherry Clark for her notes.
Computer Ethics Chapter 14 – Computers: Understanding Technology.
Stephanie Mercury.  A firewall allows or blocks traffic into and out of a private network or the user's computer.
CS453: Introduction to Information Security for E-Commerce Prof. Tom Horton.
Chapter 3 Encryption Algorithms & Systems (Part D)
Free Cookies and Other Security and Privacy Issues.
Twelve Guiding Principles for the Regulation of Surveillance Camera Systems Presented by: Alastair Thomas Date: 23 rd October 2013.
Traditional Security Issues Confidentiality –Prevent unauthorized access or reading of information Integrity –Insure that writing or operations are allowed.
Impact of Computers on Society 3. Encryption and Interception of Communication.
Encryption Basics Module 7 Section 2. History of Encryption Secret - NSA National Security Agency –has powerful computers - break codes –monitors all.
Digital Law -The Deep Web- Digital Law -The Deep Web- Liam Leppard Matthias Lee Russell Wong.
A Gift of Fire Third edition Sara Baase Chapter 2: Privacy Slides prepared by Cyndi Chie and Sarah Frye.
Encryption u “Encryption basically involves running a readable message known as “plaintext” through a computer program that translates the message according.
National Security Agency (NSA) Surveillance Christopher Boyd.
COEN 350 Network Security Introduction. Computer Networks OSI Reference Model Application Layer Presentation Layer Session Layer Transport Layer Network.
Internet Piracy By: Andrew Allen.
Using Social Media in the University Setting
PowerPoint® Slides to Accompany
PowerPoint® Slides to Accompany
E-Commerce: Doing Business on the Internet
A Brief History of the Crypto Wars
A Gift of Fire Third edition Sara Baase
A Gift of Fire Third edition Sara Baase
العدد تذكيره وتأنيثه مقدمة
The Need For Forensic Capabilities In The Commercial Sector
PowerPoint® Slides to Accompany
A Gift of Fire Third edition Sara Baase
Computer Security Social Legal and Ethical issues
Governmental Control of Network Activities CS 239 Advanced Topics in Computer Security Peter Reiher September 30, 2010.
Online Learning.
RESEARCH PROJECTS Digital Piracy Laws Concerning Cryptography
Presentation transcript:

Chapter 21 E-Policy The debate rages

Cryptography Policy What do you think about: Who controls the keys? Public opinion with government IT, civil liberty groups on the other side Export controls PGP Wiretapping Foreign targets Law enforcement data matching

Right from book subpoena Subpoena of Google awsuit/ _ html awsuit/ _ html dyn/content/article/2006/01/19/AR html dyn/content/article/2006/01/19/AR html d= d= Result gle.hearing.ap/

Foreign intelligence HUGE use of communications intelligence NSA Traffic selection

Cryptography National Security Export control Back doors You don’t always need the capability to break it, just make them think you do Clipper

Copyright Distributed systems and international law Effect on internet Freedom of speech Porn Digital Millennium Copyright Act

Data Protection International differences Can force US companies to give up data they really do not want to Germany hard-line data protection US self-regulation Citi-bank must process German card-holder information Will cameras be: Surveillance cams Web cams

Evidential Issues Admissibility of evidence Quality of evidence system produces Reliability of evidence Computer forensics Electronic signatures Burden of proof On person accepting signature Or person supposedly making signature Currently on person accepting Others would like to change this Digital signatures could change this and be bad for customer Risk dumping

Articles Digital Millennium Copyright Act Electronic elections

List of resources Key escrow Cryptography policy _2649_34255_ _1_1_1_1,00.html _2649_34255_ _1_1_1_1,00.html

List of resources Clipper chip Digital Millennium Copyright Act