Information Technology - Ethics
The US Patriot Act
A U.S. federal act that broadens the surveillance of law enforcement agencies to enhance the detection and suppression of terrorism
Structured Data
Data that (1) are typically numeric or categorical; (2) can be organized and formatted in a way that is easy for computers to read, organize, and understand; and (3) can be inserted into a database in a seamless fashion.
Digital Millennium Copyright Act of 1998
Refines copyright laws to protect digital versions of copyrighted materials, including music and movies
Big Data
The use of very large volumes of structured and unstructured data from a variety of sources to gain new insights.
The Children's Internet Protection Act of 2000 (CIPA)
addresses children's access to harmful content over the internet
Cybersecurity Information Sharing Act (CISA)
allows private companies to share threat warnings with the federal government
Indirect Tracking
cookies and web beacons allow companies to track website visitors browsing habits
Third-Party Cookies
created by a website other than the one you are currently visiting and are used to track your surfing habits
First-Party Cookies
created by a website you visit and keep track of your personal preferences and the current web browsing session
Direct Inquiry
directly asking the individual remains the primary method of gathering data
Control and Accountability
examines how individuals or corporations can be held accountable in case in violations of privacy or intellectual property rights
Title 4 of the Digital Millennium Copyright - title contains miscellaneous provisions for digital copyrights
facilitates distance learning by allowing educational institutions latitude with regard to the use of copyrighted material
Keystroke Loggers
form of spyware that records the keys pressed on a keyboard and can be software or hardware devices
copyright infringement
occurs when the perpetrator uses materials that another person holds exclusive rights to
The Federal Information Security Management (FISMA)
outlines a plan to protect government information and assets against cyber threats
Computer Theft
physical theft of computer or network equipment
The Electronic Communications Privacy Act of 1986
protects email and VoIP communicates by making it illegal to intercept calls or messages without a warrant
Title 2 of the Digital Millennium Copyright - The Online Copyright Infringement Liability Limitation
protects internet service providers from being used for copyright infringement when the ISP's user wrongfully copies items from the internet
The Wiretap Act
protects person-to-person wire, oral, and electronic communications
Intellectual Privacy Rights
refer to creative works such as artwork, literary works inventions, music, and images using patents, trademarks, and copyrights to protect intellectual property.
Establishing Quality Standards
refers to determining what constitutes proper levels of protection of digital information
Quality of Life
relates to the digital age refers to ensuring that technological advancements do not detract from one's qualify of life.
Title 1 of the Digital Millennium Copyright
requires that measures be taken to make it difficult to copy analog video recordings
Internet Privacy
right of personal privacy concerning the storing, distributing and displaying information concerning oneself via the internet
computer ethics
set of moral principles that regulate the use of computers
Third Party Data Purchase
several large corporations purchase and sell consumer data
Spyware
software that enables a user to obtain covert information about another's computer activities by transmitting data covertly from their hard drive.
Packet Sniffers
specialized hardware or software that captures packets transmitted over a network
software piracy
the illegal copying or use of computer programs
Information Privacy Rights
the rights of individuals and organizations to privacy
Opt-in and Opt-out
to common methods of gaining consumer permission to access their information or track their behavior
Privacy
your right to control what happens with personal information about you