Legal and Ethical Issues

Slides:



Advertisements
Similar presentations
Data Protection.
Advertisements

Christian Vargas. Also known as Data Privacy or Data Protection Is the relationship between collection and spreading or exposing data and information.
Data Retention LIS 550 Winter 2010 Unsworth Tuesday, March 02, 2010.
1 The Engineer as a Professional Privacy. 2 After reading the articles please answer the following questions. 1) Is privacy a concern that engineers have.
Privacy in Computing Legal & Ethical Issues in Computer …Security Information Security Management …and Security Controls Week-9.
Class 13 Internet Privacy Law European Privacy.
Data Protection Paul Veysey & Bethan Walsh. Introduction Data Protection is about protecting people by responsibly managing their data in ways they expect.
Personal Data (Privacy) Ordinance Hong Kong Personal Data (Privacy) Ordinance Hong Kong by Stephen Lau Privacy Commissioner for Personal Data Hong Kong.
Data Protection Overview
How It Applies In A Virtual World
2 Private versus public. 2 Lesson objectives By the end of the session, you will: understand how you might unintentionally disclose personal data; define.
1 AQA ICT AS Level © Nelson Thornes Data Protection Act.
Health & Social Care Apprenticeships & Diploma
An Educational Computer Based Training Program CBTCBT.
Elma Graham. To understand what data protection is To reflect on how data protection affects you To consider how you would safeguard the data of others.
Component 4: Introduction to Information and Computer Science Unit 2: Internet and the World Wide Web 1 Component 4/Unit 2Health IT Workforce Curriculum.
Created by, Author Name, School Name—State FLUENCY WITH INFORMATION TECNOLOGY Skills, Concepts, and Capabilities.
7-Oct-15 Threat on personal data Let the user be aware Privacy and protection.
OCR Nationals Level 3 Unit 3.  To understand how the Data Protection Act 1998 relates to the data you will be collecting, storing and processing  To.
Privacy in computing Material/text on the slides from Chapter 10 Textbook: Pfleeger.
Data Protection Act AS Module Heathcote Ch. 12.
Lesson Title: Privacy Overview Dale R. Thompson Computer Science and Computer Engineering Dept. University of Arkansas 1 This.
DATA PROTECTION & FREEDOM OF INFORMATION. What is the difference between Data Protection & Freedom of Information? The Data Protection Act allows you.
1 Ethical Issues in Computer Science CSCI 328, Fall 2013 Session 15 Privacy as a Value.
The Data Protection Act What Data is Held on Individuals? By institutions: –Criminal information, –Educational information; –Medical Information;
Why the Data Protection Act was brought in  The 1998 Data Protection Act was passed by Parliament to control the way information is handled and to give.
BTEC ICT Legal Issues Data Protection Act (1998) Computer Misuse Act (1990) Freedom of Information Act (2000)
Legal issues The Data Protection Act Legal issues What the Act covers The misuse of personal data By organizations and businesses.
Data protection This means ensuring that stored data does not get changed, removed or accessed accidentally or by unauthorised people. Data can be corrupted,
Ethical and Legal Issues Information Systems 337 Prof. Harry Plantinga.
THE DATA PROTECTION ACT Data Protection Act 1998 DPA 1. Reasons2. People3. Principles 4. Exemptions 4 key points you need to learn/understand/revise.
Information Systems Unit 3.
Does It Matter Who Has Your Data? 1.Intro 2.Teach 1: Travel Safety Rules 3.Teach 2: How to Protect Your Data 4.Wrap-Up 5.Assessment 6.Extension Activity.
LEFIS ROVANIEMI MEETING 19TH 20TH JANUARY 2007 Privacy In The Web TATYANA STEFANOVA LEX.BG BULGARIA.
Computer Laws Data Protection Act 1998 Computer Misuse Act 1990.
Data Protection and research Rachael Maguire Records Manager.
GCSE ICT Data and you: The Data Protection Act. Loyalty cards Many companies use loyalty cards to encourage consumers to use their shops and services.
Yes, it’s the holidays... A time of joy, a time of good cheer, a time of celebration... From the Office of the Chief Human Capital Officer (CHCO ) Privacy.
Data protection act. During the second half of the 20th century, businesses, organisations and the government began using computers to store information.
The Data Protection Act 1998
The Data Protection Act 1998
Chapter 9 e-Commerce Systems.
Data Protection GCSE ICT Mrs N Steventon-2005.
Big Data Considerations
"Our vision is to be earth's most customer-centric company; to build a place where people can come to find and discover anything they might want to buy.
Data Protection: The Law
SETTING UP OF E-COMMERCE WEBSITE
Computer Literacy – Grade 8
Legislation in ICT.
Data Protection Act.
Data Protection The Current Regime
The Data Protection Act 1998
Data Protection Legislation
Suffolk Public Schools
Evaluating Web Resources
Data Protection & Freedom of Information- An Introduction
Component 4: Introduction to Information and Computer Science Unit 2: Internet and the World Wide Web Lecture 4 This material was developed by Oregon.
Big Data Considerations
Computers and the Internet
The Data Protection Act & ICT Law
Current Privacy Issues That May Affect Your Credit Union
Google Privacy Policy Karen Tao.
Computer Programming I
Computer Literacy – Grade 8
Privacy Act 1993 EIT, Author Gay Robertson, 2017.
The activity of Art. 29. Working Party György Halmos
Legislation in ICT.
ENDANGERED ANIMALS A RESEARCH PROJECT
Being Aware of What You Share
Founded in 2002, Credit Abuse Resistance Education (CARE) educates high school and college students on the responsible use of credit and other fundamentals.
Presentation transcript:

Legal and Ethical Issues Information Systems 337 Prof. Harry Plantinga Legal and Ethical Issues

Question Is it legal and ethical to promote your site with mass emailings?

CAN SPAM act Requirements of mass emails: Exemptions Accurate from line & other headers Subject line is not deceptive Accurate physical address Message may not be sent through open relay Message may not use harvested email addrs A way to opt out with single click or web page Exemptions Religious messages Political messages National security messages Was rushed through congress just before California passed a tougher state law; it supersedes state laws Less htan 1% of spam complies Rarely enforced

Privacy policies Are you required by law to have a privacy policy?

Privacy policies California requires commercial websites that collect personally identifiable information to post a privacy policy. It must Identify the categories of personally identifiable information that are collected Describe how consumers can review and make changes Describe how consumers can learn of changes in the policy Identify the effective date of the policy Actually, this law was a cop-out

Privacy policy tips If you do business in California, make it legal in CA Make it easy to read Abide by it! It can be enforced by the FTC (see Wikipedia article on e-commerce) You’ll need a privacy policy for your term project.

Privacy policy tool Here's an online tool to create a privacy policy Create one for your term project website

Cookie Consent Law May, 2011 European Union directive: Let users know if a website is using cookies Explain what data is gathered and how used Gather user consent to the use of cookies Who does the law apply to? Any person or organization that is physically in the EU and has a website Any website that targets EU consumers Does your website use cookies?

Ethical issues What ethical and legal issues arise in running a website? Is there a Christian perspective?

Why do you run your site? Jesus' fundamental ethical principles: Love God above all, love your neighbor as yourself You can do that by serving others with your site You have been entrusted with readers' attention. Do something useful with it!

Ethics of SEO Is it ethical to buy links in order to get a better SEO ranking?

Ethics of SEO Is it ethical to buy links in order to get a better SEO ranking? What will the effect be on effectiveness of search by Google users? This is a hotly-debated issue. It's against Google's rules; if you are caught you will be penalized by Google

Ethics of SEO Is it ethical to target particular keywords and modify your web pages to get better search results?

Ethics of SEO Is it ethical to target particular keywords and modify your web pages to get better search results? Are you trying to improve the web?

Advertising Is it ethical to have advertising on your site? How does advertising affect your site? Is it a win for users as well as you? What kinds of advertising should you use? How about targeted advertising based on user browsing history, etc?

Guestbook Is it ethical to keep a guestbook at CCEL? What if people sign from a country where Christianity is illegal?

Ethics of storing data Is it ethical to keep access logs? Who might want access? What harm could be done? Why are you keeping the log? Is it ethical to store user names, addresses, credit card numbers, passwords, health problems, etc? What ethical considerations apply to storing user data?

Ethics of mining data Is it ethical to use data gathered on a website like Hymnary.org to Improve website performance? Give users results they are more likely to want? Provide more relevant advertising? Sell to personal information aggregators, to pay for the site?

Ethics of mining data Case study: Target

Ethics of using data Suppose a CIT employee happened to see an email you wrote (in the process of normal system administration) that gave evidence you had committed a crime or broken a rule. Should she report it to anyone? So, any overall principles in the ethical use of data?

Code of Fair Info Practices There must be no personal data record-keeping systems whose very existence is secret. There must be a way for a person to find out what information about the person is in a record and how it is used. There must be a way for a person to prevent information about the person that was obtained for one purpose from being used or made available for other purposes without the person's consent. There must be a way for a person to correct or amend a record of identifiable information about the person. Any organization creating, maintaining, using, or disseminating records of identifiable personal data must assure the reliability of the data for their intended use and must take precautions to prevent misuses of the data. The Code of Fair Information Practices was the central contribution of the HEW (Health, Education, Welfare) Advisory Committee on Automated Data Systems. The Advisory Committe was established in 1972, and the report released in July. The citation for the report is as follows: U.S. Dep't. of Health, Education and Welfare, Secretary's Advisory Committee on Automated Personal Data Systems, Records, computers, and the Rights of Citizens viii (1973).

Additions to the Code Three other principles might be added from the ACM Code of Ethics: Only the necessary information should be collected Data retention and disposal periods should be implemented User data observed during normal system maintenance must be treated with confidentiality unless you are required to reveal it by law or organzational rules

Status of the Code Created by the HEW (Health, Education, Welfare) Advisory Committee on Automated Data Systems in 1972 Not legally binding Some of its principals were adopted in laws governing data in particular areas: financial data medical records

Examples Is it ethical for a library online catalog to show most popular search results first? Is it ethical for a store to ask for your rewards card or phone number when you make a purchase?