Introduction to Computer Ethics: Privacy Text: George Reynolds, Ethics in Information Technology, Thomson Course Technology, Second Edition, 2006.

Slides:



Advertisements
Similar presentations
Chapter 27 Your Credit and the Law pp Learning Objectives 1.Explain 1.Explain how government protects credit rights. 2. Name 2. Name federal.
Advertisements

Ethics in Information Technology, Fourth Edition
Chapter 4 Privacy.
Ethics in Information Technology, Second Edition Updates by Carlotta Eaton, NRCC.
1 Identity Theft and Phishing: What You Need to Know.
BEWARE! IDENTITY THEFT CARL JOHNSON FINANCIAL LITERACY JENKS HIGH CSHOOL.
RMG:Red Flags Rule 1 Regal Medical Group Red Flags Rule Identify Theft Training.
Identity Theft Someone steals your personal information for his/her own gain It’s a crime!
© 2014 wheresjenny.com Cyber crime CYBER CRIME. © 2014 wheresjenny.com Cyber crime Vocabulary Defacement : An attack on a website that changes the visual.
What is identity theft, and how can you protect yourself from it?
1 Identity Theft: What You Need to Know. 2 Identity Theft Identity theft is a crime of stealing key pieces of someone’s identifying information, such.
Greg Lamb. Introduction It is clear that we as consumers and entrepreneurs cannot expect complete privacy when discussing business matters. However… There.
Ethics in Information Technology, Second Edition
Ethics in Information Technology Privacy Ethics in Information Technology N. Mlambo 2012.
Insights on the Legal Landscape for Data Privacy in Higher Education Rodney Petersen, J.D. Government Relations Officer and Security Task Force Coordinator.
MIS PERSONAL, LEGAL, ETHICAL, AND ORGANIZATIONAL ISSUES OF INFORMATION SYSTEMS CHAPTER 4 Hossein BIDGOLI Phishing that bites Paying for Privacy Pirates.
Holley Myers CSCI101 Lab Lecture Thursday 2:00 10/25/07.
This work is supported by the National Science Foundation under Grant Number DUE Any opinions, findings and conclusions or recommendations expressed.
© Oklahoma State Department of Education. All rights reserved. 1 Beware! Consumer Fraud Standard 9. 1 Fraud and Identity Theft.
Scams and Schemes. Today’s Objective I can understand what identity theft is and why it is important to guard against it, I can recognize strategies that.
BTT12OI.  Do you know someone who has been scammed? What happened?  Been tricked into sending someone else money (not who they thought they were) 
DIGITAL CITIZENSHIP 6 TH – 8 TH UNIT 1 LESSON 3 SCAMS & SCHEMES What is identity theft, and how can you protect yourself from it?
CJ © 2011 Cengage Learning Chapter 17 Cyber Crime and The Future of Criminal Justice.
MIS PERSONAL, LEGAL, ETHICAL, AND ORGANIZATIONAL ISSUES OF INFORMATION SYSTEMS CHAPTER 4 LO1 Describe information technologies that could be used in computer.
COMPUTER CRIME AND TYPES OF CRIME Prepared by: NURUL FATIHAH BT ANAS.
CONSUMER PROTECTION AND LITIGATION: CONSUMER PROTECTION AND LITIGATION: Ryan Mehm Attorney Bureau of Consumer Protection Federal Trade Commission The views.
Chapter 11 Security and Privacy: Computers and the Internet.
PHISHING AND SPAM INTRODUCTION There’s a good chance that in the past week you have received at least one that pretends to be from your bank,
© 2011 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license.
Scams & Schemes Common Sense Media.
Slides prepared by Cyndi Chie and Sarah Frye1 A Gift of Fire Third edition Sara Baase Chapter 2: Privacy.
Component 4: Introduction to Information and Computer Science Unit 2: Internet and the World Wide Web 1 Component 4/Unit 2Health IT Workforce Curriculum.
7-Oct-15 Threat on personal data Let the user be aware Privacy and protection.
Ethics in Information Technology, Second Edition 1 Computer & Society Week 5 Marwan Al-Namari.
Slides prepared by Cyndi Chie and Sarah Frye1 A Gift of Fire Third edition Sara Baase Chapter 2: Privacy.
Computer and Internet privacy (2) University of Palestine University of Palestine Eng. Wisam Zaqoot Eng. Wisam Zaqoot Feb 2011 Feb 2011 ITSS 4201 Internet.
IDENTITY THEFT. Illegally obtaining personal information such as name, social security, drivers license, or mothers maiden name, address, bank/credit.
 A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your wishes. It is deliberately.
BTT12OI.  Do you know someone who has been scammed online? What happened?  Been tricked into sending someone else money (not who they thought they were)
COPYRIGHT © 2011 South-Western/Cengage Learning. 1 Click your mouse anywhere on the screen to advance the text in each slide. After the starburst appears,
Protecting Privacy “Most people have figured out by now you can’t do anything on the Web without leaving a record” - Holman W. Jenkins, Jr
About Phishing Phishing is a criminal activity using social engineering techniques.criminalsocial engineering Phishers attempt to fraudulently acquire.
SCAMS & SCHEMES PROTECTING YOUR IDENTITY. SCAMS WHAT IS A SCAM? ATTEMPT TO TRICK SOMEONE, USUALLY WITH THE INTENTION OF STEALING MONEY OR PRIVATE INFORMATION.
Protecting Yourself from Fraud including Identity Theft Advanced Level.
 Make a list of things you did today. From the time you got up until now.  Who you talked to? How you communicated?  What you did before you came to.
Protecting Yourself from Fraud including Identity Theft Personal Finance.
Cyberlaw. “The moving finger writes; and, having writ Moves on: nor all thy piety nor wit Shall lure it back to cancel half a line. Nor all thy tears.
Identity Theft PD Identity Theft Identity theft is a serious crime which can: Cost you time and money Destroy your.
1 Law, Ethical Impacts, and Internet Security. 2 Legal Issues vs. Ethical Issues Ethics — the branch of philosophy that deals with what is considered.
Protecting Yourself from Fraud including Identity Theft Advanced Level.
WHAT IS IDENTITY THEFT?  Identity thieves take your personal information and use it to harm you in various ways, including these:  User names, passwords,
Presented By: Jennifer Thayer, SPHR, SHRM-SCP.  Identify CyberCrime and Types  Identify Steps to Take to Prevent Identity Theft  Learn Tips and Tricks.
 Definition  How thieves steal identity  Origin  Possible impacts on the small island nation of Vanuatu  Precaution Measures.
Yes, it’s the holidays... A time of joy, a time of good cheer, a time of celebration... From the Office of the Chief Human Capital Officer (CHCO ) Privacy.
E-C OMMERCE : T HE E -C ONSUMER AND THE ATTACKS AGAINST THE PERSONAL DATA Nomikou Eirini Attorney at Law, Piraeus Bar Association Master Degree in Web.
Identity Theft It’s a crime!
Add video notes to lecture
Done by… Hanoof Al-Khaldi Information Assurance
PRIVACY AND SECURITY (CCI410) PERTEMUAN 5 IR. NIZIRWAN ANWAR, MT
Digital Citizenship Middle School
Chapter # 1 Overview of Ethics
Ethics in Information Technology, Second Edition
CHAPTER 33 Cyberlaw.
Ethics in Information Technology
Information Security Session October 24, 2005
Computers and the Internet
Protecting Yourself from Fraud including Identity Theft
Protecting Yourself from Fraud including Identity Theft
INFS 452 – Computer Ethics & Society
Protecting Yourself from Fraud including Identity Theft
Presentation transcript:

Introduction to Computer Ethics: Privacy Text: George Reynolds, Ethics in Information Technology, Thomson Course Technology, Second Edition, 2006

Homework for Friday, Oct 6 Find and present information (5-10) minutes about e- mail spam, phishing, spear phishing, identity theft prosecution cases You can work in groups Read “Scoping Identity Theft”, “Private Lives” Communications of the ACM, May 2006 and “Why Spoofing is Serious Internet Fraud”, Communications of the ACM, October 2006 and be ready to discuss the articles and answer the questions in the test on Friday, Oct 13, 2006

Privacy Protection and the Law The use of IT in business requires balancing the needs of those who use the information against the rights and desires of the people whose information may be used On one hand, information about people is gathered, stored, analyzed and reported because organizations can use it to make better decisions. Organizations need basic information about customers to serve them better. On the other hand, many object to the data collection policies of government and businesses. According to U.S. Census data, privacy is a key concern of Internet users and a top reason why nonusers still avoid the Internet.

Privacy Protection and the Law Historical perspective on the right to privacy: U.S. Constitution took effect in 1789 Although, the Constitution does not contain the word privacy, the U.S. Supreme Court has ruled that the concept of privacy is protected by a number of amendments in the Bill of Rights. Supreme Court has stated that the American Citizens are protected by the Fourth Amendment when there is a “reasonable expectation of privacy”. To today, in addition to protection from government intrusion, people need privacy protection from private industry. Few laws provide such protection.

Recent History of Privacy Protection Communications Act of 1934 restricted the government’s ability to secretly intercept communications. However, under a 1968 federal statute, law enforcement officers can use wiretapping – the interception of telephone or telegraph communications for purpose of espionage or surveillance – if the first obtain a court order. FOIA – The Freedom of Information Act passed in 1966 and amended in 1974, provides public with the means to gain access to certain government records. Fair Credit Reporting Act of 1970 regulates the operations of credit- reporting bureaus, including how they collect, store and use credit information. Privacy Act of 1974 provides certain safeguards for people against invasion of personal privacy by federal agencies. The Central Intelligence Agency (CIA) and law enforcement agencies are excluded from this act; nor does it cover the actions of private industry.

Recent History of Privacy Protection COPA – Children’s Online Protection Act was passed by Congress in October According to the COPA law, a Web site that caters to children must offer comprehensive privacy policies, notify their parents or guardians about its data collection practices, and receive parent consent before collecting any personal information from children under 13 years of age. In 2004, the Federal Trade Commission (FTC) accused Bonzi Software Inc. and UMG Recordings Inc. of collecting personal information from children online without their parent’s consent, and settled with them for penalties of $75,000 and $400,

Recent History of Privacy Protection European Community Directive 95/46/EC of 1998 requires any company that does business within the borders of 15 Western European nations to implement a set of privacy directives on fair and appropriate use of information. BBB Online and TRUSTe are independent, nonprofit initiatives that favor an industry - regulated approach to data privacy. Gramm-Leach-Bliley Act (1999) – one example of the law that controls opt- out information gathering. The Financial Privacy Rule requires financial institutions to provide each consumer with a privacy notice at the time the consumer relationship is established and annually thereafter.

Key Privacy and Anonymity Issues Identity Theft occurs when someone steals key pieces of personal information to gain access to a person’s financial accounts. This information include: name, address, DOB, SSN, passport number, driver’s license number, and mother’s maiden name. 246, 000 identity complaints in 2004 Estimation: number of victims is about 10 millions per year.

Hacking of Large Databases to Gain Personal Identity Information Partial list of incidents from 2005: February 2005, Check Point, keeper of more than 19 million public records, revealed that hackers stole data on more than 147, 000 consumers March 2005, Reed Elsevier, the parent company of LexisNexis, announced that hackers had compromised its massive database, stealing information on more than 300, 000 people March 2005, Retail Ventures Inc. reported the theft of credit card data and other personal information of 1.4 million customers from its DSW Store Warehouse stores.

Hacking of Large Databases to Gain Personal Identity Information March 2005, Bank of America disclosed that it lost computer rapes containing credit card account records of 1.2 million federal employees June 2005, Visa USA and American Express announced that they were terminating their contract with CardSystem Solutions after a hacker accesses as many as 40 million credit card numbers The number of incidents is alarming. The lack of the initiative by some companies in informing people whose data was stolen.

Approaches used by Identity Thieves Hacking Databases, Phishing, Spyware Phishing is an attempt to steal personal identity data by tricking users entering the information on a counterfeit Web site; this data includes credit card numbers, account usernames, passwords, SSN. Spoofed s lead consumers to the fake Web sites Spear-phishing is a variation in which employees are sent phony s that look like they came from high-level executives within their organization. Employees are again directed to the fake Web site and then asked to provide a personal Information.

Phishing Examples Anti-Phishing Working Group: Spear Phishing:

Spyware Spyware is a term for keystroke-logging software that is downloaded to user’s computer without adequate notice, consent, or control for the users. Spyware creates a record of the keystrokes entered on the computer, enabling the capture of account usernames, passwords, credit card numbers, and other sensitive information.

Identity Theft and Assumption Deterrence Act Congress passed the Identity Theft and Assumption Deterrence Act in 1998 to fight identity fraud, making it a federal felony punishable by a prison sentence of tree to 25 years. The act appoints Federal Trade Commission (FTC) to help victims restore their credit and erase the impact of the imposter.

Spamming Spamming is the transmission of the same message to a large number of people. The Controlling the Assault of Non-Solicited Pornography and Marketing (CAN-SPAM) Act went into effect in January Act says that it is legal to spam, provided the message meets a few basic requirements Not only has the CAN-SPAM Act failed to slow the flow of junk , but some believe that it actually has increased the flow of spam, because it legalizes sending of unsolicited