1 Gordana Dodig-Crnkovic Department of Computer Science and Engineering Mälardalen University 2007 PROFESSIONAL ETHICS IN SCIENCE AND ENGINEERING CDT409.

Slides:



Advertisements
Similar presentations
TECHNO-TONOMY Privacy & Autonomy in a Networked World Learning Module 2: Legislating Privacy: Your Rights.
Advertisements

Chapter 4: Federalism.
DATA PROTECTION and Research University Research Ethics Committee – David Cauchi David Cauchi Office of the Commissioner for Data Protection.
US Constitution and Right to Privacy Generally only protects against government action Doesn’t obligate government to do something, but rather to refrain.
Richard Warner USA Patriot Act: Money Laundering Provisions.
1. As a Florida KidCare community partner families entrust you to not only help them navigate the Florida KidCare system but to keep the information they.
Increasing public concern about loss of privacy Broad availability of information stored and exchanged in electronic format Concerns about genetic information.
1 HIPAA Education CCAC Professional Development Training September 2006 CCAC Professional Development Training September 2006.
Chapter 17 Law and Terrorism.
Legal, Ethical, and Professional Issues in Information Security
DATA PROTECTION and Research University Research Ethics Committee – David Cauchi Office of the Data Protection Commissioner.
Insights on the Legal Landscape for Data Privacy in Higher Education Rodney Petersen, J.D. Government Relations Officer and Security Task Force Coordinator.
Higher Administration and IT Administrative Practices.
The role of the Office of the Privacy Commissioner in telecommunications Andrew Solomon Director, Policy.
1 The Engineer as a Professional Privacy. 2 After reading the articles please answer the following questions. 1) Is privacy a concern that engineers have.
CSE 4482, 2009 Session 21 Personal Information Protection and Electronic Documents Act Payment Card Industry standard Web Trust Sys Trust.
3 Ethics and Privacy.
Legislation Who governs e-commerce?. E-commerce is regulated by laws and guidelines. These aim to ensure that sites operate effectively and that online.
Data Protection: International. Data Protection: a Human Right Part of Right to Personal Privacy Personal Privacy : necessary in a Democratic Society.
Tina Kraigher and Milena Podjed-Fabjančič 18 April 2010 Processing of Telephone Traffic Data of Employees ( a Case Study )
1 When hate speech tangles privacy... When hate speech tangles privacy...
Teresa Macklin Information Security Officer 27 May, 2009 Campus-wide Information Security Activities.
Handling information 14 Standard.
E-commerce Law Consumer Protection. This lecture will examine legislation protecting consumers. We will look specifically at: –Consumer Protection (Distance.
1 International Forum on Trade Facilitation May 2003 Trade Facilitation, Security Concerns and the Postal Industry Thomas E. Leavey Director General, UPU.
What is Law? Jurisprudence is devoted to answering this question!
1 Gordana Dodig-Crnkovic Department of Computer Science and Engineering Mälardalen University 2003 PROFESSIONAL ETHICS IN SCIENCE AND ENGINEERING CD5590.
Professional Values and Basic Business Legislation.
7-Oct-15 Threat on personal data Let the user be aware Privacy and protection.
The Eighth Asian Bioethics Conference Biotechnology, Culture, and Human Values in Asia and Beyond Confidentiality and Genetic data: Ethical and Legal Rights.
Ch. 24: Social and Ethical Responsibility. Social Responsibility  What is Social Responsibility?  More than running your enterprise responsibility every.
Unit 2 Human Rights Part 3 Civil and Human Rights.
Privacy Professional Practice for Computer Science Guest Lecture, 05 March 2007 Philippa Lawson Director, Canadian Internet Policy & Public Interest Clinic.
IBT - Electronic Commerce Privacy Concerns Victor H. Bouganim WCL, American University.
What is personal data? Personal data is data about an individual which they consider to be private.
© 2013 The McGraw-Hill Companies, Inc. All rights reserved. Ch 8 Privacy Law and HIPAA.
1 The Broader Picture Laws Governing Hacking and Other Computer Crimes Consumer Privacy Employee Workplace Monitoring Government Surveillance Cyberwar.
Socratic Seminar Units 1-6. Unit 1: Principles of Government What were some of the reasons that the text indicated for governments forming? What effects.
6 Ethics and Privacy.
PROTECTION OF PERSONAL DATA. OECD GUIDELINES: BASIC PRINCIPLES OF NATIONAL APPLICATION Collection Limitation Principle There should be limits to the collection.
Data protection and European citizens’ initiatives
When Can You Redact Information Without Requesting an Attorney General Decision? Karen Hattaway Assistant Attorney General Open Records Division Views.
Principles of LPSCS. Copyright © Texas Education Agency All rights reserved. Images and other multimedia content used with permission. Copyright.
Information Security Legislation Moving ahead Information Security 2001 Professional Information Security Association Sin Chung Kai Legislative Councillor.
Information Technology & Ethics. Impact The impact of IT on information and communication can be categorized into 4 groups: privacy, accuracy, property,
“ Welcome to Seminar 8: Civil Liberties and Civil Rights.
The Protection of Personal Information Bill 13 February
James Fox Shane Stuart Danny Deselle Matt Baldwin Acceptable Use Policies.
Intellectual Property. Confidential Information Duty not to disclose confidential information about a business that would cause harm to the business or.
Personal Privacy: Limited Disclosure using Cryptographic Techniques Mark Shaneck Karthikeyan Mahadevan SCLab.
GCSE ICT Data and you: The Data Protection Act. Loyalty cards Many companies use loyalty cards to encourage consumers to use their shops and services.
© University of Reading Lee Shailer 06 June 2016 Data Protection the basics.
Presented by Ms. Teki Akuetteh LLM (IT and Telecom Law) 16/07/2013Data Protection Act, 2012: A call for Action1.
Protection of Personal Information Act An Analysis on the impact.
Clark Holt Limited (Co. No ), Hardwick House, Prospect Place, Swindon, SN1 3LJ Authorised and regulated by the Solicitors Regulation.
CHAPTER SIXTEEN The Right to Privacy and Other Protections from Employer Intrusions.
TRANSBORDER DATA FLOWS INA MEIRING. THE PROTECTION OF PERSONAL INFORMATION ACT (“POPI”) > 'personal information' means information relating to an identifiable,
1 HIPAA’s Impact on Depository Financial Institutions 2 nd National Medical Banking Institute Rick Morrison, CEO Remettra, Inc.
Bellwork Think about this…. Historical Event
Privacy in the Digital Age: the UN General Assembly Resolution
Privacy and the Law.
Surveillance around the world
PowerPoint presentation
Data Protection: EU & International
Employee Privacy and Privacy of Employee Information
Government.
American Political Culture and Beliefs
Computer Security Social Legal and Ethical issues
APK Bellwork Think* Pair* Share
Colorado “Protections For Consumer Data Privacy” Law
Presentation transcript:

1 Gordana Dodig-Crnkovic Department of Computer Science and Engineering Mälardalen University 2007 PROFESSIONAL ETHICS IN SCIENCE AND ENGINEERING CDT409 LECTURE 5

2 Ethics, Privacy and Civil Liberties

3 Ethics of Computing Ethics, Values and Practices – Why is it Important? Agency implies making choices, which is related to preferences. Questions of identity in a digital universe.

4 Privacy Privacy is a fundamental human right recognized in all major international agreements regarding human rights such as Article 12 of the Universal Declaration of Human Rights (United Nations, 1948).

5 Privacy protection vs. Surveillance The four basic features of computing technology that makes it unprecedented tools for monitoring and surveillance:  Searching,  Sorting,  Storage  Simulation

6 Privacy protection vs. Surveillance Disappearance of boundaries between private and public/professional life: -ubiquitous computing -ambiental intelligence

7 Legislation Privacy and Human Rights Report Personal Information must be: –obtained fairly and lawfully –used only for the original specified purpose –adequate, relevant and not excessive to purpose –accurate and up to date, and –destroyed after its purpose is completed

8 Legislation  The Council of Europe's 1981 Convention for the Protection of Individuals with regard to the Automatic Processing of Personal Data  The Organization for Economic Cooperation and Development's Guidelines Governing the Protection of Privacy and Transborder Data Flows of Personal Data

9 Why Value Privacy? Privacy and Democracy In intruding on privacy, which is closely related to freedom and autonomy, surveillance can be considered to have, ultimately, a negative effect on democracy. A Privacy Culture Whether or not privacy is protected by law or contract, fostering a culture where privacy is valued and respected contributes to healthy human relations.

10 Legitimacy by Design and Trustworthy Computing The first phase of the intentional design for democracy is the explication of the embedded moral significance of ICT while the next is the development of the corresponding technology (Yu and Cysneiros, 2002).

11 Legitimacy by Design and Trustworthy Computing –Trust must be established in the use of ICT, where both users and the technology will be trustworthy. – This in the first place presupposes the informed consent of all the parties involved. –This trust must be established globally because the data contained in networked computers virtually knows no boundaries.

12 Some common uses of data about people Public Information Business Transactions Birth Certificates Mail Orders Driver Licenses Telephone Orders Car Registrations Subscriptions Property Records Donations Marriage License Credit Cards Census Records Warranty Cards Telephone Directories Tattslotto,... Consumer Surveys Accounts Payments Passports Visas

13 which can lead to.. Multiple Mailing Lists Subscriptions Entertainment Specials Donations Memberships Catalogues Social Clubs Professional Development Some common uses of data about people

14 Public Information Business Transactions Birth Certificates Mail Orders Driver Licenses Telephone Orders Car Registrations Subscriptions Property Records Donations Marriage License Credit Cards Census Records Warranty Cards Telephone Directories Tattslotto,... Consumer Surveys Accounts Payments Passports Visas Ethics, Privacy and Security Some common uses of data about people

15 Multiple Mailing Lists Subscriptions Entertainment Specials Donations Memberships Catalogues Social Clubs Professional Development Ethics, Privacy and Security

16  Privacy: The right of people not to reveal information about themselves, the right to keep personal information from being misused  Electronic invasion of personal data has become a serious ethical issue Ethics, Privacy and Security

17 Invasion of Privacy. Would you agree to:  Your shopping habits, your income, to be available to any number of businesses ?  Your medical records being used by your employer as one of the means of making decision regarding promotions, hiring, redundancy ? Ethics, Privacy and Security

18 Ethics, Privacy and Security US  The rapid expansion of use of the Internet and E-Commerce has raised many problems with privacy aspects.  In America there exists the ‘Association of Corporate Privacy Officers’ which would indicate that there is much interest and concern regarding privacy of data.

19 Ethics, Privacy and Security US  Privacy Officers : - train employees about privacy - examine a company’s policies for potential risks - manage customer-privacy disputes - inform senior executives on how the company deals with privacy issues

20 Database Security: is the protection of a database from – unauthorised access – unauthorised modification – destruction PRIVACY is the right of individuals to have some control over information about themselves INTEGRITY refers to the correctness, completeness and consistency of data Security

21 AIMPREVENTS - Confidentiality- Unauthorised disclosure - Integrity- Unauthorised Amendment - Availability- Unauthorised Withholding Security Systems: 1. Computer Security 2. Communications Security - transmission - encryption 3. Procedural security 4. Physical security Security

22 Civil Rights and Civil Liberties

23 What are civil rights and what are civil liberties? Civil Rights = The right of every person to equal protection under the law and equal access to society’s opportunities and public facilities. Civil Liberties = Individual rights that are protected from infringement by government.

24 CIVIL LIBERTIES 1.The Bill of Rights 2.First Amendment: Freedom of Religion 3.First Amendment: Freedom of Speech and Press 4.The Right to Keep and Bear Arms 5.The Rights of Criminal Defendants 6.The Right to Privacy

25  Civil liberties are the personal rights and freedoms that the federal government cannot abridge, either by law, constitution, or judicial interpretation.  These are limitations on the power of government to restrain or dictate how individuals act. CIVIL LIBERTIES

26 The Right to Privacy  Privacy is not specifically mentioned in the Constitution, nevertheless some areas are to be off-limits to government interference.  Examples: – The right to Abortion – The right to Homosexuality – The Right to Die

27 Civil Liberties after Sept 11

28 Privacy before Sept. 11 th  Tradeoff between security and privacy has always been a major issue for most Americans  Most sided with privacy at the expense of security  84% of Americans were concerned about the government, businesses, or individuals collecting information on them

29 Privacy Before Sept 11 th, cont.  54% were “very concerned”  Only a minor portion of America (13%) supported FBI internet surveillance to catch criminals  62% of Americans thought that new laws should be created to guarantee that privacy would be protected from government agencies

 On September 11, 2001, terrorists attacked the World Trade Center in New York City and the Pentagon just outside Washington, D.C.

31 Shift in Public Opinion

32 Government Reaction  The government is reacting to public opinion polls and are passing new controversial laws that expand government power  Have already passed many ‘anti-terrorism’ bills that cover matters such as wiretaps, electronic surveillance, regulation of airports, etc.

33  Internet wiretapping scheme  Installed at ISPs (Internet Service Providers)  Maintained and operated by FBI  Monitors all , both incoming and outgoing

34 Cryptography  Evidence produced from the Libyan bombings that Osama bin Laden, the suspected mastermind behind the 9/11 attacks, used phones scrambled by strong cryptography to hide the planning of the Libyan bombings  Evidence produced by the US government suggests that similar methods were used by the terrorist network for 9/11 attacks as well

35 Cryptography  The US government has charged that such cryptography aids terrorism more than it protects privacy and therefore should be banned

36 Conclusions  Public opinion will most likely remain concerned with security for years to come  Government expanding law enforcement powers  Privacy strongly related to public safety