Computer Errors, Failures, and Risks Dr. Kapatamoyo 9/9/14.

Slides:



Advertisements
Similar presentations
PRIVACY ACT OF 1974 OVERVIEW. FAIR INFORMATION PRACTICES The Privacy Act is primarily concerned with fair information practices. The Privacy Act is primarily.
Advertisements

Department of Defense FOIA Website Compliance March 6, 2008 Internet Requirements Internet Requirements.
Responding to Subpoenas and Law Enforcement Demands for PHI: An Overview Janet A. Newberg Chair, Health Law Section Felhaber Larson Fenlon & Vogt, P.A.
AN OVERVIEW OF DATA PROTECTION LAW IN THE GCC NICK OCONNELL, Senior Associate – TMT JUNE 2013.
Overview of the Privacy Act
Voter Registration and Privacy Barbara Simons. False Positives Financial Services Technology Consortium credit card fraud analysis –500,000 samples, 100,000.
HIPAA and Public Health 2007 Epi Rapid Response Team Conference.
Confidentiality and HIPAA
Introduction to Risk Management 26 September 2014 Peter Fowler CPPD.
CONSUMER CREDIT LEGISLATION Carl Johnson Financial Literacy Jenks High School.
C YBER S ECURITY FOR E DUCATIONAL L EADERS : A G UIDE TO U NDERSTANDING AND I MPLEMENTING T ECHNOLOGY P OLICIES Chapter 10 Privacy Policy © Routledge Richard.
Research Development for Android Coopman Tom. What is Android?  Smartphone operating system  Google  Popular  ‘Easy to develop’  Open-Source  Linux.
Writing Effective HIPAA Privacy and Security Policies and Procedures September 21, 2007 by Catherine Boerner, JD.
Introduction to the APPs and the OAIC’s regulatory approach Presented by: Este Darin-Cooper Director, Regulation and Strategy May 2015.
2/16/2010 The Family Educational Records and Privacy Act.
PRIVACY ACT Federal Workers’ Compensation Conference 2014 Department of Labor.
Duncan Woodhouse – Assistant Registrar for Information Security, Risk Management and Business Continuity Helen Wollerton – Administrative Officer (Legal.
Health and Safety Legislation
FAMILY EDUCATIONAL RIGHTS AND PRIVACY ACT Electronic Signatures This work is the intellectual property of the author. Permission is granted for this material.
Students with Disabilities Parentally Placed in Nonpublic Elementary or Secondary Schools VESID Special Education Services New York State Education Department.
Data Protection Paul Veysey & Bethan Walsh. Introduction Data Protection is about protecting people by responsibly managing their data in ways they expect.
Data Protection Act. Lesson Objectives To understand the data protection act.
Copyright : Hi Tech Criminal Justice, Raymond E. Foster Police Technology Police Technology Chapter Nine Police Technology External Systems.
Legal Aspects of Computer System Security “Security - Protecting Our Resources”
Privacy, Confidentiality and Duty to Warn in School Guidance Services March 2006 Disclaimer - While the information in these slides are designed to reflect.
Use Policies Deputy Attorney General Robert Morgester
1 Disclosures © HIPAA Pros 2002 All rights reserved.
Sunshine Center of the N.C. Open Government Coalition Feb. 27, 2015 NORTH CAROLINA SUNSHINE LAWS & GIS.
CSE/ISE 312 Privacy (Part 2). The Business and Social Sectors Marketing and personalization What we do ourselves Location tracking A right to be forgotten.
Copyright © Pearson Education, Inc. Publishing as Pearson Addison-Wesley Chapter 7: Computer Reliability Ethics for the Information Age Forth Edition by.
Computerized Networking of HIV Providers Workshop Data Security, Privacy and HIPAA: Focus on Privacy Joy L. Pritts, J.D. Assistant Research Professor Health.
Michael R. Costa, Esq., M.P.H. Greenberg Traurig, LLP One International Place, 3 rd Floor Boston, MA (fax)
New Arkansas Legislation The Wisdom of the 85 th General Assembly.
VOTER REGISTRATION 101 STATE BOARD OF ELECTIONS. VOTER REGISTRATION AND THE ELECTIONS PROCESS Voter Registration VoterCandidate Elected Official Petition.
Data Protection Act AS Module Heathcote Ch. 12.
Medical Law and Ethics, Third Edition Bonnie F. Fremgen Copyright ©2009 by Pearson Education, Inc. Upper Saddle River, New Jersey All rights reserved.
Chapter 22: Organization and Coordination of Counterterrorism Investigations.
FatMax Licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 2.5 LicenseCreative Commons Attribution-NonCommercial-ShareAlike 2.5.
Data Protection Act & Freedom of Information Simon Mansell Corporate Governance and Information Team.
Data Protection Corporate training Data Protection Act 1998 Replaces DPA 1994 EC directive 94/46/EC The Information Commissioner The courts.
PricewaterhouseCoopers 1 Administrative Simplification: Privacy Audioconference April 14, 2003 William R. Braithwaite, MD, PhD “Doctor HIPAA” HIPAA Today.
The Framework for Privacy Policies in the UK: Is telling people what information is gathered about them part of the framework? Does it need to be? Emma.
Record Keeping How should our data be handled? Katie Fore.
BTEC ICT Legal Issues Data Protection Act (1998) Computer Misuse Act (1990) Freedom of Information Act (2000)
Bosnia & Herzegovina Statistical Training Prosecution / Courts Session 4, November 22nd Overview of the Criminal Justice System and Statistics – Recording.
Criminal Justice-- Investigations Chapter 12—Due Process Rights of Suspects under 4 th & 5 th Amendments.
NJ DMV CHAPTER 10 WESTFIELD HIGH SCHOOL DRIVER EDUCATION
PROTECTION OF PERSONAL DATA. OECD GUIDELINES: BASIC PRINCIPLES OF NATIONAL APPLICATION Collection Limitation Principle There should be limits to the collection.
When Can You Redact Information Without Requesting an Attorney General Decision? Karen Hattaway Assistant Attorney General Open Records Division Views.
THE DATA PROTECTION ACT Data Protection Act 1998 DPA 1. Reasons2. People3. Principles 4. Exemptions 4 key points you need to learn/understand/revise.
Information Technology & Ethics. Impact The impact of IT on information and communication can be categorized into 4 groups: privacy, accuracy, property,
FDA job description  Regulates about 25% of all consumer purchases  Mission summary: protect and advance public health  Products: food, cosmetics, drugs,
Serving the Public. Regulating the Profession. CANADA’S ANTI-SPAM LEGISLATION (CASL) Training for Chapters Based on Guidelines for Chapters First published.
HIPAA Overview Why do we need a federal rule on privacy? Privacy is a fundamental right Privacy can be defined as the ability of the individual to determine.
Sharing Information (FERPA) FY07 REMS Initial Grantee Meeting December 5, 2007, San Diego, CA U.S. Department of Education, Office of Safe and Drug-Free.
FERPA for the Financial Aid Office NCASFAA Fall Conference November 2012.
GCSE ICT Data and you: The Data Protection Act. Loyalty cards Many companies use loyalty cards to encourage consumers to use their shops and services.
© University of Reading Lee Shailer 06 June 2016 Data Protection the basics.
Presented by Ms. Teki Akuetteh LLM (IT and Telecom Law) 16/07/2013Data Protection Act, 2012: A call for Action1.
HIPAA Training Workshop #3 Individual Rights Kaye L. Rankin Rankin Healthcare Consultants, Inc.
HIPAA Administrative Simplification
USA PATRIOT ACT WHAT DOES IT STAND FOR?.
The Division of Power The States and Interstate Relations
Data Protection Legislation
HIPAA Pros - Disclosures
The Data Protection Act & ICT Law
Election Code Public Information
General Data Protection Regulations 2018
Background checks are required by state and federal law prior to CA/DCYF staff authorizing an individual (other than a parent) to have unsupervised access.
Presentation transcript:

Computer Errors, Failures, and Risks Dr. Kapatamoyo 9/9/14

Douglas Adams  The major difference between a thing that might go wrong and a thing that cannot possibly go wrong is that when a thing that cannot possibly go wrong goes it usually turns out to be impossible to get at or repair.  Douglas Adams, Mostly Harmless (author of The Hitchhiker's Guide to the Galaxy)  Correlation doesn’t imply causation.  Usually a cop out. 2

Terminologies to Remember  Discussion is framed in  Data  Speed,  Size,  Scope, and  Reach 3

Errors are Inevitable 4

Why Axciom is keeping data? 5

Errors are Inevitable  Computer errors are inevitable.  Errors arise from:  Bad information fed into the computer;  User misinterpretation of the information;  Machine malfunction;  Sometimes a combination of all these.  Consequences may be trivial (nuisance value), costly (huge dollars), or even lead to death and injury. 6

NCIC 7

NCIC Records  National Crime Information Center (NCIC), Est. 1967:   Database has several millions of records related to stolen automobiles, missing persons, wanted persons, suspected terrorists, etc.  Some legal cases include:  Sheila Jackson Stossier, an airline attendant was confused for Shirley Jackson who was wanted in Texas and arrested in Louisiana.  Stolen ID of Michigan resident Terry Dean was used to obtain driver’s license in California. The real Terry was arrested 5 times in 14 months. LA City compensated him $55,000. 8

Privacy Act of 1974  “No agency shall disclose any record which is contained in a system of records by any means of communication to any person, or to another agency, except pursuant to a written request by, or with the prior written consent of, the individual to whom the record pertains....” 9

Privacy Act of 1974  Further provisions are:  Data records should be “ relevant and necessary ” to the purpose for which they are collected.  Establish procedures to allow individuals to see, copy and amend records about themselves.  Requires publishing notices describing all systems of records (no secret records).  Agency is required to make reasonable efforts to maintain accurate, relevant, timely and complete records about individuals.  Information collected for one purpose MAY NOT be used for another purpose without notice to or the consent of the subject of record. 10

Amended Privacy Act of 1974  Ted Bridis an Associated Press Writer (link)link  March 25, 2003, that The Justice Department lifted a requirement that the FBI ensure the accuracy and timeliness of information about criminals and crime victims before adding it to the country's most comprehensive law enforcement database.  The Privacy Act previously required the FBI to ensure information was " accurate, relevant, timely and complete " before it could be added to the system. 11

Direct Recording Electronic Voting Machines  Indian version 12

Direct Recording Electronic Voting Machines  US version 13

Direct Recording Electronic Voting  The Help America Vote Act of 2002 (HAVA) provides money to states to replace punch card voting systems and improve standards on administering elections. Led to the establishment of the Election Assistance Commission Help America Vote Act of 2002 Election Assistance Commission  DRE voting machines are certainly fast at counting votes, but have vulnerabilities.  DRE machines are widely used in India where 417 million people voted in 2009 parliamentary elections.  1.4 million EVMs in use throughout the country in  DRE machines have been banned in some countries, e.g. the Netherlands for fear of eavesdropping.  Zambia used EVMs from Israel for last 3 elections. 14

A Good Deal! 15

Another Good Deal! 16

When Computers are blamed 17

Market Micro Crash 18