Thursday, March 14, 2019

Information Technology Ethics Essay

Definitions-the chasten to be alone the most comprehensive of rights, and the right most determine by citizenry. (Justice Louis Brandeis, Olmstead v. US, 1928)-the right of individuals to control the collection and put on of development nearly themselves. Legal Aspects tribute from nonsensical intrusion upon ones isolation. protection from appropriation of ones fix or handleness.Protection from unreasonable openity given to ones tete-a-tete. Protection from publicity that unreasonably places one in a false light before the public. new-fashioned HISTORY OF PRIVACY PROTECTIONCommunication take on of 1934-it restricted the regimes ability to secretly intercept conversations. However, under a 1968 federal statute, equity enforcement officers can use wiretapping if they first obtain a hook order.Wiretapping the interception of tele prognosticate or telegraph communications for purpose of espionage or surveillance. granting immunity of Information shape (FOIA) (passe d -1966, amended-1974) bequeaths the public with the means to gain inlet to certain regimen records such as the spending patterns of an agency, the agencys policies and the ratiocination behind them, and the agencys mission and goals. comme il faut Credit inform Act (1970) this act regulates the operations of credit-reporting bureaus, including how they collect, store, and use credit entropy. it is designed to move on accuracy, fairness, and privateness of information in the files of credit reporting companies and to check substantiation governances that gather and sell information about people. cover Act (1974) declargons that no agency of the U.S. government can conceal the existence of whatsoever ad hominem entropy record-keeping system, and that any(prenominal) agency that maintains such a system, must publicly describe both the kind of information in it and the manner in which the information go out be employ. the Central Intelligence Agency (CIA) and the law enforcement agencies be excluded from this act. the Organization for Economic Cooperation and Development (OECD) Fair Information Practices atomic number 18 often held up as a model of ethical interposition of consumer selective information for organization to adopt.Summary of the 1980 OECD retirement guidelinesPrincipleGuideline assembling limitationLimit the collection of personal information. All such data must be obtained lawfully and fairly with the subjects bear and knowledge. Data QualityPersonal data should be accurate, complete, current and germane(predicate) to the purpose for which it is utilise. Purpose SpecificationThe purpose for which personal data is quiet should be should be contract and should not be changed. Use limitPersonal data should not be used beyond the specified purpose without a persons combine or by authority of law. warrantor department SafeguardsPersonal data should be protected against unauthorised access, modification, or disclosure. o penness principleData policies should exist and a data restrainer should be identified. Individual participationPeople should withstand the right to review their data, to contest its correctness, and to have incorrect data changed. AccountabilityA data controller should be responsible for ensuring that the above principles are met.Childrens Online Protect Act (COPA)(1998) The law states that a website that caters to children must offer comprehensive privacy policies, appreciate their parents or guardians about its data collection practices, and receive parental consent before collecting any personal information from children under 13 years of age. European Company Directives 95/46/EC (1998) requires any friendship that does business within the borders of 15 Western European nations to enforce a set of privacy precedeives on fair and appropriate use of information.Summary of the European Data concealing PrincipleNotice tell apart every last(predicate) customer what is done with their information.ChoiceGive customer a way to opt out of marketing.Onward TransferEnsure that suppliers trace with the privacy policy.AccessGive customer access to their information.SecurityProtect customer information from unauthorized access.Data IntegrityEnsure that information are accurate and relevant.EnforcementIndependently enforce the privacy policy.Better transaction Bureau Online (BBB Online) and TRUSTe independent, nonprofit initiatives that favor an industry-regulated approach to data privacy which interested about the government regulation that could have a negative intrusion on the Internets use and growth, and that such regulation would be costly to implement and difficult to change.The BBB Online Seal adheres that the website has a high train of dataprivacy. The seal program identifies online businesses that honor their own stated privacy policy.The TRUSTes main rule is that websites should openly communicate what information it gathers, its use, to whom it will be shared, and does the consumer has a choice of opting out. Gramm-Leach-Bliley Act (1998)-this act required all financial-services institutions to communicate their data privacy policies and honor customer data- congregation preferences by July 1, 2001. This was to stimulate them take actions to protect and secure customers nonpublic data from unauthorized access or use.KEY PRIVACY AND ANONYMITY ISSUESGOVERNMENTAL ELECTRONIC superintendenceFederal Wiretap Act (U.S. law Title 18 rive 1, Chapter 119, Wire and Electronic Communications Interception and Interception of Oral Communications) it requires carry outes to obtain motor hotel leave for surveillance of all kinds of electronic communications, including e-mail, fax, mesh, and voice, in turn investigation. A court order must be issued based on presumable safari before a wiretap can commence. roving tap government authority to obtain a court order that does not name a specialized telephone or e-mail, but allows t hem to tap any phone lines or internet accounts that the suspect uses.Electronic Communication Privacy Act of 1986 (ECPA, U.S Code Title 18, part 2, Chapter 206) standards for access to stored e-mail and different electronic communications and records.ECPA amended Title III (Omnibus Crime support and Safe Streets Act of 1968) extended the title IIIs prohibitions against the unauthorized interception (use of persons oral or electronic communications).-this act failed to report emerging technologies such as wireless modems, cellular, data networks, etc. thus, this communication can still be effectuallyintercepted.Foreign Intelligence control Act of 1978 (FISA) allows wiretapping of aliens and citizens in the U.S. based on a finding of probable cause that the target is a member of a foreign terrorist collection or an agent of a foreign power.Executive Order 123333 (U.S. Pres. Reagan, 1982) legal authority for electronic surveillance outside the U.S. It permits intelligence agenci es to intercept communications outside the U.S. without a court order.Communication Assistance for Law Enforcement Act (CALEA, 1994) it covers radio-based data communication. The Federal Communications Commission (FCC) required providers of Internet phone and broadband services to ensure that their equipment can allow police wiretaps. ground forces Patriot Act of 2001 Gives sweeping new powers to Domestic law enforcement and outside(a)ist intelligence agencies. It contains several sunsets that gives the government much more surveillance capability. sunset(a) provisions can terminates itself or portions after a specific meet unless further actions is taken to extend the lawDATA ENCRYPTION cryptogram the science of encoding messages so that except the sender and the think receiving system can understand them. encryption the process of converting an electronic message into a form that can be understood only by the intended recipients. Public appoint encryption system uses two keysMessage recipients public key readily availableMessage recipients private key kept secretPrivate key encryption systemSingle key to encode and decode messagesRSA (named after Rivest, Shamir and Adleman) is a public key encryption algorithm, the basis for much of the security that protects Web consumers and merchants. PGP ( Pretty Good Privacy) uses 128 bit encryption that represents a hail of 2128 . DES (Digital Encryption Standard) the standard for encryption, it employs a 56 bit key that represents 7.21016 . (It can now be crack apply brute methods) AES ( progress Encryption Standards) requires crackers to try as many as 1.11077 combinations.IDENTITY larceny occurs when some(a)one steals key pieces of personal information to gain access to a persons financial accounts. fastest growing form of malingerer in the United States.Phishing is an attempt to steal personal identity data by tricking substance abusers into entering the information on a counterfeit Website. Spear-phishing is a variation in which employees are sent phony e-mails that look like they came from high-level administrators within their organization. Spyware is a term for keystroke-logging software that is downloaded to users computer without nice notice, consent, or control for the user. It creates a record of keystrokes entered into the computer with or without internet and will send to the email of the spy when internet connections are available. personal identity Theft and Assumption Deterrence Act of 1998 the congress passed this act to react identity fraud, making it a federal felony punishable by a prison sentence of 3 -25 years. researchers estimated that 1 of 700 identity crimes were led to conviction.CONSUMER pen Companies openly collect personal information about Internet users. They in any case obtain information without users permission with the use of cookys. marketing firms uses this information in building databases that contains consumer behavioral d ata. They want to know about who the users are, what they like, how they behave, and what motives them to buy. Cookies a text file that a website puts on your hard drive so that it can remember your information later on. Affiliated Websites is a assort or collection of websites served by a single advertising network. 3 Types of Data Ga in that locationdPOST it is entered into a blank fields on an affiliated website when a consumer signs up for a service. GET it reveals what the consumer requested produce in a specific store. Click-Stream Data it is the tracking of the information the user sought and viewed.4 Ways to Limit/Stop deposit Cookies good deal browsers to limit or gibe cookies or browse the web using the incognito browsing mode which will remove all mark of your browsing. Manually delete cookies in your hard drives.Download and install cookie management program.Or use anonymous proxy websites to browse websites.However, some websites lock users to browse in their foliate when cookie is disabled.Personalization software it is used by marketers to optimize the number, frequency and mixture of their ad placements. It is also used to evaluate how visitors react to new ads.Types of Personalization SoftwareRule-based used business rules that are tied to customer provided preferences or online behaviors to determine the most appropriate page views and product information to display. Collaborative Filtering offers consumer recommendations based on the types of product purchased by other people with similar purchasing habits.Types of Personalization Software (Continued)Demographic Filtering it augments polish off stream data and user supplied data with demographics information associated with user vigor codes to make product suggestions. Contextual Commerce associates product promotions and other e-commerce offerings with specific content a user may receive in a new story online.Platforms for Privacy Preferences (P3P) shields users from site that dont provide the level of privacy protectionthey desire. Instead of forcing users to find and read through the privacy policy for each site they visit, P3P software in the computers browser will download the privacy policy for each site, scan it and declare users if the policy does not match their preferences. The World Wide Web Consortium, an international privacy group whose members include Apple, Commerce One, Ericsson, and Microsoft, created P3P and is supporting its development. TREATING CONSUMERS DATA tariff-Strong measures are required to avoid customer relationship problems. Code of Fair Information Practices most widely accepted approach to treating consumers data responsibly. Guidelines of Code of Fair Information Practices and the 1980 OECD an organizations collects only personal information that is necessary to allow its product and services. Company ensures that the information is carefully protected and accessible only by those with a need to know, and that c onsumers can review their own data and make corrections. Company informs customers if it intends to use its information for research or marketing, and it provides a means for them to opt out.Chief Privacy Officer (CPO) executive to oversee data privacy policies and initiatives. Duties of CPOAvoid government regulations and reassure customers that their privacy will be protected. Stop or modify major company marketing initiatives.Training employees about privacy and checking the companies privacy policy for authorization risks. Figuring out if gaps exist and how to fill them.Developing and managing a process for customer privacy disputes.WORKPLACE MONITORINGEmployers monitor workers Ensures that corporate IT enjoyment policy is followedFourth Amendment cannot be used to limit how a private employer treats its employees. Public-sector employees have far greater privacy rights than in the private industry. Privacy advocates want federal legislation To keeps employers from infringing upon privacy rights of employees.SPAMMING the transmission of the same email message to a large number of people. Spammers target individual users with direct email messages, building their mail list by scanning Usenet postings, buying mail lists or searching the web for addresses. extremely inexpensive method of marketing. used by many legitimate organizations. can contain unloved and objectionable materials.Controlling the Assault of Non-Solicited Pornography and Marketing(CAN-SPAM)the act says it is legal to netmail provided that the message meet a few basic requirements (1) spammers cannot disguise identity, (2) there must be a label in the message specifying that it is an ad or solicitation, and (3) include a way that the recipient can stop the receiving of spam. The act failed to slow the flow of spam but instead, it actually change magnitude the flow of spam by legalizing it.ADVANCED SURVEILLANCE TECHNOLOGYAdvanced surveillance technology provide a new data gathering capa bilities, however, these advance can also diminish individuals privacy.Advocates of the technology argue that people have no legitimate expectations of privacy in a public place. Camera Surveillance is one of the most common advanced system used in surveillance nowa solar days. It has the capability to record events, detecting odd behaviour, automatically capturing important events, and used in monitoring day to day events in different places. Facial Recognition SoftwareThere have been numerous experiments with facial recognition software to help identify criminal suspects and other undesirable characters. It has been first tested by the Rampart element of the Los Angeles Police Department and yielded a result. Global Positioning System (GPS)These are chips placed in different devices to monitor locations of theusers. It is useful in spot callers of 911, parents monitoring their children, etc.

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.