K. Salah1 Legal, Privacy, & Ethical Issues. K. Salah2 Overview Human Controls Applicable to Computer Security The Basic Issues Computer Crime Privacy.

Slides:



Advertisements
Similar presentations
Vladimir Misic: 10 Professionalism and Ethics Ownership and Protection.
Advertisements

Slides prepared by Cyndi Chie and Sarah Frye1 A Gift of Fire Third edition Sara Baase Chapter 4: Intellectual Property.
Legal Issues in Software CS 415, Software Engineering II Mark Ardis, Rose-Hulman Institute April 11, 2003.
Copyright Infringement
Legal and Ethical Issues in Computer Security
Ownership of Computer Software Ethical Questions and Concerns.
1 Introduction to Software Engineering Lecture 38 – Intellectual Property.
Chapter 7.5 Intellectual Property Content, Law and Practice.
1 McGraw-Hill/Irwin Copyright © 2004, The McGraw-Hill Companies, Inc. All rights reserved. Ethical Challenges Ethics Principles of right and wrong that.
Click your mouse anywhere on the screen to advance the text in each slide. After the starburst appears, click a blue triangle to move to the next slide.
The illusion of privacy and protection … Legal, Privacy, Ethical Issues Barbara Endicott-Popovsky INFO498.
P A R T P A R T Crimes & Torts Crimes Intentional Torts Negligence & Strict Liability Intellectual Property & Unfair Competition 2 McGraw-Hill/Irwin Business.
By: Lauren Monteith, Derek Love, Cole Howell, and Reggie Jones.
Patents and trade secrets 6 6 Chapter. Patents  Grant of property rights to inventors  Issued by the U.S. Patent and Trademark Office (USPTO)  Permits.
Professional Ethics for Computer Programmers
Chapter 9 – Legal, Privacy, and Ethical Issues in Computer Security  Program and data protection by patents, copyrights, and trademarks  Computer Crime.
 Provide a basis for determining who in the organization should control access to a particular item of information.
Intellectual Property Rights and Computer Technology
Intellectual property rights concern the legal ownership and use of intellectual property such as software, music, movies, data, and information. Intellectual.
Intellectual Property
The Social Context of Computing Foundation Computing Never underestimate the power of human stupidity.
Copyright © 2008 by West Legal Studies in Business A Division of Thomson Learning Chapter 10 Intellectual Property Rights and the Internet Twomey Jennings.
Chapter 17.3 Regulating the Internet. Internet Speech ► Free speech is a key democratic right. The Internet promotes free speech by giving all users a.
Copyright © 2008 by West Legal Studies in Business A Division of Thomson Learning Chapter 11 Cyberlaw Twomey Jennings Anderson’s Business Law and the Legal.
Legal and Ethical Issues in Computer Security Csilla Farkas
Legal and Ethical Issues. Major Topics Protecting Programs and Data Information and the Law Rights of Employees and Employers Software Failures Computer.
Legal aspects Based on Law in the Internet Age Sharon K. Black.
Legal and Ethical Issues in Computer Security
Reboot Your Attitude Internet Copyright and Piracy.
13 Intellectual Property 1 Aaron Schiff ECON Reading: Cabral p , Deak p
Copyright Basics. Intellectual Property Intellectual Property is a unique product or idea created by an individual or organization. Common types of protection.
Intellectual Property Rights and Internet Law, Social Media, and Privacy Chapter 8 & 9.
Chapter 08.  Describes property that is developed through an intellectual and creative process  Inventions, writings, trademarks that are a business’s.
Zheng Liu January 18, 2015 Intellectual Property Law For Startups.
1 Ethical Issues in Computer Science CSCI 328, Fall 2013 Session 17 Software as Intellectual Property.
Ethical and Social...J.M.Kizza1 Module 5: Intellectual Property Rights and Computer Technology  Computer Products and Services  Instruments of Protection.
Why the Data Protection Act was brought in  The 1998 Data Protection Act was passed by Parliament to control the way information is handled and to give.
Intellectual Property Laws and Fair Use Guidelines for Educational Multimedia.
Intellectual Property (Quinn Chapter 4) CS4001 Kristin Marsicano.
Copyright and the Law For more information contact:
1 Ethics of Computing MONT 113G, Spring 2012 Session 32 Software as Intellectual Property.
 By the end of the presentation, you should: › Be able to define and give examples of intellectual property › Explain the basics of Copyright Law  Know.
Ownership of Software Software represents the results of intellectual rather than purely physical efforts and is therefore inherently non- tangible. So.
Chapter 10 Intellectual Property Rights Twomey, Business Law and the Regulatory Environment (14th Ed.)
© 2004 West Legal Studies in Business A Division of Thomson Learning BUSINESS LAW Twomey Jennings 1 st Ed. Twomey & Jennings BUSINESS LAW Chapter 11 Cyberlaw.
Chapter 11 CYBERLAW. 2 Cyberlaw is not a new body of laws. Cyberlaw is not a new body of laws. Cyberlaw is the application of existing laws and legal.
Comprehensive Volume, 18 th Edition Chapter 11: Cyberlaw.
Legal Issues Now that we have looked at ethics, some of these issues are also dealt by the law. We will consider laws in the following catagories: Intellectual.
Legal and Ethical Issues in Computer Security Csilla Farkas
Intellectual Property. Confidential Information Duty not to disclose confidential information about a business that would cause harm to the business or.
LEARNING AREA 1 : INFORMATION AND COMMUNICATION TECHNOLOGY INTRODUCTION TO ICT COMPUTER ETHICS AND LEGAL ISSUES.
CHAPTER 8 Legal, Privacy and Ethical Issues in Computer Security (c) by Syed Ardi Syed Yahya Kamal, UTM
Intellectual Property. An original (creative) work, invention or information protected by law through a trademark, patent, copyright or trade secret.
Intellectual property (IP) refers to creations of the mind: inventions, literary and artistic works, music, movies, symbols, names, images, and designs.
Slide 1 © 2013, Ian Tan TSC2211 Computer Security Slide 1 TSC2211 Computer Security Lecture 12 Legal Issues.
Group E - Enrico Costanza Sam Holder, Jonathan Stephens-Jones, Joseph Buckingham, Crispin Clark, Benjamin Dixon Creative Commons, Open Source, Open Movements.
Intellectual Property. An original (creative) work, invention or information protected by law through a trademark, patent, copyright or trade secret.
Plagiarism, Fair Use and Copyright Laws
Intro to Intellectual Property 3.0
Intellectual Property
A Gift of Fire Third edition Sara Baase
Legal and Ethical Issues in Computer Security
U. S. Copyright Basics.
Welcome to IST e-Lab Entrepreneurship Lab, 3rd Session, 06 November 2017.
Learning Area 1 Information And Communication Technology and Society
Evaluate It - Lesson 3.
Intellectual Property
Intellectual Property
Chapter # 6 Intellectual Property
Presentation transcript:

K. Salah1 Legal, Privacy, & Ethical Issues

K. Salah2 Overview Human Controls Applicable to Computer Security The Basic Issues Computer Crime Privacy Ethical Issues Codes of Professional Ethics

K. Salah3 The basic issues

K. Salah4 Protecting Programs and Data Copyrights—works of the mind Copyrights—works of the mind Intellectual Property Digital Millennium Copyright Act Patents—tangible objects Patents—tangible objects Trade Secrets—competitive edge info Trade Secrets—competitive edge info

K. Salah5 Intellectual Property Intellectual property == information that belongs to someone  Book  Movie  Program May be protected by  Copyright  Patent  Trade secret Computer security can help with some of these  Not much help with patents

K. Salah6 Copyrights Designed to protect the expression of ideas  Limited to a particular specific expression  May be more than one copyright for a given expression Composer: the score Lyricist: the lyrics to the song Artist: a particular performance of the song Limited in time  Expire 70 years after author’s death  Expire after 95 years (if owned by corporation)  These limits can change, and have been getting longer recently Public domain  Public “owns” the copyright  Common for government documents  Older works pass into the public domain Collections can be copyrighted even if the individual components aren’t subject to copyright

K. Salah7 Fair use Copyrighted item is subject to fair use  May be excerpted for teaching, criticism, etc.  Definition of fair use depends on many factors First sale  Author controls the first sale of a copyrighted work: receives benefits from its sale  Owner controls future sales: owner may resell it to anyone without contacting the copyright holder  Owner may only sell a copy he currently owns

K. Salah8 Patents Cover an implementation of an idea  Patent has details on how to implement the object  Patent should have enough information to allow someone to actually build the object! Patents are public  Searchable at  Download PDF for $3 each Patent protection  Nobody is allowed to make an object covered by the patent without licensing it from the patent owner  Deciding what’s covered is difficult. Patent lasts for about 18 years

K. Salah9 More on patents Patent must be novel  Only one patent per idea: if multiple independent inventors, still only one patent (one inventor loses)  Patent must not be obvious Patent holder must oppose all infringement  Even small infringers have to be pursued  Copyright holder need only go after major offenders Patent can be lost  Holder didn’t pursue all infringers  Patent was obvious and shouldn’t have been granted  Someone else invented it first Patents best for big companies, not individuals

K. Salah10 Trade secrets Not legally protected  Must be kept secret!  Legal action can be taken against someone who (illegally) reveals the secret Can’t uncover the secret, but can  Reverse engineer the process  Independently invent something that does the same thing Difficult to enforce!  Reverse engineering -- OK  Revealing the secret isn’t  Distinguishing these can be difficult

K. Salah11 Comparison among: Copyright, Patent and Trade Secret Protection CopyrightPatent Trade Secret Protects Expression of idea, not idea itself Invention—way something works A secret, competitive advantage Protected Object Made Public Yes, intention is to promote pub. Design filed at Patent Office No Requirement to Distribute YesNoNo Ease of filing Very easy, do-it- yourself Very complicated; specialist lawyer suggested No filing Duration Individual’s life + 70 years 19 years Indefinite Legal Protection Sue if unauthorized copy sold Sue if invention copied Sue if secret stolen

K. Salah12 Licensing vs. Ownership If program is sold (under copyright), owner can resell it to someone else If program is licensed, “owner” must abide by licensing terms  May restrict redistribution  May restrict other uses (it’s a license) Licensing may avoid some problems, but opens others  What if the program doesn’t work? Copyright has no guarantees License has to say what you’re licensing for  Making backup copies?  Using the program on multiple machines?

K. Salah13 Rights of Employees/Employers Ownership of Products Ownership of Products Ownership of a Patent Ownership of a Patent Ownership of a Copyright Ownership of a Copyright Work for Hire Work for Hire Licenses Licenses Trade Secret Protection Trade Secret Protection Employment Contracts Employment Contracts

K. Salah14 Software Failures Selling correct software Selling correct software Reporting software flaws Reporting software flaws Vendor interests User interests Responsible vulnerability reporting Quality Software

K. Salah15 Computer Crime Rules of Property Rules of Property Rules of Evidence Rules of Evidence Threats to Integrity and Confidentiality Threats to Integrity and Confidentiality Value of Data Value of Data Acceptance of Computer Terminology Acceptance of Computer Terminology Hard to Define Hard to Define Hard to Prosecute Hard to Prosecute US Computer Fraud and Abuse Act US Economic Espionage Act US Electronic Funds Transfer Act US Freedom of Information Act US Privacy Act US Electronic Communications Privacy Act USA Patriot Act

K. Salah16 Computer Crime (cont’d) International International EU Data Protection Act Restricted Content Cryptography Use Criminals are hard to catch Criminals are hard to catch Law is not precise Law is not precise

K. Salah17 Cryptography Challenges Controls on export Controls on export Controls on use Controls on use Free speech issues Free speech issues Key escrow issues Key escrow issues

K. Salah18 III. Privacy Identity Theft Identity Theft Aggregation and Data Mining Aggregation and Data Mining Poor System Security Poor System Security Government Threats Government Threats The Internet The Internet Privacy vs. Security Concerns Privacy vs. Security Concerns Corporate Rights and Private Business Corporate Rights and Private Business Privacy for Sale Privacy for Sale Controls Controls Authentication Anonymity Computer Voting Pseudonymity The Law—EU Protection Act, HIPAA, Graham-Leach-Bailey

K. Salah19 IV. Ethical Issues Law vs. Ethics Law vs. Ethics Ethics vs. Religion Ethics vs. Religion Universality ?? Pluralism ?? Ethical Approaches Ethical Approaches Consequence-based—i.e. utilitarianism Rules-based—deontology

K. Salah20 V. Codes of Ethics IEEE IEEE ACM ACM Computer Ethics Institute Computer Ethics Institute 10 Commandments of Computer Use 10 Commandments of Computer Use Brookings Institute