Privacy, Security, Intellectual Property and Responsible Use Policy Issue Spotting! Ucosmic Tracy Mitrano.

Slides:



Advertisements
Similar presentations
Class 11: Information Systems Ethics and Crime MIS 2101: Management Information Systems Based on material from Information Systems Today: Managing in the.
Advertisements

Strand 1 Social and ethical significance. Reliability and Integrity Reliability ◦Refers the operation of hardware, the design of software, the accuracy.
Computer Forensics BACS 371
Reliability and Security. Security How big a problem is security? Perfect security is unattainable Security in the context of a socio- technical system.
Tales from the Trenches Copyright Long, Mitrano, McGovern, and Orr, This work is the intellectual property of the authors. Permission is granted.
Company LOGO Copyright Carrie Kerskie Data Breach & Identity Theft By Carrie Kerskie Kerskie Group, Inc.
Unit 4 – Impact of the use of IT on Business Systems.
What distinguishes cyber crime from “traditional” crime? What distinguishes cyber crime from “traditional” crime? How has the Internet expanded opportunities.
BY: BRENT MILLER. What is Computer Crime? Crime involving a computer and a network. A computer may be used or targeted. Divided into two categories: Crimes.
Social Media Jeevan Kaur, Michael Mai, Jing Jiang.
Computer Law University of Palestine University of Palestine Eng. Wisam Zaqoot Eng. Wisam Zaqoot Feb 2010 Feb 2010 ITSS 4201 Internet Insurance and Information.
Arnold Bregt SDI as an organisational infrastructure: Policy & Legal issues 0.
LEFIS General Assembly, Wrocław Sept Continuing education Andrzej Adamski, Nicolaus Copernicus University, Poland.
Tackling IT crime in a global context: the Convention on Cybercrime 3 years after Julio Pérez Gil University of Burgos, Spain.
Unethical use of Computers and Networks
Crime & Malpractice AS Module Heathcote Ch. 10.
E-Rule. What is cyber crimes Cyber crime encompasses any criminal act dealing with computers and networks (called hacking). Additionally, cyber crime.
C YBER C RIME any criminal act dealing with computers and networks traditional crimes conducted through the Internet.
ETHICS OVERVIEW CS10 Winter Any ethical issues from ICTD discussions?
IBT - Electronic Commerce Privacy Concerns Victor H. Bouganim WCL, American University.
L ESSON 2 A website is a collection of different types of data, which can be anything like text, graphics, videos etc. combined together to provide.
LESSON 2: Internet, Computer Ethics and Security
CAN I GET IN TROUBLE USING A... COMPUTER? Or do computers solve all of life’s problems?
Author: Victor Rosenberg, 2010 License: Unless otherwise noted, this material is made available under the terms of the Creative Commons Attribution 3.0.
COPYRIGHT © 2011 South-Western/Cengage Learning. 1 Click your mouse anywhere on the screen to advance the text in each slide. After the starburst appears,
IT and the LAW. The Computer Misuse Act of 1990 In the early 1980s in the UK, hacking was not illegal. Some universities stipulated that hacking, especially.
Ethical and Legal Practices in INFORMATION TECHNOLOGY.
Everyone has a duty to comply with the Act, including employers, employees, trainees, self-employed, manufacturers, suppliers, designers, importers of.
Management of Data as Responsible Use ICPL Information Privacy and Security As usual in higher education, different institution will have, and take,
1 The Broader Picture Chapter 12 Copyright 2003 Prentice-Hall.
Welcome….!!! CORPORATE COMPLIANCE PROGRAM Presented by The Office of Corporate Integrity 1.
Territory Insurance Conference, resilient future Mr Ralph Bönig, Special Counsel, Finlaysons Cyber Times and the Insurance Industry Territory Insurance.
Digital Millennium Copyright Act (DMCA) The Digital Millennium Copyright Act is a United States copyright law that was signed into law by Bill Clinton.
Comprehensive Volume, 18 th Edition Chapter 11: Cyberlaw.
Intellectual Property. Confidential Information Duty not to disclose confidential information about a business that would cause harm to the business or.
Strategic Agenda We want to be connected to the internet……… We may even want to host our own web site……… We must have a secure network! What are the.
Chapter 4: Laws, Regulations, and Compliance
Considerations on barriers to data sharing Elaine Collier, MD National Center for Research Resources National Institutes of Health.
Social and Ethical Issues Overview of strand 1. Topics of strand 1 1. Reliability and integrity 2. Security 3. Privacy and anonymity 4. Intellectual property.
Computing and Ethics & The Law. The Law Copyright, Designs and Patents Act (1988) Computer Misuse Act (1990) Data Protection Act (1998) (8 Main Principles)
Data Protection Act INFO2009 A film and a quiz 5/ DPA, BBC Test Bite + Barry's Bad Data Day.
Privacy CSC385 Kutztown University Fall 2009 Oskars J. Rieksts.
Cyber Security and how to safeguard data in the ‘Cloud’ Claire Jacques 21 April 2016.
CyberLaw. Assignment Review Cyber LawCyberLaw 6/23/2016 CyberLaw 3 Securing an Organization  This Chat: CyberLaw and Compliance –Forensics –Privacy.
Cyber Insurance Risk Transfer Alternatives Heather Soronen - Operations Director Rocky Mountain Insurance Information Association.
Privacy. Some Web Science Issues Kieron O’Hara 29 November 2011.
TYLER GROUP
Global One internet, worldwide Uncitral WTO Some laws: –Communications Decency Act –Child Online Protectioon Act –Children’s Internet Protection Act.
Australia Cybercrime Capacity Building Conference April 2010 Brunei Darussalam Ms Marcella Hawkes Director, Cyber Security Policy Australian Government.
Cyber Insurance Risk Transfer Alternatives
MGMT 452 Corporate Social Responsibility
Attention Identity theft Definition
Networking 2002 USA-Patriot Act Tracy Mitrano Cornell University
Information Technology Sector
Internet Governance: An Analysis from Developing country’s perspective
Google company intro information assurance
Five Unethical Uses of Computers
EU Directive 95/46/EC (Paragraph 2) “Whereas data-processing systems are designed to serve man; whereas they must Respect their fundamental rights.
6. Politics, Ethics and Law
GENERAL DATA PROTECTION REGULATION (GDPR)
Cyber Issues Facing Medical Practice Managers
Computers and Homeland Security
Overview of the Budapest Convention on Cybercrime (2001)
Social Issues in Computing
Social Issues in Computing
Expression of Needs for the Research Centre
Standard 6: Educational Leaders understand the social, legal, and ethical issues related to technology and model responsible decision-making related to.
Data Protection What can I do? GDPR Principles General Data Protection
Code of Conduct By Leo Coroneos
COSC-100 (Elements of Computer Science) Prof. Juola
Presentation transcript:

Privacy, Security, Intellectual Property and Responsible Use Policy Issue Spotting! Ucosmic Tracy Mitrano

Privacy International Law – Comprehensive Approach E.U. and most developed countries – Notice – Transparency – Relevance – Security – Sectoral Approach U.S. almost singularly – Safe Harbors for E.U. from data handling laws – Absence of international substantive law

Security Hacking – Criminals – Hacktavists – Persistent Nation State Attacks

Intellectual Property Software – Open source regimes Important to make some claim so it is not appropriated! Content – Copyright regimes Same: make a claim so it is not appropriated!

Responsible Use That which is either not covered by privacy, security and intellectual property, i.e. use for any form of intimidation, identity theft or fraud, harrasment Form Bite size? Whole document – Depends on the culture, tradition, audience and tone you want to set.