Ethics IS Exam 2

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

OECD fair information practices guidelines are composed of eight principles:

Collection limitation Data quality Purpose specification Use limitation Security safeguards Openness principle Individual participation Accountability

Freedom of Speech includes:

- Nonverbal, visual, and symbolic forms of expression, including: flag burning, dance movements, and hand gestures -The right to speak anonymously

European-United States Privacy Shield Data Transfer Program Guidelines

- Replaced the Safe Harbor agreement between the U.S. and EU, which was declared invalid by the European Court of Justice - Places stronger obligations on U.S. companies to protect the personal data of EU citizens and requires stronger enforcement by U.S. agencies

Fake News

- journalism - Nontraditional sources of news and information Blogs—Some bloggers report on things about which they are very passionate. As a result, they may be less likely to remain unbiased. Fake news sites—Some sites modify real news stories to entice viewers to click on them. Others create entirely fictitious "news" stories and present them as fact. Social media sites—Because reports, images, opinions, and videos shared via social media often spread like wildfire, they can sometimes cause confusion, misunderstanding, and controversy, rather than bringing clarity to a situation

Executive order:

-An official document used by the U.S. president to manage the operations of the federal government -Subject to judicial review, and may be struck down if determined to be unsupported by statute or the Constitution

Obscene Speech (Miller v. California)

-Established a test to determine if material is obscene -Speech can be considered obscene if: 1. The average person finds that the work, taken as a whole, appeals to the prurient interest 2. The work depicts or describes, in a patently offensive way, sexual conduct specifically defined by the applicable state law 3. The work, taken as a whole, lacks serious literary, artistic, political, or scientific value

General Agreement on Tariffs and Trade (GATT)

-Multilateral agreement governing international trade -Established the World Trade Organization (WTO) -Despite GATT, copyright protection varies greatly from country to country

Freedom of Speech Doesn't Protect

-Perjury and fraud -Defamation and obscene speech -Incitement of panic and incitement to crime -Fighting Words and sedition

Criticisms of consumer profiling:

-Personal data may be gathered and sold to other companies without the permission of consumers who provide the data -Risk of a data breach: The unintended release of sensitive data or the access of sensitive data (e.g., credit card numbers or Social Security numbers) by unauthorized individuals -Risk of identity theft: The theft of personal information, which is then used without the owner's permission—often to commit fraud or other crimes

Information about web surfers can be obtained through the use of:

-Voluntary methods: Website registrations, survey, contests, and social media -Cookies: Text files that can be downloaded to the hard drives of users who visit a website, so that the website is able to identify visitors on subsequent visits -Tracking software: Allows a website to analyze browsing habits and deduce personal interests and preferences

Surveillance Technology

1. Camera surveillance 2. Facial Recognition: Used in major cities around the world to deter crime and terrorist activities -Criticism: Such scrutiny is a violation of civil liberties and the cost of the equipment and people required to monitor the video feeds is excessive

Key Issues with Freedom of Expression

1. Controlling access to information on the Internet 2. Internet censorship 3. SLAPP lawsuits 4. Anonymity on the Internet 5. John Doe lawsuits 6. Hate speech 7. Pornography on the Internet 8. Fake news

Electronic Surveillance Timeline

1968-Title III of Omnibus Crime Control and Safe Streets Act 1978-Foreign Intelligence Surveillance Act 1981-Executive Order 12333 1986-Electronic Communications Privacy Act 1994- Communications Assistance for Law Enforcement 2001-USA Patriot Act 2004-Foreign Intelligence Surveillance Act Amendment 2008-Foreign Intelligence Surveillance Act Amendment 2011-PATRIOT Extension 2015-USA Freedom

American Recovery and Reinvestment Act

: Includes provisions related to electronic health records (EHRs): -Bans the sale of health information -Promotes the use of audit trails and encryption -Provides rights of access for patients

FISA Court:

A court established by FISA that meets in secret to hear applications for orders approving electronic surveillance anywhere within the U.S. -Between 2001 and 2015 -More than 25,000 applications were submitted to the FISA court -Only 12 of those were rejected

Pen register:

A device that records electronic impulses to identify the numbers dialed for outgoing calls

Trap and trace:

A device that records the originating number of incoming calls for a particular phone number

Vehicle event data recorder (EDR):

A device that records vehicle and occupant data for a few seconds before, during, and after any vehicle crash severe enough to deploy the vehicle's air bags Purposes: - To capture and record data to make changes to improve vehicle performance - For use in a court of law to determine what happened during a vehicle accident

Wiretap Act:

A law that regulates the interception of wire (telephone) and oral communications; also known as the Title III of the Omnibus Crime Control and Safe Streets Act

Strategic Lawsuit Against Public Participation (SLAPP):

A lawsuit employed by corporations, government officials, and others against citizens and community groups who oppose them on matters of public interest

John Doe lawsuit:

A lawsuit filed by an aggrieved party against a defendant whose identity is temporarily unknown because the person is communicating anonymously or using a pseudonym Plaintiff can request court permission to issue subpoenas to command a person to appear If permission is granted, subpoenas can be served on any third party that may have information about the true identity of the defendant

Predictive coding:

A process that couples human guidance with computer-driven concept searching in order to "train" document review software to recognize relevant documents

Fair information practices:

A set of guidelines that govern the collection and use of personal data

Copyright infringement:

A violation of the rights secured by the owner of a copyright Sonny Bono Copyright Term Extension Act (p.225) Establishes time limits for copy right protected work Copyright law guarantees developers the rights to their works for a certain amount of time. Since 1960, the term of copyright has been extended 11 times; new works are protected for the life of the author plus 70 years. Eligibility criteria: Work must be original and fall within one of the categories described in Title 17 of the U.S. Code

Libel

A written defamatory statement

Fair and Accurate Credit Transactions Act

Allows consumers to obtain a free credit report once each year from each of the three primary consumer credit reportign companies (equifax, experian, transunion) (consumers can place an alert on their credit files if they are victim of fraud/identity theft)

Fair use doctrine:

Allows portions of copyrighted materials to be used without permission - Court decisions regarding fair use are based on four factors: - Purpose and character of the use - Nature of the copyrighted work - The portion of the work used in relation to the whole - Effect of the use on the value of the copyrighted work

General Data Protection Regulation (GDPR):

An EU regulation passed in 2016; designed to strengthen data protection for individuals within the EU -Organizations anywhere in the world that collect, store, or transfer personal data of EU citizens must ensure their systems and procedures are compliant

Slander

An oral defamatory statement

Electronically stored information (ESI):

Any form of digital information stored on any form of electronic storage device

Open source code:

Any program whose source code is made available for use or modification, as users or other developers see fit Advocates believe open source code produces better software than the traditional closed model

Family Educational Rights and Privacy Act (FERPA)

Assigns parents rights regarding their children's educational records, including rights to: -Access educational records maintained by a school -Demand that educational records be disclosed only with student consent -Amend educational records -File complaints against a school for disclosing student records

Foreign Intelligence Surveillance Act Amendments Act (2004)

Authorized intelligence gathering on individuals not affiliated with any known terrorist organization (so-called lone wolves)

Gramm-Leach-Bliley Act (GLBA)

Bank deregulation law that includes three personal privacy rules 1. financial privacy rule: mandatory guidelines for the collection and disclosure of personal financial data (can opt out and opt in) 2. Safeguard rule: Requires financial institutions to document a data security plan to protect personal data 3. Pretexting rule: addresses attempts by people to access personal information without proper authority

Trade secret:

Business information that has the following qualities: -Represents something of economic value -Required effort or cost to develop -Has some degree of uniqueness or novelty -Is generally unknown to the public -Is kept confidential -Trade secret law protects only against the misappropriation of trade secrets -Trade secret laws protect more technology worldwide than patent laws do.

Famous Supreme Court Cases for Hate Speech and Fighting Words

Chaplinsky vs New Hampshire: articulated the fighting words doctrine, a limitation of the First Amendment's guarantee of freedom of speech Terminielllo vs Chicago: forbid breach of peace and and speech that stirs up the public violates the ordinance

Pornography on the Internet

Companies must take reasonable steps to prevent pornography in the workplace: -Establish and communicate an AUP that prohibits access to pornography sites -Identify and take disciplinary action against those who violate the policy -Possession of child pornography is a federal offense punishable by up to five years in prison -Some states require computer technicians who discover child pornography on clients' computers to report it to law enforcement officials -Sexting: Sending sexual messages, nude, or seminude photos, or sexually explicit videos over a cell phone -Sexters may face prosecution for child pornography

Form of Intellectual Property

Copyright: Computer programs are protected as literary works. -Authors of computer programs and producers of sound recordings have the right to prohibit the commercial rental of their works to the public. Patent: - Patent protection is available for any invention, whether a product or process. -Discrimination is not allowed based on the place of invention. Trade Secret: -Trade secrets must be protected against breach of confidence and other acts that are contrary to honest commercial practices.

Patent infringement: Unauthorized use of another's patent

Courts can award up to three times the amount of damages claimed by the patent holder if infringement is found

Foreign Intelligence Surveillance Act (FISA):

Describes procedures for electronic surveillance and collection of foreign intelligence information in communications between foreign powers and their agents -Allows surveillance, without court order, within the U.S. for up to a year unless the surveillance will acquire the contents of any communication to which a U.S. citizen, permanent resident, or company is a party -Requires the government to obtain an individualized court order before it can intentionally target a U.S. person anywhere in the world

Doxing:

Doing research online to obtain someone's private personal information—such as home address, email address, phone numbers, and place of employment and then posting that information online May be done as an act of revenge or to publicly shame someone who has been operating anonymously online

Cross-licensing agreements

Each party agrees not to sue the other over patent infringements Typically involves large software companies Small businesses, therefore, often must pay additional costs. Small businesses are also generally unsuccessful in enforcing their patents against larger companies.

Greatest Threat to Loss of Company Trade Secrets

Employees

Leahy-Smith America Invents Act (2011):

Enacted a major change in patent law; changed U.S. patent system from a "first-to-invent" to a "first-inventor-tofile" system -Also expanded the definition of prior art used to determine the novelty of an invention and whether it can be patented -The law made it more difficult to obtain a U.S. patent.

European Union Data Protection Directive:

Ensures that data transferred to non-European Union countries is protected - Only U.S. companies certified as meeting certain "safe harbor" principles were allowed to process and store data of European consumers and companies.

Freedom of Information Act (FOIA):

Grants citizens the right to access certain information and records of federal, state, and local governments upon request -Two basic requirements for a FOIA request: The request must not require wide-ranging, unreasonable, or burdensome searches for records -The request must be made according to procedural regulations published in the Federal Register

Children's Online Privacy Protection Act (COPPA):

Gives parents control over the collection, use, and disclosure of their children's personal information over the Internet

Patents

Grant of a property right issued by the United States Patent and Trademark Office (USPTO) to an inventor Prevent independent creation and copying Require filing application with USPTO (Before granting a patent, the USPTO searches the prior art (the existing body of knowledge available to a person of ordinary skill in the art, including existing patents and published material). The following cannot be patented (Abstract ideas, Laws of nature, Natural phenomenon)

Foreign Intelligence Surveillance Act of 1978 Amendments Act of 2008

Granted NSA expanded authority to collect (without court approved warrants) international communications as they flow through U.S. telecom network equipment and facilities

Actions that schools can take to combat student plagiarism:

Help students understand what constitutes plagiarism and why they need to cite sources Show students how to document material found online Schedule major writing assignments in portions due over the course of the term Tell students that instructors are aware of Internet paper mills and plagiarism detection services Incorporate detection software and services

Executive Order 12333:

Identifies the various U.S. governmental intelligence-gathering agencies, and defines what information can be collected, retained, and disseminated by these agencies

•Digital Millennium Copyright Act (1998):

Implements the WIPO Copyright Treaty and the WIPO Performances and Phonograms Treaty Unlike traditional copyright law, the DMCA does not govern copying; it focuses on the distribution of tools and software that can be used for copyright infringement. The DMCA explicitly outlaws technologies that can defeat copyright protection devices, but it does permit reverse engineering for encryption, interoperability, and computer security research.

Prioritizing Resources and Organization for Intellectual Property (PRO-IP) Act of 2008:

Increased trademark and copyright enforcement and substantially increased penalties for infringement

Intellectual property:

Intellectual property: Describes works of the mind that are distinct and owned or created by a single person or group - Art and music - Books and film - Formulas, inventions and processes Intellectual property is protected through: - Copyright - Patent - Trade secret laws Owners control and receive compensation for the use of their intellectual property

Organization for Economic Co-operation and Development (OECD):

International organization that sets policies and produces agreements on topics for which multilateral consensus is required

National Security Letter (NSL):

Issued by the FBI director to an ISP; requires the ISP to provide various data and records about a service subscriber. - Compels holders of your personal records to turn them over to the government -Not subject to judicial review or oversight -NSL gag provision: Prohibits NSL recipients from revealing that the government has requested an individual's records

Tools used to guard against Plagiarism

Ithenticate Turnitin SafeAssign

Telecommunications Act:

Its goal was to promote free competition among phone, cable, and TV companies

Electronic Communications Privacy Act (ECPA):

Law passed as an amendment to Title III of the Omnibus Crime Control and Safe Streets Act; deals with three main issues: -Protection of communications while in transfer from sender to receiver -Protection of communications held in electronic storage -Prohibition of devices from recording dialing, routing, addressing, and signaling information without a search warrant

USA Freedom Act:

Law passed following revelations by Edward Snowden (a former government contractor who leaked classified information) of secret NSA surveillance programs -Terminated NSA's bulk collection of telephone metadata -Telecommunications providers are now required to hold that data and respond to NSA queries

PATRIOT Sunsets Extension Act of 2011:

Law that granted a four-year extension of roving wiretaps and searches of business records; also extended authorized intelligence gathering on "lone wolves"

Communications Decency Act (CDA):

Title V of the Telecommunications Act; aimed at protecting children from pornography In June 1997, much of the CDA was ruled unconstitutional by the U.S. Supreme Court Section 230 of the CDA: Not declared unconstitutional, provides immunity to an ISP that publishes user-generated content—provided its actions do not rise to the level of a content provider

Key advantages of Trade Secrets:

No time limitations on the protection of trade secrets No need to file an application, make disclosures to any person or agency, or disclose a trade secret to outsiders to gain protection Trade secrets cannot be ruled invalid by the courts

Anonymous expression:

Opinions expressed by people who do not reveal their identity

Non-compete agreement:

Part of an employment contract that prohibits an employee from working for any competitors for a period of time

Nondisclosure clause:

Part of an employment contract that specifically prohibits an employee from revealing company secrets

Digital Millennium Copyright Act (DMCA):

Passed in 1998; addresses a number of copyright-related issues Title II of the act limits the liability of an ISP for copyright infringement if an ISP subscriber posts copyrighted material. An ISP cannot be held liable for copyright infringement if, when notified by the copyright holder, it notifies the subscriber of the alleged infringement and executes a "takedown" by removing the offending content.

Child Online Protection Act (COPA):

Passed in 1998; imposes penalties for exposing minors to harmful material online In June 2004, COPA was ruled unconstitutional by the U.S. Supreme Court

Children's Internet Protection Act (CIPA):

Passed in 2000; requires federally financed schools and libraries to block computer access to obscene material, pornography, and anything else harmful to minors

Anti-SLAPP laws:

Passed in 28 states and the District of Columbia Designed to reduce frivolous SLAPPs

Hate speech:

Persistent or malicious harassment aimed at a specific person Most ISPs reserve the right to remove content that does not meet their standards Public schools and universities must follow the First Amendment's prohibition against speech restrictions. Corporations and private schools/universities may prohibit employees and students from engaging in offensive speech using corporate- or school-owned computers, networks, or email services.

First Amendment

Protects Americans' rights to freedom of religion, freedom of expression, and freedom to assemble peaceably

Software patent:

Protects a feature, function, or process embodied in instructions executed on a computer In recent years, the courts have become more restrictive in granting software patents.

Software patents

Protects feature, function, or process embodied in instructions executed on a computer

Software copyright protection

Proving infringement requires showing striking resemblance that could be explained only by copying

Health Insurance Portability and Accountability Act (HIPAA)

Provisions designed to... - Improve the portability and continuity of health insurance coverage -Reduce fraud, waste, and abuse in health insurance and healthcare delivery -Simplify the administration of health insurance

Controlling the Assault of Non-Solicited Pornography and Marketing (CANSPAM) Act:

Specifies requirements that commercial emailers must follow when sending messages to advertise or promote a commercial product or service Key requirements From and To fields in the email and the originating domain name and email address must be accurate Subject line of the email cannot mislead the recipient as to the contents or subject matter of the message If the message contains sexually-oriented material, the phrase "SEXUALLY-EXPLICIT" must appear in the subject

Defamation

Statement of alleged fact that is false and harms another person

Anonymous remailer service:

Strips originating header and/or IP number from emails before sending the message to its intended recipient

Title III of the Omnibus Crime Control and Safe Streets Act:

Regulates the interception of wire and oral communications. Also known as the Wiretap Act. Allows state and federal law enforcement officials to use wiretapping and electronic eavesdropping if a warrant is issued

Fair Credit Reporting Act

Regulates the operations of credit-reporting bureaus

Communications Assistance for Law Enforcement Act (CALEA):

Required the telecommunications industry to build tools into its products for use by federal investigators, after obtaining a court order, to intercept communications -USA PATRIOT Act: Gave sweeping new powers to both domestic law enforcement and U.S. international intelligence agencies -Increased their ability to search telephone, email, medical, financial, and other records -Passed five weeks after the terrorist attacks of September 11, 2001

Right of Privacy

Right to be left alone, most comprehensive of rights, most valued by free people

Privacy Act:

Sets rules for the collection, use, and dissemination of personal data kept by federal agencies -Prohibits U.S. government agencies from concealing the existence of any personal data record-keeping system

Internet filter:

Software that blocks access to certain websites that contain material deemed inappropriate or offensive Uses a combination of URL, keyword, and dynamic content filtering

Stalking app:

Software that can be loaded onto a cell phone or smartphone - Performs location tracking, records calls, views text messages sent or received, and records the URLs of any website visited on the phone - Illegal to install the software on a phone without the permission of the phone owner - Performs location tracking, records calls, views text messages sent or received, and records the URLs of any website visited on the phone - Illegal to install the software on a phone without the permission of the phone owner

Bill of Rights

Ten amendments that were ratified to protect the privacy of individuals

Plagiarism:

The act of stealing someone's ideas or words and passing them off as one's own

Electronic discovery (e-discovery):

The collection, preparation, review, and production of electronically stored information for use in criminal and civil actions

Information Privacy

The combination of communications privacy (the ability to communicate with others without those communications being monitored by other persons or organizations) and data privacy (the ability to limit access to one's personal data by others)

Internet censorship:

The control or suppression of the publishing or accessing of information online Speech on the Internet requires a series of intermediaries to reach its audience with each intermediary vulnerable to some degree of pressure from those who want to silence the speech Different Forms: - Limiting access to certain websites - Allowing access to only some content or to modified content at certain websites - Rejecting the use of certain keywords in online searches - Tracking the Internet activities of individuals - Jailing individuals for their Internet use - Deregistering a domain that hosts content deemed inappropriate or illegal - Think about Amazon, Twitter and Facebook policies

Copyright:

The exclusive right to distribute, display, perform, or reproduce an original work in copies, or to prepare derivative works based on the work

Transborder data flow:

The flow of personal data across national boundaries -Fair information practices form the underlying basis for many national laws addressing data privacy and data protection issues

Reverse engineering:

The process of taking something apart in order to understand it, build a copy of it, or improve it Applicable for both hardware and software Violates copyright and trade secret laws Software license agreements typically forbid reverse engineering. The courts have ruled in favor of using reverse engineering to enable interoperability. Reverse engineering can also be a useful tool in detecting software bugs and security holes

Fourth Amendment

The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall not be violated, and no Warrants shall issue, but upon probable cause, supported by Oath or affirmation, and particularly describing the place to be searched, and the persons or things to be seized. The Fourth Amendment does not limit how a private employer treats its employees State privacy statutes tend to favor employers over employees

Reasons for developing open source code:

To earn respect for solving a problem To pay back the developer community To promote expertise and/or attract new clients To recover maintenance cost To avoid the hassle of license and marketing

Criticisms of CIPA:

Transferred power over education to the software companies that develop the Internet filters. Some filters are ineffective. Penalties resulting in a loss of federal funds could lead to a less capable version of the Internet for students at poorer schools

US Trade Secret Laws

Uniform Trade Secrets Act (UTSA): Established uniformity across the states in area of trade secret law Economic Espionage Act (EEA) of 1996: Imposes penalties for the theft of trade secrets Defend Trade Secrets Act of 2016: Amended the EEA to create a federal civil remedy for trade secret misappropriation -Allows for seizure of property under certain conditions to prevent dissemination of the misappropriated trade secret

Cyberloafing:

Using the Internet for purposes unrelated to work, such as posting to Facebook, sending personal emails or texts, or shopping online - Private employers may legally monitor employees' use of any employer-provided mobile phone or computing device

Right to Financial Privacy Act

protects the records of financial institution customers from unauthorized scrutiny by the federal government (does not cover disclosures to private businesses or state/local governments)


संबंधित स्टडी सेट्स

[Chapter 8 - System Management 2] TestOut PC Pro

View Set

jacob miller language arts 800 3

View Set

health and illness II practice questions exam 1

View Set