SlideShare a Scribd company logo
1 of 10
LEGAL & ETHICAL ISSUES ASSOCIATED 
WITH MODERN TECHNOLOGIES 
Nicole Waterford 
AET 531 
11-7-14 
Stephanie Kreb
INTRODUCTION 
When an organization takes on a new project like 
implementing new technology there is more to 
consider than just how to get the systems up and 
running. The organization must also consider any legal 
and ethical issues related to implementing new 
technology to the organization. The organization must 
consider legal issues like privacy, intellectual property, 
copyright and fair use.
LEGAL AND ETHICAL ISSUES 
 Privacy Act of 1974 
 Consumer Privacy Act 
 The Freedom of 
Information Act (FOIA) 
 Acceptable Use Policy
PRIVACY ACT OF 1974 
 The Privacy Act of 1974, protects an individuals 
personal identification information records such as 
name, social security number, and any other 
identifying number or information. The act also 
provides individuals with the ability to request 
modification of their individual records if necessary. 
 The Privacy Act of 1974 excludes any disclosure of 
an individuals personal information or records 
without the written permission or approval of the 
individual themselves (US Department of State 
Freedom of Information Act, 2014)
CONSUMER PRIVACY ACT 
 The Federal Trade Commission Act (FTC) requires all 
financial institutions to protect a consumers 
information. 
 The act requires businesses to take responsibility 
and become liable for protecting their client’s private 
information from unidentified third par ties. 
 The Federal Trade Commission will prosecute all 
companies that fail to protect the privacy of their 
clients from third par ties(US Federal Trade 
Commission , 2014.
THE FREEDOM OF INFORMATION ACT 
 The Freedom of Information Act (FOIA) is a law that 
provides the public with accessibility to U.S. 
government records and information. 
 The FOIA outlines mandatory disclosure of various 
agency records and lists nine exemptions to the 
statute that relate to issues of sensitivity and 
personal rights listed in Title 5 of the US Code, 
section 552(US Depar tment of Justice, 2014)
ACCEPTABLE USE POLICY 
 The Acceptable Use pol icy is an organizational agreement 
written by the organization requiring al l agreed upon par ties 
who share the use of the organizations computers and 
network to do so within the best interest of the organization. 
 The Acceptable Use pol icy wi l l state rule of compl iance and 
any penalties for misuse of the organizations computers or 
network. 
 The details of an organizations Acceptable Use pol icy wi l l be 
to the discretion of the organization itsel f . The organization 
wi l l generally state par ticular stipulation that users wi l l 
adhere to such as: 
 Use of internet 
 Mail 
 Spam
THE CHILDREN’S INTERNET PROTECTION ACT 
 T h e C h i l dr en’ s I nte r net P rote c t io n Ac t wa s e nd o r s ed by 
C o n g r e s s i n 2 0 0 0 wi t h t h e i n te n t to a d d r e s s c h i l dr e n ’ s a c c e s s 
to obscene or harmful content found over the internet. 
 The Act requires publ ic l ibraries, educational institutions, and 
other companies that service chi ldren to adhere to par ticular 
requirements of the Act. 
 The Act requires the above institutions to instal l protective 
sof tware to their computers preventing chi ldren from 
accessing harmful content via the internet(The Federal 
Communications Commission, 2014).
CONCLUSION 
When an organization implements new technology it is 
imperative that the organization factors in any legal and ethical 
issues that the organization may face due to the 
implementation of new technology. The organization wi l l need 
to have pol icies and procedures set in place to deal with the 
anticipated issues for the business health of the organization.
REFERENCES 
 The Federal Communications Commission. (2014, 11 7) . 
About: The Federal Communications Commission . Retrieved 
from The Federal Communications Commission : 
http://www.fcc.gov/guides/childrens- internet -protection-act 
 US Depar tment of Justice. (2014, 11 7) . Home: Freedom Of 
Information Act. Retrieved from Freedom Of Information Act: 
http://www.foia.gov/ 
 US Depar tment of State Freedom of Information Act. (2014, 
11 7) . About: US Depar tment of State Freedom Of Information 
Act . Retrieved from US Depar tment of State Freedom Of 
Information Act : http://foia.state.gov/Learn/PrivacyAct.aspx 
 US Federal Trade Commission . (2014, 11 7) . About: US 
Federal Trade Commission . Retrieved from US Federal Trade 
Commission : http://www.f tc.gov/about-f tc

More Related Content

What's hot

Be aware of the laws in South Africa that apply to email
Be aware of the laws in South Africa that apply to emailBe aware of the laws in South Africa that apply to email
Be aware of the laws in South Africa that apply to emailLance Michalson
 
Anti-circumvention and ISP liability provisions in Free Trade Agreements.
Anti-circumvention and ISP liability provisions in Free Trade Agreements.Anti-circumvention and ISP liability provisions in Free Trade Agreements.
Anti-circumvention and ISP liability provisions in Free Trade Agreements.blogzilla
 
Navigating Privacy Laws When Developing And Deploying Location Tracking Appli...
Navigating Privacy Laws When Developing And Deploying Location Tracking Appli...Navigating Privacy Laws When Developing And Deploying Location Tracking Appli...
Navigating Privacy Laws When Developing And Deploying Location Tracking Appli...Ben Allen
 
Computer misuse act new 13 12-11
Computer misuse act new 13 12-11Computer misuse act new 13 12-11
Computer misuse act new 13 12-11mrmwood
 
Right to privacy on internet and Data Protection
Right to privacy on internet and Data ProtectionRight to privacy on internet and Data Protection
Right to privacy on internet and Data Protectionatuljaybhaye
 
Internet Corporate Responsibility
Internet Corporate ResponsibilityInternet Corporate Responsibility
Internet Corporate ResponsibilityCharles Mok
 
The Philippine Cybercrime Prevention Act of 2012
The Philippine Cybercrime Prevention Act of 2012The Philippine Cybercrime Prevention Act of 2012
The Philippine Cybercrime Prevention Act of 2012Jim Ayson
 
communication decency act
communication decency actcommunication decency act
communication decency actAditya Kumar
 
Privacy_Issues_Overview
Privacy_Issues_OverviewPrivacy_Issues_Overview
Privacy_Issues_OverviewBrian Berger
 
Data Protection and Journalism: The Changing Landscape
Data Protection and Journalism: The Changing LandscapeData Protection and Journalism: The Changing Landscape
Data Protection and Journalism: The Changing LandscapeDavid Erdos
 
Att. patrizia giannini fordham university new york 19 july 2013 - electroni...
Att. patrizia giannini   fordham university new york 19 july 2013 - electroni...Att. patrizia giannini   fordham university new york 19 july 2013 - electroni...
Att. patrizia giannini fordham university new york 19 july 2013 - electroni...Amministratore Bluefactor
 
Talking about Privacy
Talking about PrivacyTalking about Privacy
Talking about Privacymbattagl
 
Employee can be prosecuted for violation of employer restrictions
Employee can be prosecuted for violation of employer restrictionsEmployee can be prosecuted for violation of employer restrictions
Employee can be prosecuted for violation of employer restrictionsAndres Baytelman
 
Data protection act new 13 12-11
Data protection act new 13 12-11Data protection act new 13 12-11
Data protection act new 13 12-11mrmwood
 
Regulations And Standards For DR
Regulations And Standards For DRRegulations And Standards For DR
Regulations And Standards For DRTPComps LLC
 
Att. patrizia giannini ggi lisbon conference 19 april 2013 - electronic dis...
Att. patrizia giannini   ggi lisbon conference 19 april 2013 - electronic dis...Att. patrizia giannini   ggi lisbon conference 19 april 2013 - electronic dis...
Att. patrizia giannini ggi lisbon conference 19 april 2013 - electronic dis...Amministratore Bluefactor
 

What's hot (19)

Be aware of the laws in South Africa that apply to email
Be aware of the laws in South Africa that apply to emailBe aware of the laws in South Africa that apply to email
Be aware of the laws in South Africa that apply to email
 
Anti-circumvention and ISP liability provisions in Free Trade Agreements.
Anti-circumvention and ISP liability provisions in Free Trade Agreements.Anti-circumvention and ISP liability provisions in Free Trade Agreements.
Anti-circumvention and ISP liability provisions in Free Trade Agreements.
 
Navigating Privacy Laws When Developing And Deploying Location Tracking Appli...
Navigating Privacy Laws When Developing And Deploying Location Tracking Appli...Navigating Privacy Laws When Developing And Deploying Location Tracking Appli...
Navigating Privacy Laws When Developing And Deploying Location Tracking Appli...
 
Computer misuse act new 13 12-11
Computer misuse act new 13 12-11Computer misuse act new 13 12-11
Computer misuse act new 13 12-11
 
Right to privacy on internet and Data Protection
Right to privacy on internet and Data ProtectionRight to privacy on internet and Data Protection
Right to privacy on internet and Data Protection
 
Internet Corporate Responsibility
Internet Corporate ResponsibilityInternet Corporate Responsibility
Internet Corporate Responsibility
 
The Philippine Cybercrime Prevention Act of 2012
The Philippine Cybercrime Prevention Act of 2012The Philippine Cybercrime Prevention Act of 2012
The Philippine Cybercrime Prevention Act of 2012
 
communication decency act
communication decency actcommunication decency act
communication decency act
 
Privacy in simple
Privacy in simplePrivacy in simple
Privacy in simple
 
Privacy_Issues_Overview
Privacy_Issues_OverviewPrivacy_Issues_Overview
Privacy_Issues_Overview
 
Right to privacy
Right to privacyRight to privacy
Right to privacy
 
Data Protection and Journalism: The Changing Landscape
Data Protection and Journalism: The Changing LandscapeData Protection and Journalism: The Changing Landscape
Data Protection and Journalism: The Changing Landscape
 
Att. patrizia giannini fordham university new york 19 july 2013 - electroni...
Att. patrizia giannini   fordham university new york 19 july 2013 - electroni...Att. patrizia giannini   fordham university new york 19 july 2013 - electroni...
Att. patrizia giannini fordham university new york 19 july 2013 - electroni...
 
Talking about Privacy
Talking about PrivacyTalking about Privacy
Talking about Privacy
 
9th circuit
9th circuit9th circuit
9th circuit
 
Employee can be prosecuted for violation of employer restrictions
Employee can be prosecuted for violation of employer restrictionsEmployee can be prosecuted for violation of employer restrictions
Employee can be prosecuted for violation of employer restrictions
 
Data protection act new 13 12-11
Data protection act new 13 12-11Data protection act new 13 12-11
Data protection act new 13 12-11
 
Regulations And Standards For DR
Regulations And Standards For DRRegulations And Standards For DR
Regulations And Standards For DR
 
Att. patrizia giannini ggi lisbon conference 19 april 2013 - electronic dis...
Att. patrizia giannini   ggi lisbon conference 19 april 2013 - electronic dis...Att. patrizia giannini   ggi lisbon conference 19 april 2013 - electronic dis...
Att. patrizia giannini ggi lisbon conference 19 april 2013 - electronic dis...
 

Similar to Aet wk 6

Week 6 legal and ethical issues associated with modern technologies - anita...
Week 6   legal and ethical issues associated with modern technologies - anita...Week 6   legal and ethical issues associated with modern technologies - anita...
Week 6 legal and ethical issues associated with modern technologies - anita...mchellehemp
 
Unit 6 Privacy and Data Protection 8 hr
Unit 6  Privacy and Data Protection 8 hrUnit 6  Privacy and Data Protection 8 hr
Unit 6 Privacy and Data Protection 8 hrTushar Rajput
 
1ITC358ICT Management and Information SecurityChapter 12.docx
1ITC358ICT Management and Information SecurityChapter 12.docx1ITC358ICT Management and Information SecurityChapter 12.docx
1ITC358ICT Management and Information SecurityChapter 12.docxhyacinthshackley2629
 
Privacy and Civil Liberties
Privacy and Civil LibertiesPrivacy and Civil Liberties
Privacy and Civil LibertiesUpekha Vandebona
 
Law and Ethics in Information Security.pptx
Law and Ethics in Information Security.pptxLaw and Ethics in Information Security.pptx
Law and Ethics in Information Security.pptxEdFeranil
 
Challenges to Achieve Privacy for Online Consumers in Mexico
Challenges to Achieve Privacy for Online Consumers in MexicoChallenges to Achieve Privacy for Online Consumers in Mexico
Challenges to Achieve Privacy for Online Consumers in MexicoJoel A. Gómez Treviño
 
Privacy and Data Security: Minimizing Reputational and Legal Risks
Privacy and Data Security: Minimizing Reputational and Legal RisksPrivacy and Data Security: Minimizing Reputational and Legal Risks
Privacy and Data Security: Minimizing Reputational and Legal RisksTechWell
 
Data Security and Regulatory Compliance
Data Security and Regulatory ComplianceData Security and Regulatory Compliance
Data Security and Regulatory ComplianceLifeline Data Centers
 
httpsdigitalguardian.comblogsocial-engineering-attacks-common.docx
httpsdigitalguardian.comblogsocial-engineering-attacks-common.docxhttpsdigitalguardian.comblogsocial-engineering-attacks-common.docx
httpsdigitalguardian.comblogsocial-engineering-attacks-common.docxadampcarr67227
 
Privacy and Data Security
Privacy and Data SecurityPrivacy and Data Security
Privacy and Data SecurityWilmerHale
 
Ronit Mathur Cyber Security assesment.pptx
Ronit Mathur Cyber Security assesment.pptxRonit Mathur Cyber Security assesment.pptx
Ronit Mathur Cyber Security assesment.pptxManuGupta344215
 
SIM - Mc leod ch10
SIM - Mc leod ch10SIM - Mc leod ch10
SIM - Mc leod ch10Welly Tjoe
 
Farm Data: Examining the Legal Issues
Farm Data: Examining the Legal Issues Farm Data: Examining the Legal Issues
Farm Data: Examining the Legal Issues Roger Royse
 
social, legal and ethical issues of e-commerce..
social, legal and ethical issues of e-commerce..social, legal and ethical issues of e-commerce..
social, legal and ethical issues of e-commerce..home based
 
An Overview of the Major Compliance Requirements
An Overview of the Major Compliance RequirementsAn Overview of the Major Compliance Requirements
An Overview of the Major Compliance RequirementsDoubleHorn
 
Data Protection in India
Data Protection in IndiaData Protection in India
Data Protection in IndiaHome
 

Similar to Aet wk 6 (20)

Week 6 legal and ethical issues associated with modern technologies - anita...
Week 6   legal and ethical issues associated with modern technologies - anita...Week 6   legal and ethical issues associated with modern technologies - anita...
Week 6 legal and ethical issues associated with modern technologies - anita...
 
Unit 6 Privacy and Data Protection 8 hr
Unit 6  Privacy and Data Protection 8 hrUnit 6  Privacy and Data Protection 8 hr
Unit 6 Privacy and Data Protection 8 hr
 
1ITC358ICT Management and Information SecurityChapter 12.docx
1ITC358ICT Management and Information SecurityChapter 12.docx1ITC358ICT Management and Information SecurityChapter 12.docx
1ITC358ICT Management and Information SecurityChapter 12.docx
 
Privacy and Civil Liberties
Privacy and Civil LibertiesPrivacy and Civil Liberties
Privacy and Civil Liberties
 
Law and Ethics in Information Security.pptx
Law and Ethics in Information Security.pptxLaw and Ethics in Information Security.pptx
Law and Ethics in Information Security.pptx
 
Challenges to Achieve Privacy for Online Consumers in Mexico
Challenges to Achieve Privacy for Online Consumers in MexicoChallenges to Achieve Privacy for Online Consumers in Mexico
Challenges to Achieve Privacy for Online Consumers in Mexico
 
Privacy and Data Security: Minimizing Reputational and Legal Risks
Privacy and Data Security: Minimizing Reputational and Legal RisksPrivacy and Data Security: Minimizing Reputational and Legal Risks
Privacy and Data Security: Minimizing Reputational and Legal Risks
 
Data Security and Regulatory Compliance
Data Security and Regulatory ComplianceData Security and Regulatory Compliance
Data Security and Regulatory Compliance
 
Cie 2 cyber law
Cie 2  cyber lawCie 2  cyber law
Cie 2 cyber law
 
Chap 4 (1)
Chap 4 (1)Chap 4 (1)
Chap 4 (1)
 
httpsdigitalguardian.comblogsocial-engineering-attacks-common.docx
httpsdigitalguardian.comblogsocial-engineering-attacks-common.docxhttpsdigitalguardian.comblogsocial-engineering-attacks-common.docx
httpsdigitalguardian.comblogsocial-engineering-attacks-common.docx
 
MIS chap # 10..
MIS chap # 10..MIS chap # 10..
MIS chap # 10..
 
Privacy and Data Security
Privacy and Data SecurityPrivacy and Data Security
Privacy and Data Security
 
Ronit Mathur Cyber Security assesment.pptx
Ronit Mathur Cyber Security assesment.pptxRonit Mathur Cyber Security assesment.pptx
Ronit Mathur Cyber Security assesment.pptx
 
SIM - Mc leod ch10
SIM - Mc leod ch10SIM - Mc leod ch10
SIM - Mc leod ch10
 
Review questions
Review questionsReview questions
Review questions
 
Farm Data: Examining the Legal Issues
Farm Data: Examining the Legal Issues Farm Data: Examining the Legal Issues
Farm Data: Examining the Legal Issues
 
social, legal and ethical issues of e-commerce..
social, legal and ethical issues of e-commerce..social, legal and ethical issues of e-commerce..
social, legal and ethical issues of e-commerce..
 
An Overview of the Major Compliance Requirements
An Overview of the Major Compliance RequirementsAn Overview of the Major Compliance Requirements
An Overview of the Major Compliance Requirements
 
Data Protection in India
Data Protection in IndiaData Protection in India
Data Protection in India
 

Recently uploaded

Class 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdfClass 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdfakmcokerachita
 
Biting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdfBiting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdfadityarao40181
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsanshu789521
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Celine George
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...Marc Dusseiller Dusjagr
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Krashi Coaching
 
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfEnzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfSumit Tiwari
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxOH TEIK BIN
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17Celine George
 
Blooming Together_ Growing a Community Garden Worksheet.docx
Blooming Together_ Growing a Community Garden Worksheet.docxBlooming Together_ Growing a Community Garden Worksheet.docx
Blooming Together_ Growing a Community Garden Worksheet.docxUnboundStockton
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon AUnboundStockton
 
Science lesson Moon for 4th quarter lesson
Science lesson Moon for 4th quarter lessonScience lesson Moon for 4th quarter lesson
Science lesson Moon for 4th quarter lessonJericReyAuditor
 
Pharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfPharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfMahmoud M. Sallam
 
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting DataJhengPantaleon
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxpboyjonauth
 
Painted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaPainted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaVirag Sontakke
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdfssuser54595a
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformChameera Dedduwage
 

Recently uploaded (20)

Class 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdfClass 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdf
 
Biting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdfBiting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdf
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha elections
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfEnzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
 
9953330565 Low Rate Call Girls In Rohini Delhi NCR
9953330565 Low Rate Call Girls In Rohini  Delhi NCR9953330565 Low Rate Call Girls In Rohini  Delhi NCR
9953330565 Low Rate Call Girls In Rohini Delhi NCR
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptx
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17
 
Blooming Together_ Growing a Community Garden Worksheet.docx
Blooming Together_ Growing a Community Garden Worksheet.docxBlooming Together_ Growing a Community Garden Worksheet.docx
Blooming Together_ Growing a Community Garden Worksheet.docx
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon A
 
Science lesson Moon for 4th quarter lesson
Science lesson Moon for 4th quarter lessonScience lesson Moon for 4th quarter lesson
Science lesson Moon for 4th quarter lesson
 
Pharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfPharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdf
 
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
 
Painted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaPainted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of India
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 

Aet wk 6

  • 1. LEGAL & ETHICAL ISSUES ASSOCIATED WITH MODERN TECHNOLOGIES Nicole Waterford AET 531 11-7-14 Stephanie Kreb
  • 2. INTRODUCTION When an organization takes on a new project like implementing new technology there is more to consider than just how to get the systems up and running. The organization must also consider any legal and ethical issues related to implementing new technology to the organization. The organization must consider legal issues like privacy, intellectual property, copyright and fair use.
  • 3. LEGAL AND ETHICAL ISSUES  Privacy Act of 1974  Consumer Privacy Act  The Freedom of Information Act (FOIA)  Acceptable Use Policy
  • 4. PRIVACY ACT OF 1974  The Privacy Act of 1974, protects an individuals personal identification information records such as name, social security number, and any other identifying number or information. The act also provides individuals with the ability to request modification of their individual records if necessary.  The Privacy Act of 1974 excludes any disclosure of an individuals personal information or records without the written permission or approval of the individual themselves (US Department of State Freedom of Information Act, 2014)
  • 5. CONSUMER PRIVACY ACT  The Federal Trade Commission Act (FTC) requires all financial institutions to protect a consumers information.  The act requires businesses to take responsibility and become liable for protecting their client’s private information from unidentified third par ties.  The Federal Trade Commission will prosecute all companies that fail to protect the privacy of their clients from third par ties(US Federal Trade Commission , 2014.
  • 6. THE FREEDOM OF INFORMATION ACT  The Freedom of Information Act (FOIA) is a law that provides the public with accessibility to U.S. government records and information.  The FOIA outlines mandatory disclosure of various agency records and lists nine exemptions to the statute that relate to issues of sensitivity and personal rights listed in Title 5 of the US Code, section 552(US Depar tment of Justice, 2014)
  • 7. ACCEPTABLE USE POLICY  The Acceptable Use pol icy is an organizational agreement written by the organization requiring al l agreed upon par ties who share the use of the organizations computers and network to do so within the best interest of the organization.  The Acceptable Use pol icy wi l l state rule of compl iance and any penalties for misuse of the organizations computers or network.  The details of an organizations Acceptable Use pol icy wi l l be to the discretion of the organization itsel f . The organization wi l l generally state par ticular stipulation that users wi l l adhere to such as:  Use of internet  Mail  Spam
  • 8. THE CHILDREN’S INTERNET PROTECTION ACT  T h e C h i l dr en’ s I nte r net P rote c t io n Ac t wa s e nd o r s ed by C o n g r e s s i n 2 0 0 0 wi t h t h e i n te n t to a d d r e s s c h i l dr e n ’ s a c c e s s to obscene or harmful content found over the internet.  The Act requires publ ic l ibraries, educational institutions, and other companies that service chi ldren to adhere to par ticular requirements of the Act.  The Act requires the above institutions to instal l protective sof tware to their computers preventing chi ldren from accessing harmful content via the internet(The Federal Communications Commission, 2014).
  • 9. CONCLUSION When an organization implements new technology it is imperative that the organization factors in any legal and ethical issues that the organization may face due to the implementation of new technology. The organization wi l l need to have pol icies and procedures set in place to deal with the anticipated issues for the business health of the organization.
  • 10. REFERENCES  The Federal Communications Commission. (2014, 11 7) . About: The Federal Communications Commission . Retrieved from The Federal Communications Commission : http://www.fcc.gov/guides/childrens- internet -protection-act  US Depar tment of Justice. (2014, 11 7) . Home: Freedom Of Information Act. Retrieved from Freedom Of Information Act: http://www.foia.gov/  US Depar tment of State Freedom of Information Act. (2014, 11 7) . About: US Depar tment of State Freedom Of Information Act . Retrieved from US Depar tment of State Freedom Of Information Act : http://foia.state.gov/Learn/PrivacyAct.aspx  US Federal Trade Commission . (2014, 11 7) . About: US Federal Trade Commission . Retrieved from US Federal Trade Commission : http://www.f tc.gov/about-f tc

Editor's Notes

  1. The Privacy Act of 1974 protects an individuals personal identification records, such as name, social security number, and other identifying number or information. The act also provides individuals with the ability to request modification of their individual records if necessary. The Act excludes any disclosure of an individuals personal information or records without with out written permission of the individual themselves (US Department of State Freedom of Information Act, 2014).
  2. Over the past few years we have seen plenty of large companies such as Target, Bank of America and several others who have been targeted by information hackers. These information hackers seek out personal information of a companies clients and use that information for unlawful means. The Federal Trade Commission Act helps to deal with issues of this magnitude by requiring financial institutions to protect their consumers personal information(US Federal Trade Commission , 2014).
  3. The Freedom of Information Act is a law that provides the public with accessibility to US government records and information. Many people consider this act to be the right to know act since it does allow the public to stay informed of changes or information in government records. Upon written request any agency of the US government will be obligated to open up their records for viewing of the public. The act itself does have a few exceptions and allow the government to withhold disclosure. (US Department of Justice, 2014).
  4. The Acceptable Use policy is an agreement that all parties who share a network of computers agree to use the computers and network in the best interest of the organization. Many organizations use this type or agreement to ensure that their employees and contractors do not abuse any privileged information of the organization. The organizations Acceptable Use policy includes policies regarding the appropriate network use and etiquette.
  5. The Children’s Internet Protection Act was endorsed by Congress in 2000 with the intent to address children’s access to obscene or harmful content found over the internet. The Act requires public libraries, educational institutions, and other companies that service children to adhere to particular requirements of the Act. The Act requires the above institutions to install protective software to their computers preventing children from accessing harmful content via the internet. (The Federal Communications Commission, 2014).