Information Technology - Ethics

¡Supera tus tareas y exámenes ahora con Quizwiz!

The US Patriot Act

A U.S. federal act that broadens the surveillance of law enforcement agencies to enhance the detection and suppression of terrorism

Structured Data

Data that (1) are typically numeric or categorical; (2) can be organized and formatted in a way that is easy for computers to read, organize, and understand; and (3) can be inserted into a database in a seamless fashion.

Digital Millennium Copyright Act of 1998

Refines copyright laws to protect digital versions of copyrighted materials, including music and movies

Big Data

The use of very large volumes of structured and unstructured data from a variety of sources to gain new insights.

The Children's Internet Protection Act of 2000 (CIPA)

addresses children's access to harmful content over the internet

Cybersecurity Information Sharing Act (CISA)

allows private companies to share threat warnings with the federal government

Indirect Tracking

cookies and web beacons allow companies to track website visitors browsing habits

Third-Party Cookies

created by a website other than the one you are currently visiting and are used to track your surfing habits

First-Party Cookies

created by a website you visit and keep track of your personal preferences and the current web browsing session

Direct Inquiry

directly asking the individual remains the primary method of gathering data

Control and Accountability

examines how individuals or corporations can be held accountable in case in violations of privacy or intellectual property rights

Title 4 of the Digital Millennium Copyright - title contains miscellaneous provisions for digital copyrights

facilitates distance learning by allowing educational institutions latitude with regard to the use of copyrighted material

Keystroke Loggers

form of spyware that records the keys pressed on a keyboard and can be software or hardware devices

copyright infringement

occurs when the perpetrator uses materials that another person holds exclusive rights to

The Federal Information Security Management (FISMA)

outlines a plan to protect government information and assets against cyber threats

Computer Theft

physical theft of computer or network equipment

The Electronic Communications Privacy Act of 1986

protects email and VoIP communicates by making it illegal to intercept calls or messages without a warrant

Title 2 of the Digital Millennium Copyright - The Online Copyright Infringement Liability Limitation

protects internet service providers from being used for copyright infringement when the ISP's user wrongfully copies items from the internet

The Wiretap Act

protects person-to-person wire, oral, and electronic communications

Intellectual Privacy Rights

refer to creative works such as artwork, literary works inventions, music, and images using patents, trademarks, and copyrights to protect intellectual property.

Establishing Quality Standards

refers to determining what constitutes proper levels of protection of digital information

Quality of Life

relates to the digital age refers to ensuring that technological advancements do not detract from one's qualify of life.

Title 1 of the Digital Millennium Copyright

requires that measures be taken to make it difficult to copy analog video recordings

Internet Privacy

right of personal privacy concerning the storing, distributing and displaying information concerning oneself via the internet

computer ethics

set of moral principles that regulate the use of computers

Third Party Data Purchase

several large corporations purchase and sell consumer data

Spyware

software that enables a user to obtain covert information about another's computer activities by transmitting data covertly from their hard drive.

Packet Sniffers

specialized hardware or software that captures packets transmitted over a network

software piracy

the illegal copying or use of computer programs

Information Privacy Rights

the rights of individuals and organizations to privacy

Opt-in and Opt-out

to common methods of gaining consumer permission to access their information or track their behavior

Privacy

your right to control what happens with personal information about you


Conjuntos de estudio relacionados

ECE 335 UTK Dr. McFarlane Final Exam Concept Review

View Set

section 3 ok landlord tenant act

View Set

Med Surg: Chapter 33: Nursing Management: Patients With Breast and Female Reproductive Disorders: PREPU

View Set

Chapter 5 Business Finance Smartbook

View Set

Wireless Network Interfaces Lecture 2

View Set

CIS 2200 Homework 6 (Chapter 10,11,12)

View Set

Physiology Review Questions: The Body Fluids and Kidneys

View Set