Legal and Ethical Issues in Computer Security Csilla Farkas

Slides:



Advertisements
Similar presentations
Ethics Ethics are the rules of personal behavior and conduct established by a social group for those existing within the established framework of the social.
Advertisements

Facing Ethical and Legal Challenges C H A P T E R 2.
Case study Engineering Ethics Mahmoud Darawsheh. Psystar corporation  Psystar Corporation was a company based in Florida, owned by Rudy and Robert Pedraza.
Tuesday, January 21, 2014 Review Copyright Basics and Fair Use (for test) Share “Case Research”
Vladimir Misic: 10 Professionalism and Ethics Ownership and Protection.
1 The Economic Impact of Cyber Attacks The Global Picture Chapter 9.
EXAMINING CYBER/COMPUTER LAW BUSINESS LAW. EXPLAIN CYBER LAW AND THE VARIOUS TYPES OF CYBER CRIMES.
Slides prepared by Cyndi Chie and Sarah Frye1 A Gift of Fire Third edition Sara Baase Chapter 4: Intellectual Property.
Legal Issues in Software CS 415, Software Engineering II Mark Ardis, Rose-Hulman Institute April 11, 2003.
Legal and Ethical Issues in Computer Security
Adapted from David G Kay -- SIGCSE 2003 Intellectual Property.
Introduction to Computer Ethics
1 Introduction to Software Engineering Lecture 38 – Intellectual Property.
Computer Engineering 294 IP R.Smith 5/ Intellectual Property What is it? Why is it important? – What is it designed to do? What are its basic forms?
Chapter 5 Intellectual Property & Internet Law
Week 13 - Thursday.  What did we talk about last time?  security  Privacy in emerging technologies.
Chapter 9 – Legal, Privacy, and Ethical Issues in Computer Security  Program and data protection by patents, copyrights, and trademarks  Computer Crime.
Data Protection Paul Veysey & Bethan Walsh. Introduction Data Protection is about protecting people by responsibly managing their data in ways they expect.
Intellectual Property Rights and Computer Technology
Intellectual property rights concern the legal ownership and use of intellectual property such as software, music, movies, data, and information. Intellectual.
Chapter 25 Intellectual Property Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written.
K. Salah1 Legal, Privacy, & Ethical Issues. K. Salah2 Overview Human Controls Applicable to Computer Security The Basic Issues Computer Crime Privacy.
 Copyright protects creative expression that has been reduced to a tangible form, such as a book, piece of recorded music, computer program, screenplay,
5-1 Ethics To examine the role of ethical behavior in business finance. 2. To illustrate the role of unethical behavior in the downfall of.
Computer Science and Engineering 1 Csilla Farkas Associate Professor Center for Information Assurance Engineering Dept. of Computer Science and Engineering.
Legal and Ethical Issues. Major Topics Protecting Programs and Data Information and the Law Rights of Employees and Employers Software Failures Computer.
COPYRIGHT LAW 2004 Professor Fischer CLASS of April : TECHNOLOGICAL PROTECTION MEASURES.
 You will face ethical dilemmas in your career – count on it!  Your decisions will affect: ◦ your professional reputation. ◦ your employability. ◦ the.
Intellectual Property Rights and the Web: Common Myths Presentation by Jean Mistele.
Legal and Ethical Issues in Computer Security
Computer Science and Engineering 1 Cyber Security University of South Carolina Columbia Center for Information Assurance Engineering (CIAE)
Computer Science and Engineering 1 Future of Cyber Security.
Intellectual Property Rights and Internet Law, Social Media, and Privacy Chapter 8 & 9.
… concern the legal ownership and use of intellectual property, such as software, music, movies, data, and information. Links: Video: Too Much Copyright.
Copyright legislation Copyright (Computer Programs) Regulations 1992 Elma Graham.
Chapter 08.  Describes property that is developed through an intellectual and creative process  Inventions, writings, trademarks that are a business’s.
TMK 264: COMPUTER SECURITY
© 2007 West Legal Studies in Business, A Division of Thomson Learning Chapter 5 Intellectual Property.
PROTECTING YOUR IP RIGHTS Waldo Steyn, Senior Associate, Intellectual Property December 2012.
Intellectual Property (Quinn Chapter 4) CS4001 Kristin Marsicano.
Chapter 18 Intentional Torts. Intentionally With Purpose, done deliberately for a specific reason.
IT Security Policy Framework ● Policies ● Standards ● Procedures ● Guidelines.
Back to the Basics The Ethical Aspect of Reverse Engineering.
Ownership of Software Software represents the results of intellectual rather than purely physical efforts and is therefore inherently non- tangible. So.
Ethics. Technology  Technology is not an immutable force – people make decisions about what technologies and products to develop and how to use them.
Copyright Grace, Ienash, Nick. Copyright - International  Instruments of copyright  World Intellectual Property Organisation and EU Convention on Cybercrime.
Well, sir, from the sounds of it, you've got yourself some pirated software. I'm afraid there's nothing we can do to help you.`
Digital Millennium Copyright Act (DMCA) The Digital Millennium Copyright Act is a United States copyright law that was signed into law by Bill Clinton.
Legal and Ethical Issues in Computer Security Csilla Farkas
Computing, Ethics & The Law. The Law Copyright, Designs and Patents Act (1988) Computer Misuse Act (1990) Data Protection Act (1998) (8 Main Principles)
CISB 412 Social and Professional Issues Understanding Intellectual Property.
CHAPTER 8 Legal, Privacy and Ethical Issues in Computer Security (c) by Syed Ardi Syed Yahya Kamal, UTM
©2002 by West Legal Studies in Business A Division of Thomson Learning Chapter 6 Business Torts, Intellectual Property and Cyberlaw.
Intellectual property (IP) refers to creations of the mind: inventions, literary and artistic works, music, movies, symbols, names, images, and designs.
Slide 1 © 2013, Ian Tan TSC2211 Computer Security Slide 1 TSC2211 Computer Security Lecture 12 Legal Issues.
Ethical Issues. Introduction to Copyright, Plagiarism Get out your note sheet.
Computer Science and Engineering 1 Cyber Security University of South Carolina Columbia Center for Information Assurance Engineering (CIAE)
Software piracy and software patents
Ethical, Social, and Political Issues in E-commerce
Intellectual Property and Cyber Piracy
A Gift of Fire Third edition Sara Baase
Legal and Ethical Issues in Computer Security
Week 13 - Monday CS363.
Intellectual Property
Intellectual Property Rights
Csilla Farkas Cybersecurity Csilla Farkas
Chapter 9 Internet Law and Intellectual Property
Intellectual Property
Chapter # 6 Intellectual Property
Presentation transcript:

Legal and Ethical Issues in Computer Security Csilla Farkas

Question 1. If you see someone shoplifting a book what would you do? 1. Report it to the authorities 2. Create a diversion to ensure s/he is not caught 3. Ask if you can borrow the book later 4. Turn away and pretend you didn’t see anything 2

Question 2. If you see someone making a unofficial copy of a computer game what would you do? 1. Report it to the authorities 2. Create diversion to ensure s/he is not caught 3. Ask if you can borrow the game later 4. Turn away and pretend you didn’t see anything 3

4 Ethics vs. Law LawEthics Formal, written documentUnwritten principles Interpreted by courtsInterpreted by each individual Established by legislaturesPresented by philosophers, religious, professional groups Applicable to everyonePersonal choice Priority decided by courtPriority determined by individual Court makes final decisionNo external decision maker Enforceable by police and courts Limited enforcement

5 Law and Computer Security Laws: regulate the use, development, and ownership of data and programs Laws: affect actions that can be taken to protect the secrecy, integrity, and availability of computing resources International, national, state, and city laws

6 Cyber Security: Lack of Legislation Reactive procedures Do not address improper acts Lack of technical expertise of legal personnel  What is an appropriate protection?  What is a security breach? DemandTechnologyLaw

7 Protection of Computer Systems Protecting computing systems against criminals Protecting code and data Protecting programmers’ and employers’ rights Protecting users of programs

8 Protecting Programs and Data Copyright Patents Trade secrets Protection for computer objects

9 Copyrights Protect the expression of ideas 1978: U.S. copyright law  Updated in 1998: Digital Millennium Copyright Act (DMCA) – deals with computers and other electronic media Give the copyright holder the exclusive right to make copies of the expression and sell them to the public Simple procedure to register copyright U.S. copyright expires 70 years beyond the death of last surviving holder

10 Fair Use The purchaser has the right to use the product in the manner for which it was intended and in a way that does not interfere with the author’s right. Piracy First sale Copyright infringement

11 Copyright for Digital Objects Digital Millennium Copyright Act  Digital objects can be copyrighted  It is a crime to circumvent or disable anti-piracy functionality  It is a crime to manufacture, sell, or distribute devices that disable anti-piracy functionality or that copy digital objects Exempt: when used for educational and research purposes  It is legal to make a backup to protect against loss  Libraries can make three backups

Software Piracy Which countries are the highest in software piracy? 1. Armenia: 93% 2. Azerbaijan: 92% 3. Moldova: 92% 4. Bangladesh: 92% 5. Zimbabwe: 91% 6. Sri Lanka: 90% 107. United States: 20% Cultural indifference toward software piracy 12

13 Patents Protects inventions – results of science, technology, and engineering Requirement of novelty  Truly novel and unique  only one patent for a given invention  Non-obvious U.S. Patent and Trademark Office: register patent  Patent attorney: verifies that the invention has not been patented and identifies similar inventions

Interesting Patents 1. August 17,1982 – Anti-eating face mask 14

Interesting Patents 2. October 26, 1999 Motorized ice-cream cone 15

16 Patent Infringement Copyright: holder can decide which violations prosecute Patent: all violations must be prosecuted or patent can be lost Suing for patent infringement may cause the patent owner to loose the paten. Infringer may argue that:  This isn’t infringement (different inventions)  The patent is invalid (a prior infringement was not opposed)  The invention is not novel  The infringer invented the object first

17 Trade Secret Information that gives one company a competitive edge over the others Must always be kept secret If someone obtains it improperly, the owner can recover  Profits  Damages  Lost revenues  Legal cost Reverse Engineering!

18 Protection of Computer Objects Protecting hardware, firmware, object code software, source code software, documentation, web content, domain names, etc.

19 Computer Crime Least clear area of law in computing Separate category for computer crime  No access to the physical object  Is it a serious crime?  Rules of evidence  How to prove the authenticity?  Threats to integrity and confidentiality  How to measure loss of privacy?  Value of data  How to measure it?

20 Why Computer Crime is Hard to Prosecute? Lack of understanding Lack of physical evidence Lack of recognition of assets Lack of political impact Complexity of case Age of defendant

21 Ethical Issues Ethic: objectively defined standard of right and wrong Ultimately, each person is responsible for deciding what to do in a specific situation Ethical positions can and often do come into conflict

22 Information Assurance Courses At USC

23 Courses and Faculty Courses CSCE 201 – Introduction to Security CSCE 517 – Computer Crime and Forensics CSCE 522 – Information Security Principles CSCE 557 – Introduction to Cryptography CSCE 548 – Secure Software Construction Faculty Csilla Farkas Chin-Tser Huang Wenyuan Xu

24 IA Jobs Job market –Civil (Join Information Systems Security Association, ISSA, ) –Government (Internship available at USC-UTS, and SC Dept. of Probation, Parole, and Pardon Services) –Military (Internship available at SPAWAR, Charleston) Education and training requirements (B.S. degree, certification, hands-on experiments) Salary FUN