Ethical and Legal Issues Information Systems 337 Prof. Harry Plantinga.

Slides:



Advertisements
Similar presentations
Using National Geographics By Allyson Gately. ABOUT E-PALS E-Pals is a useful wiki that allows teachers, students and parents all around the world, to.
Advertisements

Fair Credit Reporting Act You must be told if information in your file has been used against you You can find out what is in your file You can dispute.
© 2014 Nelson Brown Hamilton & Krekstein LLC. All Rights Reserved PRIVACY & DATA SECURITY: A LEGAL FRAMEWORK MOLLY LANG, PARTNER, NELSON BROWN & CO.
Data Protection.
Christian Vargas. Also known as Data Privacy or Data Protection Is the relationship between collection and spreading or exposing data and information.
CNStats © 2008 State of the art solution for recording and analyzing site attendance statistics Why Choosing CNStats ?
Data Retention LIS 550 Winter 2010 Unsworth Tuesday, March 02, 2010.
FARMINGTON AREA PUBLIC SCHOOLS SUMMER TECHNOLOGY ACADEMY AUGUST 18TH, 2010 Web 2.0 Tools.
1 The Engineer as a Professional Privacy. 2 After reading the articles please answer the following questions. 1) Is privacy a concern that engineers have.
Chapter 9 e-Commerce Systems.
INTERNET and CODE OF CONDUCT
“If you build it, they will come.”. Virtual Business  There is much more that goes into a virtual business than just building the web site.  You will.
DATA PROTECTION AND PATIENT CONFIDENTIALITY IN RESEARCH Nic Drew Data Protection Manager University Hospital of Wales   
Class 13 Internet Privacy Law European Privacy.
Data Protection Paul Veysey & Bethan Walsh. Introduction Data Protection is about protecting people by responsibly managing their data in ways they expect.
Personal Data (Privacy) Ordinance Hong Kong Personal Data (Privacy) Ordinance Hong Kong by Stephen Lau Privacy Commissioner for Personal Data Hong Kong.
Data Protection Overview
How It Applies In A Virtual World
“Internet” and “Operator” (COPPA Statute) InternetOperator Collectively the myriad of computer and telecommunications facilities, including equipment.
© 2010 Dorsey & Whitney LLP Social Media Friday, September 17, 2010 The Committee on Finance & Information Technology (CFIT)
1 AQA ICT AS Level © Nelson Thornes Data Protection Act.
Eric J. Pritchard One Liberty Place, 46 th Floor 1650 Market Street Philadelphia, Pennsylvania (215)
An Educational Computer Based Training Program CBTCBT.
Computer Programming I
Computer Ethics.
Nilsa Polanco CMP 230 LA01 Meta Search Engine Presentation.
Component 4: Introduction to Information and Computer Science Unit 2: Internet and the World Wide Web 1 Component 4/Unit 2Health IT Workforce Curriculum.
Mi-Gyeong Gwak, Christian Vargas, Jonathan Vinson
Created by, Author Name, School Name—State FLUENCY WITH INFORMATION TECNOLOGY Skills, Concepts, and Capabilities.
7-Oct-15 Threat on personal data Let the user be aware Privacy and protection.
QUESTIONS ABOUT WEBSITES. But, how do you know if the information is good, accurate and reliable ? Websites from the Internet can be fast and easy to.
Privacy in computing Material/text on the slides from Chapter 10 Textbook: Pfleeger.
Student Technology Code of Ethics
Digital Citizenship Lesson 3. Does it Matter who has your Data What kinds of information about yourself do you share online? What else do you do online.
Lesson Title: Privacy Overview Dale R. Thompson Computer Science and Computer Engineering Dept. University of Arkansas 1 This.
1 Ethical Issues in Computer Science CSCI 328, Fall 2013 Session 15 Privacy as a Value.
The Data Protection Act What Data is Held on Individuals? By institutions: –Criminal information, –Educational information; –Medical Information;
Why the Data Protection Act was brought in  The 1998 Data Protection Act was passed by Parliament to control the way information is handled and to give.
From P3P to Data Licensing Cha, Shi-Cho ( 查士朝 ) and Joung, Yuh-zer ( 莊裕澤 ) Dept. of Information Management Nation Taiwan University, Taipei, Taiwan
Business Project Nicos Rodosthenous PhD 28/10/ /10/20141Dr Nicos Rodosthenous.
Legal issues The Data Protection Act Legal issues What the Act covers The misuse of personal data By organizations and businesses.
Data protection This means ensuring that stored data does not get changed, removed or accessed accidentally or by unauthorised people. Data can be corrupted,
Presentation will begin shortly. (Please Stand By)
ECT 455/HCI 513 ECT 4 55/HCI 513 E-Commerce Web Site Engineering Legal Issues.
Information Systems Unit 3.
University Website Office August 2002 University Web Guidelines ● Objectives ● Outline ● Development Process.
DATA ACCURACY- one of the issues of computer ethics. Providing inaccurate data input results in erroneous information & decision making. Information on.
Does It Matter Who Has Your Data? 1.Intro 2.Teach 1: Travel Safety Rules 3.Teach 2: How to Protect Your Data 4.Wrap-Up 5.Assessment 6.Extension Activity.
LEFIS ROVANIEMI MEETING 19TH 20TH JANUARY 2007 Privacy In The Web TATYANA STEFANOVA LEX.BG BULGARIA.
Data Protection and research Rachael Maguire Records Manager.
GCSE ICT Data and you: The Data Protection Act. Loyalty cards Many companies use loyalty cards to encourage consumers to use their shops and services.
Protection of Personal Information Act An Analysis on the impact.
Yes, it’s the holidays... A time of joy, a time of good cheer, a time of celebration... From the Office of the Chief Human Capital Officer (CHCO ) Privacy.
Government Protection Consumers protected by both laws and agencies at different levels Look at table on page 30.
Ways To Get More Traffic To Your Wordpress Ecommerce Website.
LIBS100 April 4, 2005 Career Exploration C- revisions Information Ethics.
IT Security  .
Data Protection and Confidentiality
SETTING UP OF E-COMMERCE WEBSITE
Consumer Health Informatics
Data Protection The Current Regime
Legal and Ethical Issues
Evaluating Web Resources
Data Protection & Freedom of Information- An Introduction
Component 4: Introduction to Information and Computer Science Unit 2: Internet and the World Wide Web Lecture 4 This material was developed by Oregon.
Computers and the Internet
Internet Privacy and You
Computer Programming I
Computer Security.
The activity of Art. 29. Working Party György Halmos
Presentation transcript:

Ethical and Legal Issues Information Systems 337 Prof. Harry Plantinga

Issues What ethical and legal issues arise in running a website? What ethical and legal issues arise in running a website?

Why do you run your site? Jesus' fundamental ethical principles: Love God above all, love your neighbor as yourself Jesus' fundamental ethical principles: Love God above all, love your neighbor as yourself You can do that by serving others with your site You can do that by serving others with your site You have been entrusted with readers' attention. Do something useful with it! You have been entrusted with readers' attention. Do something useful with it!

Ethics question Is it ethical to have advertising on your site? Is it ethical to have advertising on your site? How does advertising affect your site? Is it a win for users as well as you? How does advertising affect your site? Is it a win for users as well as you? What kinds of advertising should you use? What kinds of advertising should you use? How about targeted advertising based on user browsing history, etc? How about targeted advertising based on user browsing history, etc?

Ethics question Is it ethical to promote your site with mass ings? Is it ethical to promote your site with mass ings?

CAN SPAM Act Requirements of mass s: Requirements of mass s: Accurate from line & other headers Accurate from line & other headers Subject line is not deceptive Subject line is not deceptive Accurate physical address Accurate physical address Message may not be sent through open relay Message may not be sent through open relay Message may not use harvested addrs Message may not use harvested addrs A way to opt out with single click or web page A way to opt out with single click or web page Exemptions Exemptions Religious messages Religious messages Political messages Political messages National security messages National security messages

Issue Is it ethical to keep a guestbook at CCEL? Is it ethical to keep a guestbook at CCEL? What if people sign from a country where Christianity is illegal? What if people sign from a country where Christianity is illegal?

Ethics of Storing Data Is it ethical to keep access logs? Is it ethical to keep access logs? Who might want access? Who might want access? What harm could be done? What harm could be done? Why are you keeping the log? Why are you keeping the log? Is it ethical to store user names, addresses, credit card numbers, passwords, health problems, etc? Is it ethical to store user names, addresses, credit card numbers, passwords, health problems, etc? What ethical considerations apply to storing user data? What ethical considerations apply to storing user data?

Code of Fair Info Practices There must be no personal data record-keeping systems whose very existence is secret. There must be no personal data record-keeping systems whose very existence is secret. There must be a way for a person to find out what information about the person is in a record and how it is used. There must be a way for a person to find out what information about the person is in a record and how it is used. There must be a way for a person to prevent information about the person that was obtained for one purpose from being used or made available for other purposes without the person's consent. There must be a way for a person to prevent information about the person that was obtained for one purpose from being used or made available for other purposes without the person's consent. There must be a way for a person to correct or amend a record of identifiable information about the person. There must be a way for a person to correct or amend a record of identifiable information about the person. Any organization creating, maintaining, using, or disseminating records of identifiable personal data must assure the reliability of the data for their intended use and must take precautions to prevent misuses of the data. Any organization creating, maintaining, using, or disseminating records of identifiable personal data must assure the reliability of the data for their intended use and must take precautions to prevent misuses of the data.

Additions to the Code Three other principles might be added from the ACM Code of Ethics: Three other principles might be added from the ACM Code of Ethics: Only the necessary information collected Only the necessary information collected Data retention and disposal periods Data retention and disposal periods User data observed during normal system maintenance must be treated with confidentiality unless you are required to reveal it by law or organzational rules User data observed during normal system maintenance must be treated with confidentiality unless you are required to reveal it by law or organzational rules

Status of the Code Created by the HEW (Health, Education, Welfare) Advisory Committee on Automated Data Systems in 1972 Created by the HEW (Health, Education, Welfare) Advisory Committee on Automated Data Systems in 1972 Not legally binding Not legally binding Some of its principals were adopted in laws governing data in particular areas: Some of its principals were adopted in laws governing data in particular areas: financial data financial data medical records medical records

Examples Is it ethical to use Hymnary user statistics to improve search results? Is it ethical to use Hymnary user statistics to improve search results? Is it ethical for a library online catalog to show most popular search results first? Is it ethical for a library online catalog to show most popular search results first?

Ethics of SEO Is it ethical to buy links in order to get a better SEO ranking? Is it ethical to buy links in order to get a better SEO ranking? What will the effect be on effectiveness of search by Google users? What will the effect be on effectiveness of search by Google users? This is a hotly-debated issue. This is a hotly-debated issue. It's against Google's rules; if you are caught you will be penalized by Google It's against Google's rules; if you are caught you will be penalized by Google Is it ethical to target particular keywords and modify your web pages to get better search results? Is it ethical to target particular keywords and modify your web pages to get better search results?

Privacy Policies California requires commercial websites that collect personally identifiable information to post a privacy policy. It must California requires commercial websites that collect personally identifiable information to post a privacy policy. It must Identify the categories of personally identifiable information that are collected Identify the categories of personally identifiable information that are collected Describe how consumers can review and make changes Describe how consumers can review and make changes Describe how consumers can learn of changes in the policy Describe how consumers can learn of changes in the policy Identify the effective date of the policy Identify the effective date of the policy

Privacy Policy Tips If you do business in California, make it legal in CA If you do business in California, make it legal in CA Make it easy to read Make it easy to read Abide by it! It can be enforced by the FTC (see Wikipedia article on e-commerce) Abide by it! It can be enforced by the FTC (see Wikipedia article on e-commerce)

Privacy Policy tool Here's an online tool to create a privacy policy Here's an online tool to create a privacy policyonline tool to create a privacy policyonline tool to create a privacy policy Create one for your term project website Create one for your term project website