SlideShare a Scribd company logo
1 of 17
Legal, Privacy, and Ethical Issues
in Computer Security
Legal, Privacy, and Ethical Issues in
Computer Security
Human Controls Applicable to Computer Security:
Basic Legal Issues
a) Protecting Programs and Data
b) Information and the Law
c) Ownership Rights of Employees and Employers
d) Software Failures (and Customers)
Computer Crime
Privacy
Ethics
a) Introduction to Ethics
b) Case Studies of Ethics
c) Codes of Professional Ethics
Protecting Programs and Data
Copyrights — designed to protect expression of ideas (creative
works of the mind)
Ideas themselves are free
Different people can have the same idea
The way of expressing ideas is copyrighted
Copyrights are exclusive rights to making copies of
expression
Copyright protects intellectual property (IP)
IP must be:
Original work
In some tangible medium of expression
Patent — designed to protect tangible objects, or ways to make
them (not works of the mind)
Protected entity must be novel & nonobvious
The first inventor who obtains patent gest his invention
protected against patent infrigement
Patents applied for algorithms only since 1981
Trade secret — information that provides competitive edge over
others
Information that has value only if kept secret
Undoing release of a secret is impossible or very difficult
Reverse engineering used to uncover trade secret is legal!
T.s. protection applies very well to computer s/w
E.g., pgms that use algorithms unknown to others
Copyright Patent Trade Secret
Protects Expression of idea,
not idea itself
Invention—way
something works
Secret, competitive
advantage
Protected Object
Made Public
Yes; intention is to
promote publication
Design filed at
Patent Office
No
Must Distribute Yes No No
Ease of filing Very easy, do-it-
yourself
Very complicated;
specialist lawyer
suggested
No filing
Duration Originator’s life + 70
yrs; 95 y. For
company
19 years Indefinite
Legal Protection Sue if unauthorized
copy sold
Sue if invention
copied/reinvented
Sue if secret
improperly obtained
Protecting Programs and Data
How to protect:
H/w
Patent
Firmware (microcode)
Patent physical device, chip
Use trade secret protection
Copyright s/w such as embedded OS
Object code s/w
Copyiright of binary code
Copyright of source code
Need legal precedents
Source code s/w
Use trade secret protection
Copyright reveals some code, facilitates reverse
engineering
Need legal precedents, too
Information and the Law
Characteristics of information as an object of value
Not exhaustable
Can be replicated
Has minimal marginal cost
Value is often time dependent
Can be transferred intangibly
Criminal Law Civil Law
Defined by Statutes Common law (tort l.)
Contracts
Cases
brought by
Government Government
Individuals and
companies
Wronged
party
Society Individuals and
companies
Remedy Jail, fine Damages, typically
monetary
Comparison of Criminal and Civil Law
Ownership Rights of Employees and
Employers
Ownership rights are computer security issue
Concerned with protecting secrecy (confidentiality) and integrity of
works produced by employees of an employer
Ownership issues in emploee/employer relations:
Ownership of products
Products/ideas/inventions developed by employee after hours might
still be owned by her employer
Esp. if in the same „line of business”
Ownership of patents
If employer files for patent, employer will own patent
Ownership of copyrights
Similar to patents
Trade secret protection
No registered inventor/author—owner can prosecute
for damages
Ownership Rights of Employees and Employers (2)
Type of employment has ownership consequences
Work for hire
All work done by employee is owned by employer
Employment contracts
Often spell out ownership rights
Often includes agreement not to compete (for some time after
termination)
Non-competition is not always enforceable by law
Licenses
Programmer retains full ownership of developed s/w
Grants license for a fee
Software Failures (& Customers)
-If not correct: ask for refund, replacement, fixing
Refund: possible
Replacement: if this copy damaged, or improved in the
meantine
Fixing: rarely legally enforced; instead, monetary awards
for damages
Correctness of s/w difficult to define/enforce legally
Individual can rarely sue a major s/w vendor
Prohibitive costs for individual
Issue 2: Reporting software flaws
Should we share s/w vulnerability info?
Both pros and cons
Vendor interests
Vendors don’t want to react to individual flaws
Prefer bundle a number of flaw fixes
User interests
Would like to have fixes quickly
Responsible vulnerability reporting
How to report vulnerability info responsibly?
E.g. First notify the vendor, give vendor a few weeks to fix
If vendor delays fixes, ask „coordinator” for help
Coordinator—e.g., computer emergency response center
Computer Crime
Separate category for computer crime is needed
Because special laws are needed for CC
Value of integrity and confidentiality/privacy
Value of privacy is now recognized by several federal/state laws
Value of data
Courts understand value of data better
Acceptance of computer terminology
Law lags behind technology in acceptance of new terminology
Privacy
Identity theft – the most serious crime against privacy
Threats to privacy
Aggregation and data mining
Poor system security
The Internet as privacy threat
Unencrypted e-mail / web surfing / attacks
Corporate rights and private business
Controls for protecting privacy
Authentication
Anonymity
Pseudonymity
Introduction to Ethics
Law vs. Ethics
Law alone can’t restrict human behavior
Impractical/impossible to describe/enforce all acceptable behaviors
Ethics/morals are sufficient self-controls for most people
Most ethical and legal issues in computer system are in the area of individual’s
right to privacy versus the greater good of a larger entity i.e. a company or
a society. For example, tracking how employees use computers, crowd
surveillance, managing customer profiles, tracking a person’s travel with
passport and so on. A key concept in resolving this issues is to find out,
what is a person’s expectation of privacy. Classically, the ethical issues in
security system are classified into following 4 categories:
• Privacy: This deals with the right of an individual to control personal
information. It is the protection of personal or sensitive information.
Privacy is subjective. Different people have different ideas of what privacy
is and how much privacy they will trade for safety or convenience.
• Accuracy: This talks about the responsibility for the authenticity, fidelity
an accuracy of the information.
• Property: This determines who the owner of the information is and who
controls access.
• Accessibility: This deals with the issue of the type of information, an
organization has the right to collect. And in that situation, it also expects to
know the measures which will safeguard against any unforeseen
eventualities.

More Related Content

What's hot

information security management
information security managementinformation security management
information security managementGurpreetkaur838
 
Cybersecurity
CybersecurityCybersecurity
CybersecurityA. Shamel
 
Legal, Ethical, and Professional Issues In Information Security
Legal, Ethical, and Professional Issues In Information SecurityLegal, Ethical, and Professional Issues In Information Security
Legal, Ethical, and Professional Issues In Information SecurityCarl Ceder
 
Basics of Cyber Security
Basics of Cyber SecurityBasics of Cyber Security
Basics of Cyber SecurityNikunj Thakkar
 
Cybercrime and Security
Cybercrime and SecurityCybercrime and Security
Cybercrime and SecurityNoushad Hasan
 
User authentication
User authenticationUser authentication
User authenticationCAS
 
Introduction to Network Security
Introduction to Network SecurityIntroduction to Network Security
Introduction to Network SecurityJohn Ely Masculino
 
Computer Security Lecture 1: Overview
Computer Security Lecture 1: OverviewComputer Security Lecture 1: Overview
Computer Security Lecture 1: OverviewMohamed Loey
 
Security services and mechanisms
Security services and mechanismsSecurity services and mechanisms
Security services and mechanismsRajapriya82
 
MG6088 SOFTWARE PROJECT MANAGEMENT
MG6088 SOFTWARE PROJECT MANAGEMENTMG6088 SOFTWARE PROJECT MANAGEMENT
MG6088 SOFTWARE PROJECT MANAGEMENTKathirvel Ayyaswamy
 
Cyber security landscape
Cyber security landscapeCyber security landscape
Cyber security landscapeJisc
 
Cybersecurity 1. intro to cybersecurity
Cybersecurity 1. intro to cybersecurityCybersecurity 1. intro to cybersecurity
Cybersecurity 1. intro to cybersecuritysommerville-videos
 
Man in The Middle Attack
Man in The Middle AttackMan in The Middle Attack
Man in The Middle AttackDeepak Upadhyay
 
Steganography
Steganography Steganography
Steganography Uttam Jain
 

What's hot (20)

Security policies
Security policiesSecurity policies
Security policies
 
information security management
information security managementinformation security management
information security management
 
Cybersecurity
CybersecurityCybersecurity
Cybersecurity
 
Legal, Ethical, and Professional Issues In Information Security
Legal, Ethical, and Professional Issues In Information SecurityLegal, Ethical, and Professional Issues In Information Security
Legal, Ethical, and Professional Issues In Information Security
 
Basics of Cyber Security
Basics of Cyber SecurityBasics of Cyber Security
Basics of Cyber Security
 
Cybercrime and Security
Cybercrime and SecurityCybercrime and Security
Cybercrime and Security
 
User authentication
User authenticationUser authentication
User authentication
 
Introduction to Network Security
Introduction to Network SecurityIntroduction to Network Security
Introduction to Network Security
 
Computer Security Lecture 1: Overview
Computer Security Lecture 1: OverviewComputer Security Lecture 1: Overview
Computer Security Lecture 1: Overview
 
Authentication techniques
Authentication techniquesAuthentication techniques
Authentication techniques
 
Security services and mechanisms
Security services and mechanismsSecurity services and mechanisms
Security services and mechanisms
 
MG6088 SOFTWARE PROJECT MANAGEMENT
MG6088 SOFTWARE PROJECT MANAGEMENTMG6088 SOFTWARE PROJECT MANAGEMENT
MG6088 SOFTWARE PROJECT MANAGEMENT
 
Cyber security landscape
Cyber security landscapeCyber security landscape
Cyber security landscape
 
Security Threats at OSI layers
Security Threats at OSI layersSecurity Threats at OSI layers
Security Threats at OSI layers
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Cybersecurity 1. intro to cybersecurity
Cybersecurity 1. intro to cybersecurityCybersecurity 1. intro to cybersecurity
Cybersecurity 1. intro to cybersecurity
 
Man in The Middle Attack
Man in The Middle AttackMan in The Middle Attack
Man in The Middle Attack
 
Steganography
Steganography Steganography
Steganography
 
Network security
Network security Network security
Network security
 
Information security
Information securityInformation security
Information security
 

Similar to Legal Privacy and Ethical Issues in Computer Security.pptx

Stallings ch18 privacy
Stallings ch18 privacyStallings ch18 privacy
Stallings ch18 privacysalehnia
 
CR 23 - Legal & Ethical Aspects.ppt
CR 23 - Legal & Ethical Aspects.pptCR 23 - Legal & Ethical Aspects.ppt
CR 23 - Legal & Ethical Aspects.pptssuseraaf866
 
Computer ethics cyber security and technology of it
Computer ethics cyber security and technology of itComputer ethics cyber security and technology of it
Computer ethics cyber security and technology of itsr24production
 
Introduction to Engineering and Profession Ethics Lecture9-Computer Ethics, P...
Introduction to Engineering and Profession Ethics Lecture9-Computer Ethics, P...Introduction to Engineering and Profession Ethics Lecture9-Computer Ethics, P...
Introduction to Engineering and Profession Ethics Lecture9-Computer Ethics, P...Dr. Khaled Bakro
 
Ethics assignment.docx
Ethics assignment.docxEthics assignment.docx
Ethics assignment.docxBestMan28
 
Super billing computer ethics, privacy and security
Super billing computer ethics, privacy and securitySuper billing computer ethics, privacy and security
Super billing computer ethics, privacy and securitysuperb11b
 
Copy Right issue in computer software and hardware and IP
Copy Right issue in computer software and hardware and IPCopy Right issue in computer software and hardware and IP
Copy Right issue in computer software and hardware and IPmuhammadshahid2047
 
chapter5F.ppt
chapter5F.pptchapter5F.ppt
chapter5F.pptamreena6
 
Contracting for Better Cybersecurity
Contracting for Better CybersecurityContracting for Better Cybersecurity
Contracting for Better CybersecurityShawn Tuma
 
Aet531 week6 nnb_final
Aet531 week6 nnb_finalAet531 week6 nnb_final
Aet531 week6 nnb_finalnykobap01
 
BS CS5 Lecture 5.pptx
BS CS5 Lecture 5.pptxBS CS5 Lecture 5.pptx
BS CS5 Lecture 5.pptxwhoiam36
 
Trade Secret Lien
Trade Secret LienTrade Secret Lien
Trade Secret LienFNian
 
Lasa European NFP Technology Conference 2010 - Data protection and the cloud
Lasa European NFP Technology Conference 2010 - Data protection and the cloudLasa European NFP Technology Conference 2010 - Data protection and the cloud
Lasa European NFP Technology Conference 2010 - Data protection and the cloudukriders
 
BTEC National in ICT: Unit 3 - Legal Constraints
BTEC National in ICT: Unit 3 - Legal ConstraintsBTEC National in ICT: Unit 3 - Legal Constraints
BTEC National in ICT: Unit 3 - Legal Constraintsmrcox
 
Privacy in computing & interlectual property
Privacy in computing & interlectual propertyPrivacy in computing & interlectual property
Privacy in computing & interlectual propertyMutongole Benjamin Benjamin
 
Ethics of electronic marketing
Ethics of electronic marketingEthics of electronic marketing
Ethics of electronic marketinggaurav jain
 
chapter 5.pptxggggggggggggggggggggggggggg
chapter 5.pptxgggggggggggggggggggggggggggchapter 5.pptxggggggggggggggggggggggggggg
chapter 5.pptxgggggggggggggggggggggggggggadabotor7
 

Similar to Legal Privacy and Ethical Issues in Computer Security.pptx (20)

Stallings ch18 privacy
Stallings ch18 privacyStallings ch18 privacy
Stallings ch18 privacy
 
CR 23 - Legal & Ethical Aspects.ppt
CR 23 - Legal & Ethical Aspects.pptCR 23 - Legal & Ethical Aspects.ppt
CR 23 - Legal & Ethical Aspects.ppt
 
Computer ethics cyber security and technology of it
Computer ethics cyber security and technology of itComputer ethics cyber security and technology of it
Computer ethics cyber security and technology of it
 
Corporate ethics
Corporate ethicsCorporate ethics
Corporate ethics
 
Introduction to Engineering and Profession Ethics Lecture9-Computer Ethics, P...
Introduction to Engineering and Profession Ethics Lecture9-Computer Ethics, P...Introduction to Engineering and Profession Ethics Lecture9-Computer Ethics, P...
Introduction to Engineering and Profession Ethics Lecture9-Computer Ethics, P...
 
Ethics assignment.docx
Ethics assignment.docxEthics assignment.docx
Ethics assignment.docx
 
Super billing computer ethics, privacy and security
Super billing computer ethics, privacy and securitySuper billing computer ethics, privacy and security
Super billing computer ethics, privacy and security
 
Copy Right issue in computer software and hardware and IP
Copy Right issue in computer software and hardware and IPCopy Right issue in computer software and hardware and IP
Copy Right issue in computer software and hardware and IP
 
chapter5F.ppt
chapter5F.pptchapter5F.ppt
chapter5F.ppt
 
5362098
53620985362098
5362098
 
5362098
53620985362098
5362098
 
Contracting for Better Cybersecurity
Contracting for Better CybersecurityContracting for Better Cybersecurity
Contracting for Better Cybersecurity
 
Aet531 week6 nnb_final
Aet531 week6 nnb_finalAet531 week6 nnb_final
Aet531 week6 nnb_final
 
BS CS5 Lecture 5.pptx
BS CS5 Lecture 5.pptxBS CS5 Lecture 5.pptx
BS CS5 Lecture 5.pptx
 
Trade Secret Lien
Trade Secret LienTrade Secret Lien
Trade Secret Lien
 
Lasa European NFP Technology Conference 2010 - Data protection and the cloud
Lasa European NFP Technology Conference 2010 - Data protection and the cloudLasa European NFP Technology Conference 2010 - Data protection and the cloud
Lasa European NFP Technology Conference 2010 - Data protection and the cloud
 
BTEC National in ICT: Unit 3 - Legal Constraints
BTEC National in ICT: Unit 3 - Legal ConstraintsBTEC National in ICT: Unit 3 - Legal Constraints
BTEC National in ICT: Unit 3 - Legal Constraints
 
Privacy in computing & interlectual property
Privacy in computing & interlectual propertyPrivacy in computing & interlectual property
Privacy in computing & interlectual property
 
Ethics of electronic marketing
Ethics of electronic marketingEthics of electronic marketing
Ethics of electronic marketing
 
chapter 5.pptxggggggggggggggggggggggggggg
chapter 5.pptxgggggggggggggggggggggggggggchapter 5.pptxggggggggggggggggggggggggggg
chapter 5.pptxggggggggggggggggggggggggggg
 

Recently uploaded

VIP Kolkata Call Girl Dum Dum 👉 8250192130 Available With Room
VIP Kolkata Call Girl Dum Dum 👉 8250192130  Available With RoomVIP Kolkata Call Girl Dum Dum 👉 8250192130  Available With Room
VIP Kolkata Call Girl Dum Dum 👉 8250192130 Available With Roomdivyansh0kumar0
 
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts serviceChennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts servicesonalikaur4
 
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts serviceChennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts servicevipmodelshub1
 
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)Dana Luther
 
定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一
定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一
定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一Fs
 
Russian Call Girls in Kolkata Samaira 🤌 8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Samaira 🤌  8250192130 🚀 Vip Call Girls KolkataRussian Call Girls in Kolkata Samaira 🤌  8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Samaira 🤌 8250192130 🚀 Vip Call Girls Kolkataanamikaraghav4
 
AlbaniaDreamin24 - How to easily use an API with Flows
AlbaniaDreamin24 - How to easily use an API with FlowsAlbaniaDreamin24 - How to easily use an API with Flows
AlbaniaDreamin24 - How to easily use an API with FlowsThierry TROUIN ☁
 
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012rehmti665
 
VIP Call Girls Kolkata Ananya 🤌 8250192130 🚀 Vip Call Girls Kolkata
VIP Call Girls Kolkata Ananya 🤌  8250192130 🚀 Vip Call Girls KolkataVIP Call Girls Kolkata Ananya 🤌  8250192130 🚀 Vip Call Girls Kolkata
VIP Call Girls Kolkata Ananya 🤌 8250192130 🚀 Vip Call Girls Kolkataanamikaraghav4
 
The Intriguing World of CDR Analysis by Police: What You Need to Know.pdf
The Intriguing World of CDR Analysis by Police: What You Need to Know.pdfThe Intriguing World of CDR Analysis by Police: What You Need to Know.pdf
The Intriguing World of CDR Analysis by Police: What You Need to Know.pdfMilind Agarwal
 
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一z xss
 
Contact Rya Baby for Call Girls New Delhi
Contact Rya Baby for Call Girls New DelhiContact Rya Baby for Call Girls New Delhi
Contact Rya Baby for Call Girls New Delhimiss dipika
 
VIP Kolkata Call Girl Kestopur 👉 8250192130 Available With Room
VIP Kolkata Call Girl Kestopur 👉 8250192130  Available With RoomVIP Kolkata Call Girl Kestopur 👉 8250192130  Available With Room
VIP Kolkata Call Girl Kestopur 👉 8250192130 Available With Roomdivyansh0kumar0
 
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一Fs
 
Call Girls Service Adil Nagar 7001305949 Need escorts Service Pooja Vip
Call Girls Service Adil Nagar 7001305949 Need escorts Service Pooja VipCall Girls Service Adil Nagar 7001305949 Need escorts Service Pooja Vip
Call Girls Service Adil Nagar 7001305949 Need escorts Service Pooja VipCall Girls Lucknow
 
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
Sushant Golf City / best call girls in Lucknow | Service-oriented sexy call g...
Sushant Golf City / best call girls in Lucknow | Service-oriented sexy call g...Sushant Golf City / best call girls in Lucknow | Service-oriented sexy call g...
Sushant Golf City / best call girls in Lucknow | Service-oriented sexy call g...akbard9823
 
Call Girls In Mumbai Central Mumbai ❤️ 9920874524 👈 Cash on Delivery
Call Girls In Mumbai Central Mumbai ❤️ 9920874524 👈 Cash on DeliveryCall Girls In Mumbai Central Mumbai ❤️ 9920874524 👈 Cash on Delivery
Call Girls In Mumbai Central Mumbai ❤️ 9920874524 👈 Cash on Deliverybabeytanya
 
Russian Call Girls in Kolkata Ishita 🤌 8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Ishita 🤌  8250192130 🚀 Vip Call Girls KolkataRussian Call Girls in Kolkata Ishita 🤌  8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Ishita 🤌 8250192130 🚀 Vip Call Girls Kolkataanamikaraghav4
 

Recently uploaded (20)

VIP Kolkata Call Girl Dum Dum 👉 8250192130 Available With Room
VIP Kolkata Call Girl Dum Dum 👉 8250192130  Available With RoomVIP Kolkata Call Girl Dum Dum 👉 8250192130  Available With Room
VIP Kolkata Call Girl Dum Dum 👉 8250192130 Available With Room
 
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts serviceChennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts service
 
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts serviceChennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts service
 
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
 
定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一
定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一
定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一
 
Russian Call Girls in Kolkata Samaira 🤌 8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Samaira 🤌  8250192130 🚀 Vip Call Girls KolkataRussian Call Girls in Kolkata Samaira 🤌  8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Samaira 🤌 8250192130 🚀 Vip Call Girls Kolkata
 
AlbaniaDreamin24 - How to easily use an API with Flows
AlbaniaDreamin24 - How to easily use an API with FlowsAlbaniaDreamin24 - How to easily use an API with Flows
AlbaniaDreamin24 - How to easily use an API with Flows
 
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
 
VIP Call Girls Kolkata Ananya 🤌 8250192130 🚀 Vip Call Girls Kolkata
VIP Call Girls Kolkata Ananya 🤌  8250192130 🚀 Vip Call Girls KolkataVIP Call Girls Kolkata Ananya 🤌  8250192130 🚀 Vip Call Girls Kolkata
VIP Call Girls Kolkata Ananya 🤌 8250192130 🚀 Vip Call Girls Kolkata
 
The Intriguing World of CDR Analysis by Police: What You Need to Know.pdf
The Intriguing World of CDR Analysis by Police: What You Need to Know.pdfThe Intriguing World of CDR Analysis by Police: What You Need to Know.pdf
The Intriguing World of CDR Analysis by Police: What You Need to Know.pdf
 
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一
 
Contact Rya Baby for Call Girls New Delhi
Contact Rya Baby for Call Girls New DelhiContact Rya Baby for Call Girls New Delhi
Contact Rya Baby for Call Girls New Delhi
 
VIP Kolkata Call Girl Kestopur 👉 8250192130 Available With Room
VIP Kolkata Call Girl Kestopur 👉 8250192130  Available With RoomVIP Kolkata Call Girl Kestopur 👉 8250192130  Available With Room
VIP Kolkata Call Girl Kestopur 👉 8250192130 Available With Room
 
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一
 
Call Girls Service Adil Nagar 7001305949 Need escorts Service Pooja Vip
Call Girls Service Adil Nagar 7001305949 Need escorts Service Pooja VipCall Girls Service Adil Nagar 7001305949 Need escorts Service Pooja Vip
Call Girls Service Adil Nagar 7001305949 Need escorts Service Pooja Vip
 
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝
 
Sushant Golf City / best call girls in Lucknow | Service-oriented sexy call g...
Sushant Golf City / best call girls in Lucknow | Service-oriented sexy call g...Sushant Golf City / best call girls in Lucknow | Service-oriented sexy call g...
Sushant Golf City / best call girls in Lucknow | Service-oriented sexy call g...
 
Call Girls In Mumbai Central Mumbai ❤️ 9920874524 👈 Cash on Delivery
Call Girls In Mumbai Central Mumbai ❤️ 9920874524 👈 Cash on DeliveryCall Girls In Mumbai Central Mumbai ❤️ 9920874524 👈 Cash on Delivery
Call Girls In Mumbai Central Mumbai ❤️ 9920874524 👈 Cash on Delivery
 
Model Call Girl in Jamuna Vihar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in  Jamuna Vihar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in  Jamuna Vihar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Jamuna Vihar Delhi reach out to us at 🔝9953056974🔝
 
Russian Call Girls in Kolkata Ishita 🤌 8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Ishita 🤌  8250192130 🚀 Vip Call Girls KolkataRussian Call Girls in Kolkata Ishita 🤌  8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Ishita 🤌 8250192130 🚀 Vip Call Girls Kolkata
 

Legal Privacy and Ethical Issues in Computer Security.pptx

  • 1. Legal, Privacy, and Ethical Issues in Computer Security
  • 2. Legal, Privacy, and Ethical Issues in Computer Security Human Controls Applicable to Computer Security: Basic Legal Issues a) Protecting Programs and Data b) Information and the Law c) Ownership Rights of Employees and Employers d) Software Failures (and Customers) Computer Crime Privacy Ethics a) Introduction to Ethics b) Case Studies of Ethics c) Codes of Professional Ethics
  • 3. Protecting Programs and Data Copyrights — designed to protect expression of ideas (creative works of the mind) Ideas themselves are free Different people can have the same idea The way of expressing ideas is copyrighted Copyrights are exclusive rights to making copies of expression Copyright protects intellectual property (IP) IP must be: Original work In some tangible medium of expression
  • 4. Patent — designed to protect tangible objects, or ways to make them (not works of the mind) Protected entity must be novel & nonobvious The first inventor who obtains patent gest his invention protected against patent infrigement Patents applied for algorithms only since 1981 Trade secret — information that provides competitive edge over others Information that has value only if kept secret Undoing release of a secret is impossible or very difficult Reverse engineering used to uncover trade secret is legal! T.s. protection applies very well to computer s/w E.g., pgms that use algorithms unknown to others
  • 5. Copyright Patent Trade Secret Protects Expression of idea, not idea itself Invention—way something works Secret, competitive advantage Protected Object Made Public Yes; intention is to promote publication Design filed at Patent Office No Must Distribute Yes No No Ease of filing Very easy, do-it- yourself Very complicated; specialist lawyer suggested No filing Duration Originator’s life + 70 yrs; 95 y. For company 19 years Indefinite Legal Protection Sue if unauthorized copy sold Sue if invention copied/reinvented Sue if secret improperly obtained
  • 6. Protecting Programs and Data How to protect: H/w Patent Firmware (microcode) Patent physical device, chip Use trade secret protection Copyright s/w such as embedded OS Object code s/w Copyiright of binary code Copyright of source code Need legal precedents Source code s/w Use trade secret protection Copyright reveals some code, facilitates reverse engineering Need legal precedents, too
  • 7. Information and the Law Characteristics of information as an object of value Not exhaustable Can be replicated Has minimal marginal cost Value is often time dependent Can be transferred intangibly
  • 8. Criminal Law Civil Law Defined by Statutes Common law (tort l.) Contracts Cases brought by Government Government Individuals and companies Wronged party Society Individuals and companies Remedy Jail, fine Damages, typically monetary Comparison of Criminal and Civil Law
  • 9. Ownership Rights of Employees and Employers Ownership rights are computer security issue Concerned with protecting secrecy (confidentiality) and integrity of works produced by employees of an employer Ownership issues in emploee/employer relations: Ownership of products Products/ideas/inventions developed by employee after hours might still be owned by her employer Esp. if in the same „line of business” Ownership of patents If employer files for patent, employer will own patent Ownership of copyrights Similar to patents Trade secret protection No registered inventor/author—owner can prosecute for damages
  • 10. Ownership Rights of Employees and Employers (2) Type of employment has ownership consequences Work for hire All work done by employee is owned by employer Employment contracts Often spell out ownership rights Often includes agreement not to compete (for some time after termination) Non-competition is not always enforceable by law Licenses Programmer retains full ownership of developed s/w Grants license for a fee
  • 11. Software Failures (& Customers) -If not correct: ask for refund, replacement, fixing Refund: possible Replacement: if this copy damaged, or improved in the meantine Fixing: rarely legally enforced; instead, monetary awards for damages Correctness of s/w difficult to define/enforce legally Individual can rarely sue a major s/w vendor Prohibitive costs for individual
  • 12. Issue 2: Reporting software flaws Should we share s/w vulnerability info? Both pros and cons Vendor interests Vendors don’t want to react to individual flaws Prefer bundle a number of flaw fixes User interests Would like to have fixes quickly Responsible vulnerability reporting How to report vulnerability info responsibly? E.g. First notify the vendor, give vendor a few weeks to fix If vendor delays fixes, ask „coordinator” for help Coordinator—e.g., computer emergency response center
  • 13. Computer Crime Separate category for computer crime is needed Because special laws are needed for CC Value of integrity and confidentiality/privacy Value of privacy is now recognized by several federal/state laws Value of data Courts understand value of data better Acceptance of computer terminology Law lags behind technology in acceptance of new terminology
  • 14. Privacy Identity theft – the most serious crime against privacy Threats to privacy Aggregation and data mining Poor system security The Internet as privacy threat Unencrypted e-mail / web surfing / attacks Corporate rights and private business
  • 15. Controls for protecting privacy Authentication Anonymity Pseudonymity
  • 16. Introduction to Ethics Law vs. Ethics Law alone can’t restrict human behavior Impractical/impossible to describe/enforce all acceptable behaviors Ethics/morals are sufficient self-controls for most people
  • 17. Most ethical and legal issues in computer system are in the area of individual’s right to privacy versus the greater good of a larger entity i.e. a company or a society. For example, tracking how employees use computers, crowd surveillance, managing customer profiles, tracking a person’s travel with passport and so on. A key concept in resolving this issues is to find out, what is a person’s expectation of privacy. Classically, the ethical issues in security system are classified into following 4 categories: • Privacy: This deals with the right of an individual to control personal information. It is the protection of personal or sensitive information. Privacy is subjective. Different people have different ideas of what privacy is and how much privacy they will trade for safety or convenience. • Accuracy: This talks about the responsibility for the authenticity, fidelity an accuracy of the information. • Property: This determines who the owner of the information is and who controls access. • Accessibility: This deals with the issue of the type of information, an organization has the right to collect. And in that situation, it also expects to know the measures which will safeguard against any unforeseen eventualities.