Non Profit and Faith Based Agencies, and the role of Information Technology Lakewood Resource & Referral Center 212 2 nd Street Suite 204 Lakewood, NJ.

Slides:



Advertisements
Similar presentations
Slides prepared by Cyndi Chie and Sarah Frye A Gift of Fire Third edition Sara Baase Chapter 3: Freedom of Speech.
Advertisements

EXAMINING CYBER/COMPUTER LAW BUSINESS LAW. EXPLAIN CYBER LAW AND THE VARIOUS TYPES OF CYBER CRIMES.
Security, Privacy, and Ethics Online Computer Crimes.
MIS PERSONAL, LEGAL, ETHICAL, AND ORGANIZATIONAL ISSUES OF INFORMATION SYSTEMS CHAPTER 4 Hossein BIDGOLI Phishing that bites Paying for Privacy Pirates.
1 Freedom of Expression Prepared By Joseph Leung.
Click your mouse anywhere on the screen to advance the text in each slide. After the starburst appears, click a blue triangle to move to the next slide.
A Gift of Fire, 2edChapter 5: Freedom of Speech in Cyberspace1 PowerPoint ® Slides to Accompany A Gift of Fire : Social, Legal, and Ethical Issues for.
1 McGraw-Hill/Irwin Copyright © 2004, The McGraw-Hill Companies, Inc. All rights reserved. Ethical Challenges Ethics Principles of right and wrong that.
Workplace Monitoring Store & review messages (keyword search): 46.5% Store & review computer files (keyword search): 36.1% Monitor Internet connections:
Freedom of Speech in Cyberspace 1. The U.S. Constitution - The 1 st Amendment: The 1 st Amendment Congress shall make no law respecting an establishment.
INTERNET and CODE OF CONDUCT
Chapter 5 Freedom of Expression
MIS PERSONAL, LEGAL, ETHICAL, AND ORGANIZATIONAL ISSUES OF INFORMATION SYSTEMS CHAPTER 4 LO1 Describe information technologies that could be used in computer.
Freedom of Speech and Freedom of Assembly. The Purpose of Freedom of Speech 1 to guarantee to each person a right of free expression, in the spoken and.
The Social Context of Computing Foundation Computing Never underestimate the power of human stupidity.
Chapter 17.3 Regulating the Internet. Internet Speech ► Free speech is a key democratic right. The Internet promotes free speech by giving all users a.
Chapter 18-Internet Law www World Wide Web-Wild,Wild West? New Global Community has caused many ethical dilemmas Unequal Access increasing wealth gap.
Copyright © 2008 by West Legal Studies in Business A Division of Thomson Learning Chapter 11 Cyberlaw Twomey Jennings Anderson’s Business Law and the Legal.
Freedom of Speech in Cyberspace
Eric J. Pritchard One Liberty Place, 46 th Floor 1650 Market Street Philadelphia, Pennsylvania (215)
Chapter 17 Objectives: 6.04, 6.05, 10.05, Using the Internet Web sites: pages on the World Wide Web that contain text, images, audio, and video.
A Gift of Fire Third edition Sara Baase
Legal aspects Based on Law in the Internet Age Sharon K. Black.
ISNE101 Dr. Ken Cosh. Review  Dependability  Reliability  How do we improve it?  Security  Threats & Countering the Threats.
Freedom of Speech. acts/funddocs/billeng.htm Amendment I “Congress shall make no law respecting an establishment.
CS 4001Mary Jean Harrold1 Class 24 ŸFreedom of speech in cyberspace ŸAssign ŸAssignment 8—due today ŸTerm paper—due 11/20.
Ch3 Freedom of Speech The US Constitution.
Ethical Issue Computer Ethics. Why do we have to consider computer ethics? The advancements of computer/internet have significant influence on our lives.
Slides prepared by Cyndi Chie and Sarah Frye1 A Gift of Fire Third edition Sara Baase Chapter 2: Privacy.
Class Discussion Notes MKT April 10, 2001.
LIBS100 July 20, 2005 First Amendment Library Bill of Rights.
Legal Environment for a New Century. Click your mouse anywhere on the screen when you are ready to advance the text within each slide. After the starburst.
Chapter 17 E-Commerce and Digital Law
Intellectual Property Rights and Internet Law, Social Media, and Privacy Chapter 8 & 9.
Do you believe in this? Due to its very nature, the Internet is NOT a safe or secure environment. It is an ever-changing medium where anyone and everyone.
COPYRIGHT © 2011 South-Western/Cengage Learning. 1 Click your mouse anywhere on the screen to advance the text in each slide. After the starburst appears,
Media Law: Understanding Freedom of Expression Chapter Outline  History  Today’s Media Law  Controversies.
1 Freedom of Speech In Cyberspace Changing Communications Paradigms Changing Communications Paradigms Offensive Speech and Censorship in Cyberspace AnonymitySpam.
Educational Computing David Goldschmidt, Ph.D. Computer Science The College of Saint Rose CIS 204 Spring 2009.
CptS 401 Adam Carter. Quiz Question 7 Obscene speech is protected by the First Amendment. A. True B. False 2.
October 21, 2008 Jennifer Q.; Loriane M., Michelle E., Charles H. Internet Safety.
Chapter 11.  Electronic commerce (e-commerce)  The sale of goods and services by computer over the Internet  Internet (Net)  A collection of millions.
Slides prepared by Cyndi Chie and Sarah Frye A Gift of Fire Third edition Sara Baase Chapter 3: Freedom of Speech.
Freedom of Speech Computers in the World.
THE LEGAL ENVIRONMENT OF BUSINESS © 2006 Prentice Hall Ch. 6-1 A Critical Thinking Approach Fourth Edition Nancy K. Kubasek Bartley A. Brennan M. Neil.
Essentials Of Business Law Chapter 27 Conducting Business In Cyberspace McGraw-Hill/Irwin Copyright © 2007 The McGraw-Hill Companies, Inc. All rights reserved.
Its Legal, Ethical & Global Environment 6 th Ed. Its Legal, Ethical & Global Environment 6 th Ed. B U S I N E S S MARIANNE M. JENNINGS Copyright ©2003.
Chapter 11 CYBERLAW. 2 Cyberlaw is not a new body of laws. Cyberlaw is not a new body of laws. Cyberlaw is the application of existing laws and legal.
Legal and Ethical Issues in Computer Security Csilla Farkas
Intellectual Property. Confidential Information Duty not to disclose confidential information about a business that would cause harm to the business or.
A Crash Course in Press Law For the High School Press.
1 Law, Ethical Impacts, and Internet Security. 2 Legal Issues vs. Ethical Issues Ethics — the branch of philosophy that deals with what is considered.
Copyright, Intellectual Property, and Privacy 1 Lesson Plan: BMM A9-4.
11-1 Copyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall.
LIBS100 March 23, 2005 First Amendment Library Bill of Rights.
CHAPTER SIXTEEN The Right to Privacy and Other Protections from Employer Intrusions.
A Gift of Fire, 2edChapter 5: Freedom of Speech in Cyberspace1 Anonymity Common Sense and the Internet Early publications by some of our Founding Fathers.
Privacy and the Law.
Physical Safety Issues
Constitution Debated.
– Communication Technology in a Changing World
A Gift of Fire Third edition Sara Baase
Constitutional Issues
Essentials of the legal environment today, 5e
Constitution Debated.
Freedom of Speech in Cyberspace
Ethical Use of Computers
Computer Security Social Legal and Ethical issues
A Gift of Fire Third edition Sara Baase
A Gift of Fire Third edition Sara Baase
Presentation transcript:

Non Profit and Faith Based Agencies, and the role of Information Technology Lakewood Resource & Referral Center nd Street Suite 204 Lakewood, NJ 08701

The Topics We’ll be Covering Appreciating the Benefits Ethical Issues  Privacy and personal information  Freedom of speech in cyberspace  Intellectual property  Cyber crime Broader Impacts of Information Technology

Appreciating the Benefits

 Entertainment-games-DVD’s, etc.  World Wide Web and the Internet  Business data  and e-commerce  Digital libraries  Automobiles/trucks/hybrid cars, ABS brake sensors, night vision drivers  Etc… Appreciating the Benefits

Ethical Issues

 Privacy and personal information  Freedom of speech in cyberspace  Intellectual property  Cyber crime Ethical Issues

Privacy and IT

What are the privacy Issues related to IT?  Freedom from intrusion of unwanted information into one’s personal space. There is no privacy violation if information is obtained or published with the person’s consent.  Spam  Unsolicited Commercial (UCE)  Freedom from surveillance and improper access by computer hacking (monitoring, tracking/interception)  Cookie-Encryption  Autonomy over personal data collected and disclosed to others  Theft  Phishing  Anonymity-Discuss under 1st Amendment

Freedom from surveillance & improper access by others (improper monitoring, tracking, hacking & interception)  Cookies--Website stores information about visitor’s activity (data spillage--allow advertiser’s to use this information or leaks due to the complexity of the software  Spyware--surfing monitors, buying habits, keystroke monitors.  Secondary Use of Information  Sale of consumer information  Computer matching-comparing databases  Detecting fraud,  Law enforcement Privacy and IT

 Autonomy over personal information collected & disclosed by others  Biometrics (Identification of bodily indicators such as fingerprints, iris, bone structure in the hand, etc).  School ID’s and civil liberties  How do you design privacy safeguards? Build them into system rather than retrofit a complex system  Guard against theft, make system trustworthy, update system without infringing on civil liberties  Phishing  or access link containing request for data and it is fraudulent  Debate over National ID Card-HR 418 and/or Standardized driver’s licenses. Privacy and IT

What Privacy Protection and Regulations exist?  4th Amendment-protection against intrusion  Philosophical-Warren & Brandeis  Free Market v. Consumer Protection view  Contract  Regulations (consider the cost to compliance)---Example: Children’s Online Privacy Protection Act (COPPA)  EU---Comprehensive Privacy Directive--Processing personal data. Privacy and IT

Freedom of Speech

 First Amendment  “Congress shall make no law…abridging the freedom of speech, or of the press…”  Protection against objectionable speech, pictures, and other forms of expression of ideas and opinions  Restriction are on “the power of government”, not individuals or private business.  Supreme Ct has developed guidelines  for example advocating illegal acts (usually) and truthful advertising are protected  Anonymity protected.  Libel and direct, specific threats, Inciting violence, in certain circumstances, are all illegal. Freedom of Speech

 Regulatory Paradigm  Federal Election Commission (FEC) regulations restrict anonymity in the form of disclosure and financial requirements established before the Web.  Anonymity on the Internet is taken advantage of for criminal and antisocial purposes.  Children’s Internet Protection Act (CIPA)  Child Online Protection Act (COPA) 1998  Supreme Ct found it unconstitutional. Targets Internet terminals in schools and libraries that participate in certain federal programs.  Filters better solution Freedom of Speech

What is illegal?  Obscenity is offensive and not protected by US Constitution. Criteria for obscene material  1) it depicts offensive acts whose depiction is specifically prohibited by state law,  2) it depicts these acts in a patently offensive manner, appealing to prurient interest as judged by a reasonable person using community standards, and  3) it has no serious literary, artistic, social, political, or scientific value. Freedom of Speech

 Is Anonymity Protected?  Right to express political opinion anonymously (in print) is protected.  Right to anonymity by IP is protected.  Providers must have good identity protection programs and must train their employees to monitor policy effectively. [Stems from “sailor case’ AOL employee violated anonymity of customers by selling list and provider held liable]. Freedom of Speech

Intellectual Property

 Intangible creative work protected  Cheating Intellectual Property

Legislative History  No Electronic Theft Act (1997 )  Fair-Use Doctrine (Copyright Act of 1976)  Sonny Bono Copyright Term Extension Act  Digital Millennium Copyright Act [DMCA] (1998) Intellectual Property

 Ethical argument about copying  Who owns the content ?  What are the rights of the owner of the media? Can they backup their material?  Who should be held liable for infringement  Individual consumer? (Napster)  Internet Service Provider?  What are the rights of business and Universities Intellectual Property

 Peer to Peer  Benefits-allows for Open Source and enhanced research capability and collaboration  Consistent with a network or ecological worldview/paradigm  Downside-copyright infringement Intellectual Property

Cyber Crime

 Exploitation of Minors  Copyright piracy  Consumer fraud  Embezzlement  Attacks on digital assets (computer is the target)  Identity theft  Identity changed (programmer to criminal)  Medical records changed  Life of investigator erased Cyber Crime

Broader Impact of IT

 Computers and Community  Reduce face to face gathering and hurts local community resulting in “isolation” and eroding the family and community life.  Robert Putman argues that an indicator is the number of clubs that people join--other factors at play including: modern transportation and communication (increased mobility), changes in family patterns and TV.  Addiction to computers and TV  Digital divide---Computer Professionals for Social Responsibility (CPRS) push for universal access. Broader Impact

 Criticism of Computer Technology  Unemployment and deskilling of jobs  “Manufacture needs”  Social injustice  Dehumanizing  Separates humans from nature  Benefits big business and big government  Use in schools thwarts development of social skill, human values, intellectual skills and create an “ominous uniformity of knowledge” consistent with corporate values. Broader Impact

Summing it all Up Appreciating the Benefits Ethical Issues Broader Impact of IT

Thank You. Q&A