Security and Privacy Outline u Needs and Requirements –Personal –Business –Government u Legal Issues u Technological Issues.

Slides:



Advertisements
Similar presentations
The 9 th Amendment: F 9th amendment case: -Griswold v. Connecticut (1965) -The enumeration in the Constitution, of certain rights, shall not be construed.
Advertisements

US Constitution and Right to Privacy Generally only protects against government action Doesn’t obligate government to do something, but rather to refrain.
Federal Court Structure U. S. Supreme Court U. S. Court of Appeals U. S. District Courts Agency Rulings (FCC, EPA, etc.)
Privacy and the Right to Know Grayson Barber, Esq. Grayson Barber, LLC.
© 2007 by West Legal Studies in Business / A Division of Thomson Learning CHAPTER 4 Constitutional Authority to Regulate Business.
USA Patriot Act Presented by: Kisha Thompson. Objectives potential threats potential vulnerabilities potential legal exposure To determine how the USA.
Privacy Rights Under Pressure  Innovations in technology: photography, audio recording, motion pictures, computers, telecommunications, digital data,
+ Classifying Law. + Sources of Canadian Law Common Law – from previous legal decisions Also called case law because sources include judge’s decisions.
Security for Data Transfers Protecting Customer Data.
This work is supported by the National Science Foundation under Grant Number DUE Any opinions, findings and conclusions or recommendations expressed.
NSA Surveillance Justin Waller and Brian Bauer. What is NSA Surveillance? Essentially NSA surveillance is an attempt to monitor communications in order.
Technology for Computer Forensics by Alicia Castro.
Framework for Global Electronic Commerce Communications 411 Relevant Site:
1 Legal and Ethical Considerations Matakuliah: G0462 English for Broadcasting Tahun: 2005/2006 Legal Restraints Ethical Concerns.
LAW AND AMERICAN POLITICS 1.Law and Politics 2.Law and Social Order -regulate behavior -resolve disputes -secure rights and liberties -allocate resources.
THE CONSTITUTION OF THE UNITED STATES How is it organized?
Cyberlaw Laws intended to govern computer, E-commerce, and Internet use. Cases involve computers and subject areas such as: Jurisdiction Trademarks Copyrights.
© 2009 Cengage Learning. All Rights Reserved. Electronic Health Records.
Canada’s Constitution
Chapter 1. Electronic Commerce  Brief History of Commerce and Communication  Introduction to Electronic Commerce  Laws Guiding E-commerce  Are we.
(Edited) WORKPLACE PRIVACY.
31 March CMU Sustainable Computing Consortium, Tempe, Arizona Trust in Mobile & Context-Aware Computing: Legal Perspectives W. Scott Blackmer, Esq.
CS 4001Mary Jean Harrold1 Class 8 ŸQuestions about term paper—list of possible topics available later today ŸCommunications discussion ŸCommunications.
Abcde Electronic Signatures and Certification Authorities Obligations, Liabilities and Responsibilities Michael Peeters Pinsent Curtis - UK.
Lecture 11: Law and Ethics
© 2011 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license.
14.1 Chapter 14 Privacy © 2003 by West Legal Studies in Business/A Division of Thomson Learning.
Promoting safe and healthy ways of using the internet in the classroom Ms. Sherman.
1 The Broader Picture Laws Governing Hacking and Other Computer Crimes Consumer Privacy Employee Workplace Monitoring Government Surveillance Cyberwar.
Business Law ATBs Quarter 1. ATB #1 Define Common law Type 1 writing List examples.
Privacy in Romania Today’s Challenges Bogdan Manolea A.B.U.S.E.
Chapter 19 Manager of Information Systems. Defining Informatics Process of using cognitive skills and computers to manage information.
1 PARCC Data Privacy & Security Policy December 2013.
Fifth Class Legal Systems and Judiciary. Different Legal Systems Common Law Continental Law.
SOURCES OF LAW AND THE COURTS A NATION OF LAWS EDUCATIONAL GOVERNANCE.
Section 2: The Fourth Amendment: Your Right to Be Secure Chapter 13: Supreme Court Cases.
The American legal system An overview. Sources of law Constitutional law –U.S. Constitution –State constitutions May grant more rights than the U.S. Constitution,
Privacy.  Fact: One of the least secure methods of communication you can use.  s are stored at multiple locations such as sender’s computer,
Tara George Amber Gardner Jennifer Shorter. Advantages Many employers run software that searches for offensives words and highlights problematic s.
Part 1 – Digital Life & Private Life Edward Mc Laughlin July 2011.
The Place of Cyberlaw in the MSIS Curriculum Ramesh Subramanian Bruce White Quinnipiac University.
Table of Contents. Lessons 1. Introduction to HIPAA Go Go 2. The Privacy Rule Go Go.
Business Law with UCC Applications,13e Sources of the Law Chapter 2 McGraw-Hill/Irwin Copyright © 2013 by The McGraw-Hill Companies, Inc. All rights reserved.
多媒體網路安全實驗室 A Secure Privacy-Preserving Roaming Protocol Based on Hierarchical Identity-Based Encryption for mobile Networks 作者 :Zhiguo Wan,Kui Ren,Bart.
March 26, 2015 Robin F. Wheeler The Legal Part. Federal Laws: The Rehab Act The Rehabilitation Act of 1973 – §504 §504 – §508 §508.
LAW for Business and Personal Use © 2012 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible.
CHAPTER SIXTEEN The Right to Privacy and Other Protections from Employer Intrusions.
- Richard Bhuleskar “At the end of the day, the goals are simple: safety and security” – Jodi Rell.
Judicial Branch. Origin of Law Case law: Court decisions that inform judicial ruling Constitutional Law: Outline the structure of the American government.
KEY AMENDMENTS: First Amendment - speech, press, assembly, religion Fourth Amendment – Privacy (search and seizure) Fifth Amendment - life, liberty, property.
© 2014 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license.
LAW 421 Week 2 DQ 3 To purchase this material link 421-Week-2-DQ-3 For more courses visit our website
Law and Ethics INFORMATION SECURITY MANAGEMENT
Privacy Group 1 Gerson De Conti II Robert Rhyne Chris Glasnapp
EVOLUTION OF HUMAN RIGHTS LEGISLATION
Applications of Cryptography
CONSTITUTIONAL LAW.
COMPUTER PRIVACY.
تعديل أسعار عقود الإنشاءات
Army FOIA/Privacy/Records Management Conference
Unit 4: The Constitution
Chapter 1 Authority.
Legal Systems and Judiciary
Federal Court Systems: Supreme Court
2.4 Due process.
United States Legal System
Judicial Branch Vocabulary
1. Who is our current President. 2. Who is our Vice President. 3
Session 1 – Introduction to Information Security
Unit # 1: Overview of the Course Dr. Bhavani Thuraisingham
Presentation transcript:

Security and Privacy Outline u Needs and Requirements –Personal –Business –Government u Legal Issues u Technological Issues

Needs and Requirements u Personal –Privacy –Security –Control u Business –Communication and Layered Information u Government

Legal Issues u The Constitution - The Fourth Amendment - The Griswold Case u Federal Statutes - The Electronic Privacy Communications Act - The Telecommunications Act of 1996 u State Common Law - Invasion of Privacy - Defamation u Jurisdiction

Technological Issues u Classification of Needs –Data Encryption –Authentication –Authorization u Mathematical Availability u Usage

Conclusion