Ethics and privacy-Exam 3
electronic communications privacy act
(1986) protects email and VoIP communications by making it illegal to intercept calls or messages without a warrant
Digital Millennium Copyright Act
(1998) implements treaties of the World Intellectual Property Organization (WIPO).
cybersecurity information sharing act
(CISA) created a network where information about cybersecurity threats can be shared between the government and technology companies.
4 categories of intellectual properties
1.Patents 2.Trademarks 3.Copyrights Trade secrets
5 steps of ethical analysis
1.getting the facts 2. determining the affected 3.searching for precedents 4.listing options 5.deciding and preparing for the consequences
Five Dimensions of Ethical Behavior
Information privacy rights, intellectual privacy rights, control and accountability, establishing quality standards, and quality of life.
Wiretap Act
a federal law that protects person-to-person wire, oral, and electronic communications.
cookie
a small text file of information created by a website that the web browser stores on the user's hard disk
children's internet protect act of 2000
addresses children's access to harmful content over the Internet.
USA Freedom Act
allows law enforcement to obtain information about online and offline communications related to terrorist activities without a warrant
US patriot act
allows law enforcement to obtain information about online and offline communications related to terrorist activities without a warrant.
quality of life
as it relates to the digital age refers to ensuring that technological advancements do not detract from one's quality of life
principle of virtues
asks the decision maker to consider what a highly moral person would do when faced with this question
The Principle of Distributive Justice
attempts to distribute rewards equitable to individuals based on their level of effort or productivity level.
packet analyzerss
capture packets transmitted over a network and can be legitimate for routine examination and problem detection or unauthorized which are used to steal information.
spyware
collects information about Internet surfing habits and behaviors.
intellectual property
consists of human knowledge and ideas that are protected by law against unauthorized use.
third party cookies
created by an outside website.
first party cookie
created by the visited website.
control and accountabily
examines how individuals or corporations can be held accountable in case of violations of privacy or intellectual property rights
session cookies
ext files that are stored in temporary memory and are lost when the web browser is closed.
patent
grants an inventor the right to exclude others from the use of an invention for a period of time.
opt-out
has a checked box that says the user agrees to something and to refuse that option, the user must uncheck the box.
structured data
has a defined length, type, and format and includes numbers, dates, or strings and is designed for input into databases.
virtual private network
hides your IP address by running your communications through a secure network.
Digital Millennium Copyright Act
implements treaties of the World Intellectual Property Organization (WIPO) and is comprised of five titles meant to protect intellectual property in digital formats
big data
includes all the analysis tools and processes related to applying and managing large volumes of data.
computer fraud and abuse act
is also referred to as an anti-hacking statute.
internet privacy
is the right of personal privacy concerning the storing, distributing and displaying information concerning oneself via the Internet.
privacy
is your right to control what happens with personal information about you
federal information security management act
outlines a plan to protect government information and assets against cyberthreats and requires each federal agency to develop a plan for information security.
ethics
refers to a framework that allows a person to lead a virtuous life. involves making choices
intellectual privacy rights
refers to creative works such as artwork, literary works, inventions, music, and images using patents, trademarks, and copyrights to protect intellectual property
Establishing Quality Standards
refers to determining what constitutes proper levels of protection of digital information
anti virus software
scans files to identify and remove computer viruses and other malicious programs.
The Universalist Principle-
sounds simple, but often has significant ethical consequences for managers. Simply stated, this principle states that a manager must attempt to determine if this decision is fair for all involved
Keystoke loggers
spyware/surveillance technology that records all actions typed on a keyboard.
The Principle of Moral Rights-
states that some decisions are either morally right or morally wrong. In other words, there exist certain moral values that should always be upheld or never be violated.
The Utilitarian Principle
states that when faced with an ethical dilemma the manager should choose the option that does the greatest good for the most involved. Does the end justify the means?
persistent cookies
stored on the hard drive and only lost if they have an expiration date
opt in
the check box is empty and the user must check the box to agree.
Copyright
the exclusive legal right, given to an originator or an assignee to print, publish, perform, film, or record literary, artistic, or musical material, and to authorize others to do the same.
data
the raw facts that describe the characteristics of an event, object, or set of information.
information privacy rights
this category of ethical dilemmas involves the rights of individuals and organizations to privacy
first amendment
to the U.S. Constitution protects freedom of speech against all levels of government censorship and extends to the Internet.
indirect injury
•cookies and web beacons allow companies to track website visitors' browsing habits
direct inquiry
•directly asking the individual remains the primary method of gathering data
Copyright Infringement
•occurs when the perpetrator uses materials that another person holds exclusive rights to
computer theft
•physical theft of computer or network equipment
third party data purchase
•several large corporations purchase and sell consumer data
software privacy
•similar to copyright infringement, software piracy refers to using licensed computer software without permission
5 principles of ethical decision making
•the principle of moral rights •the principle of virtue •the principle of distributive justice •the universalist principle the utilitarian principle