Privacy
Computer Ethics
- Every computer user should be aware of ethical matters,
including how databases and networks are used and the major privacy laws.
- Technology is moving so fast that it is difficult for the
legal system to keep up.
- The essential element that controls how computers are used
today is ethics.
- Ethics are standards of moral conducts.
- Computer ethics are guidelines for the morally
acceptable use of computers in society.
- There are four primary computer ethics issues:
- Privacy - concerns the collection and use of
data about individuals.
- Accuracy - relates to the responsibility
of those who collect data to ensure the data is correct.
- Property - relates to who owns data and
rights to software.
- Access - relates to responsibility of
those who have data control.
Privacy Concerns of Large Databases
- Large organizations are constantly compiling information
about us in large databases.
- Telephone companies compile lists of calls we make and
numbers we call.
- Reverse directory lists telephone numbers followed by
subscriber names.
- Credit cards companies keep our names, addresses and
other personal information.
- Supermarket scanners record customers buying habits.
- Magazine, newspapers, and catalogs publishers keep
names, addresses, and order information of customers.
- We may be concerned that cross-referenced information
might be used for the wrong purposes.
- We may be concerned that an industry of data gatherer
(information resellers) now exists that collect personal data then sell it
to direct marketers, fund raisers, etc.
- Government agencies contribute to the information
reselling.
- State motor vehicle departments sell car registration
data they collect.
- The average person is on over 100 mailing lists.
- There are two major areas of concerns about privacy of
large databases:
- Spreading information without personal consent
- Spreading inaccurate information.
Privacy concerns about Private
Networks
- Eavesdropping on employees
- It is legal for employers to spy on exchange of
company electronic mail.
- 20 percent of businesses search employees' electronic
mail and computer files.
- A proposed law would require employers to provide
prior written notice and alert employees during the monitoring with an
audible or visual signal.
- Censorship
- There is controversy over whether or not commercial
online information services can restrict libelous, obscene, or otherwise
offensive material on their site.
- These services argue that the U.S. constitution does
not give members the right to express their views without restrictions.
- Opponents say there has to be fundamental protection
for users against other people people reading or censoring their
messages.
Privacy concerns about the
Internet and the Web
- There is an illusion of anonymity about sending
e-mails across the Internet.
- Some individuals commonly eavesdrop into the content of
e-mail sent across the Internet.
- Browsers can store information on your hard disk (without
you knowing) when you visit a Web site.
- History file - includes locations of
sites visited by your computer system.
- Cookies - special data that contain
personal information such as how often you visit a site, what you do
there, credit card numbers, etc.
Major Laws on Privacy
- Fair Credit Reporting Act of 1970
- Intended to keep inaccuracies out of credit bureau
files.
- Credit agencies are barred from sharing credit
information with anyone but authorized customers.
- Consumers have the right to review and correct their
records and to be notified of credit investigations for insurance and
employment.
- Drawback: Credit agencies may share information with
anyone they reasonably has legitimate business need.
- Freedom of Information Act of 1970
- Gives you the right to look at data concerning you
that is stored by the federal government.
- Drawback: Sometimes a lawsuit is necessary to pry data
loose.
- Privacy Act of 1974
- Designed to restrict federal agencies in the way they
share information about American citizens by prohibiting federal
information collected for one purpose from being used for a diferent
purpose.
- Drawback: Exceptions written into the law permit
federal agencies to share information anyway.
- Right to Financial Privacy Act of 1979
- Sets strict procedures that federal agencies must
follow when seeking to examine customer records in banks.
- Drawback: The law does not cover sate and local
governments.
- Computer Fraud and Abuse Act of 1986
- Allows prosecutions of unauthorized access to
computers and databases.
- Drawback: People with legitimate access can still get
into systems and create mischief without penalty.
- Electronic Communication Privacy Act of 1986
- Protects the privacy of people on public
electronic-mail systems.
- Drawback: Does not cover communication within an
organization's internal electronic communications.
- Video Privacy Protection Act of 1988
- Prevents retailers from selling or disclosing
video-rental records without consumer consent or court order.
- Drawback: Restrictions do no apply to important
files such as medical and insurance records.
- Computer Matching and Privacy Protection Act of 1988
- Set procedures for computer matching of federal data.
- Drawback: Individuals may not always be given a chance
to respond before the government take adverse action against them.
- Computer Abuse Amendments Act of 1994
- Amends the 1984 act to outlaw transmission of virus
and other harmful computer code.
- Drawback: locating the origins and individuals for
creating computer viruses is very difficult.
- Nation Information Infrastructure Protection Act of
1996
- Provides penalties for trespassing on computer
systems, threats made against computer networks, and theft of
information.
- Drawback: It is difficult to gather sufficient
information to prosecute.
< Previous Page
Next Page >