1 Gordana Dodig-Crnkovic Department of Computer Science and Engineering Mälardalen University 2003 PROFESSIONAL ETHICS IN SCIENCE AND ENGINEERING CD5590.

Slides:



Advertisements
Similar presentations
IT Security Policy Framework
Advertisements

State and Local Government State Government ~~~~~ The States
The US Constitution.
Unit 4- Assignment 3 P5, P6, M2 BTEC Business Level 3.
US Constitution and Right to Privacy Generally only protects against government action Doesn’t obligate government to do something, but rather to refrain.
1. As a Florida KidCare community partner families entrust you to not only help them navigate the Florida KidCare system but to keep the information they.
Increasing public concern about loss of privacy Broad availability of information stored and exchanged in electronic format Concerns about genetic information.
1 HIPAA Education CCAC Professional Development Training September 2006 CCAC Professional Development Training September 2006.
HIPAA How It Is Affecting Information Systems Within Companies Around Us.
Development of a Surveillance Society By: Tyler Madden (Comp 1631, Winter 2011)
Greg Lamb. Introduction It is clear that we as consumers and entrepreneurs cannot expect complete privacy when discussing business matters. However… There.
Chapter 17 Law and Terrorism.
Basic Banking Services - Activity 1
Right to Privacy: The Unwritten Right
Insights on the Legal Landscape for Data Privacy in Higher Education Rodney Petersen, J.D. Government Relations Officer and Security Task Force Coordinator.
1.7.6.G1 © Family Economics & Financial Education –March 2008 – Financial Institutions – Online Banking Funded by a grant from Take Charge America, Inc.
5.1 © 2006 by Prentice Hall Ethical and Social Issues in the Digital Firm.
Tina Kraigher and Milena Podjed-Fabjančič 18 April 2010 Processing of Telephone Traffic Data of Employees ( a Case Study )
The Bill of Rights.
Challenges for Civil Liberties
Newsgathering: Access to Meetings & Records. Access and the First Amendment How has the U.S. Supreme Court responded to claims that the First Amendment.
Teresa Macklin Information Security Officer 27 May, 2009 Campus-wide Information Security Activities.
Bordoloi CMIS 108 Dr. Bijoy Bordoloi Privacy. Bordoloi Computers and Privacy These notes focus on the various topics associated with maintaining individual.
Chapter 20: Civil Liberties: Protecting Individual Rights Section 1
PAR CONFERENCE Homeland Defense A Provider’s Perspective Lessons from TMI Dennis Felty November 15, 2001.
Privacy Information: A Consumer Action Project information.org Workplace Privacy Your rights on the job © Consumer Action 2009.
Legal and Ethical Issues. Major Topics Protecting Programs and Data Information and the Law Rights of Employees and Employers Software Failures Computer.
Forum IIIB Group 7 Open Access to Personal Information Introduction- Steve Ayers Pros- Michelle Peterson Cons- Christie Christman Conclusion- Audrey Clausen.
ISNE101 Dr. Ken Cosh. Review  Dependability  Reliability  How do we improve it?  Security  Threats & Countering the Threats.
Component 4: Introduction to Information and Computer Science Unit 2: Internet and the World Wide Web 1 Component 4/Unit 2Health IT Workforce Curriculum.
Unit 2 Human Rights Part 3 Civil and Human Rights.
Student Data and Confidentiality Parents Rights Schools’ Responsibilities.
© 2013 The McGraw-Hill Companies, Inc. All rights reserved. Ch 8 Privacy Law and HIPAA.
Chapter 4: Federalism Section 1-2
1 The Broader Picture Laws Governing Hacking and Other Computer Crimes Consumer Privacy Employee Workplace Monitoring Government Surveillance Cyberwar.
U.S. Department of Education Safeguarding Student Privacy Melanie Muenzer U.S. Department of Education Chief of Staff Office of Planning, Evaluation, and.
 Make a list of things you did today. From the time you got up until now.  Who you talked to? How you communicated?  What you did before you came to.
When Can You Redact Information Without Requesting an Attorney General Decision? Karen Hattaway Assistant Attorney General Open Records Division Views.
Welcome….!!! CORPORATE COMPLIANCE PROGRAM Presented by The Office of Corporate Integrity 1.
Information Security Legislation Moving ahead Information Security 2001 Professional Information Security Association Sin Chung Kai Legislative Councillor.
Teens lesson fourteen consumer privacy presentation slides 03/08.
“ Welcome to Seminar 8: Civil Liberties and Civil Rights.
Credit:  Cyber law refers to any laws relating to protecting the Internet and other online communication technologies.
1 Gordana Dodig-Crnkovic Department of Computer Science and Engineering Mälardalen University 2007 PROFESSIONAL ETHICS IN SCIENCE AND ENGINEERING CDT409.
Protecting Yourself from Fraud including Identity Theft Personal Finance.
Personal Privacy: Limited Disclosure using Cryptographic Techniques Mark Shaneck Karthikeyan Mahadevan SCLab.
Chapter 14.4 CIVIL LIBERTIES CHALLENGES This section focuses on government and civil liberties.
What is the difference between Civil Rights and Civil Liberties?
The Medical College of Georgia HIPAA Privacy Rule Orientation.
Chapter 6 Due Process and Other Protected Rights Section 2 Controversial Rights.
New Hire HIPAA Orientation. HIPAA Overview HIPAA is an acronym that stands for the Health Insurance Portability and Accountability Act of HIPAA.
1 HIPAA’s Impact on Depository Financial Institutions 2 nd National Medical Banking Institute Rick Morrison, CEO Remettra, Inc.
College lesson ten consumer privacy presentation slides 04/09.
Bellwork Think about this…. Historical Event
U.S. and Texas Politics and Constitution Civil Liberties I February 3, 2015 J. Bryan Cole POLS 1336.
privacy and information
Privacy and the Law.
The US Constitution.
Component 4: Introduction to Information and Computer Science Unit 2: Internet and the World Wide Web Lecture 4 This material was developed by Oregon.
Cyber Issues Facing Medical Practice Managers
The US Constitution.
HIPAA PRIVACY AWARENESS, COMPLIANCE and ENFORCEMENT
Employee Privacy and Privacy of Employee Information
CompTIA Security+ Study Guide (SY0-401)
Identity Theft Prevention Program Training
Teens lesson fourteen consumer privacy presentation slides 03/08.
Computer Security Social Legal and Ethical issues
APK Bellwork Think* Pair* Share
Colorado “Protections For Consumer Data Privacy” Law
The Health Insurance Portability and Accountability Act
Presentation transcript:

1 Gordana Dodig-Crnkovic Department of Computer Science and Engineering Mälardalen University 2003 PROFESSIONAL ETHICS IN SCIENCE AND ENGINEERING CD5590 LECTURE 10

2 Ethics, Privacy and Civil Liberties

3 Some common uses of data about people Public Information Business Transactions Birth Certificates Mail Orders Driver Licenses Telephone Orders Car Registrations Subscriptions Property Records Donations Marriage License Credit Cards Census Records Warranty Cards Telephone Directories Tattslotto,... Consumer Surveys Accounts Payments Passports Visas

4 which can lead to.. Multiple Mailing Lists Subscriptions Entertainment Specials Donations Memberships Catalogues Social Clubs Professional Development Some common uses of data about people

5 Public Information Business Transactions Birth Certificates Mail Orders Driver Licenses Telephone Orders Car Registrations Subscriptions Property Records Donations Marriage License Credit Cards Census Records Warranty Cards Telephone Directories Tattslotto,... Consumer Surveys Accounts Payments Passports Visas Ethics, Privacy and Security Some common uses of data about people

6 Multiple Mailing Lists Subscriptions Entertainment Specials Donations Memberships Catalogues Social Clubs Professional Development Ethics, Privacy and Security

7  Privacy: The right of people not to reveal information about themselves, the right to keep personal information from being misused  Electronic invasion of personal data has become a serious ethical issue Ethics, Privacy and Security

8 Invasion of Privacy. Would you agree to:  Your shopping habits, your income, to be available to any number of businesses ?  Your medical records being used by your employer as one of the means of making decision regarding promotions, hiring, redundancy ? Ethics, Privacy and Security

9 Ethics, Privacy and Security US  The rapid expansion of use of the Internet and E-Commerce has raised many problems with privacy aspects.  In America there exists the ‘Association of Corporate Privacy Officers’ which would indicate that there is much interest and concern regarding privacy of data.

10 Ethics, Privacy and Security US  Privacy Officers : - train employees about privacy - examine a company’s policies for potential risks - manage customer-privacy disputes - inform senior executives on how the company deals with privacy issues

11 Database Security: is the protection of a database from – unauthorised access – unauthorised modification – destruction PRIVACY is the right of individuals to have some control over information about themselves INTEGRITY refers to the correctness, completeness and consistency of data Security

12 AIMPREVENTS - Confidentiality- Unauthorised disclosure - Integrity- Unauthorised Amendment - Availability- Unauthorised Withholding Security Systems: 1. Computer Security 2. Communications Security - transmission - encryption 3. Procedural security 4. Physical security Security

13 Civil Rights and Civil Liberties

14 What are civil rights and what are civil liberties? Civil Rights = The right of every person to equal protection under the law and equal access to society’s opportunities and public facilities. Civil Liberties = Individual rights that are protected from infringement by government.

15 CIVIL LIBERTIES 1.The Bill of Rights 2.First Amendment: Freedom of Religion 3.First Amendment: Freedom of Speech and Press 4.The Right to Keep and Bear Arms 5.The Rights of Criminal Defendants 6.The Right to Privacy

16  Civil liberties are the personal rights and freedoms that the federal government cannot abridge, either by law, constitution, or judicial interpretation.  These are limitations on the power of government to restrain or dictate how individuals act. CIVIL LIBERTIES

17 The Right to Privacy  Privacy is not specifically mentioned in the Constitution, nevertheless some areas are to be off-limits to government interference.  Examples: – The right to Abortion – The right to Homosexuality – The Right to Die

18 Civil Liberties after Sept 11

19 Privacy before Sept. 11 th  Tradeoff between security and privacy has always been a major issue for most Americans  Most sided with privacy at the expense of security  84% of Americans were concerned about the government, businesses, or individuals collecting information on them

20 Privacy Before Sept 11 th, cont.  54% were “very concerned”  Only a minor portion of America (13%) supported FBI internet surveillance to catch criminals  62% of Americans thought that new laws should be created to guarantee that privacy would be protected from government agencies

 On September 11, 2001, terrorists attacked the World Trade Center in New York City and the Pentagon just outside Washington, D.C.

22 Shift in Public Opinion

23 Government Reaction  The government is reacting to public opinion polls and are passing new controversial laws that expand government power  Have already passed many ‘anti-terrorism’ bills that cover matters such as wiretaps, electronic surveillance, regulation of airports, etc.

24  Internet wiretapping scheme  Installed at ISPs (Internet Service Providers)  Maintained and operated by FBI  Monitors all , both incoming and outgoing

25 Cryptography  Evidence produced from the Libyan bombings that Osama bin Laden, the suspected mastermind behind the 9/11 attacks, used phones scrambled by strong cryptography to hide the planning of the Libyan bombings  Evidence produced by the US government suggests that similar methods were used by the terrorist network for 9/11 attacks as well

26 Cryptography  The US government has charged that such cryptography aids terrorism more than it protects privacy and therefore should be banned

27 Conclusions  Public opinion will most likely remain concerned with security for months and years to come  Government expanding law enforcement powers  Privacy subordinated public safety

28 Ethical Challenges in a Public Health Crisis – SARS Epidemic

29

30

31

32

33

34 Reference: Ross Upshur, University of Toronto