Legal and Ethical Issues

Download Report

Transcript Legal and Ethical Issues

Legal and Ethical Issues
Major Topics
 Protecting Programs and Data
 Information and the Law
 Rights of Employees and
Employers
 Software Failures
 Computer Crime
 Privacy
 Ethical Issues in Computer Security
Relationship to Security
 Relationship of topics discussed to
computer security is not always
clear
 Legal and ethical issues involving
computers are often, not always,
security issues
 Example: Ownership of program
code
Legal Issues
 Laws provide a framework in which
security issues can/must be
addressed
 Constraints
 Things you can’t do
 Requirements
 Things you must do
 Frameworks
 Things you can use
Ethical Issues
 Ethics involves generally accepted
standards of proper behavior
 Ethical principle – “an objectively
defined standard of right and wrong”
 Ethical system – “a set of ethical
principles”
 The United States is an ethically
pluralistic society
Ethical Principles
 Consequence-based: teleology
 Egoism
 Utilitarianism
 Rule-based: deontology
 Rule-deontology
 Personal
 Professional codes of ethics
Law and Ethics
 It is possible for an action to be
legal but not ethical
 It is possible for an action to be
ethical but not legal
 What these actions are depends
upon the ethical and legal systems
used
Law and Security
 Law may specify information that must
be kept confidential
 Medical information: HIPAA
 Student information: FERPA
 Law may specify information that must
be released
 FOIA – Freedom of Information Act –
applies to many government records
Privacy Issues
 Combine legal requirements and
social expectations
 Privacy refers to protection/release
of personal information
 Confidentiality refers to
protection/release of information in
general
Personal Story 1: Medical Privacy
 I went for a medical test for osteoporosis.
 The results were shown to me on a
computer screen also containing results
from other patients.
 Clear violation of HIPAA/other privacy rules
 Not a major problem since I did not
recognize/remember any of the names
seen.
Personal Story 2: Password Disclosure
 I was setting up a computer display in a
database course
 When I signed on to the DB system, my
password was displayed.
 So I changed my password.
 Whose fault?
Mine – I should have checked display.
 DB – It should not have displayed password in
clear.

Personal Story 3: Credit Card Theft
 I received a call from local police that my
credit card had been found in possession of
an apparent credit card thief. (He had lots of
stolen cards.)
 I got a new credit card/number.
 No improper charges were made.
 Whose fault:
Thief – He stole it!
 Mine – I could have kept better track of the card.

Personal Story 4: Another Credit
Card Theft
 I received a notification that I was to be sent a
new AMEX card and did not get it even
though my husband got his.
 AMEX notified me that my card was showing
unusual usage patterns.
 Multiple charges were posted that I had not
made.
 Card apparently stolen from mailbox.
Personal Story 4 (continued)
 AMEX removed improper charges.
 I received a new card.
 I did not receive any information about
eventual outcome of situation.
 Note redundancy in system:
 Mail notification of card issuance.
 Tracking of usage patterns.
Some Privacy Issues
 Identity theft
 Data mining
 Carnivore
 Passport
 Anonymity
 Computer voting
 E.U. Data Protection Act (personal data)
 Gramm-Leach-Bliley (financial information)
 HIPAA (health information)
Some Privacy Laws
 US Privacy Act
 US Electronic Communications Privacy Act
 US Patriot Act
Software Ownership
Protecting information about
software
Possible protection mechanisms:
 Trade
secret
 Copyright (DMCA)
 Patent
Trade Secret
 Confidential business information
 Must be kept secret
 Coke formula
 Diebold code for DREs
 Trade secrets may be lost
 Independent discovery
 Reverse engineering
Copyright
 Protect expressions of ideas
 But
not the ideas themselves
 Limited time period
 Programs may be copyrighted
 DMCA – Digital Millennium Copyright Act
 Copy protection mechanisms
 Sony-BMG XCP
Patents
 Patents protect inventions
 Novel
 Nonobvious
 Computer programs
 Patents allowed since 1981
 Controversial
 Almost 40 years of prior art
Who Owns Software?
 The developer
 Company?
 Individual?
 Considerations
 Employment contract
 Work for hire
 Relationship to employment
 License
Criminal vs. Civil Law
 Criminal law – actions against the
state
 Statutes
 Civil law – actions against
individuals/other private entities
 Precedents
 Contract law – actions in violation of a
contract
How are Computer Crimes
Different from Other Crimes?
Unfamiliarity of criminal justice
system with computers and
computer terminology
Need to deal with intangible and
easily copied property
International Issues
 Laws are different in different
countries.
 Computer networks are international.
 Who has “jurisdiction” over a
computer crime?
 Can software/data be effectively
excluded?
 Privacy
concerns
 Cryptography