Ethics and Privacy in Cyberspace Lesson 20. Privacy and Other Personal Rights Thomas J. Watson, Chairman of the Board for IBM, once stated: Today the.

Slides:



Advertisements
Similar presentations
/0403 © 2004 Business & Legal Reports, Inc. BLRs Training Presentations Privacy Issues in the Workplace.
Advertisements

HIPAA Privacy Practices. Notice A copy of the current DMH Notice must be posted at each service site where persons seeking DMH services will be able to.
HIPAA Privacy Training. 2 HIPAA Background Health Insurance Portability and Accountability Act of 1996 Copyright 2010 MHM Resources LLC.
Confidentiality and HIPAA
HIPAA – Privacy Rule and Research USCRF Research Educational Series March 19, 2003.
Increasing public concern about loss of privacy Broad availability of information stored and exchanged in electronic format Concerns about genetic information.
Information Risk Management Key Component for HIPAA Security Compliance Ann Geyer Tunitas Group
Health Insurance Portability and Accountability Act (HIPAA)HIPAA.
1 HIPAA Education CCAC Professional Development Training September 2006 CCAC Professional Development Training September 2006.
Privacy Laws & Higher Education. Agenda 1.Five Privacy Laws a.FERPA b.HIPAA c.GLB d.FACTA Disposal Rule e.CAN-SPAM 2.Overview of the Laws a.What does.
Today’s Schools face:  Numerous State and Federal Regulations  Reduced Technology Funding  More Stringent Guidelines for Technology Use.
Regulatory Issues in Campus Computing Privacy and Security in a Digital World Presented by David Gleason, Esq. University Counsel University of Maryland,
COMPLYING WITH HIPAA PRIVACY RULES Presented by: Larry Grudzien, Attorney at Law.
HIPAA THE PRIVACY RULE Reviewed December HISTORY In 2000, many patients that were newly diagnosed with depression received free samples of anti-
IS3350 Security Issues in Legal Context
Right to Privacy: The Unwritten Right
Policing the Internet: Higher Education Law and Policy Rodney Petersen, Policy Analyst Wendy Wigen, Policy Analyst EDUCAUSE.
Your Rights Under the Internet Law By: Sannita S. Lam.
2/16/2010 The Family Educational Records and Privacy Act.
FERPA 2008 New regulations enact updates from over a decade of interpretations.
EMPLOYMENT LAW CONSIDERATIONS March 16, Difference between being an employer vs. a law enforcement officer Garrity – this case involves employees’
1 FERPA and Student Privacy in Records of University Research ECURE March 1, 2005 Richard Rainsberger, Ph.D. Consultant, Education Records Law and Privacy.
Developed by Susan Carle under NIC Cooperative Agreement 06S20GJJ1 EMPLOYMENT LAW CONSIDERATIONS Investigating Allegations of Staff Sexual Misconduct with.
Final PowerPoint Presentation. The Wide World of Censorship By: Donnia Zack-Williams Sarah D’Orsie Katie Sullivan.
Health Sciences.  Principles  Code of Conduct for right and wrong  Values  Core of all health care decisions.
2015 ANNUAL TRAINING By: Denise Goff
HIPAA PRIVACY AND SECURITY AWARENESS.
Privacy and Security of Protected Health Information NorthPoint Health & Wellness Center 2011.
And how it applies to suicide prevention programs in Utah schools February 28, 2014.
Security and Privacy Strategic Global Partners, LLC.
Confidentiality and Public Information Act LISD Special Education Department Training SY
How Hospitals Protect Your Health Information. Your Health Information Privacy Rights You can ask to see or get a copy of your medical record and other.
Policy Review (Top-Down Methodology) Lesson 7. Policies From the Peltier Text, p. 81 “The cornerstones of effective information security programs are.
FERPA Refresher Training Start. Page 2 of 11 Copyright © 2006 Arizona Board of Regents FERPA Refresher Training What is FERPA FERPA stands for Family.
Medical Law and Ethics, Third Edition Bonnie F. Fremgen Copyright ©2009 by Pearson Education, Inc. Upper Saddle River, New Jersey All rights reserved.
Family Educational Rights and Privacy Act (FERPA) UNION COLLEGE.
Securing Patient-Related Data: The Impact of HIPAA Module VI NUR 603 Russ McGuire.
Copyright © 2009 by The McGraw-Hill Companies, Inc. All Rights Reserved. McGraw-Hill Chapter 6 The Privacy and Security of Electronic Health Information.
Health Insurance Portability and Accountability Act of 1996 HIPAA Privacy Training for County Employees.
© 2013 The McGraw-Hill Companies, Inc. All rights reserved. Ch 8 Privacy Law and HIPAA.
Chapter 7—Privacy Law and HIPAA
The right item, right place, right time. DLA Privacy Act Code of Fair Information Principles.
HIPAA BASIC TRAINING Presented by Anderson Health Information Systems, Inc.
HIPAA BASIC TRAINING MODULE 1C – Overview (For staff who do not generally create Protected Health Information) Anderson Health Information Systems, Inc.
HIPAA THE PRIVACY RULE. 2 HISTORY In 2000, many patients that were newly diagnosed with depression received free samples of anti- depressant medications.
1 CONFIDENTIALITY. 2 Requirement Under IDEA 34 CFR Sec (c) All staff collecting or using personally identifiable information in public education.
Copyright © 2015 by Saunders, an imprint of Elsevier Inc. All rights reserved. Chapter 3 Privacy, Confidentiality, and Security.
Intellectual Property. Confidential Information Duty not to disclose confidential information about a business that would cause harm to the business or.
Protecting Yourself from Fraud including Identity Theft Personal Finance.
Sharing Information (FERPA) FY07 REMS Initial Grantee Meeting December 5, 2007, San Diego, CA U.S. Department of Education, Office of Safe and Drug-Free.
Legal, Regulations, Investigations, and Compliance Chapter 9 Part 2 Pages 1006 to 1022.
CONFIDENTIALITY. Three Confidentiality Laws 1.FERPA-Family Education Rights and Privacy Act (State Policy 4350: Procedures for the Collection, Maintenance.
Table of Contents. Lessons 1. Introduction to HIPAA Go Go 2. The Privacy Rule Go Go.
Protection of Personal Information Act An Analysis on the impact.
CHAPTER SIXTEEN The Right to Privacy and Other Protections from Employer Intrusions.
The Health Insurance Portability and Accountability Act (HIPAA) requires Plumas County to train all employees in covered departments about the County’s.
LAW RIGHT TO PRIVACY NOTES 1. Def: Right protecting citizens from unreasonable interference by government 2. No right to privacy in the Constitution.
1 HIPAA’s Impact on Depository Financial Institutions 2 nd National Medical Banking Institute Rick Morrison, CEO Remettra, Inc.
Privacy and the Law.
Privacy Group 1 Gerson De Conti II Robert Rhyne Chris Glasnapp
Privacy & Confidentiality
Current Privacy Issues That May Affect Your Credit Union
Spencer County Public Schools Responsible Use Policy for Technology and Related Devices Spencer County Public Schools has access to and use of the Internet.
Employee Privacy and Privacy of Employee Information
Data Protection principles
CompTIA Security+ Study Guide (SY0-401)
Information management and communication
Lesson 1: Introduction to HIPAA
Presentation transcript:

Ethics and Privacy in Cyberspace Lesson 20

Privacy and Other Personal Rights Thomas J. Watson, Chairman of the Board for IBM, once stated: Today the Internal Revenue Service has our tax returns. The Social Security Administration keeps a running record on our jobs and our families. The Veterans Administration has medical records on many of us, and the Pentagon our records of military service. So, in this scatteration lies our protection. But put everything in one place, computerize it, and add to it without limit, and a thieving electronic blackmailer would have just one electronic safe to crack to get a victim’s complete dossier, tough as that job may be. And a malevolent Big Brother would not even have to do that: he could sit in his office, punch a few keys, and arm himself with all he needed to know to crush any citizen who threatened his power. Therefore, along with the bugged olive in the martini, the psychological tests, and the spiked microphone, the critics have seen “data surveillance” as an ultimate destroyer of the individual American citizen’s right to privacy – his right to call his soul his own.

Privacy and Other Personal Rights  “Security has sometimes been defined as protecting the computer against people, and privacy as protecting people against the computer.”  From our perspective, we must be concerned with protecting information we may have on clients/customers from unauthorized access or inappropriate use.

Privacy and Other Personal Rights  The Federal Privacy Act There is a basic rule that government files are open to the public, unless there is a specific reason, enacted by the legislature, saying that certain files are not available. –Freedom of Information Act Agencies can maintain information about individuals only when it is relevant and necessary to accomplish the agency’s purpose. Prohibits the disclosure of any record except within the agency maintaining it unless the individual makes a written request for the data.

Privacy and Other Personal Rights Employee rights –With respect to , the company should have a clearly stated policy as to the use of the system for personal communications. –It should explicitly state that supervisory personnel have the right to read all communications if the company intends to monitor.

Motivation -- Individual Rights  Rights to Privacy & Free speech Where do these rights come from? Are they universal?  Privacy, who “owns” the info about you? Check a company’s privacy statement

Privacy – Toysmart

Privacy

Laws  Electronic Communications Privacy Act (ECPA) (1986) was adopted to address the legal privacy issues that were evolving with the growing use of computers and other new innovations in electronic communications. The ECPA updated legislation passed in extended privacy protection outlined in the earlier legislation to apply to radio paging devices, electronic mail, cellular telephones, private communication carriers, and computer transmissions.

GLB  Requires clear disclosure by all financial institutions of their privacy policy regarding the sharing of non-public personal information with both affiliates and third parties.  Requires a notice to consumers and an opportunity to "opt-out" of sharing of non-public personal information with nonaffiliated third parties subject to certain limited exceptions.  Clarifies that the disclosure of a financial institution's privacy policy is required to take place at the time of establishing a customer relationship with a consumer and not less than annually during the continuation of such relationship.

HIPAA  Organizations involved in the maintenance or transmissions of health information pertaining to individuals must: Assess risks to and vulnerabilities in their systems Develop, implement, and maintain appropriate security measures to safeguard the records Measures taken should be documented and kept current  Addressed four categories of requirements Administrative procedures Physical safeguards Technical security services Technical mechanisms

Criminal Acts  Interception of Communication  Intrusion and Trespass  Destruction of Property (web defacement)  Denial of Service  Fraud  Extortion

Motivation -- Individual Rights  Rights to Privacy & Free speech Where do these rights come from? Are they universal?  Privacy, who “owns” the info about you? Check a company’s privacy statement  Conflicts between free speech and harmful or disturbing speech flaming -vs- defamation  Conflicts over censorship some countries restrict satellite and Internet access for national interests or religious reasons some restrict to protect groups such as children  Conflicts over government surveillance Carnivore

Ethical Behavior  An example from the Unix world A person has a file in their home directory with protection bits set to “777”. Have they –Granted you Permission to view the file (i.e. they are permission bits). –Granted you the Capability to view the file (in which case what mechanism is used to grant permission)?

Societal norms, expectations, perceptions  Do they affect our view? Think Perception Management!  How are “hackers” portrayed in the press?  How are they portrayed in things such as editorials or cartoons?

Summary  What is the Importance and Significance of this material?  How does this topic fit into the subject of “Voice and Data Security”?