Bordoloi CMIS 108 Dr. Bijoy Bordoloi Privacy. Bordoloi Computers and Privacy These notes focus on the various topics associated with maintaining individual.

Slides:



Advertisements
Similar presentations
/0403 © 2004 Business & Legal Reports, Inc. BLRs Training Presentations Privacy Issues in the Workplace.
Advertisements

MINNESOTA GOVERNMENT DATA PRACTICES ACT How the law affects University employees and recordkeeping Susan McKinney Records & Information Management.
Your Rights Under the Internet Law By: Sannita S. Lam.
Security, Privacy, and Ethics Online Computer Crimes.
MIS PERSONAL, LEGAL, ETHICAL, AND ORGANIZATIONAL ISSUES OF INFORMATION SYSTEMS CHAPTER 4 Hossein BIDGOLI Phishing that bites Paying for Privacy Pirates.
Chapter 10 Privacy and Security McGraw-Hill
Click your mouse anywhere on the screen to advance the text in each slide. After the starburst appears, click a blue triangle to move to the next slide.
This work is supported by the National Science Foundation under Grant Number DUE Any opinions, findings and conclusions or recommendations expressed.
1 McGraw-Hill/Irwin Copyright © 2004, The McGraw-Hill Companies, Inc. All rights reserved. Ethical Challenges Ethics Principles of right and wrong that.
Computers: Information Technology in Perspective By Long and Long Copyright 2002 Prentice Hall, Inc. IT Ethics & Healthy Computing Chapter 8.
Privacy & Security By Martin Perez. Introduction  Information system - People : meaning use, the people who use computers. - Procedures : Guidelines.
PRIVACY & SECURITY HOW MUCH DO YOU KNOW ABOUT PRIVACY AND SECURITY?
Information Technology for the Health Professions, 2/e By Lillian Burke and Barbara Weill ©2005 Pearson Education, Inc. Pearson Prentice Hall Upper Saddle.
9 99 CHAPTER Privacy and Security. 9 © The McGraw-Hill Companies, Inc Objectives 1.Privacy 2.Security 3.Ergonomics 4.Environment.
Chapter 14: Ethics, Justice and Fair Treatment at Work
1. 2 Technology in Action Technology in Focus: Information Technology Ethics Information Technology Ethics Copyright © 2012 Pearson Education, Inc. Publishing.
INTERNET and CODE OF CONDUCT
ETHICS, POLICY & SECURITY ISSUES 1CIIT---ETHICS,POLICY AND SECURITY ISSUES.
Privacy and Encryption The threat of privacy due to the sale of sensitive personal information on the internet Definition of anonymity and how it is abused.
MIS PERSONAL, LEGAL, ETHICAL, AND ORGANIZATIONAL ISSUES OF INFORMATION SYSTEMS CHAPTER 4 LO1 Describe information technologies that could be used in computer.
The University of Kansas Medical Center Shadow Experience Training.
Ten Thing IT Staff Need to Know About Education Records Privacy Ten Things IT Staff Need to Know About Education Records Privacy Jeff von Munkwitz-Smith.
Chapter 11 Security and Privacy: Computers and the Internet.
Chapter 17.3 Regulating the Internet. Internet Speech ► Free speech is a key democratic right. The Internet promotes free speech by giving all users a.
Chapter 18-Internet Law www World Wide Web-Wild,Wild West? New Global Community has caused many ethical dilemmas Unequal Access increasing wealth gap.
Copyright © 2008 by West Legal Studies in Business A Division of Thomson Learning Chapter 11 Cyberlaw Twomey Jennings Anderson’s Business Law and the Legal.
Information Systems Today, 2/C/e ©2008 Pearson Education Canada 9-1 ACS 1803 Lecture Outline 15 ETHICS AND COMPUTER CRIME.
Eric J. Pritchard One Liberty Place, 46 th Floor 1650 Market Street Philadelphia, Pennsylvania (215)
Computer Programming I
ISNE101 Dr. Ken Cosh. Review  Dependability  Reliability  How do we improve it?  Security  Threats & Countering the Threats.
Component 4: Introduction to Information and Computer Science Unit 2: Internet and the World Wide Web 1 Component 4/Unit 2Health IT Workforce Curriculum.
Computing Essentials 2014 Privacy, Security and Ethics © 2014 by McGraw-Hill Education. This proprietary material solely for authorized instructor use.
UDMIS.info Ethics and IS. UDMIS.info The Ethics of IS Ethics and Privacy Ethical Issues Law & Order.
CHAPTER 10 Technology Issues.
Unethical use of Computers and Networks
Slides prepared by Cyndi Chie and Sarah Frye1 A Gift of Fire Third edition Sara Baase Chapter 2: Privacy.
Computer and Internet privacy (2) University of Palestine University of Palestine Eng. Wisam Zaqoot Eng. Wisam Zaqoot Feb 2011 Feb 2011 ITSS 4201 Internet.
Use of U.T. Austin Property Computers: Security & Acceptable Use The University of Texas at Austin General Compliance Training Program.
Legal Environment for a New Century. Click your mouse anywhere on the screen when you are ready to advance the text within each slide. After the starburst.
COMPUTER ETHICS Owda Shaqalih Hussam Hamada Nedal ALshorafa.
ETHICS and COMPUTERS An Overview 23/04/2017.
ETHICS, POLICY & SECURITY ISSUES
ETHICS, POLICY & SECURITY ISSUES
COPYRIGHT © 2011 South-Western/Cengage Learning. 1 Click your mouse anywhere on the screen to advance the text in each slide. After the starburst appears,
Chapter 40 Labor and Employment Law. 2  What is the employment at will doctrine? When and why are exceptions made?  What federal statutes govern working.
MIS 2000 Ethical and Legal Aspects of Information Systems Updated: June 2015.
Computer Forensics Law & Privacy © Joe Cleetus Concurrent Engineering Research Center, Lane Dept of Computer Science and Engineering, WVU.
Understanding Business Ethics 2 nd Edition © 2014 SAGE Publications, Inc. Chapter 9 Ethics and Information Technology Understanding Business Ethics Stanwick.
Vitor Giesteira, 9E. The Nine Elements of Digital Citizenship 1. Access 2. Communication 3. Literacy 4. Security and Safety 5. Etiquette 6. Rights and.
MIS 2000 Social Implications of IST. Outline Law & Ethics Accountability and Liability Information Rights Privacy Computer Abuse and Crime Intellectual.
© 2004 West Legal Studies in Business A Division of Thomson Learning BUSINESS LAW Twomey Jennings 1 st Ed. Twomey & Jennings BUSINESS LAW Chapter 11 Cyberlaw.
Chapter 11 CYBERLAW. 2 Cyberlaw is not a new body of laws. Cyberlaw is not a new body of laws. Cyberlaw is the application of existing laws and legal.
Comprehensive Volume, 18 th Edition Chapter 11: Cyberlaw.
Intellectual Property. Confidential Information Duty not to disclose confidential information about a business that would cause harm to the business or.
Protecting Yourself from Fraud including Identity Theft Personal Finance.
Ethical Implications In The Age Of Information
1 Law, Ethical Impacts, and Internet Security. 2 Legal Issues vs. Ethical Issues Ethics — the branch of philosophy that deals with what is considered.
The Place of Cyberlaw in the MSIS Curriculum Ramesh Subramanian Bruce White Quinnipiac University.
Xin Xie Fan Yang Dorlly Cruz PRIVACY ACT. Invasion of our rights We like Technology but we also want our privacy.
Unit 2- Privacy and Cyberspace Kaizen MIDTERM Definition of Terms How is Technology eroding our privacy and anonymity? Protecting privacy online.
Security, Ethics and the Law. Vocabulary Terms Copyright laws -software cannot be copied or sold without the software company’s permission. Copyright.
CHAPTER SIXTEEN The Right to Privacy and Other Protections from Employer Intrusions.
Privacy and the Law.
Add video notes to lecture
Done BY: Zainab Sulaiman AL-Mandhari Under Supervisor: Dr.Tarek
Privacy and Information
Other Sources of Information
– Communication Technology in a Changing World
Computer Programming I
Ethical Use of Computers
Presentation transcript:

Bordoloi CMIS 108 Dr. Bijoy Bordoloi Privacy

Bordoloi Computers and Privacy These notes focus on the various topics associated with maintaining individual privacy rights in a computerized society. Specifically the topics of ethics and the potential illegal use of computers and other important topics such as data security are coveredThese notes focus on the various topics associated with maintaining individual privacy rights in a computerized society. Specifically the topics of ethics and the potential illegal use of computers and other important topics such as data security are covered

Bordoloi Databases and Personal Privacy Government Databases. The government maintains very large databases - over 2,000 of them - each containing millions of recordsGovernment Databases. The government maintains very large databases - over 2,000 of them - each containing millions of records –The Social Security Administration maintains welfare benefit and eligibility records –The Internal Revenue Service maintains income and tax records –The Department of Defense maintains military service records –The FBI maintains records about you, regardless of whether you were ever found guilty of a crime

Bordoloi Databases and Personal Privacy Computer matching can be used to match data from different databases to identify individuals engaged in wrongdoing, e.g. federal employees with delinquent student loans or use by the Internal Revenue Service to identify people underpaying taxesComputer matching can be used to match data from different databases to identify individuals engaged in wrongdoing, e.g. federal employees with delinquent student loans or use by the Internal Revenue Service to identify people underpaying taxes

Bordoloi Databases and Personal Privacy Databases and Personal Privacy Computer profiling is the use of records to identify individuals who fit a pre-determined "profile," for example, the IRS profiling of people they regard as likely tax evadersComputer profiling is the use of records to identify individuals who fit a pre-determined "profile," for example, the IRS profiling of people they regard as likely tax evaders

Bordoloi Databases and Personal Privacy Databases and Personal Privacy Private Databases. The greatest issue is with the privacy of personal issue because the computer offers access to invade an individual’s privacy Examples include:Private Databases. The greatest issue is with the privacy of personal issue because the computer offers access to invade an individual’s privacy Examples include: –Credit card usage that is tracked –Telephone usage that is tracked –Abuses include selling addresses/data to other businesses

Bordoloi Databases and Personal Privacy Databases and Personal Privacy Social Security Numbers. These are favorite targets of individuals who engage in fraudSocial Security Numbers. These are favorite targets of individuals who engage in fraud Database Inaccuracies. What happens when the information in the database is inaccurate?Database Inaccuracies. What happens when the information in the database is inaccurate?

Bordoloi Privacy Law under the Constitution The Supreme Court has ruled you have constitutional privacy rights that fall into three general areasThe Supreme Court has ruled you have constitutional privacy rights that fall into three general areas –The right to make personal choices about intimate matters such as child-rearing, education, marriage, medical care, etc. –The right to make personal choices about non- intimate matters, such as the clubs to which you belong or the people with whom you associate –The right to be left alone

Bordoloi Privacy Law under the Constitution So far, the Supreme Court has not recognized an individual's right to prevent the collection and dissemination of personal data by the governmentSo far, the Supreme Court has not recognized an individual's right to prevent the collection and dissemination of personal data by the government

Bordoloi Federal Legislation Electronic Communications Privacy Act of prohibits federal or state officials from accessing, intercepting, or disclosing or other electronic communications without a search warrantElectronic Communications Privacy Act of prohibits federal or state officials from accessing, intercepting, or disclosing or other electronic communications without a search warrant

Bordoloi Federal Legislation Fair Credit Reporting Act - gives consumers a right to obtain a copy of their credit report, and to challenge incorrect information. Also regulates the distribution of investigative consumer reports and requires consumers be notified when an investigative consumer report is requested by someoneFair Credit Reporting Act - gives consumers a right to obtain a copy of their credit report, and to challenge incorrect information. Also regulates the distribution of investigative consumer reports and requires consumers be notified when an investigative consumer report is requested by someone

Bordoloi State Legislation State laws vary widely. Illinois has a statute guaranteeing privacy protectionState laws vary widely. Illinois has a statute guaranteeing privacy protection

Bordoloi Privacy at Work Can your employer read your ? Three recent court cases upheld the employer's right to archive and review employee , as well as to terminate employees based on contentsCan your employer read your ? Three recent court cases upheld the employer's right to archive and review employee , as well as to terminate employees based on contents

Bordoloi Privacy at Work Privacy at Work Computer monitoring involves using computers to monitor employee activities and worker performance. For example, clerks can be monitored to determine if they are working at an appropriate speed. Workers complain that the monitoring adds stress to their jobsComputer monitoring involves using computers to monitor employee activities and worker performance. For example, clerks can be monitored to determine if they are working at an appropriate speed. Workers complain that the monitoring adds stress to their jobs

Bordoloi Privacy and Cryptography Public-key Cryptography - the science of keeping messages secret by encoding themPublic-key Cryptography - the science of keeping messages secret by encoding them A secret key (sequence of numbers/characters) is used with an algorithm to encrypt/decrypt messagesA secret key (sequence of numbers/characters) is used with an algorithm to encrypt/decrypt messages Important for Internet commerce where people send critical data such as credit card numbersImportant for Internet commerce where people send critical data such as credit card numbers

Bordoloi Ethics Society has reached a point where it is dependent on computers. Computers are found everywhere and are important in business and in our personal lives. An individual responsibility is to understand the use of computers so that we can better direct their application for society’s benefitSociety has reached a point where it is dependent on computers. Computers are found everywhere and are important in business and in our personal lives. An individual responsibility is to understand the use of computers so that we can better direct their application for society’s benefit

Bordoloi Ethics The standard code of ethics for computer professionals also applies to people who use computers. The main points from this code (from the textbook) include:The standard code of ethics for computer professionals also applies to people who use computers. The main points from this code (from the textbook) include: –Avoid situations that create a conflict of interest –Do not violate the confidentiality of your employer or those you service –Never misrepresent or withhold information that is germane to a problem or situation of public concern –Do not violate the rights or privacy of others

Bordoloi Ethics Take appropriate action when exposed to unethical or illegal practicesTake appropriate action when exposed to unethical or illegal practices Do not exploit the shortcomings of your employer’s computer system for personal gain (don’t steal by using the computerDo not exploit the shortcomings of your employer’s computer system for personal gain (don’t steal by using the computer

Bordoloi Computer Crime Each year it is estimated that the total cost of computer crime exceeds all robberiesEach year it is estimated that the total cost of computer crime exceeds all robberies The few laws dealing with computer crime are mostly federal and deal and make it a crime to illegally access a federal computer systemThe few laws dealing with computer crime are mostly federal and deal and make it a crime to illegally access a federal computer system Over 50% of computer frauds are internal - diverting funds, illegally copying softwareOver 50% of computer frauds are internal - diverting funds, illegally copying software Computer Hackers - these people attempt to tap into computer systems illegally, sometimes just for funComputer Hackers - these people attempt to tap into computer systems illegally, sometimes just for fun Software Piracy - This includes the theft of intellectual property and is covered by the Copyright Law of 1974Software Piracy - This includes the theft of intellectual property and is covered by the Copyright Law of 1974