The document discusses several topics related to ethics in information technology including: the concept of privacy and related laws; government surveillance laws; forms of data encryption; identity theft; consumer profiling; responsible treatment of customer data; workplace monitoring; spam; and advanced surveillance technologies. Key issues addressed include balancing security with individual privacy and establishing reasonable limits on data collection and usage.
First line of defense for cybersecurity : AIAhmed Banafa
The year 2017 wasn't a great year for cyber-security; we saw a large number of high-profile cyber attacks; including Uber, Deloitte, Equifax and the now infamous WannaCry ransomware attack, and 2018 started with a bang too with the hacking of Winter Olympics.
The frightening truth about increasingly cyber-attacks is that most businesses and the cybersecurity industry itself are not prepared. Despite the constant flow of security updates and patches, the number of attacks continues to rise.
Two hour lecture I gave at the Jyväskylä Summer School. The purpose of the talk is to give a quick non-technical overview of concepts and methodologies in data science. Topics include a wide overview of both pattern mining and machine learning.
See also Part 2 of the lecture: Industrial Data Science. You can find it in my profile (click the face)
First line of defense for cybersecurity : AIAhmed Banafa
The year 2017 wasn't a great year for cyber-security; we saw a large number of high-profile cyber attacks; including Uber, Deloitte, Equifax and the now infamous WannaCry ransomware attack, and 2018 started with a bang too with the hacking of Winter Olympics.
The frightening truth about increasingly cyber-attacks is that most businesses and the cybersecurity industry itself are not prepared. Despite the constant flow of security updates and patches, the number of attacks continues to rise.
Two hour lecture I gave at the Jyväskylä Summer School. The purpose of the talk is to give a quick non-technical overview of concepts and methodologies in data science. Topics include a wide overview of both pattern mining and machine learning.
See also Part 2 of the lecture: Industrial Data Science. You can find it in my profile (click the face)
We at AVANZO Strongly believe that PREVENTION IS BETTER THAN CURE and so an awareness program in schools named as Cyber Awareness Program (CAP) is introduced for schools across the country....
Information Security Management System in the Banking SectorSamvel Gevorgyan
Information Security Management System design. Information security governance approaches comparison. ISMS processes. ISMS implementation. The biggest threats in the Banking sector. The future of banking and payment systems. The challenges and future of banking. Cybersecurity solutions for Financial services.
Cybersecurity is important because it protects all categories of data from theft and damage. This includes sensitive data, personally identifiable information (PII), protected health information (PHI), personal information, intellectual property, data, and governmental and industry information systems.
in the modern day, there are dozens or possibly even hundreds of different interconnected assets, networks, and systems that we rely on every day for the normal functioning of society. Without these various infrastructure components, we wouldn’t be able to enjoy the benefits of living in the 21st century – small-scale disruptions to these components would result in the temporary loss of crucial capabilities.
But, if escalated to a larger scale, society would be plunged into a catastrophic black sky event, resulting in cascading failures and a serious threat to human continuity. Examples include conflicts between nations where an aggressor seeks to disable their opponent’s ability to communicate or mobilize. And what better way for a domestic or international terrorist group to sow confusion and fear than to prevent our critical infrastructure from functioning and, in turn, our successful ability to respond and recover?
In other words, it is fundamental to the safety and prosperity of a nation to provide reliable critical infrastructure security.
ETHICS01 - Introduction to Computer EthicsMichael Heron
An overview of issues related to ethics and the psychology of immorality. Intended for computing students as part of a professional and ethical issues module.
This is a basic presentation about cybersecurity to share awareness about various security threats and how you can protect yourself from them. In the preview window the formatting is off, but when downloaded it can be viewed with no problems. This is for my Info Security Policy Management class at Governors State University.
Cyber Security Awareness Session for Executives and Non-IT professionalsKrishna Srikanth Manda
Cyber Security Awareness Session conducted by Lightracers Consulting, for Management and non-IT employees. In this learning presentation, we will look at - What is Cyber Crime, Types of Cyber crime, What is Cyber Security, Types of Threats, Social Engineering techniques, Identifying legitimate and secure websites, Protection measures, Cyber Law in India followed by a small quiz.
In this slide I present you an awareness about cyber security and crimes for students. Targeted audience are students aged 14-17 years of age. I also present common mistakes we all do in our lives that lead to cyber insecurities
SPECIFIC LEARNING OBJECTIVES:
1. Know how to distinguish among ethical, moral and legal behavior;
2. Be familiar with the role of ethics in business and the need for ethics culture in the organization;
3. Understand how ethics relates to information systems;
4. Identify the main moral dimensions of an information society and specific principles of conduct that can be used to guide ethical decisions.
5. Understanding Ethical and Social Issues in IS.
6. Understand and identify Computer Crimes and how to prevent them;
7. Discuss the five ethical and moral dimensions of the Information age;
8. Know the ways to protect privacy and security on the Internet.
We at AVANZO Strongly believe that PREVENTION IS BETTER THAN CURE and so an awareness program in schools named as Cyber Awareness Program (CAP) is introduced for schools across the country....
Information Security Management System in the Banking SectorSamvel Gevorgyan
Information Security Management System design. Information security governance approaches comparison. ISMS processes. ISMS implementation. The biggest threats in the Banking sector. The future of banking and payment systems. The challenges and future of banking. Cybersecurity solutions for Financial services.
Cybersecurity is important because it protects all categories of data from theft and damage. This includes sensitive data, personally identifiable information (PII), protected health information (PHI), personal information, intellectual property, data, and governmental and industry information systems.
in the modern day, there are dozens or possibly even hundreds of different interconnected assets, networks, and systems that we rely on every day for the normal functioning of society. Without these various infrastructure components, we wouldn’t be able to enjoy the benefits of living in the 21st century – small-scale disruptions to these components would result in the temporary loss of crucial capabilities.
But, if escalated to a larger scale, society would be plunged into a catastrophic black sky event, resulting in cascading failures and a serious threat to human continuity. Examples include conflicts between nations where an aggressor seeks to disable their opponent’s ability to communicate or mobilize. And what better way for a domestic or international terrorist group to sow confusion and fear than to prevent our critical infrastructure from functioning and, in turn, our successful ability to respond and recover?
In other words, it is fundamental to the safety and prosperity of a nation to provide reliable critical infrastructure security.
ETHICS01 - Introduction to Computer EthicsMichael Heron
An overview of issues related to ethics and the psychology of immorality. Intended for computing students as part of a professional and ethical issues module.
This is a basic presentation about cybersecurity to share awareness about various security threats and how you can protect yourself from them. In the preview window the formatting is off, but when downloaded it can be viewed with no problems. This is for my Info Security Policy Management class at Governors State University.
Cyber Security Awareness Session for Executives and Non-IT professionalsKrishna Srikanth Manda
Cyber Security Awareness Session conducted by Lightracers Consulting, for Management and non-IT employees. In this learning presentation, we will look at - What is Cyber Crime, Types of Cyber crime, What is Cyber Security, Types of Threats, Social Engineering techniques, Identifying legitimate and secure websites, Protection measures, Cyber Law in India followed by a small quiz.
In this slide I present you an awareness about cyber security and crimes for students. Targeted audience are students aged 14-17 years of age. I also present common mistakes we all do in our lives that lead to cyber insecurities
SPECIFIC LEARNING OBJECTIVES:
1. Know how to distinguish among ethical, moral and legal behavior;
2. Be familiar with the role of ethics in business and the need for ethics culture in the organization;
3. Understand how ethics relates to information systems;
4. Identify the main moral dimensions of an information society and specific principles of conduct that can be used to guide ethical decisions.
5. Understanding Ethical and Social Issues in IS.
6. Understand and identify Computer Crimes and how to prevent them;
7. Discuss the five ethical and moral dimensions of the Information age;
8. Know the ways to protect privacy and security on the Internet.
Is your marriage suffering? Healthy communication in marriage can save your relationship. You are only 6 communication tips away from a better, improved marriage. They are super easy to learn and if you use them, you'll notice results quickly. The best thing of all? It only takes one spouse using these tips to change your relationship for the better.
Anger is the worst enemy of good communication. Spouses should express their emotions to each other in a healthy manner to safeguard their relationship.
Dissecting the Reproductive Health Law Policy ProcessAlbert Domingo
Slides intended for interactive discussion on the policy process behind the Philippines' Reproductive Health law (RA 10354), following the framework of Walt and Gilson (1994)'s health policy triangle and the legislative threshold of Gray (2004).
In part-4 of this series we discuss the importance of developing healthy and meaningful communication between husband and wife. We discuss practical ways to do this and remind ourselves about the power and affect of our words. We also discuss some specific areas on managing your home.
For sermon audio, notes, slides, archives and other free resources like books, please visit our website - apcwo.org
#APCBangalore
An overview of GDPR data privacy and the impact on traditional information security practices, which was presented at SecureWorld Dallas, October, 2017
https://digitalguardian.com/blog/social-engineering-attacks-common-techniques-how-prevent-attack
Statement of Michelle Richardson, Director, Privacy & Data
Center for Democracy & Technology
before the
United States Senate Committee on the Judiciary
GDPR & CCPA: Opt-ins, Consumer Control, and the Impact on Competition and Innovation
March 12, 2019
On behalf of the Center for Democracy & Technology (CDT), thank you for the
opportunity to testify about the importance of crafting a federal consumer privacy law that
provides meaningful protections for Americans and clarity for entities of all sizes and sectors.
CDT is a nonpartisan, nonprofit 501(c)(3) charitable organization dedicated to advancing the
rights of the individual in the digital world. CDT is committed to protecting privacy as a
fundamental human and civil right and as a necessity for securing other rights such as access to
justice, equal protection, and freedom of expression. CDT has offices in Washington, D.C., and
Brussels, and has a diverse funding portfolio from foundation grants, corporate donations, and
individual donations.1
The United States should be leading the way in protecting digital civil rights. This hearing
is an opportunity to learn how Congress can improve upon the privacy frameworks offered in
the European Union via the General Data Protection Regulation (GDPR) and the California
Consumer Privacy Act (CCPA) to craft a comprehensive privacy law that works for the U.S. Our
digital future should be one in which technology supports human rights and human dignity. This
future cannot be realized if people are forced to choose between protecting their personal
information and using the technologies and services that enhance our lives. This future depends
on clear and meaningful rules governing data processing; rules that do not simply provide
1 All donations over $1,000 are disclosed in our annual report and are available online at:
https://cdt.org/financials/.
2
people with notices and check boxes but actually protect them from privacy and security
abuses and data-driven discrimination; protections that cannot be signed away.
Congress should resist the narratives that innovative technologies and strong privacy
protections are fundamentally at odds, and that a privacy law would necessarily cement the
market dominance of a few large companies. Clear and focused privacy rules can help
companies of all sizes gain certainty with respect to appropriate and inappropriate uses of data.
Clear rules will also empower engineers and product managers to design for privacy on the
front end, rather than having to wait for a public privacy scandal to force the rollback of a
product or data practice.
We understand that drafting comprehensive privacy legislation is a complex endeavor.
Over the past year we have worked with partners in civil societ.
Fully understand how GDPR affects the life of millions of EU citizens by having in mind the 10 simple facts exposed by Dr. Karsten Kinast
The presentation gives a short glimpse in to the motivation of GDPR, the key changes it brings, and the ongoing compliance on information lifecycle it presumes.
identifies several types of devices on which digital evidence could be.docxmckerliejonelle
identifies several types of devices on which digital evidence could be found. list two of the devices provided by the text.
1. Explain what types of evidence you would look for on those devices
2. Explain what limitations you might have, or what hurdles you would have to clear before searching those devices (BOTH as a company IT professional and a law enforcement officer).
3. Identify what, if any, policies would need to be in place for you to search as a private employee, as well as what limits can be placed on the search by police.
Solution
1.
1. Digital evidence is defined as data and information of value to an investigation which is stored on, received or transmitted by an electronic device.
2. Evidence can be acquired when electronic devices are seized and secured for examination.
3. The following are some of the examples of Digital Evidences.
- Information or Data can be altered, destroyed or damaged with little effort.
- Information or Data can be hidden like finger prints i.e Biometric.
- Information or data crosses jurisdictional borders quickly and easily.
- Information and Data can be duplicated.
2. Limitations of Digital Evidence:
1. Investigative limitations are primarily due to encryption and proprietary systems that require decoding before data or information can be accessed.
2. Unlike what is portrayed on popular television crime shows, decoding an encrypted password can take a very long time, even with sophisticated software.
3. There are both legal and technical limitations in this area of investigation.
4. Laws governing processing and prosecution are different from state to state.
5. Digital crime can easily cross jurisdictions, making standardization an increasingly critical law enforcement issue.
6. Digital Evidence can be get through Computers, Internet and Mobile devices.
7. Global access to information and to other computers, criminals are able to use this access to hack into financial and communications systems, major corporations and government networks to steal money, identities and information, or to sabotage systems.
8. Computer crimes continue to be a growing problem in both the public and private sector. A single computer can contain evidence of criminal activity carried out on the web, or the criminal use can be contained in the computer itself, such as pornography, copyright infringement, extortion, counterfeiting and much more. Digital evidence is located on the computer\'s hard drive and peripheral equipment, including removable media such as thumb drives and CD-ROM discs.
9. Mobile devices allow criminals to engage in an ever-growing variety of activities and the devices keep track of every move and message. It is this tracking capability that turns mobile devices into key evidence in many cases
.
BYOD - Bringing Technology to work | Sending Data EverywhereJim Brashear
Presentation to the Science and Technology Committee of the American Bar Association on legal issues associated with employers enabling employee Bring Your Own Device policies.
Data theft rules and regulations things you should know (pt.1)Faidepro
The IT Act appears to be adequate in regards to data theft, it is insufficient in addressing the minute technical intricacies involved in such a crime, leaving gaps in the law and allowing the perpetrators to get away with it. Since this problem affects more than one country and has international implications, we have briefed the countries that have such law and how it works; Which will be covered in two parts.
Legal vectors - Survey of Law, Regulation and Technology RiskWilliam Gamble
Survey of law, regulation and technology risk including new cyber security regulations, HIPAA, European Privacy GDPR, Internet of Things Liability, State Law
William Gamble
Unit 6 Privacy and Data Protection 8 hrTushar Rajput
Right to Privacy and its Legal Framework, The Concept of Privacy, National Legal
Framework for Protecting Privacy, International Legal Framework for Protecting Privacy, Privacy Related Wrongs and Remedies, Data Security, The Concept of Security in Cyberspace, Technological Vulnerabilities, Legal Response to Technological
Vulnerabilities, Security Audit (VA/PT), Data Protection, Data Protection Position in
India, Privacy Policy, Emerging Issues in Data Protection and Privacy, BPOs and
Legal Regime in India, Protect Kids' Privacy Online, Evolving Trends in Data Protection and Information Security
Model Attribute Check Company Auto PropertyCeline George
In Odoo, the multi-company feature allows you to manage multiple companies within a single Odoo database instance. Each company can have its own configurations while still sharing common resources such as products, customers, and suppliers.
2024.06.01 Introducing a competency framework for languag learning materials ...Sandy Millin
http://sandymillin.wordpress.com/iateflwebinar2024
Published classroom materials form the basis of syllabuses, drive teacher professional development, and have a potentially huge influence on learners, teachers and education systems. All teachers also create their own materials, whether a few sentences on a blackboard, a highly-structured fully-realised online course, or anything in between. Despite this, the knowledge and skills needed to create effective language learning materials are rarely part of teacher training, and are mostly learnt by trial and error.
Knowledge and skills frameworks, generally called competency frameworks, for ELT teachers, trainers and managers have existed for a few years now. However, until I created one for my MA dissertation, there wasn’t one drawing together what we need to know and do to be able to effectively produce language learning materials.
This webinar will introduce you to my framework, highlighting the key competencies I identified from my research. It will also show how anybody involved in language teaching (any language, not just English!), teacher training, managing schools or developing language learning materials can benefit from using the framework.
Biological screening of herbal drugs: Introduction and Need for
Phyto-Pharmacological Screening, New Strategies for evaluating
Natural Products, In vitro evaluation techniques for Antioxidants, Antimicrobial and Anticancer drugs. In vivo evaluation techniques
for Anti-inflammatory, Antiulcer, Anticancer, Wound healing, Antidiabetic, Hepatoprotective, Cardio protective, Diuretics and
Antifertility, Toxicity studies as per OECD guidelines
Unit 8 - Information and Communication Technology (Paper I).pdfThiyagu K
This slides describes the basic concepts of ICT, basics of Email, Emerging Technology and Digital Initiatives in Education. This presentations aligns with the UGC Paper I syllabus.
How to Make a Field invisible in Odoo 17Celine George
It is possible to hide or invisible some fields in odoo. Commonly using “invisible” attribute in the field definition to invisible the fields. This slide will show how to make a field invisible in odoo 17.
Palestine last event orientationfvgnh .pptxRaedMohamed3
An EFL lesson about the current events in Palestine. It is intended to be for intermediate students who wish to increase their listening skills through a short lesson in power point.
Read| The latest issue of The Challenger is here! We are thrilled to announce that our school paper has qualified for the NATIONAL SCHOOLS PRESS CONFERENCE (NSPC) 2024. Thank you for your unwavering support and trust. Dive into the stories that made us stand out!
Synthetic Fiber Construction in lab .pptxPavel ( NSTU)
Synthetic fiber production is a fascinating and complex field that blends chemistry, engineering, and environmental science. By understanding these aspects, students can gain a comprehensive view of synthetic fiber production, its impact on society and the environment, and the potential for future innovations. Synthetic fibers play a crucial role in modern society, impacting various aspects of daily life, industry, and the environment. ynthetic fibers are integral to modern life, offering a range of benefits from cost-effectiveness and versatility to innovative applications and performance characteristics. While they pose environmental challenges, ongoing research and development aim to create more sustainable and eco-friendly alternatives. Understanding the importance of synthetic fibers helps in appreciating their role in the economy, industry, and daily life, while also emphasizing the need for sustainable practices and innovation.
2. 1. What is Right of Privacy?
2. Laws for electronic surveillance
3. Forms of data encryption
4. What is identify theft?
5. Strategies for consumer profiling
6. Treat customer data responsibly
7. Why and how work place monitoring
8. What is spamming?
9. Capabilities & ethical issues of advanced
surveillance technologies
Ethics in Information Technology, Second
Edition 2
3. Systems collect and store key data from every
interaction with customers
Many object to data collection policies of
government and business
Privacy
◦ Key concern of Internet users
◦ Top reason why nonusers still avoid the Internet
Reasonable limits must be set
Historical perspective on the right to privacy
◦ Fourth Amendment - reasonable expectation of
privacy
Ethics in Information Technology, Second
Edition 3
4. Definition
◦ “The right to be left alone—the most
comprehensive of rights, and the right most valued
by a free people”
◦ “The right of individuals to control the collection
and use of information about themselves”
Legal aspects
◦ Protection from unreasonable intrusion upon one’s
isolation
◦ Protection from appropriation of one’s name or
likeness
Ethics in Information Technology, Second
Edition 4
5. Legal aspects
◦ Protection from unreasonable publicity given to
one’s private life
◦ Protection from publicity that unreasonably places
one in a false light before the public
Ethics in Information Technology, Second
Edition 5
6. Legislative acts passed over the past 40 years
◦ Most address invasion of privacy by the government
Not corporations
◦ No single, overarching national data privacy policy
◦ Communications Act of 1934
◦ Freedom of Information Act (FOIA)
◦ Fair Credit Reporting Act of 1970
◦ Privacy Act of 1974
◦ Children’s Online Protection Act (COPA)
◦ European Community Directive 95/46/EC of 1998
◦ Gramm-Leach-Bliley Act
Ethics in Information Technology, Second
Edition 6
7. Other initiatives
◦ BBB Online and TRUSTe
Independent, nonprofit initiatives
Favor an industry-regulated approach to data privacy
Ethics in Information Technology, Second
Edition 7
8. Opt-out policy
◦ Assumes that consumers approve of companies
collecting and storing their personal information
◦ Requires consumers to actively opt out
◦ Favored by data collectors
Opt-in policy
◦ Must obtain specific permission from consumers
before collecting any data
◦ Favored by consumers
Ethics in Information Technology, Second
Edition 8
10. Secure Flight airline safety program
◦ Compares the names and information of 1.4 million
daily U.S. airline passengers with data on known or
suspected terrorists
◦ Violation of Privacy Act
Ethics in Information Technology, Second
Edition 10
11. Government electronic surveillance
Data encryption
Identity theft
Customer profiling
Need to treat customer data responsibly
Workplace monitoring
Spamming
Advanced surveillance techniques
Ethics in Information Technology, Second
Edition 11
12. Federal Wiretap Act
◦ Outlines processes to obtain court authorization for
surveillance of all kinds of electronic
communications
◦ Judge must issue a court order based on probable
cause
Almost never deny government requests
◦ “Roving tap” authority
Does not name specific telephone lines or e-mail
accounts
All accounts are tied to a specific person
Ethics in Information Technology, Second
Edition 12
14. Electronic Communications Privacy Act of
1986 (ECPA)
◦ Sets standards for access to stored e-mail and
other electronic communications and records
◦ Extends Title III’s prohibitions against the
unauthorized interception, disclosure, or use of a
person’s oral or electronic communications
◦ Prosecutor does not have to justify requests
◦ Judges are required to approve every request
Ethics in Information Technology, Second
Edition 14
15. Electronic Communications Privacy Act of
1986 (ECPA)
◦ Highly controversial
Especially collection of computer data sent over the
Internet
◦ Failed to address emerging technologies
Ethics in Information Technology, Second
Edition 15
16. Foreign Intelligence Surveillance Act of 1978
(FISA)
◦ Allows wiretapping of aliens and citizens in the
United States
◦ Based on finding of probable cause that a target is
Member of a foreign terrorist group
Agent of a foreign power
Executive Order 12333
◦ Legal authority for electronic surveillance outside
the United States
Ethics in Information Technology, Second
Edition 16
17. Communications Assistance for Law
Enforcement Act (CALEA)
◦ Requires the telecommunications industry to build
tools into its products so that federal investigators
can eavesdrop on conversations
After getting court approval
◦ Contains a provision covering radio-based data
communication
◦ Includes voice over Internet (VoIP) technology
Ethics in Information Technology, Second
Edition 17
18. USA Patriot Act of 2001
◦ Gives sweeping new powers to
Domestic law enforcement
International intelligence agencies
◦ Contains several “sunset” provisions
Ethics in Information Technology, Second
Edition 18
19. Cryptography
◦ Science of encoding messages
◦ Only sender and intended receiver can understand
the messages
◦ Key tool for ensuring confidentiality, integrity,
authenticity of electronic messages and online
business transactions
Encryption
◦ Process of converting electronic messages into a
form understood only by the intended recipients
Ethics in Information Technology, Second
Edition 19
20. Encryption key
◦ Variable value applied using an algorithm to
encrypt or decrypt text
Public key encryption system uses two keys
◦ Message receiver’s public key - readily available
◦ Message receiver’s private key - kept secret
RSA - a public key encryption algorithm
Private key encryption system
◦ Single key to encode and decode messages
Ethics in Information Technology, Second
Edition 20
22. Most people agree encryption eventually must
be built into
◦ Networks
◦ File servers
◦ Tape backup systems
Seagate Technology hard drive
◦ Automatically encrypts all data
U.S. Arms Export Control Act controls the
export of encryption technology, hardware,
and software
Ethics in Information Technology, Second
Edition 22
23. Theft of key pieces of personal information to
gain access to a person’s financial accounts
Information includes:
◦ Name
◦ Address
◦ Date of birth
◦ Social Security number
◦ Passport number
◦ Driver’s license number
◦ Mother’s maiden name
Ethics in Information Technology, Second
Edition 23
24. Fastest growing form of fraud in the United
States
Lack of initiative in informing people whose
data was stolen
Phishing
◦ Attempt to steal personal identity data
◦ By tricking users into entering information on a
counterfeit Web site
◦ Spear-phishing - a variation in which employees
are sent phony e-mails that look like they came
from high-level executives within their organization
Ethics in Information Technology, Second
Edition 24
25. Spyware
◦ Keystroke-logging software
◦ Enables the capture of:
Account usernames
Passwords
Credit card numbers
Other sensitive information
◦ Operates even if an infected computer is not
connected to the Internet
Identity Theft and Assumption Deterrence Act
of 1998 was passed to fight fraud
Ethics in Information Technology, Second
Edition 25
27. Companies openly collect personal
information about Internet users
Cookies
◦ Text files that a Web site puts on a user’s hard drive
so that it can remember the information later
Tracking software
Similar methods are used outside the Web
environment
Databases contain a huge amount of
consumer behavioral data
Ethics in Information Technology, Second
Edition 27
28. Affiliated Web sites
◦ Group of Web sites served by a single advertising
network
Customized service for each consumer
Types of data collected while surfing the Web
◦ GET data
◦ POST data
◦ Click-stream data
Ethics in Information Technology, Second
Edition 28
29. Four ways to limit or even stop the deposit of
cookies on hard drives
◦ Set the browser to limit or stop cookies
◦ Manually delete them from the hard drive
◦ Download and install a cookie-management
program
◦ Use anonymous browsing programs that don’t
accept cookies
Ethics in Information Technology, Second
Edition 29
30. Personalization software is used by marketers
to optimize the number, frequency, and
mixture of their ad placements
◦ Rules-based
◦ Collaborative filtering
◦ Demographic filtering
◦ Contextual commerce
Platform for Privacy Preferences (P3P)
◦ Shields users from sites that don’t provide the level
of privacy protection desired
Ethics in Information Technology, Second
Edition 30
31. Strong measures are required to avoid
customer relationship problems
Code of Fair Information Practices
1980 OECD privacy guidelines
Chief privacy officer (CPO)
◦ Executive to oversee data privacy policies and
initiatives
Ethics in Information Technology, Second
Edition 31
32. Employers monitor workers
◦ Ensures that corporate IT usage policy is followed
Fourth Amendment cannot be used to limit
how a private employer treats its employees
◦ Public-sector employees have far greater privacy
rights than in the private industry
Privacy advocates want federal legislation
◦ To keeps employers from infringing upon privacy
rights of employees
Ethics in Information Technology, Second
Edition 32
33. Transmission of the same e-mail message to
a large number of people
Extremely inexpensive method of marketing
Used by many legitimate organizations
Can contain unwanted and objectionable
materials
Ethics in Information Technology, Second
Edition 33
34. Controlling the Assault of Non-Solicited
Pornography and Marketing (CANSPAM)
◦ Says it is legal to spam but
Spammers cannot disguise their identity
There must be a label in the message specifying that
the e-mail is an ad or solicitation
They must include a way for recipients to indicate they
do not want future mass mailings
Ethics in Information Technology, Second
Edition 34
35. Camera surveillance
◦ U.S. cities plan to expand surveillance systems
◦ “Smart surveillance system”
Facial recognition software
◦ Identifies criminal suspects and other undesirable
characters
◦ Yields mixed results
Global Positioning System (GPS) chips
◦ Placed in many devices
◦ Precisely locate users
Ethics in Information Technology, Second
Edition 35
36. Chapter 4 Page 134
Ethics in Information Technology, Second
Edition 36
38. What is the right of privacy, and what is the
basis for protecting personal privacy under
the law?
What are some of the laws that authorize
electronic surveillance by the government,
and what are the associated ethical issues?
What are the two fundamental forms of data
encryption, and how does each work?
Ethics in Information Technology, Second
Edition 38
39. What is identity theft, and what techniques do
identity thieves use?
What are the various strategies for consumer
profiling and the associated ethical issues?
What must organizations do to treat
consumer data responsibly?
Ethics in Information Technology, Second
Edition 39
40. Why and how are employers increasingly
using workplace monitoring?
What is spamming, and what ethical issues
are associated with its use?
What are the capabilities of advanced
surveillance technologies, and what ethical
issues do they raise?
Ethics in Information Technology, Second
Edition 40
44. The legal concept of the right to privacy has
four aspects
A number of laws have been enacted over the
past 40 years that affect a person’s privacy
Laws authorize electronic surveillance by the
government
Data encryption
◦ Public key encryption system
◦ Private key encryption system
Identity theft
Ethics in Information Technology, Second
Edition 44
45. Consumer behavior data is collected both
online and offline
Code of Fair Information Practices and 1980
OECD privacy guidelines
Employers record and review employee
communications and activities on the job
Advances in information technology
◦ Surveillance cameras
◦ Facial recognition software
◦ GPS systems
Ethics in Information Technology, Second
Edition 45