Presentation is loading. Please wait.

Presentation is loading. Please wait.

Legal and Ethical Issues. Major Topics Protecting Programs and Data Information and the Law Rights of Employees and Employers Software Failures Computer.

Similar presentations


Presentation on theme: "Legal and Ethical Issues. Major Topics Protecting Programs and Data Information and the Law Rights of Employees and Employers Software Failures Computer."— Presentation transcript:

1 Legal and Ethical Issues

2 Major Topics Protecting Programs and Data Information and the Law Rights of Employees and Employers Software Failures Computer Crime Privacy Ethical Issues in Computer Security

3 Relationship to Security Relationship of topics discussed to computer security is not always clear Legal and ethical issues involving computers are often, not always, security issues Example: Ownership of program code

4 Legal Issues Laws provide a framework in which security issues can/must be addressed Constraints Things you can’t do Requirements Things you must do Frameworks Things you can use

5 Ethical Issues Ethics involves generally accepted standards of proper behavior Ethical principle – “an objectively defined standard of right and wrong” Ethical system – “a set of ethical principles” The United States is an ethically pluralistic society

6 Ethical Principles Consequence-based: teleology Egoism Utilitarianism Rule-based: deontology Rule-deontology Personal Professional codes of ethics

7 Law and Ethics It is possible for an action to be legal but not ethical It is possible for an action to be ethical but not legal What these actions are depends upon the ethical and legal systems used

8 Law and Security Law may specify information that must be kept confidential Medical information: HIPAA Student information: FERPA Law may specify information that must be released FOIA – Freedom of Information Act – applies to many government records

9 Privacy Issues Combine legal requirements and social expectations Privacy refers to protection/release of personal information Confidentiality refers to protection/release of information in general

10 Personal Story 1: Medical Privacy I went for a medical test for osteoporosis. The results were shown to me on a computer screen also containing results from other patients. Clear violation of HIPAA/other privacy rules Not a major problem since I did not recognize/remember any of the names seen.

11 Personal Story 2: Password Disclosure I was setting up a computer display in a database course When I signed on to the DB system, my password was displayed. So I changed my password. Whose fault? Mine – I should have checked display. DB – It should not have displayed password in clear.

12 Personal Story 3: Credit Card Theft I received a call from local police that my credit card had been found in possession of an apparent credit card thief. (He had lots of stolen cards.) I got a new credit card/number. No improper charges were made. Whose fault: Thief – He stole it! Mine – I could have kept better track of the card.

13 Personal Story 4: Another Credit Card Theft I received a notification that I was to be sent a new AMEX card and did not get it even though my husband got his. AMEX notified me that my card was showing unusual usage patterns. Multiple charges were posted that I had not made. Card apparently stolen from mailbox.

14 Personal Story 4 (continued) AMEX removed improper charges. I received a new card. I did not receive any information about eventual outcome of situation. Note redundancy in system: Mail notification of card issuance. Tracking of usage patterns.

15 Some Privacy Issues Identity theft Data mining Carnivore Passport Anonymity Computer voting E.U. Data Protection Act (personal data) Gramm-Leach-Bliley (financial information) HIPAA (health information)

16 Some Privacy Laws US Privacy Act US Electronic Communications Privacy Act US Patriot Act

17 Software Ownership Protecting information about software Possible protection mechanisms: Trade secret Copyright (DMCA) Patent

18 Trade Secret Confidential business information Must be kept secret Coke formula Diebold code for DREs Trade secrets may be lost Independent discovery Reverse engineering

19 Copyright Protect expressions of ideas But not the ideas themselves Limited time period Programs may be copyrighted DMCA – Digital Millennium Copyright Act Copy protection mechanisms Sony-BMG XCP

20 Patents Patents protect inventions Novel Nonobvious Computer programs Patents allowed since 1981 Controversial Almost 40 years of prior art

21 Who Owns Software? The developer Company? Individual? Considerations Employment contract Work for hire Relationship to employment License

22 Criminal vs. Civil Law Criminal law – actions against the state Statutes Civil law – actions against individuals/other private entities Precedents Contract law – actions in violation of a contract

23 How are Computer Crimes Different from Other Crimes? Unfamiliarity of criminal justice system with computers and computer terminology Need to deal with intangible and easily copied property

24 International Issues Laws are different in different countries. Computer networks are international. Who has “jurisdiction” over a computer crime? Can software/data be effectively excluded? Privacy concerns Cryptography


Download ppt "Legal and Ethical Issues. Major Topics Protecting Programs and Data Information and the Law Rights of Employees and Employers Software Failures Computer."

Similar presentations


Ads by Google