Legal and Ethical Issues in Computer Security

Slides:



Advertisements
Similar presentations
Introduction to Copyright Principles © 2005 Patricia L. Bellia. May be reproduced, distributed or adapted for educational purposes only.
Advertisements

Intellectual Property Basics for Business Owners David M. Knasel, Esq. Dominion Business Law PLC Tysons Corner | Leesburg, VA
Vladimir Misic: 10 Professionalism and Ethics Ownership and Protection.
1 The Economic Impact of Cyber Attacks The Global Picture Chapter 9.
Slides prepared by Cyndi Chie and Sarah Frye1 A Gift of Fire Third edition Sara Baase Chapter 4: Intellectual Property.
Legal and Ethical Issues in Computer Security
Copyright and Alternatives to Copyright Why now? Rita S. Heimes Director, Technology Law Center University of Maine School of Law Rita S. Heimes Director,
Rights Management Overview Peter B. Hirtle Intellectual Property Officer Cornell University Library
1 Introduction to Software Engineering Lecture 38 – Intellectual Property.
Computer Engineering 294 IP R.Smith 5/ Intellectual Property What is it? Why is it important? – What is it designed to do? What are its basic forms?
Click your mouse anywhere on the screen to advance the text in each slide. After the starburst appears, click a blue triangle to move to the next slide.
Intellectual Property OBE 118 Fall 2004 Professor McKinsey Some property, very valuable property, exists only in our minds, in our imagination. It is intangible.
Chapter 9 – Legal, Privacy, and Ethical Issues in Computer Security  Program and data protection by patents, copyrights, and trademarks  Computer Crime.
Cryptography and Network Security Chapter 23 Fifth Edition by William Stallings Lecture slides by Lawrie Brown.
Intellectual Property Rights and Computer Technology
Intellectual property rights concern the legal ownership and use of intellectual property such as software, music, movies, data, and information. Intellectual.
CENTRAL SCOTLAND POLICE Data Protection & Information Security Stuart Macfarlane Information Governance Unit Police Service of Scotland.
Chapter 25 Intellectual Property Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written.
K. Salah1 Legal, Privacy, & Ethical Issues. K. Salah2 Overview Human Controls Applicable to Computer Security The Basic Issues Computer Crime Privacy.
INTELLECTUAL PROPERTY COPYRIGHTS, PATENTS AND TRADE MARKS.
I DENTIFYING AND P ROTECTING I NTELLECTUAL P ROPERTY Tyson Benson
5-1 Ethics To examine the role of ethical behavior in business finance. 2. To illustrate the role of unethical behavior in the downfall of.
Legal and Ethical Issues in Computer Security Csilla Farkas
Legal and Ethical Issues. Major Topics Protecting Programs and Data Information and the Law Rights of Employees and Employers Software Failures Computer.
Legal aspects Based on Law in the Internet Age Sharon K. Black.
 You will face ethical dilemmas in your career – count on it!  Your decisions will affect: ◦ your professional reputation. ◦ your employability. ◦ the.
Property Business Law II Chapter 19 Mr. Kretschmer.
Legal Issues. 2 Readings Pamela Samuelson, “Anticircumvention Rules: Threat to Science,” 293 Science 2028, Sept. 14, 2001.
Class Discussion Notes MKT April 10, 2001.
Intellectual Property Rights and Internet Law, Social Media, and Privacy Chapter 8 & 9.
… concern the legal ownership and use of intellectual property, such as software, music, movies, data, and information. Links: Video: Too Much Copyright.
An Overview of Intellectual Property Law, Policy, and Controversy Michael J. Madison University of Pittsburgh School of Law February 16, 2006.
Chapter 08.  Describes property that is developed through an intellectual and creative process  Inventions, writings, trademarks that are a business’s.
Zheng Liu January 18, 2015 Intellectual Property Law For Startups.
Intellectual Property. Copyright The right to copy or reproduce a created work –federal legislation gives this right to author or owner and controls infringements.
1 Ethical Issues in Computer Science CSCI 328, Fall 2013 Session 17 Software as Intellectual Property.
McGraw-Hill/Irwin Copyright © 2011 by The McGraw-Hill Companies, Inc. All rights reserved. Chapter 24 Intellectual Property.
TMK 264: COMPUTER SECURITY
Web 2.0: Making the Web Work for You, Illustrated Unit B: Finding Media for Projects.
© 2007 West Legal Studies in Business, A Division of Thomson Learning Chapter 5 Intellectual Property.
PROTECTING YOUR IP RIGHTS Waldo Steyn, Senior Associate, Intellectual Property December 2012.
1 Ethics of Computing MONT 113G, Spring 2012 Session 32 Software as Intellectual Property.
Intellectual Property: Introduction to Copyright Peter B. Hirtle Intellectual Property Officer Cornell University Library
Ownership of Software Software represents the results of intellectual rather than purely physical efforts and is therefore inherently non- tangible. So.
Copyright Laws and Regulations Vocabulary Copyright © Texas Education Agency, All rights reserved.
Protection of Trade Secrets; current issues WIPO-UKRAINE SUMMER SCHOOL ON INTELLECTUAL PROPERTY – JULY 2011.
Prentice Hall © PowerPoint Slides to accompany The Legal Environment of Business and Online Commerce 4E, by Henry R. Cheeseman Chapter 8 Intellectual.
Legal Issues Now that we have looked at ethics, some of these issues are also dealt by the law. We will consider laws in the following catagories: Intellectual.
Legal and Ethical Issues in Computer Security Csilla Farkas
Computing, Ethics & The Law. The Law Copyright, Designs and Patents Act (1988) Computer Misuse Act (1990) Data Protection Act (1998) (8 Main Principles)
CISB 412 Social and Professional Issues Understanding Intellectual Property.
CHAPTER 8 Legal, Privacy and Ethical Issues in Computer Security (c) by Syed Ardi Syed Yahya Kamal, UTM
©2002 by West Legal Studies in Business A Division of Thomson Learning Chapter 6 Business Torts, Intellectual Property and Cyberlaw.
Intellectual property (IP) refers to creations of the mind: inventions, literary and artistic works, music, movies, symbols, names, images, and designs.
Slide 1 © 2013, Ian Tan TSC2211 Computer Security Slide 1 TSC2211 Computer Security Lecture 12 Legal Issues.
Intellectual Property Basics for Business Owners David M. Knasel, Esq. Dominion Business Law PLC Tysons Corner | Leesburg, VA
Intro to Intellectual Property 3.0
Ethical, Social, and Political Issues in E-commerce
Intellectual Property and Cyber Piracy
Introduction Intellectual property includes the application of property in the areas of trade secrets, patents, trademarks, and copyrights.
A Gift of Fire Third edition Sara Baase
Legal and Ethical Issues in Computer Security
INTELLECTUAL PROPERTY AND CYBER PIRACY
Intellectual Property
Intellectual Property Rights
Csilla Farkas Cybersecurity Csilla Farkas
Chapter 9 Internet Law and Intellectual Property
Intellectual Property
Chapter # 6 Intellectual Property
Presentation transcript:

Legal and Ethical Issues in Computer Security CSCE 201

Readings and Assignments Melissa Dark, Rich Epstein, Linda Morales, Terry Countermine, Qing Yuan, Matt Rose and Nathan Harter: CERIAS Tech Report 2007-87, A Framework for Information Security Ethics Education, https://www.cerias.purdue.edu/tools_and_resources/bibtex_archive/archive/2007-87.pdf Penn State: Cyberplagiarism: Detection and Prevention, http://tlt.its.psu.edu/suggestions/cyberplag/ CSCE 201 - Farkas

Law and Computer Security International, national, state, and city laws: affect privacy and secrecy Laws: regulate the use, development, and ownership of data and programs Laws: affect actions that can be taken to protect the secrecy, integrity, and availability of computing resources CSCE 201 - Farkas

Lack of Legislation Reactive procedures Not addressed improper acts Lack of technical expertise of legal personnel CSCE 201 - Farkas

Protection of Computer Systems Protecting computing systems against criminals Protecting code and data Protecting programmers’ and employers’ rights Protecting users of programs CSCE 201 - Farkas

Protecting Programs and Data Copyright Patents Trade secrets Protection for computer objects CSCE 201 - Farkas

Copyrights Protect the expression of ideas 1978: U.S. copyright law Updated in 1998: Digital Millennium Copyright Act (DMCA) – deals with computers and other electronic media Give the copyright holder the exclusive right to make copies of the expression and sell them to the public Simple procedure to register copyright U.S. copyright expires 70 years beyond the death of last surviving holder CSCE 201 - Farkas

Intellectual Property Copyright Does not cover the idea being expressed applies to original work and it must be in some tangible medium of expression Originality of work! CSCE 201 - Farkas

Fair Use The purchaser has the right to use the product in the manner for which it was intended and in a way that does not interfere with the author’s right. Piracy First sale Copyright infringement CSCE 201 - Farkas

Copyright for Digital Objects Digital Millennium Copyright Act Digital objects can be copyrighted It is a crime to circumvent or disable anti-piracy functionality It is a crime to manufacture, sell, or distribute devices that disable anti-piracy functionality or that copy digital objects Exempt: when used for educational and research purposes It is legal to make a backup to protect against loss Libraries can make three backups CSCE 201 - Farkas

Patents Protects inventions – results of science, technology, and engineering Requirement of novelty Truly novel and unique  only one patent for a given invention Non-obvious U.S. Patent and Trademark Office: register patent Patent attorney: verifies that the invention has not been patented and identifies similar inventions CSCE 201 - Farkas

Fun Funny Patnets http://www.totallyabsurd.com/realstuffarchive.htm http://www.freepatentsonline.com/crazy.html CSCE 201 - Farkas

Patent Infringement Copyright: holder can decide which violations prosecute Patent: all violations must be prosecuted or patent can be lost Suing for patent infringement may cause the patent owner to loose the paten. Infringer may argue that: This isn’t infringement (different inventions) The patent is invalid (a prior infringement was not opposed) The invention is not novel The infringer invented the object first CSCE 201 - Farkas

Trade Secret Information that gives one company a competitive edge over the others Must always be kept secret If someone obtains it improperly, the owner can recover Profits Damages Lost revenues Legal cost Reverse Engineering! CSCE 201 - Farkas

Computer Crime Least clear area of law in computing Separate category for computer crime No access to the physical object  Is it a serious crime? Rules of evidence  How to prove the authenticity? Threats to integrity and confidentiality  How to measure loss of privacy? Value of data  How to measure it? CSCE 201 - Farkas

Why Computer Crime is Hard to Prosecute? Lack of understanding Lack of physical evidence Lack of recognition of assets Lack of political impact Complexity of case Age of defendant CSCE 201 - Farkas

Laws for Computer Crime U.S. Computer Fraud and Abuse Act U.S. Economic Espionage Act U.S. Electronic Fund Transfer Act U.S. Freedom of Information Act U.S. Privacy Act U.S. Electronic Communication Privacy Act Gramm-Leach-Bliley Act HIPAA USA Patriot Act CAN SPAM Act CSCE 201 - Farkas

Ethical Issues Ethic: objectively defined standard of right and wrong Ultimately, each person is responsible for deciding what to do in a specific situation Ethical positions can and often do come into conflict CSCE 201 - Farkas

Ethics vs. Law Law Ethics Formal, written document Unwritten principles Interpreted by courts Interpreted by each individual Established by legislatures Presented by philosophers, religious, professional groups Applicable to everyone Personal choice Priority decided by court Priority determined by individual Court makes final decision No external decision maker Enforceable by police and courts Limited enforcement CSCE 201 - Farkas