SlideShare a Scribd company logo
Legal, Privacy, and Ethical Issues
in Computer Security
Legal, Privacy, and Ethical Issues in
Computer Security
Human Controls Applicable to Computer Security:
Basic Legal Issues
a) Protecting Programs and Data
b) Information and the Law
c) Ownership Rights of Employees and Employers
d) Software Failures (and Customers)
Computer Crime
Privacy
Ethics
a) Introduction to Ethics
b) Case Studies of Ethics
c) Codes of Professional Ethics
Protecting Programs and Data
Copyrights — designed to protect expression of ideas (creative
works of the mind)
Ideas themselves are free
Different people can have the same idea
The way of expressing ideas is copyrighted
Copyrights are exclusive rights to making copies of
expression
Copyright protects intellectual property (IP)
IP must be:
Original work
In some tangible medium of expression
Patent — designed to protect tangible objects, or ways to make
them (not works of the mind)
Protected entity must be novel & nonobvious
The first inventor who obtains patent gest his invention
protected against patent infrigement
Patents applied for algorithms only since 1981
Trade secret — information that provides competitive edge over
others
Information that has value only if kept secret
Undoing release of a secret is impossible or very difficult
Reverse engineering used to uncover trade secret is legal!
T.s. protection applies very well to computer s/w
E.g., pgms that use algorithms unknown to others
Copyright Patent Trade Secret
Protects Expression of idea,
not idea itself
Invention—way
something works
Secret, competitive
advantage
Protected Object
Made Public
Yes; intention is to
promote publication
Design filed at
Patent Office
No
Must Distribute Yes No No
Ease of filing Very easy, do-it-
yourself
Very complicated;
specialist lawyer
suggested
No filing
Duration Originator’s life + 70
yrs; 95 y. For
company
19 years Indefinite
Legal Protection Sue if unauthorized
copy sold
Sue if invention
copied/reinvented
Sue if secret
improperly obtained
Protecting Programs and Data
How to protect:
H/w
Patent
Firmware (microcode)
Patent physical device, chip
Use trade secret protection
Copyright s/w such as embedded OS
Object code s/w
Copyiright of binary code
Copyright of source code
Need legal precedents
Source code s/w
Use trade secret protection
Copyright reveals some code, facilitates reverse
engineering
Need legal precedents, too
Information and the Law
Characteristics of information as an object of value
Not exhaustable
Can be replicated
Has minimal marginal cost
Value is often time dependent
Can be transferred intangibly
Criminal Law Civil Law
Defined by Statutes Common law (tort l.)
Contracts
Cases
brought by
Government Government
Individuals and
companies
Wronged
party
Society Individuals and
companies
Remedy Jail, fine Damages, typically
monetary
Comparison of Criminal and Civil Law
Ownership Rights of Employees and
Employers
Ownership rights are computer security issue
Concerned with protecting secrecy (confidentiality) and integrity of
works produced by employees of an employer
Ownership issues in emploee/employer relations:
Ownership of products
Products/ideas/inventions developed by employee after hours might
still be owned by her employer
Esp. if in the same „line of business”
Ownership of patents
If employer files for patent, employer will own patent
Ownership of copyrights
Similar to patents
Trade secret protection
No registered inventor/author—owner can prosecute
for damages
Ownership Rights of Employees and Employers (2)
Type of employment has ownership consequences
Work for hire
All work done by employee is owned by employer
Employment contracts
Often spell out ownership rights
Often includes agreement not to compete (for some time after
termination)
Non-competition is not always enforceable by law
Licenses
Programmer retains full ownership of developed s/w
Grants license for a fee
Software Failures (& Customers)
-If not correct: ask for refund, replacement, fixing
Refund: possible
Replacement: if this copy damaged, or improved in the
meantine
Fixing: rarely legally enforced; instead, monetary awards
for damages
Correctness of s/w difficult to define/enforce legally
Individual can rarely sue a major s/w vendor
Prohibitive costs for individual
Issue 2: Reporting software flaws
Should we share s/w vulnerability info?
Both pros and cons
Vendor interests
Vendors don’t want to react to individual flaws
Prefer bundle a number of flaw fixes
User interests
Would like to have fixes quickly
Responsible vulnerability reporting
How to report vulnerability info responsibly?
E.g. First notify the vendor, give vendor a few weeks to fix
If vendor delays fixes, ask „coordinator” for help
Coordinator—e.g., computer emergency response center
Computer Crime
Separate category for computer crime is needed
Because special laws are needed for CC
Value of integrity and confidentiality/privacy
Value of privacy is now recognized by several federal/state laws
Value of data
Courts understand value of data better
Acceptance of computer terminology
Law lags behind technology in acceptance of new terminology
Privacy
Identity theft – the most serious crime against privacy
Threats to privacy
Aggregation and data mining
Poor system security
The Internet as privacy threat
Unencrypted e-mail / web surfing / attacks
Corporate rights and private business
Controls for protecting privacy
Authentication
Anonymity
Pseudonymity
Introduction to Ethics
Law vs. Ethics
Law alone can’t restrict human behavior
Impractical/impossible to describe/enforce all acceptable behaviors
Ethics/morals are sufficient self-controls for most people
Most ethical and legal issues in computer system are in the area of individual’s
right to privacy versus the greater good of a larger entity i.e. a company or
a society. For example, tracking how employees use computers, crowd
surveillance, managing customer profiles, tracking a person’s travel with
passport and so on. A key concept in resolving this issues is to find out,
what is a person’s expectation of privacy. Classically, the ethical issues in
security system are classified into following 4 categories:
• Privacy: This deals with the right of an individual to control personal
information. It is the protection of personal or sensitive information.
Privacy is subjective. Different people have different ideas of what privacy
is and how much privacy they will trade for safety or convenience.
• Accuracy: This talks about the responsibility for the authenticity, fidelity
an accuracy of the information.
• Property: This determines who the owner of the information is and who
controls access.
• Accessibility: This deals with the issue of the type of information, an
organization has the right to collect. And in that situation, it also expects to
know the measures which will safeguard against any unforeseen
eventualities.

More Related Content

What's hot

Operating system security
Operating system securityOperating system security
Operating system securitySarmad Makhdoom
 
Information Security Governance and Strategy - 3
Information Security Governance and Strategy - 3Information Security Governance and Strategy - 3
Information Security Governance and Strategy - 3
Dam Frank
 
Administering security
Administering securityAdministering security
Administering security
G Prachi
 
Information Security Principles - Access Control
Information Security  Principles -  Access ControlInformation Security  Principles -  Access Control
Information Security Principles - Access Control
idingolay
 
Security policies
Security policiesSecurity policies
Security policies
Nishant Pahad
 
Block Cipher and its Design Principles
Block Cipher and its Design PrinciplesBlock Cipher and its Design Principles
Block Cipher and its Design Principles
SHUBHA CHATURVEDI
 
Public Key Cryptosystem
Public Key CryptosystemPublic Key Cryptosystem
Public Key Cryptosystem
Devakumar Kp
 
Network security - OSI Security Architecture
Network security - OSI Security ArchitectureNetwork security - OSI Security Architecture
Network security - OSI Security Architecture
BharathiKrishna6
 
OSI Security Architecture
OSI Security ArchitectureOSI Security Architecture
OSI Security Architecture
university of education,Lahore
 
Security Mechanisms
Security MechanismsSecurity Mechanisms
Security Mechanismspriya_trehan
 
Cyber security and cyber laws
Cyber security and cyber lawsCyber security and cyber laws
Cyber security and cyber laws
Dr. Prashant Vats
 
System Security-Chapter 1
System Security-Chapter 1System Security-Chapter 1
System Security-Chapter 1
Vamsee Krishna Kiran
 
Cryptography and Information Security
Cryptography and Information SecurityCryptography and Information Security
Cryptography and Information Security
Dr Naim R Kidwai
 
S/MIME
S/MIMES/MIME
S/MIME
maria azam
 
Network Security Issues
Network Security IssuesNetwork Security Issues
Network Security Issues
AfreenYousaf
 
Legal, Ethical, and Professional Issues In Information Security
Legal, Ethical, and Professional Issues In Information SecurityLegal, Ethical, and Professional Issues In Information Security
Legal, Ethical, and Professional Issues In Information Security
Carl Ceder
 
Information Security Blueprint
Information Security BlueprintInformation Security Blueprint
Information Security Blueprint
Zefren Edior
 
Polyalphabetic Substitution Cipher
Polyalphabetic Substitution CipherPolyalphabetic Substitution Cipher
Polyalphabetic Substitution Cipher
SHUBHA CHATURVEDI
 
Introduction to security
Introduction to securityIntroduction to security
Introduction to security
Mukesh Chinta
 
Etical and professional issues of computer
Etical and professional issues of computerEtical and professional issues of computer
Etical and professional issues of computer
Abdullah Khosa
 

What's hot (20)

Operating system security
Operating system securityOperating system security
Operating system security
 
Information Security Governance and Strategy - 3
Information Security Governance and Strategy - 3Information Security Governance and Strategy - 3
Information Security Governance and Strategy - 3
 
Administering security
Administering securityAdministering security
Administering security
 
Information Security Principles - Access Control
Information Security  Principles -  Access ControlInformation Security  Principles -  Access Control
Information Security Principles - Access Control
 
Security policies
Security policiesSecurity policies
Security policies
 
Block Cipher and its Design Principles
Block Cipher and its Design PrinciplesBlock Cipher and its Design Principles
Block Cipher and its Design Principles
 
Public Key Cryptosystem
Public Key CryptosystemPublic Key Cryptosystem
Public Key Cryptosystem
 
Network security - OSI Security Architecture
Network security - OSI Security ArchitectureNetwork security - OSI Security Architecture
Network security - OSI Security Architecture
 
OSI Security Architecture
OSI Security ArchitectureOSI Security Architecture
OSI Security Architecture
 
Security Mechanisms
Security MechanismsSecurity Mechanisms
Security Mechanisms
 
Cyber security and cyber laws
Cyber security and cyber lawsCyber security and cyber laws
Cyber security and cyber laws
 
System Security-Chapter 1
System Security-Chapter 1System Security-Chapter 1
System Security-Chapter 1
 
Cryptography and Information Security
Cryptography and Information SecurityCryptography and Information Security
Cryptography and Information Security
 
S/MIME
S/MIMES/MIME
S/MIME
 
Network Security Issues
Network Security IssuesNetwork Security Issues
Network Security Issues
 
Legal, Ethical, and Professional Issues In Information Security
Legal, Ethical, and Professional Issues In Information SecurityLegal, Ethical, and Professional Issues In Information Security
Legal, Ethical, and Professional Issues In Information Security
 
Information Security Blueprint
Information Security BlueprintInformation Security Blueprint
Information Security Blueprint
 
Polyalphabetic Substitution Cipher
Polyalphabetic Substitution CipherPolyalphabetic Substitution Cipher
Polyalphabetic Substitution Cipher
 
Introduction to security
Introduction to securityIntroduction to security
Introduction to security
 
Etical and professional issues of computer
Etical and professional issues of computerEtical and professional issues of computer
Etical and professional issues of computer
 

Similar to Legal Privacy and Ethical Issues in Computer Security.pptx

Stallings ch18 privacy
Stallings ch18 privacyStallings ch18 privacy
Stallings ch18 privacysalehnia
 
CR 23 - Legal & Ethical Aspects.ppt
CR 23 - Legal & Ethical Aspects.pptCR 23 - Legal & Ethical Aspects.ppt
CR 23 - Legal & Ethical Aspects.ppt
ssuseraaf866
 
Computer ethics cyber security and technology of it
Computer ethics cyber security and technology of itComputer ethics cyber security and technology of it
Computer ethics cyber security and technology of it
sr24production
 
Introduction to Engineering and Profession Ethics Lecture9-Computer Ethics, P...
Introduction to Engineering and Profession Ethics Lecture9-Computer Ethics, P...Introduction to Engineering and Profession Ethics Lecture9-Computer Ethics, P...
Introduction to Engineering and Profession Ethics Lecture9-Computer Ethics, P...
Dr. Khaled Bakro
 
Ethics assignment.docx
Ethics assignment.docxEthics assignment.docx
Ethics assignment.docx
BestMan28
 
Super billing computer ethics, privacy and security
Super billing computer ethics, privacy and securitySuper billing computer ethics, privacy and security
Super billing computer ethics, privacy and security
superb11b
 
Copy Right issue in computer software and hardware and IP
Copy Right issue in computer software and hardware and IPCopy Right issue in computer software and hardware and IP
Copy Right issue in computer software and hardware and IP
muhammadshahid2047
 
chapter5F.ppt
chapter5F.pptchapter5F.ppt
chapter5F.ppt
amreena6
 
5362098
53620985362098
5362098
AditiVeda1
 
5362098
53620985362098
5362098
AditiVeda1
 
Contracting for Better Cybersecurity
Contracting for Better CybersecurityContracting for Better Cybersecurity
Contracting for Better Cybersecurity
Shawn Tuma
 
Aet531 week6 nnb_final
Aet531 week6 nnb_finalAet531 week6 nnb_final
Aet531 week6 nnb_final
nykobap01
 
BS CS5 Lecture 5.pptx
BS CS5 Lecture 5.pptxBS CS5 Lecture 5.pptx
BS CS5 Lecture 5.pptx
whoiam36
 
Trade Secret Lien
Trade Secret LienTrade Secret Lien
Trade Secret LienFNian
 
Lasa European NFP Technology Conference 2010 - Data protection and the cloud
Lasa European NFP Technology Conference 2010 - Data protection and the cloudLasa European NFP Technology Conference 2010 - Data protection and the cloud
Lasa European NFP Technology Conference 2010 - Data protection and the cloud
ukriders
 
BTEC National in ICT: Unit 3 - Legal Constraints
BTEC National in ICT: Unit 3 - Legal ConstraintsBTEC National in ICT: Unit 3 - Legal Constraints
BTEC National in ICT: Unit 3 - Legal Constraints
mrcox
 
Privacy in computing & interlectual property
Privacy in computing & interlectual propertyPrivacy in computing & interlectual property
Privacy in computing & interlectual property
Mutongole Benjamin Benjamin
 
Ethics of electronic marketing
Ethics of electronic marketingEthics of electronic marketing
Ethics of electronic marketing
gaurav jain
 
chapter 5.pptxggggggggggggggggggggggggggg
chapter 5.pptxgggggggggggggggggggggggggggchapter 5.pptxggggggggggggggggggggggggggg
chapter 5.pptxggggggggggggggggggggggggggg
adabotor7
 

Similar to Legal Privacy and Ethical Issues in Computer Security.pptx (20)

Stallings ch18 privacy
Stallings ch18 privacyStallings ch18 privacy
Stallings ch18 privacy
 
CR 23 - Legal & Ethical Aspects.ppt
CR 23 - Legal & Ethical Aspects.pptCR 23 - Legal & Ethical Aspects.ppt
CR 23 - Legal & Ethical Aspects.ppt
 
Computer ethics cyber security and technology of it
Computer ethics cyber security and technology of itComputer ethics cyber security and technology of it
Computer ethics cyber security and technology of it
 
Corporate ethics
Corporate ethicsCorporate ethics
Corporate ethics
 
Introduction to Engineering and Profession Ethics Lecture9-Computer Ethics, P...
Introduction to Engineering and Profession Ethics Lecture9-Computer Ethics, P...Introduction to Engineering and Profession Ethics Lecture9-Computer Ethics, P...
Introduction to Engineering and Profession Ethics Lecture9-Computer Ethics, P...
 
Ethics assignment.docx
Ethics assignment.docxEthics assignment.docx
Ethics assignment.docx
 
Super billing computer ethics, privacy and security
Super billing computer ethics, privacy and securitySuper billing computer ethics, privacy and security
Super billing computer ethics, privacy and security
 
Copy Right issue in computer software and hardware and IP
Copy Right issue in computer software and hardware and IPCopy Right issue in computer software and hardware and IP
Copy Right issue in computer software and hardware and IP
 
chapter5F.ppt
chapter5F.pptchapter5F.ppt
chapter5F.ppt
 
5362098
53620985362098
5362098
 
5362098
53620985362098
5362098
 
Contracting for Better Cybersecurity
Contracting for Better CybersecurityContracting for Better Cybersecurity
Contracting for Better Cybersecurity
 
Aet531 week6 nnb_final
Aet531 week6 nnb_finalAet531 week6 nnb_final
Aet531 week6 nnb_final
 
BS CS5 Lecture 5.pptx
BS CS5 Lecture 5.pptxBS CS5 Lecture 5.pptx
BS CS5 Lecture 5.pptx
 
Trade Secret Lien
Trade Secret LienTrade Secret Lien
Trade Secret Lien
 
Lasa European NFP Technology Conference 2010 - Data protection and the cloud
Lasa European NFP Technology Conference 2010 - Data protection and the cloudLasa European NFP Technology Conference 2010 - Data protection and the cloud
Lasa European NFP Technology Conference 2010 - Data protection and the cloud
 
BTEC National in ICT: Unit 3 - Legal Constraints
BTEC National in ICT: Unit 3 - Legal ConstraintsBTEC National in ICT: Unit 3 - Legal Constraints
BTEC National in ICT: Unit 3 - Legal Constraints
 
Privacy in computing & interlectual property
Privacy in computing & interlectual propertyPrivacy in computing & interlectual property
Privacy in computing & interlectual property
 
Ethics of electronic marketing
Ethics of electronic marketingEthics of electronic marketing
Ethics of electronic marketing
 
chapter 5.pptxggggggggggggggggggggggggggg
chapter 5.pptxgggggggggggggggggggggggggggchapter 5.pptxggggggggggggggggggggggggggg
chapter 5.pptxggggggggggggggggggggggggggg
 

Recently uploaded

可查真实(Monash毕业证)西澳大学毕业证成绩单退学买
可查真实(Monash毕业证)西澳大学毕业证成绩单退学买可查真实(Monash毕业证)西澳大学毕业证成绩单退学买
可查真实(Monash毕业证)西澳大学毕业证成绩单退学买
cuobya
 
1.Wireless Communication System_Wireless communication is a broad term that i...
1.Wireless Communication System_Wireless communication is a broad term that i...1.Wireless Communication System_Wireless communication is a broad term that i...
1.Wireless Communication System_Wireless communication is a broad term that i...
JeyaPerumal1
 
2.Cellular Networks_The final stage of connectivity is achieved by segmenting...
2.Cellular Networks_The final stage of connectivity is achieved by segmenting...2.Cellular Networks_The final stage of connectivity is achieved by segmenting...
2.Cellular Networks_The final stage of connectivity is achieved by segmenting...
JeyaPerumal1
 
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
3ipehhoa
 
一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理
一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理
一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理
eutxy
 
Understanding User Behavior with Google Analytics.pdf
Understanding User Behavior with Google Analytics.pdfUnderstanding User Behavior with Google Analytics.pdf
Understanding User Behavior with Google Analytics.pdf
SEO Article Boost
 
一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理
一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理
一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理
keoku
 
假文凭国外(Adelaide毕业证)澳大利亚国立大学毕业证成绩单办理
假文凭国外(Adelaide毕业证)澳大利亚国立大学毕业证成绩单办理假文凭国外(Adelaide毕业证)澳大利亚国立大学毕业证成绩单办理
假文凭国外(Adelaide毕业证)澳大利亚国立大学毕业证成绩单办理
cuobya
 
Bài tập unit 1 English in the world.docx
Bài tập unit 1 English in the world.docxBài tập unit 1 English in the world.docx
Bài tập unit 1 English in the world.docx
nhiyenphan2005
 
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
3ipehhoa
 
Search Result Showing My Post is Now Buried
Search Result Showing My Post is Now BuriedSearch Result Showing My Post is Now Buried
Search Result Showing My Post is Now Buried
Trish Parr
 
重新申请毕业证书(RMIT毕业证)皇家墨尔本理工大学毕业证成绩单精仿办理
重新申请毕业证书(RMIT毕业证)皇家墨尔本理工大学毕业证成绩单精仿办理重新申请毕业证书(RMIT毕业证)皇家墨尔本理工大学毕业证成绩单精仿办理
重新申请毕业证书(RMIT毕业证)皇家墨尔本理工大学毕业证成绩单精仿办理
vmemo1
 
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
APNIC
 
一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理
一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理
一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理
ufdana
 
Italy Agriculture Equipment Market Outlook to 2027
Italy Agriculture Equipment Market Outlook to 2027Italy Agriculture Equipment Market Outlook to 2027
Italy Agriculture Equipment Market Outlook to 2027
harveenkaur52
 
Meet up Milano 14 _ Axpo Italia_ Migration from Mule3 (On-prem) to.pdf
Meet up Milano 14 _ Axpo Italia_ Migration from Mule3 (On-prem) to.pdfMeet up Milano 14 _ Axpo Italia_ Migration from Mule3 (On-prem) to.pdf
Meet up Milano 14 _ Axpo Italia_ Migration from Mule3 (On-prem) to.pdf
Florence Consulting
 
How to Use Contact Form 7 Like a Pro.pptx
How to Use Contact Form 7 Like a Pro.pptxHow to Use Contact Form 7 Like a Pro.pptx
How to Use Contact Form 7 Like a Pro.pptx
Gal Baras
 
Internet of Things in Manufacturing: Revolutionizing Efficiency & Quality | C...
Internet of Things in Manufacturing: Revolutionizing Efficiency & Quality | C...Internet of Things in Manufacturing: Revolutionizing Efficiency & Quality | C...
Internet of Things in Manufacturing: Revolutionizing Efficiency & Quality | C...
CIOWomenMagazine
 
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptx
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptxBridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptx
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptx
Brad Spiegel Macon GA
 
test test test test testtest test testtest test testtest test testtest test ...
test test  test test testtest test testtest test testtest test testtest test ...test test  test test testtest test testtest test testtest test testtest test ...
test test test test testtest test testtest test testtest test testtest test ...
Arif0071
 

Recently uploaded (20)

可查真实(Monash毕业证)西澳大学毕业证成绩单退学买
可查真实(Monash毕业证)西澳大学毕业证成绩单退学买可查真实(Monash毕业证)西澳大学毕业证成绩单退学买
可查真实(Monash毕业证)西澳大学毕业证成绩单退学买
 
1.Wireless Communication System_Wireless communication is a broad term that i...
1.Wireless Communication System_Wireless communication is a broad term that i...1.Wireless Communication System_Wireless communication is a broad term that i...
1.Wireless Communication System_Wireless communication is a broad term that i...
 
2.Cellular Networks_The final stage of connectivity is achieved by segmenting...
2.Cellular Networks_The final stage of connectivity is achieved by segmenting...2.Cellular Networks_The final stage of connectivity is achieved by segmenting...
2.Cellular Networks_The final stage of connectivity is achieved by segmenting...
 
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
 
一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理
一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理
一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理
 
Understanding User Behavior with Google Analytics.pdf
Understanding User Behavior with Google Analytics.pdfUnderstanding User Behavior with Google Analytics.pdf
Understanding User Behavior with Google Analytics.pdf
 
一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理
一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理
一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理
 
假文凭国外(Adelaide毕业证)澳大利亚国立大学毕业证成绩单办理
假文凭国外(Adelaide毕业证)澳大利亚国立大学毕业证成绩单办理假文凭国外(Adelaide毕业证)澳大利亚国立大学毕业证成绩单办理
假文凭国外(Adelaide毕业证)澳大利亚国立大学毕业证成绩单办理
 
Bài tập unit 1 English in the world.docx
Bài tập unit 1 English in the world.docxBài tập unit 1 English in the world.docx
Bài tập unit 1 English in the world.docx
 
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
 
Search Result Showing My Post is Now Buried
Search Result Showing My Post is Now BuriedSearch Result Showing My Post is Now Buried
Search Result Showing My Post is Now Buried
 
重新申请毕业证书(RMIT毕业证)皇家墨尔本理工大学毕业证成绩单精仿办理
重新申请毕业证书(RMIT毕业证)皇家墨尔本理工大学毕业证成绩单精仿办理重新申请毕业证书(RMIT毕业证)皇家墨尔本理工大学毕业证成绩单精仿办理
重新申请毕业证书(RMIT毕业证)皇家墨尔本理工大学毕业证成绩单精仿办理
 
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
 
一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理
一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理
一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理
 
Italy Agriculture Equipment Market Outlook to 2027
Italy Agriculture Equipment Market Outlook to 2027Italy Agriculture Equipment Market Outlook to 2027
Italy Agriculture Equipment Market Outlook to 2027
 
Meet up Milano 14 _ Axpo Italia_ Migration from Mule3 (On-prem) to.pdf
Meet up Milano 14 _ Axpo Italia_ Migration from Mule3 (On-prem) to.pdfMeet up Milano 14 _ Axpo Italia_ Migration from Mule3 (On-prem) to.pdf
Meet up Milano 14 _ Axpo Italia_ Migration from Mule3 (On-prem) to.pdf
 
How to Use Contact Form 7 Like a Pro.pptx
How to Use Contact Form 7 Like a Pro.pptxHow to Use Contact Form 7 Like a Pro.pptx
How to Use Contact Form 7 Like a Pro.pptx
 
Internet of Things in Manufacturing: Revolutionizing Efficiency & Quality | C...
Internet of Things in Manufacturing: Revolutionizing Efficiency & Quality | C...Internet of Things in Manufacturing: Revolutionizing Efficiency & Quality | C...
Internet of Things in Manufacturing: Revolutionizing Efficiency & Quality | C...
 
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptx
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptxBridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptx
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptx
 
test test test test testtest test testtest test testtest test testtest test ...
test test  test test testtest test testtest test testtest test testtest test ...test test  test test testtest test testtest test testtest test testtest test ...
test test test test testtest test testtest test testtest test testtest test ...
 

Legal Privacy and Ethical Issues in Computer Security.pptx

  • 1. Legal, Privacy, and Ethical Issues in Computer Security
  • 2. Legal, Privacy, and Ethical Issues in Computer Security Human Controls Applicable to Computer Security: Basic Legal Issues a) Protecting Programs and Data b) Information and the Law c) Ownership Rights of Employees and Employers d) Software Failures (and Customers) Computer Crime Privacy Ethics a) Introduction to Ethics b) Case Studies of Ethics c) Codes of Professional Ethics
  • 3. Protecting Programs and Data Copyrights — designed to protect expression of ideas (creative works of the mind) Ideas themselves are free Different people can have the same idea The way of expressing ideas is copyrighted Copyrights are exclusive rights to making copies of expression Copyright protects intellectual property (IP) IP must be: Original work In some tangible medium of expression
  • 4. Patent — designed to protect tangible objects, or ways to make them (not works of the mind) Protected entity must be novel & nonobvious The first inventor who obtains patent gest his invention protected against patent infrigement Patents applied for algorithms only since 1981 Trade secret — information that provides competitive edge over others Information that has value only if kept secret Undoing release of a secret is impossible or very difficult Reverse engineering used to uncover trade secret is legal! T.s. protection applies very well to computer s/w E.g., pgms that use algorithms unknown to others
  • 5. Copyright Patent Trade Secret Protects Expression of idea, not idea itself Invention—way something works Secret, competitive advantage Protected Object Made Public Yes; intention is to promote publication Design filed at Patent Office No Must Distribute Yes No No Ease of filing Very easy, do-it- yourself Very complicated; specialist lawyer suggested No filing Duration Originator’s life + 70 yrs; 95 y. For company 19 years Indefinite Legal Protection Sue if unauthorized copy sold Sue if invention copied/reinvented Sue if secret improperly obtained
  • 6. Protecting Programs and Data How to protect: H/w Patent Firmware (microcode) Patent physical device, chip Use trade secret protection Copyright s/w such as embedded OS Object code s/w Copyiright of binary code Copyright of source code Need legal precedents Source code s/w Use trade secret protection Copyright reveals some code, facilitates reverse engineering Need legal precedents, too
  • 7. Information and the Law Characteristics of information as an object of value Not exhaustable Can be replicated Has minimal marginal cost Value is often time dependent Can be transferred intangibly
  • 8. Criminal Law Civil Law Defined by Statutes Common law (tort l.) Contracts Cases brought by Government Government Individuals and companies Wronged party Society Individuals and companies Remedy Jail, fine Damages, typically monetary Comparison of Criminal and Civil Law
  • 9. Ownership Rights of Employees and Employers Ownership rights are computer security issue Concerned with protecting secrecy (confidentiality) and integrity of works produced by employees of an employer Ownership issues in emploee/employer relations: Ownership of products Products/ideas/inventions developed by employee after hours might still be owned by her employer Esp. if in the same „line of business” Ownership of patents If employer files for patent, employer will own patent Ownership of copyrights Similar to patents Trade secret protection No registered inventor/author—owner can prosecute for damages
  • 10. Ownership Rights of Employees and Employers (2) Type of employment has ownership consequences Work for hire All work done by employee is owned by employer Employment contracts Often spell out ownership rights Often includes agreement not to compete (for some time after termination) Non-competition is not always enforceable by law Licenses Programmer retains full ownership of developed s/w Grants license for a fee
  • 11. Software Failures (& Customers) -If not correct: ask for refund, replacement, fixing Refund: possible Replacement: if this copy damaged, or improved in the meantine Fixing: rarely legally enforced; instead, monetary awards for damages Correctness of s/w difficult to define/enforce legally Individual can rarely sue a major s/w vendor Prohibitive costs for individual
  • 12. Issue 2: Reporting software flaws Should we share s/w vulnerability info? Both pros and cons Vendor interests Vendors don’t want to react to individual flaws Prefer bundle a number of flaw fixes User interests Would like to have fixes quickly Responsible vulnerability reporting How to report vulnerability info responsibly? E.g. First notify the vendor, give vendor a few weeks to fix If vendor delays fixes, ask „coordinator” for help Coordinator—e.g., computer emergency response center
  • 13. Computer Crime Separate category for computer crime is needed Because special laws are needed for CC Value of integrity and confidentiality/privacy Value of privacy is now recognized by several federal/state laws Value of data Courts understand value of data better Acceptance of computer terminology Law lags behind technology in acceptance of new terminology
  • 14. Privacy Identity theft – the most serious crime against privacy Threats to privacy Aggregation and data mining Poor system security The Internet as privacy threat Unencrypted e-mail / web surfing / attacks Corporate rights and private business
  • 15. Controls for protecting privacy Authentication Anonymity Pseudonymity
  • 16. Introduction to Ethics Law vs. Ethics Law alone can’t restrict human behavior Impractical/impossible to describe/enforce all acceptable behaviors Ethics/morals are sufficient self-controls for most people
  • 17. Most ethical and legal issues in computer system are in the area of individual’s right to privacy versus the greater good of a larger entity i.e. a company or a society. For example, tracking how employees use computers, crowd surveillance, managing customer profiles, tracking a person’s travel with passport and so on. A key concept in resolving this issues is to find out, what is a person’s expectation of privacy. Classically, the ethical issues in security system are classified into following 4 categories: • Privacy: This deals with the right of an individual to control personal information. It is the protection of personal or sensitive information. Privacy is subjective. Different people have different ideas of what privacy is and how much privacy they will trade for safety or convenience. • Accuracy: This talks about the responsibility for the authenticity, fidelity an accuracy of the information. • Property: This determines who the owner of the information is and who controls access. • Accessibility: This deals with the issue of the type of information, an organization has the right to collect. And in that situation, it also expects to know the measures which will safeguard against any unforeseen eventualities.