SlideShare a Scribd company logo
Michael Garcia
AET/531
April 14, 2014
Melinda Medina
legal and ethical issues
faced by organizations
Technology has advanced the way in which businesses use technology to reach
organizational objectives and their customer base. Nonetheless, these new
technologies can sometimes violate the rights of individuals and may, at times, be
considered unethical.
The issues raised by the arrival of new technologies has prompted government entities
to pass privacy laws and regulate communication companies. Additionally, organizations
have learned that it is necessary to monitor and apply internal policies to prevent
unethical behavior.
This new age of conducting business requires that organizations be even more diligent
in implementing safeguards that protect against unscrupulous use of technology.
Copyright
Copyright, as defined by the U.S. Copyright Office, is a form of protection
provided by the laws of the United States (title 17, U. S. Code) to the authors of
“original works of authorship,” including literary, dramatic, musical, artistic, and
certain other intellectual works. This protection is available to both published and
unpublished works. Section 106 of the 1976 gives specific rights to the copyright
owner and allows the owner to authorize others to use the work in a specified
manner.
Fair use
In the general sense, fair use is the copying of copyrighted material done for a
limited and “transformative” purpose, such as to comment upon, criticize, or
parody a copyrighted work. Such uses can be done without permission from the
copyright owner. The heart of Fair Use is a defense against a claim of copyright
infringement. The party that has utilized the copyrighted material must prove that
the use qualifies as a fair use for the transaction to not be considered an illegal
infringement.
Intellectual property
Intellectual property (IP) refers to creations of the mind, such as inventions; literary and
artistic works; designs; and symbols, names and images used in commerce.
IP is protected in law by, for example, patents, copyright and trademarks, which enable
people to earn recognition or financial benefit from what they invent or create.
Examples of IP include:
• Copyright
• Patent
• Trademarks
• Industrial designs
• Geographical indications
Privacy Policies
A privacy policy is a statement or a legal document (privacy law) that discloses some or all of
the ways a party gathers, uses, discloses and manages a customer or client's data. Personal
information can be anything that can be used to identify an individual, not limited to but
including; name, address, date of birth, marital status, contact information, ID issue and
expiry date, financial records, credit information, medical history, where one travels, and
intentions to acquire goods and services.
In business, a privacy policy is often a statement that declares a party's policy on how it
collects, stores, and releases personal information it collects. It informs the client what
specific information is collected, and whether it is kept confidential, shared with partners, or
sold to other firms or enterprises.
Risks, Legal and ethical issues
Each of the four issues, Copyright, Fair Use, Intellectual Property and Privacy Policy present
inherent risks as well as legal and ethical issues. Some of these are, but not limited to:
• Unauthorized use of copyrighted material.
• Unlawful file sharing
• “Pirating” or unauthorized duplication of work
• Misuse of intellectual property
• Unlawful distribution (selling) of personal information
Outlook of Legal and ethical
issues associated with
modern technologies
Today’s global marketplace presents tremendous opportunities for both businesses and consumers;
business can reach a broader market and consumers yield tremendous buying power. To be successful,
companies must not only ensure that their products provide customers with value but that protocols are in
place to protect the organization and its client base. Some of the common challenges are:
Privacy and Confidentiality – Web browsing is not totally private. Browsers use “cookies” to record activities
in history files. Throughout the shopping experience many online e-commerce sites use cookies to track
buying habits. When these cookies are collected into a database, they may reveal identities of individuals
and some companies sell this information to third parties.
First Amendment Rights – Information is easily accessible and unfortunately, this makes it easy to violate
Copyright laws. Regulations and laws have been enacted in an effort to stop individuals from illegal
copyrighting. Nonetheless, many of these measures are mere “speed bumps.” Enforcement of these laws
is often difficult so therefore, it is incumbent that individuals and organizations institute their own measures
that help to prevent, or at least deter copyright violations.
Security – Modern technology has made it easy for “hackers” to hijack information from computers and
websites. For this reason, anti-virus software and firewall technology is a necessity. Individuals and
corporate entities cannot conduct business without protecting their systems. Failure to continuously
upgrade the user’s system provides those adept at stealing information an open door to commit
cybercrimes.
References
Ethical Issues With Business Technology | Chron.com . (). Retrieved from
http://smallbusiness.chron.com/ethical-issues-business-technology-27297.html
What is Fair Use :: Copyright Overview by Richard Stim :: Stanford Copyright and Fair Use Center . ().
Retrieved from http://fairuse.stanford.edu/overview/fair-use/what-is-fair-use/
U.S. Copyright Office. (). Retrieved from http://www.copyright.gov/

More Related Content

What's hot

E commerce - ppt
E   commerce  - ppt E   commerce  - ppt
E commerce - ppt
Saiqa Hashmi
 
Data Privacy Introduction
Data Privacy IntroductionData Privacy Introduction
Data Privacy Introduction
G Prachi
 
Ethics in e commerce n it
Ethics in e commerce n itEthics in e commerce n it
Ethics in e commerce n it
amitmitkar
 
use and protection of Intellectual Property In online Business
use and protection of Intellectual Property In online Businessuse and protection of Intellectual Property In online Business
use and protection of Intellectual Property In online Business
Humma Rashid
 
Cybersecurity & Data Privacy 2020 - Introduction to US Privacy and Data Secur...
Cybersecurity & Data Privacy 2020 - Introduction to US Privacy and Data Secur...Cybersecurity & Data Privacy 2020 - Introduction to US Privacy and Data Secur...
Cybersecurity & Data Privacy 2020 - Introduction to US Privacy and Data Secur...
Financial Poise
 
Legal social ethical
Legal social ethicalLegal social ethical
Legal social ethical
Sheetal Verma
 
Ethical, Social And Political Issues Raised By E Commerce
Ethical, Social And Political Issues Raised By E CommerceEthical, Social And Political Issues Raised By E Commerce
Ethical, Social And Political Issues Raised By E Commerce
Nicholas Davis
 
E commerce(report)
E commerce(report)E commerce(report)
E commerce(report)
Delmer Gerald Calderon
 
Data Protection Presentation
Data Protection PresentationData Protection Presentation
Data Protection Presentation
IBM Business Insight
 
E-Commerce 10
E-Commerce 10E-Commerce 10
E-Commerce 10
Zarrar Siddiqui
 
Personal Data Privacy and Information Security
Personal Data Privacy and Information SecurityPersonal Data Privacy and Information Security
Personal Data Privacy and Information Security
Charles Mok
 
Information Privacy
Information PrivacyInformation Privacy
Information Privacy
imehreenx
 
Legal & ethical issues
Legal & ethical issuesLegal & ethical issues
Legal & ethical issues
miajay414
 
The Data Protection Act
The Data Protection ActThe Data Protection Act
The Data Protection Act
burto111
 
Chp 05 anonymity, security, privacy and civil liberties (shared)
Chp 05   anonymity, security, privacy and civil liberties (shared)Chp 05   anonymity, security, privacy and civil liberties (shared)
Chp 05 anonymity, security, privacy and civil liberties (shared)
YUSRA FERNANDO
 
E commerce
E commerce E commerce
E commerce
DrSelvamohanaK
 
Social and ethical issues in commerce
Social and ethical issues in commerceSocial and ethical issues in commerce
Social and ethical issues in commerce
University of Central Punjab
 
Privacy and personal information
Privacy and personal informationPrivacy and personal information
Privacy and personal information
Uc Man
 
Information Privacy
Information PrivacyInformation Privacy
Information Privacy
primeteacher32
 
Is More Data Always Better The Legal Risks of Data Collection, Storage and Us...
Is More Data Always Better The Legal Risks of Data Collection, Storage and Us...Is More Data Always Better The Legal Risks of Data Collection, Storage and Us...
Is More Data Always Better The Legal Risks of Data Collection, Storage and Us...
Vivastream
 

What's hot (20)

E commerce - ppt
E   commerce  - ppt E   commerce  - ppt
E commerce - ppt
 
Data Privacy Introduction
Data Privacy IntroductionData Privacy Introduction
Data Privacy Introduction
 
Ethics in e commerce n it
Ethics in e commerce n itEthics in e commerce n it
Ethics in e commerce n it
 
use and protection of Intellectual Property In online Business
use and protection of Intellectual Property In online Businessuse and protection of Intellectual Property In online Business
use and protection of Intellectual Property In online Business
 
Cybersecurity & Data Privacy 2020 - Introduction to US Privacy and Data Secur...
Cybersecurity & Data Privacy 2020 - Introduction to US Privacy and Data Secur...Cybersecurity & Data Privacy 2020 - Introduction to US Privacy and Data Secur...
Cybersecurity & Data Privacy 2020 - Introduction to US Privacy and Data Secur...
 
Legal social ethical
Legal social ethicalLegal social ethical
Legal social ethical
 
Ethical, Social And Political Issues Raised By E Commerce
Ethical, Social And Political Issues Raised By E CommerceEthical, Social And Political Issues Raised By E Commerce
Ethical, Social And Political Issues Raised By E Commerce
 
E commerce(report)
E commerce(report)E commerce(report)
E commerce(report)
 
Data Protection Presentation
Data Protection PresentationData Protection Presentation
Data Protection Presentation
 
E-Commerce 10
E-Commerce 10E-Commerce 10
E-Commerce 10
 
Personal Data Privacy and Information Security
Personal Data Privacy and Information SecurityPersonal Data Privacy and Information Security
Personal Data Privacy and Information Security
 
Information Privacy
Information PrivacyInformation Privacy
Information Privacy
 
Legal & ethical issues
Legal & ethical issuesLegal & ethical issues
Legal & ethical issues
 
The Data Protection Act
The Data Protection ActThe Data Protection Act
The Data Protection Act
 
Chp 05 anonymity, security, privacy and civil liberties (shared)
Chp 05   anonymity, security, privacy and civil liberties (shared)Chp 05   anonymity, security, privacy and civil liberties (shared)
Chp 05 anonymity, security, privacy and civil liberties (shared)
 
E commerce
E commerce E commerce
E commerce
 
Social and ethical issues in commerce
Social and ethical issues in commerceSocial and ethical issues in commerce
Social and ethical issues in commerce
 
Privacy and personal information
Privacy and personal informationPrivacy and personal information
Privacy and personal information
 
Information Privacy
Information PrivacyInformation Privacy
Information Privacy
 
Is More Data Always Better The Legal Risks of Data Collection, Storage and Us...
Is More Data Always Better The Legal Risks of Data Collection, Storage and Us...Is More Data Always Better The Legal Risks of Data Collection, Storage and Us...
Is More Data Always Better The Legal Risks of Data Collection, Storage and Us...
 

Viewers also liked

Mental Health Care Policy Ppt 1[1]
Mental Health Care Policy Ppt 1[1]Mental Health Care Policy Ppt 1[1]
Mental Health Care Policy Ppt 1[1]
Florida International University
 
Ethics in sports pr
Ethics in sports prEthics in sports pr
Ethics in sports pr
jim176
 
Ethics in sports
Ethics in sportsEthics in sports
Ethics in sports
Nick Marrale
 
Ethics in sports
Ethics in sportsEthics in sports
Ethics in sports
Meaghan Cahill
 
Ethics in Sports
Ethics in SportsEthics in Sports
Ethics in Sports
seatonrobb
 
Ethics as viewed from Computer Games
Ethics as viewed from Computer GamesEthics as viewed from Computer Games
Ethics as viewed from Computer Games
Per Arne Godejord
 
Gaming ethical issues
Gaming ethical issuesGaming ethical issues
Gaming ethical issues
Gladeatorkid
 
Ethical and legal issues in education
Ethical and legal issues in educationEthical and legal issues in education
Ethical and legal issues in education
Kevin Johnson
 
WHISTLE BLOWING A MAJOR ISSUE IN ETHICAL ORGANISATION
WHISTLE BLOWING A MAJOR ISSUE IN ETHICAL ORGANISATIONWHISTLE BLOWING A MAJOR ISSUE IN ETHICAL ORGANISATION
WHISTLE BLOWING A MAJOR ISSUE IN ETHICAL ORGANISATION
amanjeet139
 
Ethical issues in the Games industry
Ethical issues in the Games industryEthical issues in the Games industry
Ethical issues in the Games industry
Victory Media
 
Ethical issue
Ethical issue Ethical issue
Ethical issue
Sothara
 
The Game Industry - contractual, legal & ethical
The Game Industry - contractual, legal & ethicalThe Game Industry - contractual, legal & ethical
The Game Industry - contractual, legal & ethical
Victory Media
 
Slide presentation assignment2,case study mrr2, group4, section5, session 201...
Slide presentation assignment2,case study mrr2, group4, section5, session 201...Slide presentation assignment2,case study mrr2, group4, section5, session 201...
Slide presentation assignment2,case study mrr2, group4, section5, session 201...
Nurhasanah Shafei
 
Ethics And Sport
Ethics And SportEthics And Sport
Ethics And Sport
Marian College
 
Ethics in sports
Ethics in sportsEthics in sports
Ethics in sports
Mridul Kawar
 
Ethics in sports management
Ethics in sports managementEthics in sports management
Ethics in sports management
Dennis Mark Dela Cruz
 
Volkswagen's Ethical Issue
Volkswagen's Ethical IssueVolkswagen's Ethical Issue
Volkswagen's Ethical Issue
dbroderick8
 
Computer Ethics Presentation
Computer Ethics PresentationComputer Ethics Presentation
Computer Ethics Presentation
guest65a1c4
 
Ethical issues in education
Ethical issues in educationEthical issues in education
Ethical issues in education
Marie Amirtharaj
 

Viewers also liked (19)

Mental Health Care Policy Ppt 1[1]
Mental Health Care Policy Ppt 1[1]Mental Health Care Policy Ppt 1[1]
Mental Health Care Policy Ppt 1[1]
 
Ethics in sports pr
Ethics in sports prEthics in sports pr
Ethics in sports pr
 
Ethics in sports
Ethics in sportsEthics in sports
Ethics in sports
 
Ethics in sports
Ethics in sportsEthics in sports
Ethics in sports
 
Ethics in Sports
Ethics in SportsEthics in Sports
Ethics in Sports
 
Ethics as viewed from Computer Games
Ethics as viewed from Computer GamesEthics as viewed from Computer Games
Ethics as viewed from Computer Games
 
Gaming ethical issues
Gaming ethical issuesGaming ethical issues
Gaming ethical issues
 
Ethical and legal issues in education
Ethical and legal issues in educationEthical and legal issues in education
Ethical and legal issues in education
 
WHISTLE BLOWING A MAJOR ISSUE IN ETHICAL ORGANISATION
WHISTLE BLOWING A MAJOR ISSUE IN ETHICAL ORGANISATIONWHISTLE BLOWING A MAJOR ISSUE IN ETHICAL ORGANISATION
WHISTLE BLOWING A MAJOR ISSUE IN ETHICAL ORGANISATION
 
Ethical issues in the Games industry
Ethical issues in the Games industryEthical issues in the Games industry
Ethical issues in the Games industry
 
Ethical issue
Ethical issue Ethical issue
Ethical issue
 
The Game Industry - contractual, legal & ethical
The Game Industry - contractual, legal & ethicalThe Game Industry - contractual, legal & ethical
The Game Industry - contractual, legal & ethical
 
Slide presentation assignment2,case study mrr2, group4, section5, session 201...
Slide presentation assignment2,case study mrr2, group4, section5, session 201...Slide presentation assignment2,case study mrr2, group4, section5, session 201...
Slide presentation assignment2,case study mrr2, group4, section5, session 201...
 
Ethics And Sport
Ethics And SportEthics And Sport
Ethics And Sport
 
Ethics in sports
Ethics in sportsEthics in sports
Ethics in sports
 
Ethics in sports management
Ethics in sports managementEthics in sports management
Ethics in sports management
 
Volkswagen's Ethical Issue
Volkswagen's Ethical IssueVolkswagen's Ethical Issue
Volkswagen's Ethical Issue
 
Computer Ethics Presentation
Computer Ethics PresentationComputer Ethics Presentation
Computer Ethics Presentation
 
Ethical issues in education
Ethical issues in educationEthical issues in education
Ethical issues in education
 

Similar to UOP - AET/531 - Legal and Ethical Issue PPT - Final

Ethics of electronic marketing
Ethics of electronic marketingEthics of electronic marketing
Ethics of electronic marketing
gaurav jain
 
Cyber law
Cyber lawCyber law
Cyber law
Azmawati Lazim
 
Cyber law and introduction for undergrad
Cyber law and introduction for undergradCyber law and introduction for undergrad
Cyber law and introduction for undergrad
Azmawati Lazim
 
E Marketing Ch5 Ethical Legal
E Marketing Ch5 Ethical LegalE Marketing Ch5 Ethical Legal
E Marketing Ch5 Ethical Legal
Largest Catholic University
 
Define Intellectual Property And Its Types
Define Intellectual Property And Its TypesDefine Intellectual Property And Its Types
Define Intellectual Property And Its Types
World Finance Council
 
Legal and ethical issues associated with modern technologies
Legal and ethical issues associated with modern technologiesLegal and ethical issues associated with modern technologies
Legal and ethical issues associated with modern technologies
Chantial
 
3999779.ppt
3999779.ppt3999779.ppt
3999779.ppt
pixvilx
 
Stallings ch18 privacy
Stallings ch18 privacyStallings ch18 privacy
Stallings ch18 privacy
salehnia
 
Corporate ethics
Corporate ethicsCorporate ethics
Corporate ethics
Melvin DCruz
 
The Diamond Datascram Diaries: Diamond Datascram Development
The Diamond Datascram Diaries: Diamond Datascram Development The Diamond Datascram Diaries: Diamond Datascram Development
The Diamond Datascram Diaries: Diamond Datascram Development
Polsinelli PC
 
Managing Design and eBusiness - Lecture 2
Managing Design and eBusiness - Lecture 2Managing Design and eBusiness - Lecture 2
Managing Design and eBusiness - Lecture 2
Virtu Institute
 
Learning ObjectivesAfter studying this chapter, you should be ab.docx
Learning ObjectivesAfter studying this chapter, you should be ab.docxLearning ObjectivesAfter studying this chapter, you should be ab.docx
Learning ObjectivesAfter studying this chapter, you should be ab.docx
smile790243
 
Unit 6 Privacy and Data Protection 8 hr
Unit 6  Privacy and Data Protection 8 hrUnit 6  Privacy and Data Protection 8 hr
Unit 6 Privacy and Data Protection 8 hr
Tushar Rajput
 
E Marketing Ethical and Legal Issues
E Marketing Ethical and Legal IssuesE Marketing Ethical and Legal Issues
E Marketing Ethical and Legal Issues
karthik indrajit
 
Introduction to US Privacy and Data Security Regulations and Requirements (Se...
Introduction to US Privacy and Data Security Regulations and Requirements (Se...Introduction to US Privacy and Data Security Regulations and Requirements (Se...
Introduction to US Privacy and Data Security Regulations and Requirements (Se...
Financial Poise
 
Legal and Ethical Issues Associated with Modern Technologies
Legal and Ethical Issues Associated with Modern TechnologiesLegal and Ethical Issues Associated with Modern Technologies
Legal and Ethical Issues Associated with Modern Technologies
prevmed1
 
Privacy and Information Security: What Every New Business Needs to Know
Privacy and Information Security:  What Every New Business Needs to KnowPrivacy and Information Security:  What Every New Business Needs to Know
Privacy and Information Security: What Every New Business Needs to Know
The Capital Network
 
EKovacevich-IT697-Phase 5 IP
EKovacevich-IT697-Phase 5 IPEKovacevich-IT697-Phase 5 IP
EKovacevich-IT697-Phase 5 IP
EDDY KOVACEVICH
 
Ss
SsSs
Trade Secret Lien
Trade Secret LienTrade Secret Lien
Trade Secret Lien
FNian
 

Similar to UOP - AET/531 - Legal and Ethical Issue PPT - Final (20)

Ethics of electronic marketing
Ethics of electronic marketingEthics of electronic marketing
Ethics of electronic marketing
 
Cyber law
Cyber lawCyber law
Cyber law
 
Cyber law and introduction for undergrad
Cyber law and introduction for undergradCyber law and introduction for undergrad
Cyber law and introduction for undergrad
 
E Marketing Ch5 Ethical Legal
E Marketing Ch5 Ethical LegalE Marketing Ch5 Ethical Legal
E Marketing Ch5 Ethical Legal
 
Define Intellectual Property And Its Types
Define Intellectual Property And Its TypesDefine Intellectual Property And Its Types
Define Intellectual Property And Its Types
 
Legal and ethical issues associated with modern technologies
Legal and ethical issues associated with modern technologiesLegal and ethical issues associated with modern technologies
Legal and ethical issues associated with modern technologies
 
3999779.ppt
3999779.ppt3999779.ppt
3999779.ppt
 
Stallings ch18 privacy
Stallings ch18 privacyStallings ch18 privacy
Stallings ch18 privacy
 
Corporate ethics
Corporate ethicsCorporate ethics
Corporate ethics
 
The Diamond Datascram Diaries: Diamond Datascram Development
The Diamond Datascram Diaries: Diamond Datascram Development The Diamond Datascram Diaries: Diamond Datascram Development
The Diamond Datascram Diaries: Diamond Datascram Development
 
Managing Design and eBusiness - Lecture 2
Managing Design and eBusiness - Lecture 2Managing Design and eBusiness - Lecture 2
Managing Design and eBusiness - Lecture 2
 
Learning ObjectivesAfter studying this chapter, you should be ab.docx
Learning ObjectivesAfter studying this chapter, you should be ab.docxLearning ObjectivesAfter studying this chapter, you should be ab.docx
Learning ObjectivesAfter studying this chapter, you should be ab.docx
 
Unit 6 Privacy and Data Protection 8 hr
Unit 6  Privacy and Data Protection 8 hrUnit 6  Privacy and Data Protection 8 hr
Unit 6 Privacy and Data Protection 8 hr
 
E Marketing Ethical and Legal Issues
E Marketing Ethical and Legal IssuesE Marketing Ethical and Legal Issues
E Marketing Ethical and Legal Issues
 
Introduction to US Privacy and Data Security Regulations and Requirements (Se...
Introduction to US Privacy and Data Security Regulations and Requirements (Se...Introduction to US Privacy and Data Security Regulations and Requirements (Se...
Introduction to US Privacy and Data Security Regulations and Requirements (Se...
 
Legal and Ethical Issues Associated with Modern Technologies
Legal and Ethical Issues Associated with Modern TechnologiesLegal and Ethical Issues Associated with Modern Technologies
Legal and Ethical Issues Associated with Modern Technologies
 
Privacy and Information Security: What Every New Business Needs to Know
Privacy and Information Security:  What Every New Business Needs to KnowPrivacy and Information Security:  What Every New Business Needs to Know
Privacy and Information Security: What Every New Business Needs to Know
 
EKovacevich-IT697-Phase 5 IP
EKovacevich-IT697-Phase 5 IPEKovacevich-IT697-Phase 5 IP
EKovacevich-IT697-Phase 5 IP
 
Ss
SsSs
Ss
 
Trade Secret Lien
Trade Secret LienTrade Secret Lien
Trade Secret Lien
 

Recently uploaded

Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
innovationoecd
 
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
SOFTTECHHUB
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
shyamraj55
 
“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”
Claudio Di Ciccio
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
KAMESHS29
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
Octavian Nadolu
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Malak Abu Hammad
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
Matthew Sinclair
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc
 
How to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For FlutterHow to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For Flutter
Daiki Mogmet Ito
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
SOFTTECHHUB
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems S.M.S.A.
 
Data structures and Algorithms in Python.pdf
Data structures and Algorithms in Python.pdfData structures and Algorithms in Python.pdf
Data structures and Algorithms in Python.pdf
TIPNGVN2
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
Safe Software
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
Matthew Sinclair
 
Building RAG with self-deployed Milvus vector database and Snowpark Container...
Building RAG with self-deployed Milvus vector database and Snowpark Container...Building RAG with self-deployed Milvus vector database and Snowpark Container...
Building RAG with self-deployed Milvus vector database and Snowpark Container...
Zilliz
 
Large Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial ApplicationsLarge Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial Applications
Rohit Gautam
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
DianaGray10
 
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Speck&Tech
 

Recently uploaded (20)

Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
 
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
 
“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
 
How to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For FlutterHow to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For Flutter
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
 
Data structures and Algorithms in Python.pdf
Data structures and Algorithms in Python.pdfData structures and Algorithms in Python.pdf
Data structures and Algorithms in Python.pdf
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
 
Building RAG with self-deployed Milvus vector database and Snowpark Container...
Building RAG with self-deployed Milvus vector database and Snowpark Container...Building RAG with self-deployed Milvus vector database and Snowpark Container...
Building RAG with self-deployed Milvus vector database and Snowpark Container...
 
Large Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial ApplicationsLarge Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial Applications
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
 
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
 

UOP - AET/531 - Legal and Ethical Issue PPT - Final

  • 1. Michael Garcia AET/531 April 14, 2014 Melinda Medina
  • 2. legal and ethical issues faced by organizations Technology has advanced the way in which businesses use technology to reach organizational objectives and their customer base. Nonetheless, these new technologies can sometimes violate the rights of individuals and may, at times, be considered unethical. The issues raised by the arrival of new technologies has prompted government entities to pass privacy laws and regulate communication companies. Additionally, organizations have learned that it is necessary to monitor and apply internal policies to prevent unethical behavior. This new age of conducting business requires that organizations be even more diligent in implementing safeguards that protect against unscrupulous use of technology.
  • 3. Copyright Copyright, as defined by the U.S. Copyright Office, is a form of protection provided by the laws of the United States (title 17, U. S. Code) to the authors of “original works of authorship,” including literary, dramatic, musical, artistic, and certain other intellectual works. This protection is available to both published and unpublished works. Section 106 of the 1976 gives specific rights to the copyright owner and allows the owner to authorize others to use the work in a specified manner.
  • 4. Fair use In the general sense, fair use is the copying of copyrighted material done for a limited and “transformative” purpose, such as to comment upon, criticize, or parody a copyrighted work. Such uses can be done without permission from the copyright owner. The heart of Fair Use is a defense against a claim of copyright infringement. The party that has utilized the copyrighted material must prove that the use qualifies as a fair use for the transaction to not be considered an illegal infringement.
  • 5. Intellectual property Intellectual property (IP) refers to creations of the mind, such as inventions; literary and artistic works; designs; and symbols, names and images used in commerce. IP is protected in law by, for example, patents, copyright and trademarks, which enable people to earn recognition or financial benefit from what they invent or create. Examples of IP include: • Copyright • Patent • Trademarks • Industrial designs • Geographical indications
  • 6. Privacy Policies A privacy policy is a statement or a legal document (privacy law) that discloses some or all of the ways a party gathers, uses, discloses and manages a customer or client's data. Personal information can be anything that can be used to identify an individual, not limited to but including; name, address, date of birth, marital status, contact information, ID issue and expiry date, financial records, credit information, medical history, where one travels, and intentions to acquire goods and services. In business, a privacy policy is often a statement that declares a party's policy on how it collects, stores, and releases personal information it collects. It informs the client what specific information is collected, and whether it is kept confidential, shared with partners, or sold to other firms or enterprises.
  • 7. Risks, Legal and ethical issues Each of the four issues, Copyright, Fair Use, Intellectual Property and Privacy Policy present inherent risks as well as legal and ethical issues. Some of these are, but not limited to: • Unauthorized use of copyrighted material. • Unlawful file sharing • “Pirating” or unauthorized duplication of work • Misuse of intellectual property • Unlawful distribution (selling) of personal information
  • 8. Outlook of Legal and ethical issues associated with modern technologies Today’s global marketplace presents tremendous opportunities for both businesses and consumers; business can reach a broader market and consumers yield tremendous buying power. To be successful, companies must not only ensure that their products provide customers with value but that protocols are in place to protect the organization and its client base. Some of the common challenges are: Privacy and Confidentiality – Web browsing is not totally private. Browsers use “cookies” to record activities in history files. Throughout the shopping experience many online e-commerce sites use cookies to track buying habits. When these cookies are collected into a database, they may reveal identities of individuals and some companies sell this information to third parties. First Amendment Rights – Information is easily accessible and unfortunately, this makes it easy to violate Copyright laws. Regulations and laws have been enacted in an effort to stop individuals from illegal copyrighting. Nonetheless, many of these measures are mere “speed bumps.” Enforcement of these laws is often difficult so therefore, it is incumbent that individuals and organizations institute their own measures that help to prevent, or at least deter copyright violations. Security – Modern technology has made it easy for “hackers” to hijack information from computers and websites. For this reason, anti-virus software and firewall technology is a necessity. Individuals and corporate entities cannot conduct business without protecting their systems. Failure to continuously upgrade the user’s system provides those adept at stealing information an open door to commit cybercrimes.
  • 9. References Ethical Issues With Business Technology | Chron.com . (). Retrieved from http://smallbusiness.chron.com/ethical-issues-business-technology-27297.html What is Fair Use :: Copyright Overview by Richard Stim :: Stanford Copyright and Fair Use Center . (). Retrieved from http://fairuse.stanford.edu/overview/fair-use/what-is-fair-use/ U.S. Copyright Office. (). Retrieved from http://www.copyright.gov/