Legal Issues To Privacy
Legal Issues To Privacy
Legal Issues To Privacy
Public Policy:
From Legal Issues to Privacy
Learning Objectives
● Code of Ethics
● Many companies and professional
organizations develop their own codes of
ethics
● A collection of principles intended as a
guide for its members
● A guide for members of a company or an
association
9
Organize IT Ethical Issues into a
Framework
● Privacy ● Property
● Collection, storage, ● Ownership and
and dissemination of value of information
information about and intellectual
individuals property
● Accuracy ● Accessibility
● Authenticity, fidelity, ● Right to access
and accuracy of information and
information payment of fees to
collected and access it
processed
10
Protecting Privacy
● Privacy
● The right to be left alone and the right to
be free of unreasonable personal
intrusions
● Information Privacy
● The “claim of individuals, groups, or
institutions to determine for themselves
when, and to what extent, information
about them is communicated to others”
11
Protecting Privacy (cont.)
● Two rules
● The right of privacy is not absolute.
Privacy must be balanced against the
needs of society.
● The public’s right to know is superior
to the individual’s right of privacy.
12
How is Private Information
Collected?
● Registration Questionnaires
●type in private information in order to
receive a password to participate in a
lottery, to receive information, or to play
a game
● Uses of the Private Information
●collected for planning the business
●may be sold to a third party
●used in an inappropriate manner
14
From the Eighth User Survey by
GVU (1988)
16
Cookies
Cook (cont.)
20
Electronic Surveillance - Monitoring
Computer Users
● Tens of millions of computer users are
monitored, many without their knowledge
● Employees have very limited protection
against employers’ surveillance
● Personal Information in Databases
● Databases of banks and financial institutions; cable
TV; telephone ; employers; schools; insurance
companies; and online vendors
● Concerns
● Under what circumstances will personal data be released?
● Do you know where the records are?
● How are the data used?
21
Privacy Policy Basics
● Data Collection ● Data Accuracy ● Data Confidentiality
● Sensitive data gathered on
● Data should be ● Computer security procedures
individuals should be verified
collected on individuals should be implemented to provide
before it is entered into the
only to accomplish a reasonable assurance against
database.
legitimate business unauthorized disclosure of data.
● Data should be accurate
objective. ● Third parties should not be
and, where and when
● Data should be given access to data without the
necessary, kept current.
adequate, relevant, and individual’s knowledge or
● The file should be made
not excessive in relation permission, except as required by
available so the individual
to the business objective. law.
can ensure that the data are
● Individuals must give ● Disclosures of data, other than
correct.
their consent before data the most routine, should be noted
● If there is disagreement
pertaining to them can and maintained for as long as the
about the accuracy of the
be gathered. data are maintained.
data, the individual’s version
● Data should not be disclosed for
should be noted and included
reasons incompatible with the
with any disclosure of the
business objective for which they
file.
are collected. 22
Protecting Intellectual Property
● Copyright
● A statutory grant that provides the creators of
intellectual property with ownership of it for 28
years
● Trade Secret
● Intellectual work such as a business plan, which
is a company secret and is not based on public
information
● Patent
● A document that grants the holder exclusive
rights on an invention for 17 years
23
Copyright Protection Techniques
● Digital watermarks
●embedding of invisible marks
●can be represented by bits in digital
content
●hidden in the source data, becoming
inseparable from such data
24
Legal Perspectives
● Electronic Theft (NET) Act
● imposed criminal liability for individuals who reproduce
or distribute copies of copyrighted works even if no
commercial advantage or financial gain exists
● Digital Copyright Clarification and Technology
Education Act
● limits the scope of digital copyright infringement by
allowing distance learning exemptions
● Online Copyright Liability Limitation Act
● seeks to protect Internet access providers from liability
for direct and vicarious liability under specific
circumstances where they have no control or
knowledge of infringement
25
Legal Perspectives (cont.)
● Digital Millennium Copyright Act
● reasserts copyright in cyberspace
● makes illegal most attempts to defeat anti-copying
technology
● requires the National Telecommunications and Information
Administration to review the effect the bill would have on the
free flow of information and makes recommendations for any
changes two years after it is signed into law
● lets companies and common citizens circumvent anti-
copying technology when necessary to make software or
hardware compatible with other products, to conduct
encryption research or to keep personal information from
being spread via Internet “cookies” or other copy-protection
tools
● forbids excessive copying of databases, even when those
databases contain information already in the public domain
26
International Aspects of Intellectual
Property
● Two controversies
● Whether top-level domain names
(similar to com, org and gov) should
be added
● The use of trademark names by
companies for domain names that
belong to other companies
28
Domain Names (cont.)
● Network Solutions Inc.
● Contracted by the government to assign domain
addresses
● Increase Top Level Names
● Idea is that an adult only top-level name will be
created to prevent pornographic material getting
into the hands of children
● Trade Name Disputes
● Companies are using trade names of other
companies as their domain address to help
attract traffic to their Web site
29
Defining Freedom of Speech
30
Defining Freedom of Speech
(cont.)
● The united nations Universal Declaration of
Human Rights in 1948 addresses the right of
freedom of expression
31
The Debate about Free Speech
on the Internet
● Free speech debate
● “Most citizens are implacably opposed to censorship in
any form — except censorship of whatever they
personally happen to find offensive.”
● What the boundaries are, and how they
should be enforced
Governments protective of their Citizen action groups desiring to
role in society, parents concerned protect every ounce of their
about exposing their children to freedom to speak, individuals
inappropriate Web pages and concerned about their right to
chat rooms, and federal agencies information on the Internet, and
attempting to deal with illegal organizations seeking to empower
actions the citizens of the earth
32
The Debate about Free Speech
on the Internet (cont.)
33
Protecting Children
34
Protecting Children (cont.)
35
Legal Perspectives in the USA
36
Controlling Spamming
● What is spamming, why is it bad?
● Spamming
● “the practice of indiscriminate distribution of messages (for
example junk mail) without permission of the receiver and
without consideration for the messages’ appropriateness”
● Legislation, Legal
38
Controlling Spamming (cont.)
● How to cut spamming
● Tell users not to validate their addresses by
answering spam requests for replies if they want
to be taken off mailing lists
● Disable the relay feature on SMTP (mail) servers
so mail cannot be bounced off the server
● Delete spam and forget it— it’s a fact of life and
not worth wasting time over
● Use software packages, e.g. www.getlost.com
Use software packages, e.g. www.getlost.com
and www.junkbusters.com 39
Taxation Policies
● The Taxation Exemption Debate
● Internet Tax Freedom Act (8 Oct,98)
● promotes electronic commerce through tax incentives by
barring any new state or local sales taxes on Internet
transactions during the next three years
Electronic commerce Non-electronic commerce
industries industries must pay its
The Internet businesses
Applying existing law to new
fair share of the bill for the nation’s
mediums of exchange is far more
social and physical infrastructure. They
difficult than ever imagined. The
feel that the Internet industries are not
global nature of business today
pulling their own weight. These
suggests that cyberspace be
companies are screaming that the same
considered a distinct tax zone unto
situation exists in the mail order
itself with unique rules and
business and that there are sufficient
considerations befitting the stature
parallels to warrant similar legal
of the environment.
considerations.
40
Taxation Policies (cont.)
● Proposed Taxation Solutions in the USA
The Internal Revenue
Service might “come to the
rescue” with a single and
simplified national sales tax.
This will reduce 30,000
different tax codes to ‘no
more than 50”.
Net sales would be taxed at
the same rate as mail order
or Main Street transactions.
While states could set their
one rate, each sale could be
taxed only once.
38 41
Encryption Policy
42
Encryption Policy (cont.)
● Data Encryption Standard (DES)
● A published federal encryption standard created to
protect unclassified computer data and communications
● Law Enforcement’s Plea
● Cryptographers would follow an audit trail to ensure that keys
haven’t been released improperly, however, law enforcement
does not trust that process
● First Amendment Right
● Technology can encrypt so thoroughly, that every computer on
earth, working in tandem, would take trillions of years to decode
the encryption
● Business View
● EFF (Electronic Frontier Foundation) believes that
software, networked communications and cryptography
industries are suffering
43
Other Legal Issues
● What are the rules of electronic contracting, and whose jurisdiction
prevails when buyers, brokers, and sellers are in different states
and/or countries?
● How can gambling be controlled on the Internet? Gambling is legal
in Nevada and other states. How can the winner’s tax be
collected?
● When are electronic documents admissible evidence in the courts
of law? What do you do if they are not?
● Time and place can carry different dates for the buyers and sellers
when they are across the ocean.
● Is a digital signature legal?
● The use of multiple networks and trading partners makes the
documentation of responsibility difficult. How is such a problem
overcome? 44
Electronic Contracts
45
Electronic Contracts (cont.)
● Shrink-wrap agreements (or box top licenses)
● The user is bound to the license by opening the package
● This has been a point of contention for some time
● The court felt that more information would provide more
benefit to the consumer given the limited space available on
the exterior of the package
● Click-wrap contracts
● The software vendor offers to sell or license the use of the
software according to the terms accompanying the software
● The buyer agrees to be bound by the terms based on
certain conduct
46
Fraud on the Internet
● Internet Stocks Fraud
● SEC brought charges against 44 companies and individuals
who illegally promoted stocks on computer bulletin boards,
online newsletters and investment Web sites
● Other Financial Fraud
● Selling bogus investments, phantom business opportunities,
and other fraud schemes
● Other Fraud in EC
● Customers may
● receive poor quality products and services
● not get products in time
● be asked to pay for things they assume will be paid for by sellers
47
Federal Trade Commission (FTC)
Consumer Alerts
The “Dirty Dozen”
● Business opportunities ● Free goods
● Bulk mail solicitors ● Chain letters
● Investment opportunities ● Cable descrambler kits
● Work-at-home schemes ● Credit repair
● Health and diet schemes ● Vacation prize
● Effortless income promotions
● Guaranteed loans or credit,
on easy terms
48
Buyer Protection
51
Authentication
● If authentication can be solved …..
● students will be able to take exams online
● fraud of recipients of government entitlements and
other payments will be reduced to a bare minimum
● buyers will be assured who the sellers are and
sellers will know who the buyers are with a very high
degree of confidence
● arrangements will be made so that only authorized
people in companies can place purchasing orders
● interviews for employment, possible marriage, and
other matching applications will be accurate
● trust in your partners and in EC in general will
increase significantly
52
Biometrics Controls
● Photo of face
● Fingerprints
● Hand geometry
● Blood vessel pattern in the retina of a
person’s eye
● Voice
● Signature
● Keystroke dynamics t hy .
Ca
53
Seller Protection
● Sellers must be protected against:
● Use of their names by others
● Use of their unique words and phrases, names, and
slogans and their web addresses
● Dealing with customers that deny that they placed
an order
● Several other potential legal issues are related to
sellers’ protection
● Customers downloading copyrighted software and/or
knowledge and selling it to others
● Not being properly paid for products and services
provided
54
Managerial Issues