Ethics and privacy-Exam 3

Pataasin ang iyong marka sa homework at exams ngayon gamit ang Quizwiz!

electronic communications privacy act

(1986) protects email and VoIP communications by making it illegal to intercept calls or messages without a warrant

Digital Millennium Copyright Act

(1998) implements treaties of the World Intellectual Property Organization (WIPO).

cybersecurity information sharing act

(CISA) created a network where information about cybersecurity threats can be shared between the government and technology companies.

4 categories of intellectual properties

1.Patents 2.Trademarks 3.Copyrights Trade secrets

5 steps of ethical analysis

1.getting the facts 2. determining the affected 3.searching for precedents 4.listing options 5.deciding and preparing for the consequences

Five Dimensions of Ethical Behavior

Information privacy rights, intellectual privacy rights, control and accountability, establishing quality standards, and quality of life.

Wiretap Act

a federal law that protects person-to-person wire, oral, and electronic communications.

cookie

a small text file of information created by a website that the web browser stores on the user's hard disk

children's internet protect act of 2000

addresses children's access to harmful content over the Internet.

USA Freedom Act

allows law enforcement to obtain information about online and offline communications related to terrorist activities without a warrant

US patriot act

allows law enforcement to obtain information about online and offline communications related to terrorist activities without a warrant.

quality of life

as it relates to the digital age refers to ensuring that technological advancements do not detract from one's quality of life

principle of virtues

asks the decision maker to consider what a highly moral person would do when faced with this question

The Principle of Distributive Justice

attempts to distribute rewards equitable to individuals based on their level of effort or productivity level.

packet analyzerss

capture packets transmitted over a network and can be legitimate for routine examination and problem detection or unauthorized which are used to steal information.

spyware

collects information about Internet surfing habits and behaviors.

intellectual property

consists of human knowledge and ideas that are protected by law against unauthorized use.

third party cookies

created by an outside website.

first party cookie

created by the visited website.

control and accountabily

examines how individuals or corporations can be held accountable in case of violations of privacy or intellectual property rights

session cookies

ext files that are stored in temporary memory and are lost when the web browser is closed.

patent

grants an inventor the right to exclude others from the use of an invention for a period of time.

opt-out

has a checked box that says the user agrees to something and to refuse that option, the user must uncheck the box.

structured data

has a defined length, type, and format and includes numbers, dates, or strings and is designed for input into databases.

virtual private network

hides your IP address by running your communications through a secure network.

Digital Millennium Copyright Act

implements treaties of the World Intellectual Property Organization (WIPO) and is comprised of five titles meant to protect intellectual property in digital formats

big data

includes all the analysis tools and processes related to applying and managing large volumes of data.

computer fraud and abuse act

is also referred to as an anti-hacking statute.

internet privacy

is the right of personal privacy concerning the storing, distributing and displaying information concerning oneself via the Internet.

privacy

is your right to control what happens with personal information about you

federal information security management act

outlines a plan to protect government information and assets against cyberthreats and requires each federal agency to develop a plan for information security.

ethics

refers to a framework that allows a person to lead a virtuous life. involves making choices

intellectual privacy rights

refers to creative works such as artwork, literary works, inventions, music, and images using patents, trademarks, and copyrights to protect intellectual property

Establishing Quality Standards

refers to determining what constitutes proper levels of protection of digital information

anti virus software

scans files to identify and remove computer viruses and other malicious programs.

The Universalist Principle-

sounds simple, but often has significant ethical consequences for managers. Simply stated, this principle states that a manager must attempt to determine if this decision is fair for all involved

Keystoke loggers

spyware/surveillance technology that records all actions typed on a keyboard.

The Principle of Moral Rights-

states that some decisions are either morally right or morally wrong. In other words, there exist certain moral values that should always be upheld or never be violated.

The Utilitarian Principle

states that when faced with an ethical dilemma the manager should choose the option that does the greatest good for the most involved. Does the end justify the means?

persistent cookies

stored on the hard drive and only lost if they have an expiration date

opt in

the check box is empty and the user must check the box to agree.

Copyright

the exclusive legal right, given to an originator or an assignee to print, publish, perform, film, or record literary, artistic, or musical material, and to authorize others to do the same.

data

the raw facts that describe the characteristics of an event, object, or set of information.

information privacy rights

this category of ethical dilemmas involves the rights of individuals and organizations to privacy

first amendment

to the U.S. Constitution protects freedom of speech against all levels of government censorship and extends to the Internet.

indirect injury

•cookies and web beacons allow companies to track website visitors' browsing habits

direct inquiry

•directly asking the individual remains the primary method of gathering data

Copyright Infringement

•occurs when the perpetrator uses materials that another person holds exclusive rights to

computer theft

•physical theft of computer or network equipment

third party data purchase

•several large corporations purchase and sell consumer data

software privacy

•similar to copyright infringement, software piracy refers to using licensed computer software without permission

5 principles of ethical decision making

•the principle of moral rights •the principle of virtue •the principle of distributive justice •the universalist principle the utilitarian principle


Kaugnay na mga set ng pag-aaral

Chapter 2: Europeans and Africans Reach the Americas

View Set

Unit 6.1: The Lac Operon and Lactose

View Set

CHAPTER 9 FOOD ALLERGENS AND SPECIAL DIETS

View Set

Data Information Knowledge and Wisdom exam 1

View Set

Human Sexuality: Chapter 6-9 Quiz Questions

View Set

Classicorps job interview - lesson, indefinite pronouns

View Set