SlideShare a Scribd company logo
PRIVACY,
SECURITY, AND
ETHICS
Texas A&M University Commerce
Introduction
 The ubiquitous use of computers and technology prompts some very important
questions about the use of personal data and our right to privacy.
 Privacy – What are the threats to personal privacy and how can we protect
ourselves?
 Security – How can access to sensitive information be controlled and how can we
secure hardware and software?
 Ethics – How do the actions of individual users and companies affect society?
Privacy
 Privacy – concerns the collection and use of data about individuals
 Three primary privacy issues:
 Accuracy
 Property
 Access
Large Databases
 Federal government alone has over 2,000 databases
 Reverse directory compiles lists of the calls we make
 Data gatherers
 Information resellers or
information brokers
 Electronic profiles are
easily created
Large Databases - Issues
 Your personal information is a marketable commodity, which raises many issues:
Collecting public, but personally identifying information (e.g., Google’s Street View)
 Spreading information without personal consent, leading to identity theft
 Spreading inaccurate information
 Mistaken identity
 Freedom of Information Act
Private Networks
 Employers can monitor e-mail legally
 75 percent of all businesses search employees’ electronic mail and computer files using snoopware
 A proposed law could prohibit this type of
electronic monitoring
or at least require the
employer to notify
the employee first
The Internet and the Web
 Illusion of anonymity
 People are not concerned about
privacy when surfing the Internet
or when sending e-mail
 History file (right) in Web browsers
 Traditional cookies from Web surfing
 Spyware
 Ad network or adware cookies
 Web bugs
 Computer monitoring software,
such as keystroke loggers
Spyware Removal
 Anti-Spyware programs
 Designed to detect and remove cookies, web bugs, and monitoring software, such as key loggers
Major Laws on Privacy
 Federal laws governing privacy matters have been created
 Gramm-Leach-Bliley Act – protects personal financial information
 Health Insurance Portability and Accountability Act (HIPAA) – protects medical records
 Family Educational Rights and Privacy Act (FERPA) – restricts disclosure of educational results and
records
Security
 Threats to computer security include criminals, computer crimes, and other hazards
 Computer criminals:
 Employees
 Outside users
 Hackers and
crackers
 Organized crime
 Terrorists
Computer Crime
 Malicious Programs
 Viruses
 Worms
 Trojan horse
 Zombies
 Denial of service (DoS) attacks
 Internet scams, such as phishing
 Social networking risks
 Rogue Wi-Fi hotspots
 Theft of hardware, software, data, and
computer time
 Data manipulation
 Computer Fraud and Abuse Act
Other Hazards
 Natural hazards
 Natural forces such as fires, floods, and tornadoes
 Civil strife and terrorism
 Wars, riots, and terrorist activites
 Technological failures
 Voltage surge or spike
 Use a surge protector
 Human errors
 Data entry errors
 Programmer error
Measures to Protect Computer Security
 Restricting access
 Encrypting data
 Anticipating disasters
 Preventing data loss
Restricting Access
 Biometric scanning
 Fingerprint scanners
 Iris (eye) scanners
 Passwords
 Firewalls
Encrypting Data
 Encryption is the process of coding information to make it unreadable,
except to those who have the key
 E-mail encryption
 File encryption
 Web site encryption
 Virtual private networks
(VPNs)
 Wireless network encryption
 WEP, WPA, and WPA2
Ethics
 Copyright
 Gives content creators the right to control the use and distribution of their work
 Software piracy
 Unauthorized copying and distribution
 Digital Millennium Copyright Act
 Digital rights management (DRM)
 Plagiarism
Questions
 Discuss the impact of large databases, private networks, the Internet, and the Web
on privacy.
 Discuss the various kinds of computer criminals.
 What are the principal measures used to protect computer security? What is
encryption? How is it used by corporations and individuals?
 What is a copyright? Discuss software piracy, the Digital Millennium Copyright Act,
and digital rights management?
 What is plagiarism? Discuss how computers make plagiarism easy and tempting to
busy people and how a plagiarist can be easily identified.

More Related Content

What's hot

Software Legal Issues
Software Legal IssuesSoftware Legal Issues
Software Legal Issues
blogzilla
 
Digital law
Digital lawDigital law
Digital law
zrh48
 

What's hot (20)

Hacking and Hacktivism
Hacking and HacktivismHacking and Hacktivism
Hacking and Hacktivism
 
Software Legal Issues
Software Legal IssuesSoftware Legal Issues
Software Legal Issues
 
IT Ethics
IT EthicsIT Ethics
IT Ethics
 
Ethics for IT Professionals
Ethics for IT ProfessionalsEthics for IT Professionals
Ethics for IT Professionals
 
ethical legal issues
ethical legal issuesethical legal issues
ethical legal issues
 
Cyber Privacy & Password Protection
Cyber Privacy & Password ProtectionCyber Privacy & Password Protection
Cyber Privacy & Password Protection
 
Professional and Ethical Responsibilities as IT Professionals to be aware of ...
Professional and Ethical Responsibilities as IT Professionals to be aware of ...Professional and Ethical Responsibilities as IT Professionals to be aware of ...
Professional and Ethical Responsibilities as IT Professionals to be aware of ...
 
Digital law
Digital lawDigital law
Digital law
 
Cyber security laws
Cyber security lawsCyber security laws
Cyber security laws
 
Digital Law Powerpoint
Digital Law PowerpointDigital Law Powerpoint
Digital Law Powerpoint
 
Chapter8
Chapter8Chapter8
Chapter8
 
Digital law
Digital lawDigital law
Digital law
 
Digital law powerpoint
Digital law powerpointDigital law powerpoint
Digital law powerpoint
 
Chapter 11 laws and ethic information security
Chapter 11   laws and ethic information securityChapter 11   laws and ethic information security
Chapter 11 laws and ethic information security
 
Cyber security
Cyber securityCyber security
Cyber security
 
LAW PPT-LAWS IN DIGITAL AGE/SOCIAL MEDIA.
LAW PPT-LAWS IN DIGITAL AGE/SOCIAL MEDIA.LAW PPT-LAWS IN DIGITAL AGE/SOCIAL MEDIA.
LAW PPT-LAWS IN DIGITAL AGE/SOCIAL MEDIA.
 
APT 510 Assignment 1
APT 510 Assignment 1APT 510 Assignment 1
APT 510 Assignment 1
 
Etical and professional issues of computer
Etical and professional issues of computerEtical and professional issues of computer
Etical and professional issues of computer
 
Computer misuse
Computer misuse Computer misuse
Computer misuse
 
C3 and digital citizenship
C3 and digital citizenshipC3 and digital citizenship
C3 and digital citizenship
 

Similar to TAMUC LO 7

Security And Ethical Challenges Of Infornation Technology
Security And Ethical Challenges Of Infornation TechnologySecurity And Ethical Challenges Of Infornation Technology
Security And Ethical Challenges Of Infornation Technology
paramalways
 
N3275466 - Final Presentation Advance network (1)
N3275466 - Final Presentation  Advance network (1)N3275466 - Final Presentation  Advance network (1)
N3275466 - Final Presentation Advance network (1)
Christopher Lisasi
 
IT Security for the Physical Security Professional
IT Security for the Physical Security ProfessionalIT Security for the Physical Security Professional
IT Security for the Physical Security Professional
ciso_insights
 
information, people $ threats
information, people $ threatsinformation, people $ threats
information, people $ threats
07Deeps
 
Understand Ethics and Security in the Programming Process
Understand Ethics and Security in the Programming ProcessUnderstand Ethics and Security in the Programming Process
Understand Ethics and Security in the Programming Process
Casey Robertson
 
security and ethical challenges
security and ethical challengessecurity and ethical challenges
security and ethical challenges
Vineet Dubey
 
Tech Topic Privacy
Tech Topic PrivacyTech Topic Privacy
Tech Topic Privacy
netapprad
 

Similar to TAMUC LO 7 (20)

Shailendra Pandey.ppt
Shailendra Pandey.pptShailendra Pandey.ppt
Shailendra Pandey.ppt
 
Security And Ethical Challenges Of Infornation Technology
Security And Ethical Challenges Of Infornation TechnologySecurity And Ethical Challenges Of Infornation Technology
Security And Ethical Challenges Of Infornation Technology
 
N3275466 - Final Presentation Advance network (1)
N3275466 - Final Presentation  Advance network (1)N3275466 - Final Presentation  Advance network (1)
N3275466 - Final Presentation Advance network (1)
 
Cyber security & Data Protection
Cyber security & Data ProtectionCyber security & Data Protection
Cyber security & Data Protection
 
IT Security for the Physical Security Professional
IT Security for the Physical Security ProfessionalIT Security for the Physical Security Professional
IT Security for the Physical Security Professional
 
Shailendra Pandey.ppt
Shailendra Pandey.pptShailendra Pandey.ppt
Shailendra Pandey.ppt
 
information, people $ threats
information, people $ threatsinformation, people $ threats
information, people $ threats
 
VTU - MIS Module 8 - Security and Ethical Challenges
VTU - MIS Module 8 -  Security and Ethical ChallengesVTU - MIS Module 8 -  Security and Ethical Challenges
VTU - MIS Module 8 - Security and Ethical Challenges
 
Beekman5 std ppt_12
Beekman5 std ppt_12Beekman5 std ppt_12
Beekman5 std ppt_12
 
Hackers
HackersHackers
Hackers
 
Hackers
HackersHackers
Hackers
 
Hackers
HackersHackers
Hackers
 
Understand Ethics and Security in the Programming Process
Understand Ethics and Security in the Programming ProcessUnderstand Ethics and Security in the Programming Process
Understand Ethics and Security in the Programming Process
 
Ecommerce security
Ecommerce securityEcommerce security
Ecommerce security
 
security and ethical challenges
security and ethical challengessecurity and ethical challenges
security and ethical challenges
 
SHAILENDRA.ppt
SHAILENDRA.pptSHAILENDRA.ppt
SHAILENDRA.ppt
 
Managing System Security
Managing System SecurityManaging System Security
Managing System Security
 
Rainer+3e Student Pp Ts Ch03
Rainer+3e Student Pp Ts Ch03Rainer+3e Student Pp Ts Ch03
Rainer+3e Student Pp Ts Ch03
 
Tech Topic Privacy
Tech Topic PrivacyTech Topic Privacy
Tech Topic Privacy
 
IT-Presentation.pptx
IT-Presentation.pptxIT-Presentation.pptx
IT-Presentation.pptx
 

More from Dr. Christopher Jones (15)

Princeton meadows HOA 2020
Princeton meadows HOA 2020Princeton meadows HOA 2020
Princeton meadows HOA 2020
 
Sw200 whatissocialwork
Sw200 whatissocialworkSw200 whatissocialwork
Sw200 whatissocialwork
 
Princeton meadows hoa 2019 [autosaved]
Princeton meadows hoa 2019 [autosaved]Princeton meadows hoa 2019 [autosaved]
Princeton meadows hoa 2019 [autosaved]
 
Princeton meadows hoa qt2 poll
Princeton meadows hoa qt2 pollPrinceton meadows hoa qt2 poll
Princeton meadows hoa qt2 poll
 
Pmhoa 5 year landscape Plan
Pmhoa 5 year landscape PlanPmhoa 5 year landscape Plan
Pmhoa 5 year landscape Plan
 
Pmhoa 5 year pool
Pmhoa 5 year poolPmhoa 5 year pool
Pmhoa 5 year pool
 
TAMUC LO 6
TAMUC LO 6TAMUC LO 6
TAMUC LO 6
 
TAMUC LO 10
TAMUC LO 10TAMUC LO 10
TAMUC LO 10
 
TAMUC LO 9
TAMUC LO 9TAMUC LO 9
TAMUC LO 9
 
TAMUC LO 8
TAMUC LO 8TAMUC LO 8
TAMUC LO 8
 
TAMUC LO 5
TAMUC LO 5TAMUC LO 5
TAMUC LO 5
 
TAMUC LO 4
TAMUC LO 4TAMUC LO 4
TAMUC LO 4
 
TAMUC LO 3
TAMUC LO 3TAMUC LO 3
TAMUC LO 3
 
TAMUC LO 2
TAMUC LO 2TAMUC LO 2
TAMUC LO 2
 
TAMUC LO 1
TAMUC LO 1TAMUC LO 1
TAMUC LO 1
 

Recently uploaded

Accounting and finance exit exam 2016 E.C.pdf
Accounting and finance exit exam 2016 E.C.pdfAccounting and finance exit exam 2016 E.C.pdf
Accounting and finance exit exam 2016 E.C.pdf
YibeltalNibretu
 
Additional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdfAdditional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdf
joachimlavalley1
 

Recently uploaded (20)

Basic Civil Engg Notes_Chapter-6_Environment Pollution & Engineering
Basic Civil Engg Notes_Chapter-6_Environment Pollution & EngineeringBasic Civil Engg Notes_Chapter-6_Environment Pollution & Engineering
Basic Civil Engg Notes_Chapter-6_Environment Pollution & Engineering
 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
 
Operations Management - Book1.p - Dr. Abdulfatah A. Salem
Operations Management - Book1.p  - Dr. Abdulfatah A. SalemOperations Management - Book1.p  - Dr. Abdulfatah A. Salem
Operations Management - Book1.p - Dr. Abdulfatah A. Salem
 
Accounting and finance exit exam 2016 E.C.pdf
Accounting and finance exit exam 2016 E.C.pdfAccounting and finance exit exam 2016 E.C.pdf
Accounting and finance exit exam 2016 E.C.pdf
 
Mattingly "AI & Prompt Design: Limitations and Solutions with LLMs"
Mattingly "AI & Prompt Design: Limitations and Solutions with LLMs"Mattingly "AI & Prompt Design: Limitations and Solutions with LLMs"
Mattingly "AI & Prompt Design: Limitations and Solutions with LLMs"
 
Additional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdfAdditional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdf
 
B.ed spl. HI pdusu exam paper-2023-24.pdf
B.ed spl. HI pdusu exam paper-2023-24.pdfB.ed spl. HI pdusu exam paper-2023-24.pdf
B.ed spl. HI pdusu exam paper-2023-24.pdf
 
Sectors of the Indian Economy - Class 10 Study Notes pdf
Sectors of the Indian Economy - Class 10 Study Notes pdfSectors of the Indian Economy - Class 10 Study Notes pdf
Sectors of the Indian Economy - Class 10 Study Notes pdf
 
Basic phrases for greeting and assisting costumers
Basic phrases for greeting and assisting costumersBasic phrases for greeting and assisting costumers
Basic phrases for greeting and assisting costumers
 
Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345
 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
 
Basic Civil Engineering Notes of Chapter-6, Topic- Ecosystem, Biodiversity G...
Basic Civil Engineering Notes of Chapter-6,  Topic- Ecosystem, Biodiversity G...Basic Civil Engineering Notes of Chapter-6,  Topic- Ecosystem, Biodiversity G...
Basic Civil Engineering Notes of Chapter-6, Topic- Ecosystem, Biodiversity G...
 
How to Split Bills in the Odoo 17 POS Module
How to Split Bills in the Odoo 17 POS ModuleHow to Split Bills in the Odoo 17 POS Module
How to Split Bills in the Odoo 17 POS Module
 
Advances in production technology of Grapes.pdf
Advances in production technology of Grapes.pdfAdvances in production technology of Grapes.pdf
Advances in production technology of Grapes.pdf
 
Salient features of Environment protection Act 1986.pptx
Salient features of Environment protection Act 1986.pptxSalient features of Environment protection Act 1986.pptx
Salient features of Environment protection Act 1986.pptx
 
50 ĐỀ LUYỆN THI IOE LỚP 9 - NĂM HỌC 2022-2023 (CÓ LINK HÌNH, FILE AUDIO VÀ ĐÁ...
50 ĐỀ LUYỆN THI IOE LỚP 9 - NĂM HỌC 2022-2023 (CÓ LINK HÌNH, FILE AUDIO VÀ ĐÁ...50 ĐỀ LUYỆN THI IOE LỚP 9 - NĂM HỌC 2022-2023 (CÓ LINK HÌNH, FILE AUDIO VÀ ĐÁ...
50 ĐỀ LUYỆN THI IOE LỚP 9 - NĂM HỌC 2022-2023 (CÓ LINK HÌNH, FILE AUDIO VÀ ĐÁ...
 
MARUTI SUZUKI- A Successful Joint Venture in India.pptx
MARUTI SUZUKI- A Successful Joint Venture in India.pptxMARUTI SUZUKI- A Successful Joint Venture in India.pptx
MARUTI SUZUKI- A Successful Joint Venture in India.pptx
 
NCERT Solutions Power Sharing Class 10 Notes pdf
NCERT Solutions Power Sharing Class 10 Notes pdfNCERT Solutions Power Sharing Class 10 Notes pdf
NCERT Solutions Power Sharing Class 10 Notes pdf
 
Gyanartha SciBizTech Quiz slideshare.pptx
Gyanartha SciBizTech Quiz slideshare.pptxGyanartha SciBizTech Quiz slideshare.pptx
Gyanartha SciBizTech Quiz slideshare.pptx
 
INU_CAPSTONEDESIGN_비밀번호486_업로드용 발표자료.pdf
INU_CAPSTONEDESIGN_비밀번호486_업로드용 발표자료.pdfINU_CAPSTONEDESIGN_비밀번호486_업로드용 발표자료.pdf
INU_CAPSTONEDESIGN_비밀번호486_업로드용 발표자료.pdf
 

TAMUC LO 7

  • 2. Introduction  The ubiquitous use of computers and technology prompts some very important questions about the use of personal data and our right to privacy.  Privacy – What are the threats to personal privacy and how can we protect ourselves?  Security – How can access to sensitive information be controlled and how can we secure hardware and software?  Ethics – How do the actions of individual users and companies affect society?
  • 3. Privacy  Privacy – concerns the collection and use of data about individuals  Three primary privacy issues:  Accuracy  Property  Access
  • 4. Large Databases  Federal government alone has over 2,000 databases  Reverse directory compiles lists of the calls we make  Data gatherers  Information resellers or information brokers  Electronic profiles are easily created
  • 5. Large Databases - Issues  Your personal information is a marketable commodity, which raises many issues: Collecting public, but personally identifying information (e.g., Google’s Street View)  Spreading information without personal consent, leading to identity theft  Spreading inaccurate information  Mistaken identity  Freedom of Information Act
  • 6. Private Networks  Employers can monitor e-mail legally  75 percent of all businesses search employees’ electronic mail and computer files using snoopware  A proposed law could prohibit this type of electronic monitoring or at least require the employer to notify the employee first
  • 7. The Internet and the Web  Illusion of anonymity  People are not concerned about privacy when surfing the Internet or when sending e-mail  History file (right) in Web browsers  Traditional cookies from Web surfing  Spyware  Ad network or adware cookies  Web bugs  Computer monitoring software, such as keystroke loggers
  • 8. Spyware Removal  Anti-Spyware programs  Designed to detect and remove cookies, web bugs, and monitoring software, such as key loggers
  • 9. Major Laws on Privacy  Federal laws governing privacy matters have been created  Gramm-Leach-Bliley Act – protects personal financial information  Health Insurance Portability and Accountability Act (HIPAA) – protects medical records  Family Educational Rights and Privacy Act (FERPA) – restricts disclosure of educational results and records
  • 10. Security  Threats to computer security include criminals, computer crimes, and other hazards  Computer criminals:  Employees  Outside users  Hackers and crackers  Organized crime  Terrorists
  • 11. Computer Crime  Malicious Programs  Viruses  Worms  Trojan horse  Zombies  Denial of service (DoS) attacks  Internet scams, such as phishing  Social networking risks  Rogue Wi-Fi hotspots  Theft of hardware, software, data, and computer time  Data manipulation  Computer Fraud and Abuse Act
  • 12. Other Hazards  Natural hazards  Natural forces such as fires, floods, and tornadoes  Civil strife and terrorism  Wars, riots, and terrorist activites  Technological failures  Voltage surge or spike  Use a surge protector  Human errors  Data entry errors  Programmer error
  • 13. Measures to Protect Computer Security  Restricting access  Encrypting data  Anticipating disasters  Preventing data loss
  • 14. Restricting Access  Biometric scanning  Fingerprint scanners  Iris (eye) scanners  Passwords  Firewalls
  • 15. Encrypting Data  Encryption is the process of coding information to make it unreadable, except to those who have the key  E-mail encryption  File encryption  Web site encryption  Virtual private networks (VPNs)  Wireless network encryption  WEP, WPA, and WPA2
  • 16. Ethics  Copyright  Gives content creators the right to control the use and distribution of their work  Software piracy  Unauthorized copying and distribution  Digital Millennium Copyright Act  Digital rights management (DRM)  Plagiarism
  • 17. Questions  Discuss the impact of large databases, private networks, the Internet, and the Web on privacy.  Discuss the various kinds of computer criminals.  What are the principal measures used to protect computer security? What is encryption? How is it used by corporations and individuals?  What is a copyright? Discuss software piracy, the Digital Millennium Copyright Act, and digital rights management?  What is plagiarism? Discuss how computers make plagiarism easy and tempting to busy people and how a plagiarist can be easily identified.