Privacy

   

Computer Ethics

  1. Every computer user should be aware of ethical matters, including how databases and networks are used and the major privacy laws.
      
  2. Technology is moving so fast that it is difficult for the legal system to keep up.
      
  3. The essential element that controls how computers are used today is ethics.
      
  4. Ethics are standards of moral conducts.
      
  5. Computer ethics are guidelines for the morally acceptable use of computers in society.
  6. There are four primary computer ethics issues:
    1. Privacy - concerns the collection and use of data about individuals.
    2. Accuracy -  relates to the responsibility of those who collect data to ensure the data is correct.
    3. Property -  relates to who owns data and rights to software.
    4. Access -  relates to responsibility of those who have data control.

   

Privacy Concerns of Large Databases

  1. Large organizations are constantly compiling information about us in large databases.
    1. Telephone companies compile lists of calls we make and numbers we call.
    2. Reverse directory lists telephone numbers followed by subscriber names.
    3. Credit cards companies keep our names, addresses and other personal information.
    4. Supermarket scanners record customers buying habits.
    5. Magazine, newspapers, and catalogs publishers keep names, addresses, and order information of customers.
  2. We may be concerned that cross-referenced information might be used for the wrong purposes.
  3. We may be concerned that an industry of data gatherer (information resellers) now exists that collect personal data then sell it to direct marketers, fund raisers, etc.
  4. Government agencies contribute to the information reselling.
    1. State motor vehicle departments sell car registration data they collect.
  5. The average person is on over 100 mailing lists.
  6. There are two major areas of concerns about privacy of large databases:
    1. Spreading information without personal consent
    2. Spreading inaccurate information.

  

   

Privacy concerns about Private Networks

  1. Eavesdropping on employees 
    1. It is legal for employers to spy on exchange of company electronic mail.
    2. 20 percent of businesses search employees' electronic mail and computer files.
    3. A proposed law would require employers to provide prior written notice and alert employees during the monitoring with an audible or visual signal.
         
  2. Censorship
    1. There is controversy over whether or not commercial online information services can restrict libelous, obscene, or otherwise offensive material on their site.
    2. These services argue that the U.S. constitution does not give members the right to express their views without restrictions.
    3. Opponents say there has to be fundamental protection for users against other people people reading or censoring their messages.

   

Privacy concerns about the Internet and the Web

  1. There is an illusion of anonymity about sending e-mails across the Internet.
  2. Some individuals commonly eavesdrop into the content of e-mail sent across the Internet.
  3. Browsers can store information on your hard disk (without you knowing) when you visit a Web site.
    1. History file -  includes locations of sites visited by your computer system.
    2. Cookies -  special data that contain personal information such as how often you visit a site, what you do there, credit card numbers, etc.

  

Major Laws on Privacy

  1. Fair Credit Reporting Act of 1970
    1. Intended to keep inaccuracies out of credit bureau files.
    2. Credit agencies are barred from sharing credit information with anyone but authorized customers.
    3. Consumers have the right to review and correct their records and to be notified of credit investigations for insurance and employment.
    4. Drawback: Credit agencies may share information with anyone they reasonably has legitimate business need.
        
  2. Freedom of Information Act of 1970
    1. Gives you the right to look at data concerning you that is stored by the federal government.
    2. Drawback: Sometimes a lawsuit is necessary to pry data loose.
         
  3. Privacy Act of 1974
    1. Designed to restrict federal agencies in the way they share information about American citizens by prohibiting federal information collected for one purpose from being used for a diferent purpose.
    2. Drawback: Exceptions written into the law permit federal agencies to share information anyway.
        
  4. Right to Financial Privacy Act of 1979
    1. Sets strict procedures that federal agencies must follow when seeking to examine customer records in banks.
    2. Drawback: The law does not cover sate and local governments.
         
  5. Computer Fraud and Abuse Act of 1986
    1. Allows prosecutions of unauthorized access to computers and databases.
    2. Drawback: People with legitimate access can still get into systems and create mischief without penalty.
        
  6. Electronic Communication Privacy Act of 1986
    1. Protects the privacy of people on public electronic-mail systems.
    2. Drawback: Does not cover communication within an organization's internal electronic communications.
        
  7. Video Privacy Protection Act of 1988
    1. Prevents retailers from selling or disclosing video-rental records without consumer consent or court order.
    2. Drawback:  Restrictions do no apply to important files such as medical and insurance records.
        
  8. Computer Matching and Privacy Protection Act of 1988
    1. Set procedures for computer matching of federal data.
    2. Drawback: Individuals may not always be given a chance to respond before the government take adverse action against them.
        
  9. Computer Abuse Amendments Act of 1994
    1. Amends the 1984 act to outlaw transmission of virus and other harmful computer code.
    2. Drawback: locating the origins and individuals for creating computer viruses is very difficult.
         
  10. Nation Information Infrastructure Protection Act of 1996
    1. Provides penalties for trespassing on computer systems, threats made against computer networks, and theft of information.
    2. Drawback: It is difficult to gather sufficient information to prosecute.

 

<  Previous Page                                         Next Page >