SlideShare a Scribd company logo
Anita Hemp
AET/531
November 11, 2013
Terri Bubb
When an organization implements new
technology, legal and ethical issues related to
technology can exist. Issues to consider can be
privacy, intellectual property, fair use, and
copyright.
Legal and Ethical Issues
 Privacy Act of 1974
 Consumer Privacy Act
 The Freedom of Information Act (FOIA)
 Acceptable Use Policy (AUP)

 Children’s Internet Protection Act (CIPA)
Privacy Act of 1974
The Privacy Act was amended in 1988 to regulate
public and private entities on the use of personal and
public related information. It also stipulates the rights
for individual to protect his or her personal
information.
Consumer Privacy Act
This Act is the feasibility of using the internet to
purchase items and to share information. The
objective is to set limits on government access to
personal information.
Freedom of Information Act (FOIA)
FOIA is a law that gives you the right to access
information from any government agency. It is often
described as the law that keeps citizens in the know
about their government.
Acceptable Use Policy (AUP)
AUP is a set of rules applied by an organization for its
network, website or large computer system that restrict
the ways in which they are used.
Children’s Internet Protection Act
(CIPA)
CIPA Is a federal law enacted by Congress in 2001 to
regulate access to offensive content over the internet
on school and library computers. The act establishes
protection measures such as block or filter internet
access to pictures that are obscene, child pornography,
and anything harmful to minors.
Many policies are currently being written or
amended to regulate the appropriate use and
practice of information technology tools and the
internet. Organizations must abide by these rules
or face consequences.

http://www.copyright.gov

More Related Content

What's hot

Social Media and Legal Ethics
Social Media and Legal EthicsSocial Media and Legal Ethics
Social Media and Legal Ethics
anthonywong
 
Chp10 public policy
Chp10 public policyChp10 public policy
Chp10 public policy
Engr Razaque
 
Data Privacy Introduction
Data Privacy IntroductionData Privacy Introduction
Data Privacy Introduction
G Prachi
 
The Data Protection Act
The Data Protection ActThe Data Protection Act
The Data Protection Actburto111
 
Presentation ICT2
Presentation ICT2Presentation ICT2
Presentation ICT2safa
 
Privacy in simple
Privacy in simplePrivacy in simple
Privacy in simple
Aurora Computer Studies
 
social, legal and ethical issues of e-commerce..
social, legal and ethical issues of e-commerce..social, legal and ethical issues of e-commerce..
social, legal and ethical issues of e-commerce..
home based
 
Privacy and Protection of Personal Information law seminar
Privacy and Protection of Personal Information law seminarPrivacy and Protection of Personal Information law seminar
Privacy and Protection of Personal Information law seminarLance Michalson
 
Digital identity theft remedial efforts case of uganda_ruyooka
Digital identity theft  remedial efforts case of uganda_ruyookaDigital identity theft  remedial efforts case of uganda_ruyooka
Digital identity theft remedial efforts case of uganda_ruyookaAmbrose Ruyooka,PMP,CGEIT, CRISC
 
Presentation ict3992
Presentation ict3992Presentation ict3992
Presentation ict3992
Areniym Lovelova
 
24227541 cyber-law
24227541 cyber-law24227541 cyber-law
24227541 cyber-law
Md Aktar
 
Legal issues in technology
Legal issues in technologyLegal issues in technology
Legal issues in technology
Willislwhite12
 
Presentation ICT3
Presentation ICT3Presentation ICT3
Presentation ICT3safa
 
Personal privacy and computer technologies
Personal privacy and computer technologiesPersonal privacy and computer technologies
Personal privacy and computer technologies
sidra batool
 
Wealth Of Networks Info Intellectual P
Wealth Of Networks Info Intellectual PWealth Of Networks Info Intellectual P
Wealth Of Networks Info Intellectual Prleslein
 
Legal Issues in Online Environment
Legal Issues in Online EnvironmentLegal Issues in Online Environment
Legal Issues in Online Environment
MSC Malaysia Cybercentre @ Bangsar South City
 
Finding balance in the age of open data
Finding balance in the age of open dataFinding balance in the age of open data
Finding balance in the age of open data
Caribbean Open Data Conference & Code Sprint
 
Cyberlaw
CyberlawCyberlaw
Uganda cyber laws _ isaca workshop_kampala_by Ruyooka
Uganda cyber laws _ isaca workshop_kampala_by RuyookaUganda cyber laws _ isaca workshop_kampala_by Ruyooka
Uganda cyber laws _ isaca workshop_kampala_by Ruyooka
Ambrose Ruyooka,PMP,CGEIT, CRISC
 
Information Security in the Age of Wikileaks
Information Security in the Age of WikileaksInformation Security in the Age of Wikileaks
Information Security in the Age of Wikileaks
dbarton944
 

What's hot (20)

Social Media and Legal Ethics
Social Media and Legal EthicsSocial Media and Legal Ethics
Social Media and Legal Ethics
 
Chp10 public policy
Chp10 public policyChp10 public policy
Chp10 public policy
 
Data Privacy Introduction
Data Privacy IntroductionData Privacy Introduction
Data Privacy Introduction
 
The Data Protection Act
The Data Protection ActThe Data Protection Act
The Data Protection Act
 
Presentation ICT2
Presentation ICT2Presentation ICT2
Presentation ICT2
 
Privacy in simple
Privacy in simplePrivacy in simple
Privacy in simple
 
social, legal and ethical issues of e-commerce..
social, legal and ethical issues of e-commerce..social, legal and ethical issues of e-commerce..
social, legal and ethical issues of e-commerce..
 
Privacy and Protection of Personal Information law seminar
Privacy and Protection of Personal Information law seminarPrivacy and Protection of Personal Information law seminar
Privacy and Protection of Personal Information law seminar
 
Digital identity theft remedial efforts case of uganda_ruyooka
Digital identity theft  remedial efforts case of uganda_ruyookaDigital identity theft  remedial efforts case of uganda_ruyooka
Digital identity theft remedial efforts case of uganda_ruyooka
 
Presentation ict3992
Presentation ict3992Presentation ict3992
Presentation ict3992
 
24227541 cyber-law
24227541 cyber-law24227541 cyber-law
24227541 cyber-law
 
Legal issues in technology
Legal issues in technologyLegal issues in technology
Legal issues in technology
 
Presentation ICT3
Presentation ICT3Presentation ICT3
Presentation ICT3
 
Personal privacy and computer technologies
Personal privacy and computer technologiesPersonal privacy and computer technologies
Personal privacy and computer technologies
 
Wealth Of Networks Info Intellectual P
Wealth Of Networks Info Intellectual PWealth Of Networks Info Intellectual P
Wealth Of Networks Info Intellectual P
 
Legal Issues in Online Environment
Legal Issues in Online EnvironmentLegal Issues in Online Environment
Legal Issues in Online Environment
 
Finding balance in the age of open data
Finding balance in the age of open dataFinding balance in the age of open data
Finding balance in the age of open data
 
Cyberlaw
CyberlawCyberlaw
Cyberlaw
 
Uganda cyber laws _ isaca workshop_kampala_by Ruyooka
Uganda cyber laws _ isaca workshop_kampala_by RuyookaUganda cyber laws _ isaca workshop_kampala_by Ruyooka
Uganda cyber laws _ isaca workshop_kampala_by Ruyooka
 
Information Security in the Age of Wikileaks
Information Security in the Age of WikileaksInformation Security in the Age of Wikileaks
Information Security in the Age of Wikileaks
 

Viewers also liked

FTC Emphasizes Privacy Protections, Truth in Advertising in Business Guide fo...
FTC Emphasizes Privacy Protections, Truth in Advertising in Business Guide fo...FTC Emphasizes Privacy Protections, Truth in Advertising in Business Guide fo...
FTC Emphasizes Privacy Protections, Truth in Advertising in Business Guide fo...Patton Boggs LLP
 
Tech Use Posters
Tech Use PostersTech Use Posters
Tech Use Posters
Jessica Price
 
Legal, Ethical, and Social Issues in Educational Computing
Legal, Ethical, and Social Issues in Educational ComputingLegal, Ethical, and Social Issues in Educational Computing
Legal, Ethical, and Social Issues in Educational Computingsappingtonkr
 
Computer Ethics and Legal Issues
Computer Ethics and Legal IssuesComputer Ethics and Legal Issues
Computer Ethics and Legal IssuesKak Yong
 
Ethical and social issues in information systems
Ethical and social issues in information systemsEthical and social issues in information systems
Ethical and social issues in information systemsProf. Othman Alsalloum
 
Legal, Ethical and Social Issues in Technology
Legal, Ethical and Social Issues in TechnologyLegal, Ethical and Social Issues in Technology
Legal, Ethical and Social Issues in Technology
Rachel Farnese
 

Viewers also liked (6)

FTC Emphasizes Privacy Protections, Truth in Advertising in Business Guide fo...
FTC Emphasizes Privacy Protections, Truth in Advertising in Business Guide fo...FTC Emphasizes Privacy Protections, Truth in Advertising in Business Guide fo...
FTC Emphasizes Privacy Protections, Truth in Advertising in Business Guide fo...
 
Tech Use Posters
Tech Use PostersTech Use Posters
Tech Use Posters
 
Legal, Ethical, and Social Issues in Educational Computing
Legal, Ethical, and Social Issues in Educational ComputingLegal, Ethical, and Social Issues in Educational Computing
Legal, Ethical, and Social Issues in Educational Computing
 
Computer Ethics and Legal Issues
Computer Ethics and Legal IssuesComputer Ethics and Legal Issues
Computer Ethics and Legal Issues
 
Ethical and social issues in information systems
Ethical and social issues in information systemsEthical and social issues in information systems
Ethical and social issues in information systems
 
Legal, Ethical and Social Issues in Technology
Legal, Ethical and Social Issues in TechnologyLegal, Ethical and Social Issues in Technology
Legal, Ethical and Social Issues in Technology
 

Similar to Week 6 legal and ethical issues associated with modern technologies - anita hemp

Aet wk 6
Aet wk 6 Aet wk 6
Aet wk 6
Aet wk 6 Aet wk 6
Legislation
LegislationLegislation
Legislation
megabyte
 
Right to privacy on internet and Data Protection
Right to privacy on internet and Data ProtectionRight to privacy on internet and Data Protection
Right to privacy on internet and Data Protection
atuljaybhaye
 
Cyber law
Cyber lawCyber law
Cyber law
Azmawati Lazim
 
Ronit Mathur Cyber Security assesment.pptx
Ronit Mathur Cyber Security assesment.pptxRonit Mathur Cyber Security assesment.pptx
Ronit Mathur Cyber Security assesment.pptx
ManuGupta344215
 
Data Protection in India
Data Protection in IndiaData Protection in India
Data Protection in India
Home
 
Cie 2 cyber law
Cie 2  cyber lawCie 2  cyber law
Cie 2 cyber law
Mahua Narayan
 
Chap 4 (1)
Chap 4 (1)Chap 4 (1)
Farm Data: Examining the Legal Issues
Farm Data: Examining the Legal Issues Farm Data: Examining the Legal Issues
Farm Data: Examining the Legal Issues
Roger Royse
 
1ITC358ICT Management and Information SecurityChapter 12.docx
1ITC358ICT Management and Information SecurityChapter 12.docx1ITC358ICT Management and Information SecurityChapter 12.docx
1ITC358ICT Management and Information SecurityChapter 12.docx
hyacinthshackley2629
 
Itechlaw conferene presentation 15th feb 2013 the quest over identity the iss...
Itechlaw conferene presentation 15th feb 2013 the quest over identity the iss...Itechlaw conferene presentation 15th feb 2013 the quest over identity the iss...
Itechlaw conferene presentation 15th feb 2013 the quest over identity the iss...Prof. (Dr.) Tabrez Ahmad
 
Data theft rules and regulations things you should know (pt.1)
Data theft rules and regulations  things you should know (pt.1)Data theft rules and regulations  things you should know (pt.1)
Data theft rules and regulations things you should know (pt.1)
Faidepro
 
Know your rights protection against facial recognition software.
Know your rights  protection against facial recognition software.Know your rights  protection against facial recognition software.
Know your rights protection against facial recognition software.
Diganth Raj Sehgal
 
httpsdigitalguardian.comblogsocial-engineering-attacks-common.docx
httpsdigitalguardian.comblogsocial-engineering-attacks-common.docxhttpsdigitalguardian.comblogsocial-engineering-attacks-common.docx
httpsdigitalguardian.comblogsocial-engineering-attacks-common.docx
adampcarr67227
 
ACCESS TO INFORMATION Final Eugene (2)
ACCESS TO INFORMATION Final Eugene (2)ACCESS TO INFORMATION Final Eugene (2)
ACCESS TO INFORMATION Final Eugene (2)JAMAL JUMA
 
Chapter 4_dp-pertemuan 6
 Chapter 4_dp-pertemuan 6 Chapter 4_dp-pertemuan 6
Chapter 4_dp-pertemuan 6
UNIVERSITAS TEKNOKRAT INDONESIA
 
2010-06 analysis of laws inconsistent with human rights in uganda_hurinet
2010-06 analysis of laws inconsistent with human rights in uganda_hurinet2010-06 analysis of laws inconsistent with human rights in uganda_hurinet
2010-06 analysis of laws inconsistent with human rights in uganda_hurinet
Alex Taremwa
 

Similar to Week 6 legal and ethical issues associated with modern technologies - anita hemp (19)

Aet wk 6
Aet wk 6 Aet wk 6
Aet wk 6
 
Aet wk 6
Aet wk 6 Aet wk 6
Aet wk 6
 
Legislation
LegislationLegislation
Legislation
 
Right to privacy on internet and Data Protection
Right to privacy on internet and Data ProtectionRight to privacy on internet and Data Protection
Right to privacy on internet and Data Protection
 
Cyber law
Cyber lawCyber law
Cyber law
 
Ronit Mathur Cyber Security assesment.pptx
Ronit Mathur Cyber Security assesment.pptxRonit Mathur Cyber Security assesment.pptx
Ronit Mathur Cyber Security assesment.pptx
 
Data Protection in India
Data Protection in IndiaData Protection in India
Data Protection in India
 
Cie 2 cyber law
Cie 2  cyber lawCie 2  cyber law
Cie 2 cyber law
 
Chap 4 (1)
Chap 4 (1)Chap 4 (1)
Chap 4 (1)
 
Farm Data: Examining the Legal Issues
Farm Data: Examining the Legal Issues Farm Data: Examining the Legal Issues
Farm Data: Examining the Legal Issues
 
1ITC358ICT Management and Information SecurityChapter 12.docx
1ITC358ICT Management and Information SecurityChapter 12.docx1ITC358ICT Management and Information SecurityChapter 12.docx
1ITC358ICT Management and Information SecurityChapter 12.docx
 
Itechlaw conferene presentation 15th feb 2013 the quest over identity the iss...
Itechlaw conferene presentation 15th feb 2013 the quest over identity the iss...Itechlaw conferene presentation 15th feb 2013 the quest over identity the iss...
Itechlaw conferene presentation 15th feb 2013 the quest over identity the iss...
 
Data theft rules and regulations things you should know (pt.1)
Data theft rules and regulations  things you should know (pt.1)Data theft rules and regulations  things you should know (pt.1)
Data theft rules and regulations things you should know (pt.1)
 
Know your rights protection against facial recognition software.
Know your rights  protection against facial recognition software.Know your rights  protection against facial recognition software.
Know your rights protection against facial recognition software.
 
httpsdigitalguardian.comblogsocial-engineering-attacks-common.docx
httpsdigitalguardian.comblogsocial-engineering-attacks-common.docxhttpsdigitalguardian.comblogsocial-engineering-attacks-common.docx
httpsdigitalguardian.comblogsocial-engineering-attacks-common.docx
 
ACCESS TO INFORMATION Final Eugene (2)
ACCESS TO INFORMATION Final Eugene (2)ACCESS TO INFORMATION Final Eugene (2)
ACCESS TO INFORMATION Final Eugene (2)
 
Privacy and Privacy Law in India By Prashant Mali
Privacy and Privacy Law in India By Prashant MaliPrivacy and Privacy Law in India By Prashant Mali
Privacy and Privacy Law in India By Prashant Mali
 
Chapter 4_dp-pertemuan 6
 Chapter 4_dp-pertemuan 6 Chapter 4_dp-pertemuan 6
Chapter 4_dp-pertemuan 6
 
2010-06 analysis of laws inconsistent with human rights in uganda_hurinet
2010-06 analysis of laws inconsistent with human rights in uganda_hurinet2010-06 analysis of laws inconsistent with human rights in uganda_hurinet
2010-06 analysis of laws inconsistent with human rights in uganda_hurinet
 

Recently uploaded

Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Tobias Schneck
 
Search and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical FuturesSearch and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical Futures
Bhaskar Mitra
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
Jemma Hussein Allen
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Jeffrey Haguewood
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
Product School
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
Elena Simperl
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
Product School
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
Product School
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi
Fwdays
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
Alison B. Lowndes
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
Thijs Feryn
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
DianaGray10
 
ODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User GroupODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User Group
CatarinaPereira64715
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
Sri Ambati
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
Product School
 

Recently uploaded (20)

Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
 
Search and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical FuturesSearch and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical Futures
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
 
ODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User GroupODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User Group
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
 

Week 6 legal and ethical issues associated with modern technologies - anita hemp

  • 2. When an organization implements new technology, legal and ethical issues related to technology can exist. Issues to consider can be privacy, intellectual property, fair use, and copyright.
  • 3. Legal and Ethical Issues  Privacy Act of 1974  Consumer Privacy Act  The Freedom of Information Act (FOIA)  Acceptable Use Policy (AUP)  Children’s Internet Protection Act (CIPA)
  • 4. Privacy Act of 1974 The Privacy Act was amended in 1988 to regulate public and private entities on the use of personal and public related information. It also stipulates the rights for individual to protect his or her personal information.
  • 5. Consumer Privacy Act This Act is the feasibility of using the internet to purchase items and to share information. The objective is to set limits on government access to personal information.
  • 6. Freedom of Information Act (FOIA) FOIA is a law that gives you the right to access information from any government agency. It is often described as the law that keeps citizens in the know about their government.
  • 7. Acceptable Use Policy (AUP) AUP is a set of rules applied by an organization for its network, website or large computer system that restrict the ways in which they are used.
  • 8. Children’s Internet Protection Act (CIPA) CIPA Is a federal law enacted by Congress in 2001 to regulate access to offensive content over the internet on school and library computers. The act establishes protection measures such as block or filter internet access to pictures that are obscene, child pornography, and anything harmful to minors.
  • 9. Many policies are currently being written or amended to regulate the appropriate use and practice of information technology tools and the internet. Organizations must abide by these rules or face consequences. http://www.copyright.gov