CHAPTER 8 Legal, Privacy and Ethical Issues in Computer Security (c) by Syed Ardi Syed Yahya Kamal, UTM 2004 1.

Slides:



Advertisements
Similar presentations
Intellectual Property Protection – Critical Issues to Consider in Business Ventures John F. Letchford, Esquire Archer & Greiner, P.C.
Advertisements

Intellectual Property in the networked world. Overview  Copyright and copyleft  Patents  Licensing  Open Source Software.
Slides prepared by Cyndi Chie and Sarah Frye1 A Gift of Fire Third edition Sara Baase Chapter 4: Intellectual Property.
Legal and Ethical Issues in Computer Security
CS CS 5150: Software Engineering Lecture 5 Legal Aspects of Software Engineering 1.
Ownership of Computer Software Ethical Questions and Concerns.
Chapter 7.5 Intellectual Property Content, Law and Practice.
Computer Engineering 294 IP R.Smith 5/ Intellectual Property What is it? Why is it important? – What is it designed to do? What are its basic forms?
Chapter 14 Legal Aspects of Sport Marketing
Chapter 5 Intellectual Property & Internet Law
INTERNET and CODE OF CONDUCT
Professional Ethics for Computer Programmers
Chapter 9 – Legal, Privacy, and Ethical Issues in Computer Security  Program and data protection by patents, copyrights, and trademarks  Computer Crime.
Intellectual Property Rights and Computer Technology
K. Salah1 Legal, Privacy, & Ethical Issues. K. Salah2 Overview Human Controls Applicable to Computer Security The Basic Issues Computer Crime Privacy.
Copyright. US Constitution Article I – Section 8 Congress shall have the power to promote the Progress of Science and useful Arts, by securing for limited.
Characteristics of a Market Economy
MSE602 ENGINEERING INNOVATION MANAGEMENT
I DENTIFYING AND P ROTECTING I NTELLECTUAL P ROPERTY Tyson Benson
Legal and Ethical Issues in Computer Security Csilla Farkas
Legal and Ethical Issues. Major Topics Protecting Programs and Data Information and the Law Rights of Employees and Employers Software Failures Computer.
Legal and Ethical Issues in Computer Security
Introduction to IP Ellen Monson Director Intellectual Property Office University of Cincinnati.
Technology-Business-Legal Some Critical Intersections Getting Started Legally IP Protection Licensing Mark J. Sever, Jr., Esquire Deborah A. Hays, Esquire.
Intellectual Property Intellectual Property. Intellectual Property Intellectual effort, not by physical labor Intangible property Lawsuits involve infringement.
Copyright Basics. Intellectual Property Intellectual Property is a unique product or idea created by an individual or organization. Common types of protection.
Intellectual Property Rights and Internet Law, Social Media, and Privacy Chapter 8 & 9.
… concern the legal ownership and use of intellectual property, such as software, music, movies, data, and information. Links: Video: Too Much Copyright.
Chapter 08.  Describes property that is developed through an intellectual and creative process  Inventions, writings, trademarks that are a business’s.
The Legal Environment What laws and regulation apply to businesses?
Zheng Liu January 18, 2015 Intellectual Property Law For Startups.
Copyright Laws and Regulations Vocabulary Created by The University of North Texas in partnership with the Texas Education Agency.
TTS1133 : INTERNET ETHICS AND CYBER LAW
TMK 264: COMPUTER SECURITY
Ethical and Social...J.M.Kizza1 Module 5: Intellectual Property Rights and Computer Technology  Computer Products and Services  Instruments of Protection.
© 2007 West Legal Studies in Business, A Division of Thomson Learning Chapter 5 Intellectual Property.
PROTECTING YOUR IP RIGHTS Waldo Steyn, Senior Associate, Intellectual Property December 2012.
Intellectual Property Laws and Fair Use Guidelines for Educational Multimedia.
Intellectual Property (Quinn Chapter 4) CS4001 Kristin Marsicano.
Internet and Intellectual Property  University of Palestine  Eng. Wisam Zaqoot  Feb 2010 ITSS 4201 Internet Insurance and Information Hiding.
Copyright Laws and Regulations Vocabulary Copyright © Texas Education Agency, All rights reserved.
Trade Secrets Basics Victor H. Bouganim WCL, American University.
1.The Nature, Impact, and Issue of Information Technology 1.5Basic Legal Framework relating to the Use of IT.
Legal Issues Now that we have looked at ethics, some of these issues are also dealt by the law. We will consider laws in the following catagories: Intellectual.
Legal and Ethical Issues in Computer Security Csilla Farkas
Chap 11: Legal and Ethical Issues in Computer Security.
Fundamentals of Intellectual Property
CISB 412 Social and Professional Issues Understanding Intellectual Property.
Copyright, Intellectual Property, and Privacy 1 Lesson Plan: BMM A9-4.
©2002 by West Legal Studies in Business A Division of Thomson Learning Chapter 6 Business Torts, Intellectual Property and Cyberlaw.
Intellectual property (IP) refers to creations of the mind: inventions, literary and artistic works, music, movies, symbols, names, images, and designs.
MT311 – Business Law I Seminar Presentation UNIT 3 Criminal Law and Cyber Crimes I. Chapter 5, Intellectual Property and Internet Law II. Chapter 6, Criminal.
Slide 1 © 2013, Ian Tan TSC2211 Computer Security Slide 1 TSC2211 Computer Security Lecture 12 Legal Issues.
Technology Transfer Office
Intro to Intellectual Property 3.0
Introduction Intellectual property includes the application of property in the areas of trade secrets, patents, trademarks, and copyrights.
A Gift of Fire Third edition Sara Baase
INTELECTUAL PROPERTY RIGHTS
Legal and Ethical Issues in Computer Security
Week 13 - Monday CS363.
Intellectual Property Rights
Copyright Laws and Regulations
Ethical Use of Computers
Intellectual Property
Intellectual Property Patents, Trademarks and Copyrights
Chapter 2: Copyright Law in the Digital Age.
Chapter # 6 Intellectual Property
What are the types of intellectual property ?
Trademark, Patent, or Copyright?
Presentation transcript:

CHAPTER 8 Legal, Privacy and Ethical Issues in Computer Security (c) by Syed Ardi Syed Yahya Kamal, UTM

Objectives  Discuss program and data protection by patents, and trademarks  Discuss computer crime and its impact in our society  Describe the codes of professional ethics (c) by Syed Ardi Syed Yahya Kamal, UTM

Protecting Program and Data (c) by Syed Ardi Syed Yahya Kamal, UTM  Copyrights  Patents  Trade secrets  Protection for computer objects

Copyrights (c) by Syed Ardi Syed Yahya Kamal, UTM  Copyright are designed to protect the expression of idea.  Applies to creative work, such as story, photograph, song or pencil sketch.  The copyright must apply to an original work and must be in some tangible medium of expression (written, printed, recorded etc.).

Copyrights (cont) (c) by Syed Ardi Syed Yahya Kamal, UTM  Certain works are considered to be in public domain, owned by public, by no one in particular – song “Happy Birthday to You” or recipe for “Mee Goreng”.  The copyright law indicates that the copyrighted object is subject to fair use. A purchaser has the right to use the product in the manner for which it was intended and in a way that does not interfere with the author's rights  Unfair use of a copyrighted item is called piracy.  What the different of © or ®?

Copyrights (cont) (c) by Syed Ardi Syed Yahya Kamal, UTM  The Digital Millennium Copyright Act (CDMA) of 1998 clarified some issues of digital objects.  Digital objects can be subject to copyright.  It is a crime to circumvent or disable antipiracy functionality built into an object.  It is a crime to manufacture, sell, or distribute devices that disable antipiracy functionality or that copy digital objects.  However, these devices can be used (and manufactured, sold, or distributed) for research and educational purposes.  It is acceptable to make a backup copy of a digital object as a protection against hardware or software failure or to store copies in an archive.  Libraries can make up to three copies of a digital object for lending to other libraries.  Items protected – music files, graphics images, data in a database, computer programs.

Patents (c) by Syed Ardi Syed Yahya Kamal, UTM  Unlikely copyright, patents protect invention, tangible objects or ways to make them, not works of the mind.  Apply to the result of science, technology and engineering.  A patent is designed to protect the device or process for carrying out an idea, not the idea itself  Items protected – computer software, recognizing algorithms like processes and formulas.

Trade Secrets (c) by Syed Ardi Syed Yahya Kamal, UTM  Trade secrets is information that gives one company a competitive edge over others.  Example – formula for a soft drink, mailing list of customers or information about a product due to be announced in a few months.  Trade secret is easily discovered – reverse engineering.

Trade Secrets (cont) (c) by Syed Ardi Syed Yahya Kamal, UTM  In reverse engineering, one studies a finished object to determine how it is manufactured or how it works.  The difficulty with computer programs is that reverse engineering works – decompiler and disassembler programs can produce a source version of an executable program.

Protection of Computer Objects (c) by Syed Ardi Syed Yahya Kamal, UTM  Hardware such as chips, disk drives or floppy disk media can be patented.  Firmware such as code embedded in a chip can be protect by trade secret.  Copyright protection seems to appropriate to protect object code and source code for software.

(c) by Syed Ardi Syed Yahya Kamal, UTM CopyrightPatentTrade Secret ProtectsExpression of idea, not idea itself Inventionthe way something works A secret, competitive advantage Protected object made public Yes; intention is to promote publication Design filed at Patent Office No Requirement to distributeYesNo Ease of filingVery easy, do-it-yourselfVery complicated; specialist lawyer suggested No filing DurationLife of human originator plus 70 years, or total of 95 years for a company 19 yearsIndefinite Legal protectionSue if unauthorized copy sold Sue if invention copiedSue if secret improperly obtained Comparing Copyright, Patent, and Trade Secret Protection.

Information and the Law (c) by Syed Ardi Syed Yahya Kamal, UTM  why information is different from other commercial things?  Information Is Not Depletable  Information Can Be Replicated  Information Has a Minimal Marginal Cost  The Value of Information Is Often Time Dependent  Information Is Often Transferred Intangibly

Right of employee and the employer (c) by Syed Ardi Syed Yahya Kamal, UTM  Employers hire employees to generate ideas and make products  Ownership is a computer security concern because it relates to the rights of an employer to protect the secrecy and integrity of works produced by the employees.  Ownership of a Patent -If an employee lets an employer patent an invention, the employer is deemed to own the patent and therefore the rights to the invention.  Ownership of a Copyright- special situation known as work for hire applies to many copyrights for developing software or other products.

Work for Hire (c) by Syed Ardi Syed Yahya Kamal, UTM  In a work for hire situation, the employer, not the employee, is considered the author of a work Licenses  An alternative to a work for hire arrangement is licensed software-the programmer develops and retains full ownership of the software. In return for a fee, the programmer grants to a company a license to use the program.

Why Computer Crime Is Hard to Prosecute (c) by Syed Ardi Syed Yahya Kamal, UTM  Lack of understanding.  Lack of physical evidence.  Lack of recognition assets.  Lack of political impact.  Complexity of case.  Juveniles.

Why Computer Criminals Are Hard to Catch (c) by Syed Ardi Syed Yahya Kamal, UTM  As if computer crime laws and prosecution were not enough, it is also difficult for law enforcement agencies to catch computer criminals. There are two major reasons for this.  computer crime is a multinational activity that must usually be pursued on a national or local leve  Complexity is an even more significant factor than country of origin

Privacy (c) by Syed Ardi Syed Yahya Kamal, UTM  Information privacy has three aspects: sensitive data, affected parties, and controlled disclosure  Privacy is controlled disclosure: The subject chooses what personal data to give out and to whom.  After disclosing something, a subject relinquishes much control to the receiver.  What data are sensitive is at the discretion of the subject; people consider different things sensitive. Why a person considers something sensitive is less important than that it is.  Individuals, informal groups, and formal organizations all have things they consider private.  Privacy has a cost; choosing not to give out certain data may limit other benefits.

Differences Between the Law and Ethics (c) by Syed Ardi Syed Yahya Kamal, UTM  An ethic is different from a law in several important ways.  First, laws apply to everyone: One may disagree with the intent or the meaning of a law, but that is not an excuse for disobeying the law.  Second, the courts have a regular process for determining which law supersedes which if two laws conflict.  Third, the laws and the courts identify certain actions as right and others as wrong. From a legal standpoint, anything that is not illegal is right.  Finally, laws can be enforced to rectify wrongs done by unlawful behavior. Ethical Issues in Computer Security

(c) by Syed Ardi Syed Yahya Kamal, UTM LawEthics Described by formal, written documentsDescribed by unwritten principles Interpreted by courtsInterpreted by each individual Established by legislatures representing all people Presented by philosophers, religions, professional groups Applicable to everyonePersonal choice Priority determined by courts if two laws conflict Priority determined by an individual if two principles conflict Court is final arbiter of "right"No external arbiter Enforceable by police and courtsLimited enforcement Contrast of Law vs. Ethics.