Ethical Issues1 Ethics. Ethical Issues2 Modern Problems Change in cost of duplication of information –before xerox & computer disks vs. after Change in.

Slides:



Advertisements
Similar presentations
TECHNO-TONOMY Privacy & Autonomy in a Networked World Learning Module 2: Legislating Privacy: Your Rights.
Advertisements

Visit: What is a Vehicle Insurance and How Does It Work? Vehicle insurance (also known as auto insurance, GAP insurance,
Fair Credit Reporting Act You must be told if information in your file has been used against you You can find out what is in your file You can dispute.
Quick Quiz Identity Theft Protection and Your Law Firm.
Laws and Their Ethical Foundation Chp 1 Section 1-2
FERPA Refresher Training Start. Page 2 of 11 Copyright © 2006 Arizona Board of Regents FERPA Refresher Training What is FERPA FERPA stands for Family.
Chapter 3 Vocabulary US Government.
I.D. Theft Alaska’s New Protection of Personal Information Act Ed Sniffen Senior Assistant Attorney General Alaska Department of Law.
Identity Theft Someone steals your personal information for his/her own gain It’s a crime!
Children's Online Privacy Protection Act and the Video Privacy Protection Act By: Alana Rushing.
Miranda Rights 5th Amendment
Lawmaking Chapter 2 Notes.
Chapter Extension 24 Computer Crime and Forensics © 2008 Pearson Prentice Hall, Experiencing MIS, David Kroenke.
Goal 5 Bail Debate Electronic Media Felony Grand Jury MADD Misdemeanor Plea Pocket Veto US Supreme Court.
The Problem of Temporary License Plates in North Carolina.
Software Copyright. Learning Objectives: By the end of this topic you should be able to:
Applications with Warrants In Mind. The Law  Why are there laws specifically for computer crimes?  A persons reasonable right to privacy  The nature.
Privacy in Computing Legal & Ethical Issues in Computer …Security Information Security Management …and Security Controls Week-9.
Private Detective & Investigator Quristain Hand. What Do They Do? (Duties)  Interview people to gather information  Do various types of searches, using.
Chapter Nine: Defendants and Victims. Defendants and Victims are participants of the courtroom workgroup. Defendants and Victims are both subjects and.
Protecting your money: Identity Theft
24 Legal and Ethical Considerations. 24 Legal and Ethical Considerations.
The Social Context of Computing Foundation Computing Never underestimate the power of human stupidity.
Chapter 18-Internet Law www World Wide Web-Wild,Wild West? New Global Community has caused many ethical dilemmas Unequal Access increasing wealth gap.
WHO’S IN YOUR “WALLET” WHO’S IN YOUR “WALLET” YOU BETTER “RECOGNIZE” YOU BETTER “RECOGNIZE” STEPPING $200 $200 $300 $400 $500 $400 $300 $200 $500 $400.
Legal and Ethical Issues. Major Topics Protecting Programs and Data Information and the Law Rights of Employees and Employers Software Failures Computer.
Forum IIIB Group 7 Open Access to Personal Information Introduction- Steve Ayers Pros- Michelle Peterson Cons- Christie Christman Conclusion- Audrey Clausen.
PRIVACY Britt, Beattie and Amy. What are the issues regarding privacy on the internet? Privacy issues arise everyday. Examples of when privacy becomes.
Explain the significance of the following terms from Sections 8 and 9 of the Constitution as they relate to Congress: The Elastic Clause Congress can make.
Criminal Investigation Part 4 Records as an Investigative Aid.
Ch 8: Security Issues, Ethics, and Emerging Technologies in Education
Consumer Reports & Scores Quiz Game Test your knowledge A Consumer Action Training Game © 2010.
CYBER CRIME.
Chapter 2 Interrogation and Forensic Reporting
Privacy Policy, Law and Technology Carnegie Mellon University Fall 2004 Lorrie Cranor 1 Identity and biometrics.
The Nature of Evidence A Guide to Legal Evidence & the Courts.
For Computer Use in Business
Home Juvenile vs. Criminal Law Juvenile or Adult? Purpose of Punishment MN Juvenile Justice Juvenile Justice Jeopardy Juvenile Justice Jeopardy
Information Anxiety By Meghan Randinelli. Introduction Greatest problem concerning ethical information technology (IT) is personal privacy Greatest problem.
The Right to Privacy. No where in the Constitution are the words “right to privacy”
Why the Data Protection Act was brought in  The 1998 Data Protection Act was passed by Parliament to control the way information is handled and to give.
Security, Social and Legal Issues Regarding Software and Internet.
Application Forms. 2 HR Planning Job analysis Job specification Job Description Job Advertisement How to apply? Application or Resume/CV.
By: Megan and Natalia.  The person that runs the executive branch is the president  The job of the executive branch is to make sure that laws are carried.
 It is a branch of FORENSIC SCIENCE for legal evidence found in computer  It refers to detail investigation of the computers to carry out required tasks.
Types of Federal Courts The Constitution created only the Supreme Court, giving Congress the power to create any lower, or “inferior,” courts as needed.
Ethical Internet Use TECH 503 By A. Greenwell. Ethics in the Virtual World We all grow up learning the rules, regulations, and laws of the real world.
A Dual Court System Business Law. Previously…  Explain the need for laws.  Compare the different sources of law.  Examine the constitutional basis.
Higher Administration- exam technique1 Higher Admin Exam technique - Integrated question.
HOSPITALITY & TOURISM 5.02A Interpret the nature of business ethics and social responsibility 5.02B Exemplify legal issues affecting businesses.
Rules of the Road Chapter One
By: Ivelisse Avila What your zip code reveals about you By: Melanie Hicken Source: CNN Money; April 10, 2013.
Importance of Employment Background Checks By: Jeff Bannister weservepapers.com.
Security in Computing  Privacy in Computing  Legal & Ethical Issues in Computer Security  Information Security Management and Security Controls.
Computer Technology Timpview High School
Patriot Act (2002)Patriot Act (2002) Dylan Plassmeyer-Pd:8.
1 Law, Ethical Impacts, and Internet Security. 2 Legal Issues vs. Ethical Issues Ethics — the branch of philosophy that deals with what is considered.
ANONYMITY, JUVENILES AND SEX OFFENCES. JUVENILES  The age of criminal responsibility is 10 – nobody under that age can be prosecuted.  “Juvenile” defendants.
Ethical Hacking and Network Defense. Contact Information Sam Bowne Sam Bowne Website: samsclass.info Website:
 Evidence : Something that tends to establish or disprove a fact.  Examples of evidence: › Documents › Testimony › Other objects.
APPEALS Appeal against conviction Appeal against sentence Generally only by the defendant if he/she is found guilty (but the Prosecution can appeal a Not.
What laws should the police focus on?. A case in the news... Find out why Christopher Halliwell nearly got away with murder. 'Don't ask me why because.
Computer Forensics By Chris Brown. Computer Forensics Defined Applying computer science to aid in the legal process Utilization of predefined set of procedures.
What I knowWhat I wonderWhat I learned Criminal Law Civil Law Military Justice Juvenile Justice.
Data protection act. During the second half of the 20th century, businesses, organisations and the government began using computers to store information.
Identity Theft It’s a crime!
Mrs. Esman Computer Special
Security, Social and Legal Issues Regarding Software and Internet
Data Protection GCSE ICT Mrs N Steventon-2005.
Presentation transcript:

Ethical Issues1 Ethics

Ethical Issues2 Modern Problems Change in cost of duplication of information –before xerox & computer disks vs. after Change in cost of data collection & data analysis –manual techniques vs. automatic Results Ethical questions arise that could not have been a problem before.

Ethical Issues3 Privacy Issues Since information is the essence of the modern Industrial Revolution, privacy is an easy victim. Social Security Number Driver License Medical Records Arrest (& Conviction) Records

Ethical Issues4 Privacy & the Soc. Sec. Nmbr. The Social Security Number was originally set up as a part of a national retirement system, it is now extensively used as a “human identification” number. It can be (and has been) used in “identity theft” by creating records that allow a criminal to purchase items against the credit of another person.

Ethical Issues5 Privacy & the Driver License Designed to control access to the “permission to drive”. Since it is required that a driver keep the address current, and since its existence is a public record, the tape of these records has been easily available for sale from many states. This rule is changing as we watch.

Ethical Issues6 Privacy & Medical Records Nearly universally linked via the Social Security Number, these records can and have been used to deny employment to people who have difficult-to-treat illnesses.

Ethical Issues7 Privacy & Videotape Rentals The Bork Law is an example of one way to solve the problem of Privacy in the Information Age. When Judge Bork was being considered for the US Supreme Court, his videotape rental data was introduced as evidence. Congress was so incensed at this that a special law was passed.… enough said about that.

Ethical Issues8 What is Ethics Ethics is usually considered a personal thing. Professional Groups often set up codes of ethics. These codes are, perhaps, half way between personal ethics and legal requirement.