SlideShare a Scribd company logo
Ethics in Information Technology,
Second Edition
1. What is Right of Privacy?
2. Laws for electronic surveillance
3. Forms of data encryption
4. What is identify theft?
5. Strategies for consumer profiling
6. Treat customer data responsibly
7. Why and how work place monitoring
8. What is spamming?
9. Capabilities & ethical issues of advanced
surveillance technologies
Ethics in Information Technology, Second
Edition 2
 Systems collect and store key data from every
interaction with customers
 Many object to data collection policies of
government and business
 Privacy
◦ Key concern of Internet users
◦ Top reason why nonusers still avoid the Internet
 Reasonable limits must be set
 Historical perspective on the right to privacy
◦ Fourth Amendment - reasonable expectation of
privacy
Ethics in Information Technology, Second
Edition 3
 Definition
◦ “The right to be left alone—the most
comprehensive of rights, and the right most valued
by a free people”
◦ “The right of individuals to control the collection
and use of information about themselves”
 Legal aspects
◦ Protection from unreasonable intrusion upon one’s
isolation
◦ Protection from appropriation of one’s name or
likeness
Ethics in Information Technology, Second
Edition 4
 Legal aspects
◦ Protection from unreasonable publicity given to
one’s private life
◦ Protection from publicity that unreasonably places
one in a false light before the public
Ethics in Information Technology, Second
Edition 5
 Legislative acts passed over the past 40 years
◦ Most address invasion of privacy by the government
 Not corporations
◦ No single, overarching national data privacy policy
◦ Communications Act of 1934
◦ Freedom of Information Act (FOIA)
◦ Fair Credit Reporting Act of 1970
◦ Privacy Act of 1974
◦ Children’s Online Protection Act (COPA)
◦ European Community Directive 95/46/EC of 1998
◦ Gramm-Leach-Bliley Act
Ethics in Information Technology, Second
Edition 6
 Other initiatives
◦ BBB Online and TRUSTe
 Independent, nonprofit initiatives
 Favor an industry-regulated approach to data privacy
Ethics in Information Technology, Second
Edition 7
 Opt-out policy
◦ Assumes that consumers approve of companies
collecting and storing their personal information
◦ Requires consumers to actively opt out
◦ Favored by data collectors
 Opt-in policy
◦ Must obtain specific permission from consumers
before collecting any data
◦ Favored by consumers
Ethics in Information Technology, Second
Edition 8
Ethics in Information Technology, Second
Edition 9
 Secure Flight airline safety program
◦ Compares the names and information of 1.4 million
daily U.S. airline passengers with data on known or
suspected terrorists
◦ Violation of Privacy Act
Ethics in Information Technology, Second
Edition 10
 Government electronic surveillance
 Data encryption
 Identity theft
 Customer profiling
 Need to treat customer data responsibly
 Workplace monitoring
 Spamming
 Advanced surveillance techniques
Ethics in Information Technology, Second
Edition 11
 Federal Wiretap Act
◦ Outlines processes to obtain court authorization for
surveillance of all kinds of electronic
communications
◦ Judge must issue a court order based on probable
cause
 Almost never deny government requests
◦ “Roving tap” authority
 Does not name specific telephone lines or e-mail
accounts
 All accounts are tied to a specific person
Ethics in Information Technology, Second
Edition 12
Ethics in Information Technology, Second
Edition 13
 Electronic Communications Privacy Act of
1986 (ECPA)
◦ Sets standards for access to stored e-mail and
other electronic communications and records
◦ Extends Title III’s prohibitions against the
unauthorized interception, disclosure, or use of a
person’s oral or electronic communications
◦ Prosecutor does not have to justify requests
◦ Judges are required to approve every request
Ethics in Information Technology, Second
Edition 14
 Electronic Communications Privacy Act of
1986 (ECPA)
◦ Highly controversial
 Especially collection of computer data sent over the
Internet
◦ Failed to address emerging technologies
Ethics in Information Technology, Second
Edition 15
 Foreign Intelligence Surveillance Act of 1978
(FISA)
◦ Allows wiretapping of aliens and citizens in the
United States
◦ Based on finding of probable cause that a target is
 Member of a foreign terrorist group
 Agent of a foreign power
 Executive Order 12333
◦ Legal authority for electronic surveillance outside
the United States
Ethics in Information Technology, Second
Edition 16
 Communications Assistance for Law
Enforcement Act (CALEA)
◦ Requires the telecommunications industry to build
tools into its products so that federal investigators
can eavesdrop on conversations
 After getting court approval
◦ Contains a provision covering radio-based data
communication
◦ Includes voice over Internet (VoIP) technology
Ethics in Information Technology, Second
Edition 17
 USA Patriot Act of 2001
◦ Gives sweeping new powers to
 Domestic law enforcement
 International intelligence agencies
◦ Contains several “sunset” provisions
Ethics in Information Technology, Second
Edition 18
 Cryptography
◦ Science of encoding messages
◦ Only sender and intended receiver can understand
the messages
◦ Key tool for ensuring confidentiality, integrity,
authenticity of electronic messages and online
business transactions
 Encryption
◦ Process of converting electronic messages into a
form understood only by the intended recipients
Ethics in Information Technology, Second
Edition 19
 Encryption key
◦ Variable value applied using an algorithm to
encrypt or decrypt text
 Public key encryption system uses two keys
◦ Message receiver’s public key - readily available
◦ Message receiver’s private key - kept secret
 RSA - a public key encryption algorithm
 Private key encryption system
◦ Single key to encode and decode messages
Ethics in Information Technology, Second
Edition 20
Ethics in Information Technology, Second
Edition 21
 Most people agree encryption eventually must
be built into
◦ Networks
◦ File servers
◦ Tape backup systems
 Seagate Technology hard drive
◦ Automatically encrypts all data
 U.S. Arms Export Control Act controls the
export of encryption technology, hardware,
and software
Ethics in Information Technology, Second
Edition 22
 Theft of key pieces of personal information to
gain access to a person’s financial accounts
 Information includes:
◦ Name
◦ Address
◦ Date of birth
◦ Social Security number
◦ Passport number
◦ Driver’s license number
◦ Mother’s maiden name
Ethics in Information Technology, Second
Edition 23
 Fastest growing form of fraud in the United
States
 Lack of initiative in informing people whose
data was stolen
 Phishing
◦ Attempt to steal personal identity data
◦ By tricking users into entering information on a
counterfeit Web site
◦ Spear-phishing - a variation in which employees
are sent phony e-mails that look like they came
from high-level executives within their organization
Ethics in Information Technology, Second
Edition 24
 Spyware
◦ Keystroke-logging software
◦ Enables the capture of:
 Account usernames
 Passwords
 Credit card numbers
 Other sensitive information
◦ Operates even if an infected computer is not
connected to the Internet
 Identity Theft and Assumption Deterrence Act
of 1998 was passed to fight fraud
Ethics in Information Technology, Second
Edition 25
Ethics in Information Technology, Second
Edition 26
 Companies openly collect personal
information about Internet users
 Cookies
◦ Text files that a Web site puts on a user’s hard drive
so that it can remember the information later
 Tracking software
 Similar methods are used outside the Web
environment
 Databases contain a huge amount of
consumer behavioral data
Ethics in Information Technology, Second
Edition 27
 Affiliated Web sites
◦ Group of Web sites served by a single advertising
network
 Customized service for each consumer
 Types of data collected while surfing the Web
◦ GET data
◦ POST data
◦ Click-stream data
Ethics in Information Technology, Second
Edition 28
 Four ways to limit or even stop the deposit of
cookies on hard drives
◦ Set the browser to limit or stop cookies
◦ Manually delete them from the hard drive
◦ Download and install a cookie-management
program
◦ Use anonymous browsing programs that don’t
accept cookies
Ethics in Information Technology, Second
Edition 29
 Personalization software is used by marketers
to optimize the number, frequency, and
mixture of their ad placements
◦ Rules-based
◦ Collaborative filtering
◦ Demographic filtering
◦ Contextual commerce
 Platform for Privacy Preferences (P3P)
◦ Shields users from sites that don’t provide the level
of privacy protection desired
Ethics in Information Technology, Second
Edition 30
 Strong measures are required to avoid
customer relationship problems
 Code of Fair Information Practices
 1980 OECD privacy guidelines
 Chief privacy officer (CPO)
◦ Executive to oversee data privacy policies and
initiatives
Ethics in Information Technology, Second
Edition 31
 Employers monitor workers
◦ Ensures that corporate IT usage policy is followed
 Fourth Amendment cannot be used to limit
how a private employer treats its employees
◦ Public-sector employees have far greater privacy
rights than in the private industry
 Privacy advocates want federal legislation
◦ To keeps employers from infringing upon privacy
rights of employees
Ethics in Information Technology, Second
Edition 32
 Transmission of the same e-mail message to
a large number of people
 Extremely inexpensive method of marketing
 Used by many legitimate organizations
 Can contain unwanted and objectionable
materials
Ethics in Information Technology, Second
Edition 33
 Controlling the Assault of Non-Solicited
Pornography and Marketing (CANSPAM)
◦ Says it is legal to spam but
 Spammers cannot disguise their identity
 There must be a label in the message specifying that
the e-mail is an ad or solicitation
 They must include a way for recipients to indicate they
do not want future mass mailings
Ethics in Information Technology, Second
Edition 34
 Camera surveillance
◦ U.S. cities plan to expand surveillance systems
◦ “Smart surveillance system”
 Facial recognition software
◦ Identifies criminal suspects and other undesirable
characters
◦ Yields mixed results
 Global Positioning System (GPS) chips
◦ Placed in many devices
◦ Precisely locate users
Ethics in Information Technology, Second
Edition 35
Chapter 4 Page 134
Ethics in Information Technology, Second
Edition 36
FROM TEXTBOOK
Ethics in Information Technology, Second
Edition 37
 What is the right of privacy, and what is the
basis for protecting personal privacy under
the law?
 What are some of the laws that authorize
electronic surveillance by the government,
and what are the associated ethical issues?
 What are the two fundamental forms of data
encryption, and how does each work?
Ethics in Information Technology, Second
Edition 38
 What is identity theft, and what techniques do
identity thieves use?
 What are the various strategies for consumer
profiling and the associated ethical issues?
 What must organizations do to treat
consumer data responsibly?
Ethics in Information Technology, Second
Edition 39
 Why and how are employers increasingly
using workplace monitoring?
 What is spamming, and what ethical issues
are associated with its use?
 What are the capabilities of advanced
surveillance technologies, and what ethical
issues do they raise?
Ethics in Information Technology, Second
Edition 40
Ethics in Information Technology, Second
Edition 41
Ethics in Information Technology, Second
Edition 42
Ethics in Information Technology, Second
Edition 43
 The legal concept of the right to privacy has
four aspects
 A number of laws have been enacted over the
past 40 years that affect a person’s privacy
 Laws authorize electronic surveillance by the
government
 Data encryption
◦ Public key encryption system
◦ Private key encryption system
 Identity theft
Ethics in Information Technology, Second
Edition 44
 Consumer behavior data is collected both
online and offline
 Code of Fair Information Practices and 1980
OECD privacy guidelines
 Employers record and review employee
communications and activities on the job
 Advances in information technology
◦ Surveillance cameras
◦ Facial recognition software
◦ GPS systems
Ethics in Information Technology, Second
Edition 45

More Related Content

What's hot

Cyber awareness program
Cyber awareness programCyber awareness program
Cyber awareness program
Avanzo net
 
Information Security Management System in the Banking Sector
Information Security Management System in the Banking SectorInformation Security Management System in the Banking Sector
Information Security Management System in the Banking Sector
Samvel Gevorgyan
 
CyberSecurity and Importance of cybersecurity
CyberSecurity and Importance of cybersecurityCyberSecurity and Importance of cybersecurity
CyberSecurity and Importance of cybersecurity
Home
 
Chap 4 (1)
Chap 4 (1)Chap 4 (1)
CYBER CRIME AND SECURITY
CYBER CRIME AND SECURITYCYBER CRIME AND SECURITY
CYBER CRIME AND SECURITY
Chaya Sorir
 
Cyber security
Cyber securityCyber security
Cyber security
Bhavin Shah
 
Data Privacy and Protection Presentation
Data Privacy and Protection PresentationData Privacy and Protection Presentation
Data Privacy and Protection Presentationmlw32785
 
ETHICS01 - Introduction to Computer Ethics
ETHICS01 - Introduction to Computer EthicsETHICS01 - Introduction to Computer Ethics
ETHICS01 - Introduction to Computer Ethics
Michael Heron
 
Privacy in simple
Privacy in simplePrivacy in simple
Privacy in simple
Aurora Computer Studies
 
Introduction to Ethics of Big Data
Introduction to Ethics of Big DataIntroduction to Ethics of Big Data
Introduction to Ethics of Big Data28 Burnside
 
Privacy
PrivacyPrivacy
Governança e Gestão de Serviços de TI com COBIT 2019 e ITIL 4.pdf
Governança e Gestão de Serviços de TI com COBIT 2019 e ITIL 4.pdfGovernança e Gestão de Serviços de TI com COBIT 2019 e ITIL 4.pdf
Governança e Gestão de Serviços de TI com COBIT 2019 e ITIL 4.pdf
Marcelo Aguiar
 
Cybersecurity Awareness
Cybersecurity AwarenessCybersecurity Awareness
Cybersecurity Awareness
JoshuaWisniewski3
 
Cyber Security Awareness Session for Executives and Non-IT professionals
Cyber Security Awareness Session for Executives and Non-IT professionalsCyber Security Awareness Session for Executives and Non-IT professionals
Cyber Security Awareness Session for Executives and Non-IT professionals
Krishna Srikanth Manda
 
Cyber security awareness for students
 Cyber security awareness for students Cyber security awareness for students
Cyber security awareness for students
Akhil Nadh PC
 
Social Media Cyber Security Awareness Briefing
Social Media Cyber Security Awareness BriefingSocial Media Cyber Security Awareness Briefing
Social Media Cyber Security Awareness BriefingDepartment of Defense
 
Introduction to cyber security amos
Introduction to cyber security amosIntroduction to cyber security amos
Introduction to cyber security amos
Amos Oyoo
 
Data Breach Response is a Team Sport
Data Breach Response is a Team SportData Breach Response is a Team Sport
Data Breach Response is a Team Sport
Quarles & Brady
 
Ethical Dimension and understanding Ethical Foundation of IT
Ethical Dimension and understanding Ethical Foundation of ITEthical Dimension and understanding Ethical Foundation of IT
Ethical Dimension and understanding Ethical Foundation of IT
Dr. Rosemarie Sibbaluca-Guirre
 
Cyber security and AI
Cyber security and AICyber security and AI
Cyber security and AI
DexterJanPineda
 

What's hot (20)

Cyber awareness program
Cyber awareness programCyber awareness program
Cyber awareness program
 
Information Security Management System in the Banking Sector
Information Security Management System in the Banking SectorInformation Security Management System in the Banking Sector
Information Security Management System in the Banking Sector
 
CyberSecurity and Importance of cybersecurity
CyberSecurity and Importance of cybersecurityCyberSecurity and Importance of cybersecurity
CyberSecurity and Importance of cybersecurity
 
Chap 4 (1)
Chap 4 (1)Chap 4 (1)
Chap 4 (1)
 
CYBER CRIME AND SECURITY
CYBER CRIME AND SECURITYCYBER CRIME AND SECURITY
CYBER CRIME AND SECURITY
 
Cyber security
Cyber securityCyber security
Cyber security
 
Data Privacy and Protection Presentation
Data Privacy and Protection PresentationData Privacy and Protection Presentation
Data Privacy and Protection Presentation
 
ETHICS01 - Introduction to Computer Ethics
ETHICS01 - Introduction to Computer EthicsETHICS01 - Introduction to Computer Ethics
ETHICS01 - Introduction to Computer Ethics
 
Privacy in simple
Privacy in simplePrivacy in simple
Privacy in simple
 
Introduction to Ethics of Big Data
Introduction to Ethics of Big DataIntroduction to Ethics of Big Data
Introduction to Ethics of Big Data
 
Privacy
PrivacyPrivacy
Privacy
 
Governança e Gestão de Serviços de TI com COBIT 2019 e ITIL 4.pdf
Governança e Gestão de Serviços de TI com COBIT 2019 e ITIL 4.pdfGovernança e Gestão de Serviços de TI com COBIT 2019 e ITIL 4.pdf
Governança e Gestão de Serviços de TI com COBIT 2019 e ITIL 4.pdf
 
Cybersecurity Awareness
Cybersecurity AwarenessCybersecurity Awareness
Cybersecurity Awareness
 
Cyber Security Awareness Session for Executives and Non-IT professionals
Cyber Security Awareness Session for Executives and Non-IT professionalsCyber Security Awareness Session for Executives and Non-IT professionals
Cyber Security Awareness Session for Executives and Non-IT professionals
 
Cyber security awareness for students
 Cyber security awareness for students Cyber security awareness for students
Cyber security awareness for students
 
Social Media Cyber Security Awareness Briefing
Social Media Cyber Security Awareness BriefingSocial Media Cyber Security Awareness Briefing
Social Media Cyber Security Awareness Briefing
 
Introduction to cyber security amos
Introduction to cyber security amosIntroduction to cyber security amos
Introduction to cyber security amos
 
Data Breach Response is a Team Sport
Data Breach Response is a Team SportData Breach Response is a Team Sport
Data Breach Response is a Team Sport
 
Ethical Dimension and understanding Ethical Foundation of IT
Ethical Dimension and understanding Ethical Foundation of ITEthical Dimension and understanding Ethical Foundation of IT
Ethical Dimension and understanding Ethical Foundation of IT
 
Cyber security and AI
Cyber security and AICyber security and AI
Cyber security and AI
 

Viewers also liked

Sci 1010 chapter11
Sci 1010 chapter11Sci 1010 chapter11
Sci 1010 chapter11stanbridge
 
Software development
Software developmentSoftware development
Software development
Rosie Jane Enomar
 
Ethics and Social Responsibility
Ethics and Social ResponsibilityEthics and Social Responsibility
Ethics and Social Responsibilitymandalina landy
 
6 Tips to Improve Communication in Marriage
6 Tips to Improve Communication in Marriage6 Tips to Improve Communication in Marriage
6 Tips to Improve Communication in Marriage
Save My Marriage With Love
 
Creed article 1
Creed article 1Creed article 1
Creed article 1
Dominador Bentasal
 
Parenting: Challenges & Promises - Sis Jean George
Parenting: Challenges & Promises - Sis Jean GeorgeParenting: Challenges & Promises - Sis Jean George
Parenting: Challenges & Promises - Sis Jean George
All Peoples Church and World Outreach
 
The Creed - I Believe In Jesus Christ
The Creed - I Believe In Jesus ChristThe Creed - I Believe In Jesus Christ
The Creed - I Believe In Jesus Christ
Robin Schumacher
 
Atty chito liban talk rh law
Atty chito liban talk rh lawAtty chito liban talk rh law
Atty chito liban talk rh laweccce821
 
Marriage Communication Problems
Marriage Communication ProblemsMarriage Communication Problems
Marriage Communication Problems
Tajinder Singh
 
Ethic02
Ethic02Ethic02
Darul Hikmah: Maintaining a Happy Marriage, Communication Workshop
Darul Hikmah: Maintaining a Happy Marriage, Communication WorkshopDarul Hikmah: Maintaining a Happy Marriage, Communication Workshop
Darul Hikmah: Maintaining a Happy Marriage, Communication Workshopdarulhikmah
 
Nonverbal Differences in Men & Women
Nonverbal Differences in Men & WomenNonverbal Differences in Men & Women
Nonverbal Differences in Men & Women
Jessica Buck
 
Dissecting the Reproductive Health Law Policy Process
Dissecting the Reproductive Health Law Policy ProcessDissecting the Reproductive Health Law Policy Process
Dissecting the Reproductive Health Law Policy Process
Albert Domingo
 
Mission of the family (2)
Mission of the family (2)Mission of the family (2)
Mission of the family (2)
Esmhel Briones
 
Communication In Marriage
Communication In MarriageCommunication In Marriage
Communication In Marriagerevbuxton
 
Why Is The Church Against Rh Bill 5043
Why Is The Church Against Rh Bill 5043Why Is The Church Against Rh Bill 5043
Why Is The Church Against Rh Bill 5043amado sandoval
 
Marriage & Family - Part 4 : Communication In Marriage & Managing Your Home
Marriage & Family - Part 4 : Communication In Marriage & Managing Your HomeMarriage & Family - Part 4 : Communication In Marriage & Managing Your Home
Marriage & Family - Part 4 : Communication In Marriage & Managing Your Home
All Peoples Church and World Outreach
 
Practical communication in marriage
Practical communication in marriagePractical communication in marriage
Practical communication in marriage
Christine Hammond, LMHC, NCC
 
What is Moral Relativism?
What is Moral Relativism?What is Moral Relativism?
What is Moral Relativism?
Robin Schumacher
 

Viewers also liked (20)

Chapter 6
Chapter 6Chapter 6
Chapter 6
 
Sci 1010 chapter11
Sci 1010 chapter11Sci 1010 chapter11
Sci 1010 chapter11
 
Software development
Software developmentSoftware development
Software development
 
Ethics and Social Responsibility
Ethics and Social ResponsibilityEthics and Social Responsibility
Ethics and Social Responsibility
 
6 Tips to Improve Communication in Marriage
6 Tips to Improve Communication in Marriage6 Tips to Improve Communication in Marriage
6 Tips to Improve Communication in Marriage
 
Creed article 1
Creed article 1Creed article 1
Creed article 1
 
Parenting: Challenges & Promises - Sis Jean George
Parenting: Challenges & Promises - Sis Jean GeorgeParenting: Challenges & Promises - Sis Jean George
Parenting: Challenges & Promises - Sis Jean George
 
The Creed - I Believe In Jesus Christ
The Creed - I Believe In Jesus ChristThe Creed - I Believe In Jesus Christ
The Creed - I Believe In Jesus Christ
 
Atty chito liban talk rh law
Atty chito liban talk rh lawAtty chito liban talk rh law
Atty chito liban talk rh law
 
Marriage Communication Problems
Marriage Communication ProblemsMarriage Communication Problems
Marriage Communication Problems
 
Ethic02
Ethic02Ethic02
Ethic02
 
Darul Hikmah: Maintaining a Happy Marriage, Communication Workshop
Darul Hikmah: Maintaining a Happy Marriage, Communication WorkshopDarul Hikmah: Maintaining a Happy Marriage, Communication Workshop
Darul Hikmah: Maintaining a Happy Marriage, Communication Workshop
 
Nonverbal Differences in Men & Women
Nonverbal Differences in Men & WomenNonverbal Differences in Men & Women
Nonverbal Differences in Men & Women
 
Dissecting the Reproductive Health Law Policy Process
Dissecting the Reproductive Health Law Policy ProcessDissecting the Reproductive Health Law Policy Process
Dissecting the Reproductive Health Law Policy Process
 
Mission of the family (2)
Mission of the family (2)Mission of the family (2)
Mission of the family (2)
 
Communication In Marriage
Communication In MarriageCommunication In Marriage
Communication In Marriage
 
Why Is The Church Against Rh Bill 5043
Why Is The Church Against Rh Bill 5043Why Is The Church Against Rh Bill 5043
Why Is The Church Against Rh Bill 5043
 
Marriage & Family - Part 4 : Communication In Marriage & Managing Your Home
Marriage & Family - Part 4 : Communication In Marriage & Managing Your HomeMarriage & Family - Part 4 : Communication In Marriage & Managing Your Home
Marriage & Family - Part 4 : Communication In Marriage & Managing Your Home
 
Practical communication in marriage
Practical communication in marriagePractical communication in marriage
Practical communication in marriage
 
What is Moral Relativism?
What is Moral Relativism?What is Moral Relativism?
What is Moral Relativism?
 

Similar to 04 privacy

Data Privacy for Information Security Professionals Part 1
Data Privacy for Information Security Professionals Part 1Data Privacy for Information Security Professionals Part 1
Data Privacy for Information Security Professionals Part 1
Dione McBride, CISSP, CIPP/E
 
httpsdigitalguardian.comblogsocial-engineering-attacks-common.docx
httpsdigitalguardian.comblogsocial-engineering-attacks-common.docxhttpsdigitalguardian.comblogsocial-engineering-attacks-common.docx
httpsdigitalguardian.comblogsocial-engineering-attacks-common.docx
adampcarr67227
 
Privacy and personal information
Privacy and personal informationPrivacy and personal information
Privacy and personal information
Uc Man
 
Examples of international privacy legislation
Examples of international privacy legislationExamples of international privacy legislation
Examples of international privacy legislation
Ulf Mattsson
 
GDPR Part 1: Quick Facts
GDPR Part 1: Quick FactsGDPR Part 1: Quick Facts
GDPR Part 1: Quick Facts
Adrian Dumitrescu
 
L12. Digital Forensics BS.pptx
L12. Digital Forensics BS.pptxL12. Digital Forensics BS.pptx
L12. Digital Forensics BS.pptx
talhajann43
 
identifies several types of devices on which digital evidence could be.docx
identifies several types of devices on which digital evidence could be.docxidentifies several types of devices on which digital evidence could be.docx
identifies several types of devices on which digital evidence could be.docx
mckerliejonelle
 
Data Privacy
Data PrivacyData Privacy
Data Privacy
cliff_rudolph
 
BYOD - Bringing Technology to work | Sending Data Everywhere
BYOD - Bringing Technology to work | Sending Data EverywhereBYOD - Bringing Technology to work | Sending Data Everywhere
BYOD - Bringing Technology to work | Sending Data Everywhere
Jim Brashear
 
DATA SECURITY AND CONTROL.ppt
DATA SECURITY AND CONTROL.pptDATA SECURITY AND CONTROL.ppt
DATA SECURITY AND CONTROL.ppt
WilsonWanjohi5
 
Chapter1 Cyber security Law & policy.pptx
Chapter1 Cyber security Law & policy.pptxChapter1 Cyber security Law & policy.pptx
Chapter1 Cyber security Law & policy.pptx
Nargis Parveen
 
Data theft rules and regulations things you should know (pt.1)
Data theft rules and regulations  things you should know (pt.1)Data theft rules and regulations  things you should know (pt.1)
Data theft rules and regulations things you should know (pt.1)
Faidepro
 
Legal vectors - Survey of Law, Regulation and Technology Risk
Legal vectors - Survey of Law, Regulation and Technology RiskLegal vectors - Survey of Law, Regulation and Technology Risk
Legal vectors - Survey of Law, Regulation and Technology Risk
William Gamble
 
Ethics in Technology - Privacy
Ethics in Technology - PrivacyEthics in Technology - Privacy
Ethics in Technology - Privacy
Frances Coronel
 
Cross border - off-shoring and outsourcing privacy sensitive data
Cross border - off-shoring and outsourcing privacy sensitive dataCross border - off-shoring and outsourcing privacy sensitive data
Cross border - off-shoring and outsourcing privacy sensitive data
Ulf Mattsson
 
ethcpp04-Unit 3.ppt
ethcpp04-Unit 3.pptethcpp04-Unit 3.ppt
ethcpp04-Unit 3.ppt
Anil Yadav
 
Data protection & security breakfast briefing master slides 28 june-final
Data protection & security breakfast briefing   master slides 28 june-finalData protection & security breakfast briefing   master slides 28 june-final
Data protection & security breakfast briefing master slides 28 june-final
Dr. Donald Macfarlane
 
Data Protection & Security Breakfast Briefing - Master Slides_28 June_final
Data Protection & Security Breakfast Briefing - Master Slides_28 June_finalData Protection & Security Breakfast Briefing - Master Slides_28 June_final
Data Protection & Security Breakfast Briefing - Master Slides_28 June_finalDr. Donald Macfarlane
 
ethcpp04-Unit 3.ppt
ethcpp04-Unit 3.pptethcpp04-Unit 3.ppt
ethcpp04-Unit 3.ppt
Anil Yadav
 
Unit 6 Privacy and Data Protection 8 hr
Unit 6  Privacy and Data Protection 8 hrUnit 6  Privacy and Data Protection 8 hr
Unit 6 Privacy and Data Protection 8 hr
Tushar Rajput
 

Similar to 04 privacy (20)

Data Privacy for Information Security Professionals Part 1
Data Privacy for Information Security Professionals Part 1Data Privacy for Information Security Professionals Part 1
Data Privacy for Information Security Professionals Part 1
 
httpsdigitalguardian.comblogsocial-engineering-attacks-common.docx
httpsdigitalguardian.comblogsocial-engineering-attacks-common.docxhttpsdigitalguardian.comblogsocial-engineering-attacks-common.docx
httpsdigitalguardian.comblogsocial-engineering-attacks-common.docx
 
Privacy and personal information
Privacy and personal informationPrivacy and personal information
Privacy and personal information
 
Examples of international privacy legislation
Examples of international privacy legislationExamples of international privacy legislation
Examples of international privacy legislation
 
GDPR Part 1: Quick Facts
GDPR Part 1: Quick FactsGDPR Part 1: Quick Facts
GDPR Part 1: Quick Facts
 
L12. Digital Forensics BS.pptx
L12. Digital Forensics BS.pptxL12. Digital Forensics BS.pptx
L12. Digital Forensics BS.pptx
 
identifies several types of devices on which digital evidence could be.docx
identifies several types of devices on which digital evidence could be.docxidentifies several types of devices on which digital evidence could be.docx
identifies several types of devices on which digital evidence could be.docx
 
Data Privacy
Data PrivacyData Privacy
Data Privacy
 
BYOD - Bringing Technology to work | Sending Data Everywhere
BYOD - Bringing Technology to work | Sending Data EverywhereBYOD - Bringing Technology to work | Sending Data Everywhere
BYOD - Bringing Technology to work | Sending Data Everywhere
 
DATA SECURITY AND CONTROL.ppt
DATA SECURITY AND CONTROL.pptDATA SECURITY AND CONTROL.ppt
DATA SECURITY AND CONTROL.ppt
 
Chapter1 Cyber security Law & policy.pptx
Chapter1 Cyber security Law & policy.pptxChapter1 Cyber security Law & policy.pptx
Chapter1 Cyber security Law & policy.pptx
 
Data theft rules and regulations things you should know (pt.1)
Data theft rules and regulations  things you should know (pt.1)Data theft rules and regulations  things you should know (pt.1)
Data theft rules and regulations things you should know (pt.1)
 
Legal vectors - Survey of Law, Regulation and Technology Risk
Legal vectors - Survey of Law, Regulation and Technology RiskLegal vectors - Survey of Law, Regulation and Technology Risk
Legal vectors - Survey of Law, Regulation and Technology Risk
 
Ethics in Technology - Privacy
Ethics in Technology - PrivacyEthics in Technology - Privacy
Ethics in Technology - Privacy
 
Cross border - off-shoring and outsourcing privacy sensitive data
Cross border - off-shoring and outsourcing privacy sensitive dataCross border - off-shoring and outsourcing privacy sensitive data
Cross border - off-shoring and outsourcing privacy sensitive data
 
ethcpp04-Unit 3.ppt
ethcpp04-Unit 3.pptethcpp04-Unit 3.ppt
ethcpp04-Unit 3.ppt
 
Data protection & security breakfast briefing master slides 28 june-final
Data protection & security breakfast briefing   master slides 28 june-finalData protection & security breakfast briefing   master slides 28 june-final
Data protection & security breakfast briefing master slides 28 june-final
 
Data Protection & Security Breakfast Briefing - Master Slides_28 June_final
Data Protection & Security Breakfast Briefing - Master Slides_28 June_finalData Protection & Security Breakfast Briefing - Master Slides_28 June_final
Data Protection & Security Breakfast Briefing - Master Slides_28 June_final
 
ethcpp04-Unit 3.ppt
ethcpp04-Unit 3.pptethcpp04-Unit 3.ppt
ethcpp04-Unit 3.ppt
 
Unit 6 Privacy and Data Protection 8 hr
Unit 6  Privacy and Data Protection 8 hrUnit 6  Privacy and Data Protection 8 hr
Unit 6 Privacy and Data Protection 8 hr
 

Recently uploaded

Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
DeeptiGupta154
 
Polish students' mobility in the Czech Republic
Polish students' mobility in the Czech RepublicPolish students' mobility in the Czech Republic
Polish students' mobility in the Czech Republic
Anna Sz.
 
The approach at University of Liverpool.pptx
The approach at University of Liverpool.pptxThe approach at University of Liverpool.pptx
The approach at University of Liverpool.pptx
Jisc
 
Model Attribute Check Company Auto Property
Model Attribute  Check Company Auto PropertyModel Attribute  Check Company Auto Property
Model Attribute Check Company Auto Property
Celine George
 
Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345
beazzy04
 
2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...
Sandy Millin
 
Digital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and ResearchDigital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and Research
Vikramjit Singh
 
Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.
Ashokrao Mane college of Pharmacy Peth-Vadgaon
 
Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
Thiyagu K
 
How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17
Celine George
 
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXXPhrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
MIRIAMSALINAS13
 
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
Nguyen Thanh Tu Collection
 
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdfAdversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Po-Chuan Chen
 
1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx
JosvitaDsouza2
 
Palestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptxPalestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptx
RaedMohamed3
 
The Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official PublicationThe Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official Publication
Delapenabediema
 
Synthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptxSynthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptx
Pavel ( NSTU)
 
The geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideasThe geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideas
GeoBlogs
 
Language Across the Curriculm LAC B.Ed.
Language Across the  Curriculm LAC B.Ed.Language Across the  Curriculm LAC B.Ed.
Language Across the Curriculm LAC B.Ed.
Atul Kumar Singh
 
The basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptxThe basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptx
heathfieldcps1
 

Recently uploaded (20)

Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
 
Polish students' mobility in the Czech Republic
Polish students' mobility in the Czech RepublicPolish students' mobility in the Czech Republic
Polish students' mobility in the Czech Republic
 
The approach at University of Liverpool.pptx
The approach at University of Liverpool.pptxThe approach at University of Liverpool.pptx
The approach at University of Liverpool.pptx
 
Model Attribute Check Company Auto Property
Model Attribute  Check Company Auto PropertyModel Attribute  Check Company Auto Property
Model Attribute Check Company Auto Property
 
Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345
 
2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...
 
Digital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and ResearchDigital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and Research
 
Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.
 
Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
 
How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17
 
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXXPhrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
 
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
 
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdfAdversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
 
1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx
 
Palestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptxPalestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptx
 
The Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official PublicationThe Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official Publication
 
Synthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptxSynthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptx
 
The geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideasThe geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideas
 
Language Across the Curriculm LAC B.Ed.
Language Across the  Curriculm LAC B.Ed.Language Across the  Curriculm LAC B.Ed.
Language Across the Curriculm LAC B.Ed.
 
The basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptxThe basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptx
 

04 privacy

  • 1. Ethics in Information Technology, Second Edition
  • 2. 1. What is Right of Privacy? 2. Laws for electronic surveillance 3. Forms of data encryption 4. What is identify theft? 5. Strategies for consumer profiling 6. Treat customer data responsibly 7. Why and how work place monitoring 8. What is spamming? 9. Capabilities & ethical issues of advanced surveillance technologies Ethics in Information Technology, Second Edition 2
  • 3.  Systems collect and store key data from every interaction with customers  Many object to data collection policies of government and business  Privacy ◦ Key concern of Internet users ◦ Top reason why nonusers still avoid the Internet  Reasonable limits must be set  Historical perspective on the right to privacy ◦ Fourth Amendment - reasonable expectation of privacy Ethics in Information Technology, Second Edition 3
  • 4.  Definition ◦ “The right to be left alone—the most comprehensive of rights, and the right most valued by a free people” ◦ “The right of individuals to control the collection and use of information about themselves”  Legal aspects ◦ Protection from unreasonable intrusion upon one’s isolation ◦ Protection from appropriation of one’s name or likeness Ethics in Information Technology, Second Edition 4
  • 5.  Legal aspects ◦ Protection from unreasonable publicity given to one’s private life ◦ Protection from publicity that unreasonably places one in a false light before the public Ethics in Information Technology, Second Edition 5
  • 6.  Legislative acts passed over the past 40 years ◦ Most address invasion of privacy by the government  Not corporations ◦ No single, overarching national data privacy policy ◦ Communications Act of 1934 ◦ Freedom of Information Act (FOIA) ◦ Fair Credit Reporting Act of 1970 ◦ Privacy Act of 1974 ◦ Children’s Online Protection Act (COPA) ◦ European Community Directive 95/46/EC of 1998 ◦ Gramm-Leach-Bliley Act Ethics in Information Technology, Second Edition 6
  • 7.  Other initiatives ◦ BBB Online and TRUSTe  Independent, nonprofit initiatives  Favor an industry-regulated approach to data privacy Ethics in Information Technology, Second Edition 7
  • 8.  Opt-out policy ◦ Assumes that consumers approve of companies collecting and storing their personal information ◦ Requires consumers to actively opt out ◦ Favored by data collectors  Opt-in policy ◦ Must obtain specific permission from consumers before collecting any data ◦ Favored by consumers Ethics in Information Technology, Second Edition 8
  • 9. Ethics in Information Technology, Second Edition 9
  • 10.  Secure Flight airline safety program ◦ Compares the names and information of 1.4 million daily U.S. airline passengers with data on known or suspected terrorists ◦ Violation of Privacy Act Ethics in Information Technology, Second Edition 10
  • 11.  Government electronic surveillance  Data encryption  Identity theft  Customer profiling  Need to treat customer data responsibly  Workplace monitoring  Spamming  Advanced surveillance techniques Ethics in Information Technology, Second Edition 11
  • 12.  Federal Wiretap Act ◦ Outlines processes to obtain court authorization for surveillance of all kinds of electronic communications ◦ Judge must issue a court order based on probable cause  Almost never deny government requests ◦ “Roving tap” authority  Does not name specific telephone lines or e-mail accounts  All accounts are tied to a specific person Ethics in Information Technology, Second Edition 12
  • 13. Ethics in Information Technology, Second Edition 13
  • 14.  Electronic Communications Privacy Act of 1986 (ECPA) ◦ Sets standards for access to stored e-mail and other electronic communications and records ◦ Extends Title III’s prohibitions against the unauthorized interception, disclosure, or use of a person’s oral or electronic communications ◦ Prosecutor does not have to justify requests ◦ Judges are required to approve every request Ethics in Information Technology, Second Edition 14
  • 15.  Electronic Communications Privacy Act of 1986 (ECPA) ◦ Highly controversial  Especially collection of computer data sent over the Internet ◦ Failed to address emerging technologies Ethics in Information Technology, Second Edition 15
  • 16.  Foreign Intelligence Surveillance Act of 1978 (FISA) ◦ Allows wiretapping of aliens and citizens in the United States ◦ Based on finding of probable cause that a target is  Member of a foreign terrorist group  Agent of a foreign power  Executive Order 12333 ◦ Legal authority for electronic surveillance outside the United States Ethics in Information Technology, Second Edition 16
  • 17.  Communications Assistance for Law Enforcement Act (CALEA) ◦ Requires the telecommunications industry to build tools into its products so that federal investigators can eavesdrop on conversations  After getting court approval ◦ Contains a provision covering radio-based data communication ◦ Includes voice over Internet (VoIP) technology Ethics in Information Technology, Second Edition 17
  • 18.  USA Patriot Act of 2001 ◦ Gives sweeping new powers to  Domestic law enforcement  International intelligence agencies ◦ Contains several “sunset” provisions Ethics in Information Technology, Second Edition 18
  • 19.  Cryptography ◦ Science of encoding messages ◦ Only sender and intended receiver can understand the messages ◦ Key tool for ensuring confidentiality, integrity, authenticity of electronic messages and online business transactions  Encryption ◦ Process of converting electronic messages into a form understood only by the intended recipients Ethics in Information Technology, Second Edition 19
  • 20.  Encryption key ◦ Variable value applied using an algorithm to encrypt or decrypt text  Public key encryption system uses two keys ◦ Message receiver’s public key - readily available ◦ Message receiver’s private key - kept secret  RSA - a public key encryption algorithm  Private key encryption system ◦ Single key to encode and decode messages Ethics in Information Technology, Second Edition 20
  • 21. Ethics in Information Technology, Second Edition 21
  • 22.  Most people agree encryption eventually must be built into ◦ Networks ◦ File servers ◦ Tape backup systems  Seagate Technology hard drive ◦ Automatically encrypts all data  U.S. Arms Export Control Act controls the export of encryption technology, hardware, and software Ethics in Information Technology, Second Edition 22
  • 23.  Theft of key pieces of personal information to gain access to a person’s financial accounts  Information includes: ◦ Name ◦ Address ◦ Date of birth ◦ Social Security number ◦ Passport number ◦ Driver’s license number ◦ Mother’s maiden name Ethics in Information Technology, Second Edition 23
  • 24.  Fastest growing form of fraud in the United States  Lack of initiative in informing people whose data was stolen  Phishing ◦ Attempt to steal personal identity data ◦ By tricking users into entering information on a counterfeit Web site ◦ Spear-phishing - a variation in which employees are sent phony e-mails that look like they came from high-level executives within their organization Ethics in Information Technology, Second Edition 24
  • 25.  Spyware ◦ Keystroke-logging software ◦ Enables the capture of:  Account usernames  Passwords  Credit card numbers  Other sensitive information ◦ Operates even if an infected computer is not connected to the Internet  Identity Theft and Assumption Deterrence Act of 1998 was passed to fight fraud Ethics in Information Technology, Second Edition 25
  • 26. Ethics in Information Technology, Second Edition 26
  • 27.  Companies openly collect personal information about Internet users  Cookies ◦ Text files that a Web site puts on a user’s hard drive so that it can remember the information later  Tracking software  Similar methods are used outside the Web environment  Databases contain a huge amount of consumer behavioral data Ethics in Information Technology, Second Edition 27
  • 28.  Affiliated Web sites ◦ Group of Web sites served by a single advertising network  Customized service for each consumer  Types of data collected while surfing the Web ◦ GET data ◦ POST data ◦ Click-stream data Ethics in Information Technology, Second Edition 28
  • 29.  Four ways to limit or even stop the deposit of cookies on hard drives ◦ Set the browser to limit or stop cookies ◦ Manually delete them from the hard drive ◦ Download and install a cookie-management program ◦ Use anonymous browsing programs that don’t accept cookies Ethics in Information Technology, Second Edition 29
  • 30.  Personalization software is used by marketers to optimize the number, frequency, and mixture of their ad placements ◦ Rules-based ◦ Collaborative filtering ◦ Demographic filtering ◦ Contextual commerce  Platform for Privacy Preferences (P3P) ◦ Shields users from sites that don’t provide the level of privacy protection desired Ethics in Information Technology, Second Edition 30
  • 31.  Strong measures are required to avoid customer relationship problems  Code of Fair Information Practices  1980 OECD privacy guidelines  Chief privacy officer (CPO) ◦ Executive to oversee data privacy policies and initiatives Ethics in Information Technology, Second Edition 31
  • 32.  Employers monitor workers ◦ Ensures that corporate IT usage policy is followed  Fourth Amendment cannot be used to limit how a private employer treats its employees ◦ Public-sector employees have far greater privacy rights than in the private industry  Privacy advocates want federal legislation ◦ To keeps employers from infringing upon privacy rights of employees Ethics in Information Technology, Second Edition 32
  • 33.  Transmission of the same e-mail message to a large number of people  Extremely inexpensive method of marketing  Used by many legitimate organizations  Can contain unwanted and objectionable materials Ethics in Information Technology, Second Edition 33
  • 34.  Controlling the Assault of Non-Solicited Pornography and Marketing (CANSPAM) ◦ Says it is legal to spam but  Spammers cannot disguise their identity  There must be a label in the message specifying that the e-mail is an ad or solicitation  They must include a way for recipients to indicate they do not want future mass mailings Ethics in Information Technology, Second Edition 34
  • 35.  Camera surveillance ◦ U.S. cities plan to expand surveillance systems ◦ “Smart surveillance system”  Facial recognition software ◦ Identifies criminal suspects and other undesirable characters ◦ Yields mixed results  Global Positioning System (GPS) chips ◦ Placed in many devices ◦ Precisely locate users Ethics in Information Technology, Second Edition 35
  • 36. Chapter 4 Page 134 Ethics in Information Technology, Second Edition 36
  • 37. FROM TEXTBOOK Ethics in Information Technology, Second Edition 37
  • 38.  What is the right of privacy, and what is the basis for protecting personal privacy under the law?  What are some of the laws that authorize electronic surveillance by the government, and what are the associated ethical issues?  What are the two fundamental forms of data encryption, and how does each work? Ethics in Information Technology, Second Edition 38
  • 39.  What is identity theft, and what techniques do identity thieves use?  What are the various strategies for consumer profiling and the associated ethical issues?  What must organizations do to treat consumer data responsibly? Ethics in Information Technology, Second Edition 39
  • 40.  Why and how are employers increasingly using workplace monitoring?  What is spamming, and what ethical issues are associated with its use?  What are the capabilities of advanced surveillance technologies, and what ethical issues do they raise? Ethics in Information Technology, Second Edition 40
  • 41. Ethics in Information Technology, Second Edition 41
  • 42. Ethics in Information Technology, Second Edition 42
  • 43. Ethics in Information Technology, Second Edition 43
  • 44.  The legal concept of the right to privacy has four aspects  A number of laws have been enacted over the past 40 years that affect a person’s privacy  Laws authorize electronic surveillance by the government  Data encryption ◦ Public key encryption system ◦ Private key encryption system  Identity theft Ethics in Information Technology, Second Edition 44
  • 45.  Consumer behavior data is collected both online and offline  Code of Fair Information Practices and 1980 OECD privacy guidelines  Employers record and review employee communications and activities on the job  Advances in information technology ◦ Surveillance cameras ◦ Facial recognition software ◦ GPS systems Ethics in Information Technology, Second Edition 45