Lecture 11 Legal and Ethical Aspects

Slides:



Advertisements
Similar presentations
Confidentiality and HIPAA
Advertisements

HIPAA Privacy Rule Training
HIPAA PRIVACY REQUIREMENTS Dana L. Thrasher Constangy, Brooks & Smith, LLC (205) ; Victoria Nemerson.
Principles of Information Security, 3rd Edition2 Introduction  You must understand scope of an organization’s legal and ethical responsibilities  To.
Legal, Ethical, and Professional Issues in Information Security
Understanding Business Ethics
Legal, Ethical, and Professional Issues In Information Security.
For Students. What is Copyright? “The exclusive right to produce or reproduce (copy), to perform in public, or to publish an original literary or artistic.
Chapter 9 Information Systems Controls for System Reliability— Part 2: Confidentiality and Privacy Copyright © 2012 Pearson Education, Inc. publishing.
Spring 2010 Marco Valtorta CSCE 390 Professional Issues in Computer Science and Engineering Privacy Concerns (Chapters [B]) Spring.
INTERNET and CODE OF CONDUCT
HIPAA Health Insurance Portability & Accountability Act of 1996.
Administrative Agencies Chapter 4. Copyright © 2007 Thomson Delmar Learning Objectives Identify executive-branch agencies. Explain that administrative.
Chapter Two Ethical & Legal Issues.
24 Legal and Ethical Considerations. 24 Legal and Ethical Considerations.
Describe ethical considerations resulting from technological advances.
Principles of Information Security, Fourth Edition
Information Systems Today, 2/C/e ©2008 Pearson Education Canada 9-1 ACS 1803 Lecture Outline 15 ETHICS AND COMPUTER CRIME.
Privacy Law for Network Administrators Steven Penney Faculty of Law University of New Brunswick.
HIPAA PRIVACY AND SECURITY AWARENESS.
Ethical and Legal Issues v Ethical and legal issues are relevant to any project involving systems development. – privacy – professionalism – ownership.
Chinese Foreign Trade Law Jiaxiang Hu Professor of Law, School of Law, SJTU.
Risk Assessment. InfoSec and Legal Aspects Risk assessment Laws governing InfoSec Privacy.
Principles of Information Security, 2nd Edition2 Introduction  You must understand scope of an organization’s legal and ethical responsibilities  To.
Part 6 – Special Legal Rights and Relationships Chapter 35 – Privacy Law Prepared by Michael Bozzo, Mohawk College © 2015 McGraw-Hill Ryerson Limited 34-1.
Chapter 7: IT Ethcs Courtney Littlejohn CSCI 101 Thursday 3:30.
Lecture 11: Law and Ethics
Principles of Information Security, 2nd Edition2  Use this chapter as a guide for future reference on laws, regulations, and professional organizations.
Medical Law and Ethics, Third Edition Bonnie F. Fremgen Copyright ©2009 by Pearson Education, Inc. Upper Saddle River, New Jersey All rights reserved.
Health Insurance Portability and Accountability Act of 1996 HIPAA Privacy Training for County Employees.
The Data Protection Act What Data is Held on Individuals? By institutions: –Criminal information, –Educational information; –Medical Information;
COMPUTER ETHICS. Computer Ethics n What is ethical behavior? n How do we make ethical decisions? n Matherial from Ethical Decision Making and Information.
Copyright ©2014 by Saunders, an imprint of Elsevier Inc. All rights reserved 1 Chapter 02 Compliance, Privacy, Fraud, and Abuse in Insurance Billing Insurance.
Computer Forensics Law & Privacy © Joe Cleetus Concurrent Engineering Research Center, Lane Dept of Computer Science and Engineering, WVU.
CRIMES Used by permission. For Educational purposes only.
PROTECTION OF PERSONAL DATA. OECD GUIDELINES: BASIC PRINCIPLES OF NATIONAL APPLICATION Collection Limitation Principle There should be limits to the collection.
Court Systems and Practices. Copyright © Texas Education Agency All rights reserved. Images and other multimedia content used with permission. 2.
Principles of LPSCS. Copyright © Texas Education Agency All rights reserved. Images and other multimedia content used with permission. Copyright.
Information Security Legislation Moving ahead Information Security 2001 Professional Information Security Association Sin Chung Kai Legislative Councillor.
Copyright © 2015 by Saunders, an imprint of Elsevier Inc. All rights reserved. Chapter 3 Privacy, Confidentiality, and Security.
ALABAMA TECHNOLGY STANDARDS FOR TEACHERS Ethical Issues of Technology Presented by: Shirley Johnson & Keisha D. Smith.
Intellectual Property. Confidential Information Duty not to disclose confidential information about a business that would cause harm to the business or.
Data Ethics Levette Williams Associate Superintendent Technology Services Brad Bryant, State Superintendent of Schools “We will lead the nation in improving.
COMPUTER ETHICS AND LEGAL ISSUES
Chapter 4: Laws, Regulations, and Compliance
 Health Insurance and Accountability Act Cornelius Villalon Jr.
The Health Insurance Portability and Accountability Act of 1996 “HIPAA” Public Law
Karly Stinedurf.  What is Ethics?  The Ten Commandments of Computer Ethics  Frameworks/Standards of Ethics  Ethics and Education  Deterring Unethical.
CHAPTER SIXTEEN The Right to Privacy and Other Protections from Employer Intrusions.
Law and Ethics INFORMATION SECURITY MANAGEMENT
Legal Aspects of Nursing
HIPAA Privacy Rule Training
Privacy and the Law.
Legal and Ethical Dimensions of Sport Public Relations
MGMT 452 Corporate Social Responsibility
Legal and Ethical Responsibilities
CHAPTER 4 LEGAL AND ETHICAL PRINCIPLES
Chapter 10 Cyberlaw, Social Media, and Privacy
What is HIPAA? HIPAA stands for “Health Insurance Portability & Accountability Act” It was an Act of Congress passed into law in HEALTH INSURANCE.
CHAPTER 4 LEGAL AND ETHICAL PRINCIPLES
Providing Access to Your Data: Handling sensitive data
The Legal System and Ethics in Information Security
Privileged Information: Confidentiality and Disclosure
ETHICAL & SOCIAL IMPACT OF INFORMATION SYSTEMS
NAVAJO LAW SEMINAR October 14, 2016
The Health Insurance Portability and Accountability Act
Computer Ethics.
Chapter 43 Administrative Law and Regulatory Agencies
Presentation transcript:

Lecture 11 Legal and Ethical Aspects King Fahd University of Petroleum & Minerals College of Computer Science & Engineering SEC511 Principles of Information Assurance and Security Lecture 11 Legal and Ethical Aspects These slides are based on: Chapter 3: Principles of Information Security, Michael Whittman. Saudi ACCL Document.

Introduction To reduce all losses from legal action, information security professionals must thoroughly: Understand the current legal environment, Stay current with laws and regulations, and Watch for new and emerging issues. In the modern litigious societies of the world, laws are enforced in civil courts: Where large damages can be awarded. Educating the employees on their legal and ethical obligations can help keep an organization focused on its primary objectives.

Laws Vs Ethics Laws: rules that mandate or prohibit certain societal behavior Ethics: define socially acceptable behavior Ethics are based on cultural mores: the fixed moral attitudes or customs of a particular group. Some ethical standards are universal: Murder Theft Assault The difference: Laws carry sanctions of a governing authority; ethics do not

Organizational Liability What if an organization does not demand or even encourage strong ethical behavior from its employees? Even if there is no breach of criminal law, there can still be liability. Liability is the legal obligation of an entity to make restitution. Restitution is to compensate for wrongs committed

Organizational Liability If an employee, acting with or without the authorization of the employer, performs an illegal or unethical act, the employer can be held financially liable for that action. An organization increases its liability if it refuses to take measures known as due care. Due care standards are met when an organization makes sure that every employee: knows what is acceptable or unacceptable behavior, and knows the consequences of illegal or unethical actions Due diligence requires that an organization make a valid effort to protect others and continually maintains this level of effort

Policy Vs Law Information security professionals help maintain security via the establishment and enforcement of policies within the organization. Policies are guidelines that describe acceptable and unacceptable employee behaviors in the workplace Policies function as organizational laws, complete with: Penalties, Judicial practices, and Sanctions to require compliance The difference between a policy and a law is that ignorance of a policy is an acceptable defense.

Policy Vs Law For a policy to become enforceable, it must meet the following five criteria: Dissemination (distribution): Demonstrate that the relevant policy has been made readily available for review by the employee. Review (reading): Demonstrate that it disseminated the document in an intelligible form, versions in every required language Comprehension (understanding): Demonstrate that the employee understood the requirements and content of the policy (quizzes and other assessments) Compliance (agreement): Demonstrate that the employee agreed to comply with the policy through act or affirmation. Uniform enforcement: Demonstrate that the policy has been uniformly enforced, regardless of employee status or assignment.

US Computer Crime Laws United States is a leader in the development and implementation of information security legislation. This contributes to a more reliable business environment, which in turn, enables a stable economy. The Computer Fraud and Abuse Act of 1986 (CFA Act) is the cornerstone of many computer-related federal laws and enforcement efforts. The punishment for offenses prosecuted under this statute varies from fines to imprisonment up to 20 years. The severity of the penalty depends on the value of the information obtained and whether the offense is judged to have been committed: For purposes of commercial advantage For private financial gain In furtherance of a criminal act

Privacy Privacy has become one of the hottest topics in information security Many organizations are collecting, swapping, and selling personal information as a commodity: The ability to collect information, combine facts from separate sources, and merge it all with other information has resulted in databases of information. In response to the pressure for privacy protection, the number of regulations addressing an individual’s right to privacy has grown. Note: Privacy in this context is not absolute freedom from observation, but rather is a more precise “state of being free from unsanctioned intrusion.”

Privacy of Customer Information Some US regulations state that: Any proprietary information shall be used explicitly for providing services, and not for any marketing purposes, Carriers cannot disclose this information except when necessary to provide their services. The only other exception is when a customer requests the disclosure of information Then the disclosure is restricted to that customer’s information only.

Privacy and Government Agencies Federal Privacy Act of 1974 regulates government agencies and holds them accountable if they release private information about individuals or businesses without permission. The following agencies and individuals are exempt from some of the regulations so that they can perform their duties: Bureau of the Census National Archives and Records Administration Congress Comptroller General Federal courts with regard to specific issues using appropriate court orders Credit reporting agencies

Privacy of Communications The Electronic Communications Privacy Act of 1986 is a collection of statutes that regulates the interception of wire, electronic, and oral communications. These statutes work in conjunction with the Fourth Amendment of the U.S. Constitution, which protects individuals from unlawful search and seizure.

Privacy of Health Information The Health Insurance Portability and Accountability Act Of 1996 (HIPAA) protects the confidentiality and security of health care data This is by establishing and enforcing standards and by standardizing electronic data interchange. HIPAA affects all health care organizations: doctors’ practices, health clinics, life insurers, universities, HIPAA specifies stiff penalties for organizations that fail to comply with the law, with fines up to $250,000 and/or 10 years imprisonment for knowingly misusing client information

Identity Theft Identity theft: occurs when someone uses your personally identifying information, like your name, Social Security number, or credit card number, without your permission, to commit fraud or other crimes. The primary legislation is the Fraud and Related Activity in Connection with Identification Documents, Authentication Features, and Information: Criminalizes creation, reproduction, transfer, possession, or use of unauthorized or false identification documents. The penalties for such offenses range from 1 to 25 years in prison, and fines as determined by the courts.

Export and Espionage Laws To protect trade secrets and other state and private assets, several laws restrict which information and information management and security resources may be exported from the United States. These laws attempt to stem the theft of information by establishing strong penalties for these crimes. The Congress passed the Economic Espionage Act in 1996 to protect: American ingenuity, Intellectual property, and Competitive advantage

US Copyright Law Intellectual property is a protected asset in the United States. The U.S. copyright laws extend this privilege to the published word, including electronic formats. Fair use allows copyrighted materials to be used to support news reporting, teaching, scholarship, and a number of similar activities: as long as the use is for educational or library purposes, is not for profit, and is not excessive. As long as proper acknowledgement is provided to the original author (citation), it is entirely permissible to include portions of someone else’s work as reference.

International Laws and Legal Bodies When an organization does business on the Internet, it is doing business globally. As a result, IT professionals must be sensitive to the laws and ethical values of many different countries. A number of international security bodies and laws exist: European Council Cyber-Crime Convention Digital Millennium Copyright Act (DMCA) United Nations Charter However: Because of the political complexities of the relationships among nations and the differences in culture, there are currently few international laws relating to privacy and information security. The international laws are important, but are limited in their enforceability.

Ethics and Information Security Many Professional groups have explicit rules governing ethical behavior in the workplace: Doctors, Lawyers Those who commit violations can be removed from practice. The information technology field in general, and the information security field in particular, do not have a binding code of conduct.

The 10 Commandments of Computer Ethics From The Computer Ethics Institute Thou shalt not use a computer to harm other people. Thou shalt not interfere with other people’s computer work. Thou shalt not snoop around in other people’s computer files. Thou shalt not use a computer to steal. Thou shalt not use a computer to bear false witness. Thou shalt not copy or use proprietary software for which you have not paid. Thou shalt not use other people’s computer resources without authorization or proper compensation. Thou shalt not appropriate other people’s intellectual output. Thou shalt think about the social consequences of the program you are writing or the system you are designing. Thou shalt always use a computer in ways that ensure consideration and respect for your fellow humans.

Deterring Unethical and Illegal Behavior There are three general causes of unethical and illegal behavior: Ignorance: Ignorance of the law is no excuse; Ignorance of policy and procedures is. The first method of deterrence is education. Accident: Individuals with authorization and privileges may cause harm or damage by accident. Careful planning and control helps prevent accidents Intent: Criminal or unethical intent goes to the state of mind of the person performing the act; It is often necessary to establish criminal intent to successfully prosecute offenders. Protecting against intentional damage is best accomplished by technical controls, and vigorous litigation or prosecution if these controls fail.

Deterring Unethical and Illegal Behavior Whatever the cause, it is the responsibility of information security personnel to deter these acts. Because of human nature, laws and policies and their associated penalties only deter if three conditions are present: Fear of penalty: Threats of informal reprimand or verbal warnings may not have the same impact as the threat of imprisonment or forfeiture of pay. Probability of being caught: Potential offenders must believe there is a strong possibility of being caught. Probability of penalty being administered: Potential offenders must believe that the penalty will in fact be administered.

Saudi Laws Related to Security Anti-Cyber Crime Law Royal Decree No. M/17 8 Rabi 1 1428 / 26 March 2007 First Edition 2009. Electronic Transactions Regulation, Royal Decree No. M/18 of 8th Rabi Awal 1428 Hejri corresponding to 26th March 2007 Gregorian. Saudi Arabia has ratified the Berne Convention for the Protection of Literary and Artistic Works of 1886, revised in Paris on 24th July 1971 and the Paris Convention for the Protection of Industrial Property of 1883, both with effect from 11th March 2004. Regulations for the Protection of Confidential Commercial Information, June 8, 2005 (لائحة حماية المعلومات التجارية السرية)

The end Reading: Whitman, Chapter 3. Saudi ACCL Document