Legal Privacy and Ethical Issues in Computer Security.pptx

KRITARTHBANSAL1 2,493 views 17 slides Jan 05, 2023
Slide 1
Slide 1 of 17
Slide 1
1
Slide 2
2
Slide 3
3
Slide 4
4
Slide 5
5
Slide 6
6
Slide 7
7
Slide 8
8
Slide 9
9
Slide 10
10
Slide 11
11
Slide 12
12
Slide 13
13
Slide 14
14
Slide 15
15
Slide 16
16
Slide 17
17

About This Presentation

Legal Privacy and Ethical Issues in Computer Security


Slide Content

Legal, Privacy, and Ethical Issues in Computer Security

Legal , Privacy, and Ethical Issues in Computer Security Human Controls Applicable to Computer Security : Basic Legal Issues a) Protecting Programs and Data b) Information and the Law c) Ownership Rights of Employees and Employers d) Software Failures (and Customers) Computer Crime Privacy Ethic s a) Introduction to Ethic s b) Case Studies of Ethic s c) Codes of Professional Ethics

Protecting Programs and Data Copyrights — designed to protect expression of ideas (creative works of the mind ) Ideas themselves are free Different people can have the same idea The way of expressing ideas is copyrighted Copyrights are exclusive rights to making copies of expression Copyright protects intellectual property (IP) IP must be: Original work In some tangible medium of expression

Patent — designed to protect tangible objects , or ways to make them (not works of the mind) Protected entity must be novel & nonobvious The first inventor who obtains patent gest his invention protected against patent infrigement Patents applied for algorithms only since 1981 Trade secret — information that provides competitive edge over others Information that has value only if kept secret Undoing release of a secret is impossible or very difficult Reverse engineering used to uncover trade secret is legal! T.s. protection applies very well to computer s/w E.g., pgms that use algorithms unknown to others

Copyright Patent Trade Secret Protects Expression of idea, not idea itself Invention—way something works S ecret, competitive advantage Protected Object Made Public Yes ; intention is to promote pub lication Design filed at Patent Office No Must Distribute Yes No No Ease of filing Very easy, do-it-yourself Very complicated; specialist lawyer suggested No filing Duration Originator’s life + 70 yrs ; 95 y. For company 19 years Indefinite Legal Protection Sue if unauthorized copy sold Sue if invention copied /reinvented Sue if secret improperly obtained

Protecting Programs and Data How to protect: H/w Patent Firmware (microcode) Patent physical device, chip Use trade secret protection Copyright s/w such as embedded OS Object code s/w Copyiright of binary code Copyright of source code Need legal precedents Source code s/w Use trade secret protection Copyright reveals some code, facilitates reverse engineering Need legal precedents, too

Information and the Law Characteristics of information a s an object of value Not exhaustable Can be replicated Has minimal marginal cost Value is often time dependent Can be transferred intangibly

Criminal Law Civil Law Defined by Statutes Common law (tort l .) Contracts Cases brought by Government Government Individuals and c ompanies Wronged p arty Society Individuals and c ompanies Remedy Jail, fine Damages, typically monetary Comparison of Criminal and Civil Law

Ownership Rights of Employees and Employers Ownership rights are computer security issue Concerned with protecting secrecy (confidentiality) and integrity of works produced by employees of an employer Ownership issues in emploee/employer relations: Ownership of products Products/ideas/inventions developed by employee after hours might still be owned by her employer Esp. if in the same „line of business” Ownership of p atent s If employer files for patent, employer will own patent Ownership of copyrights Similar to patents Trade s ecret p rotection No registered inventor/author—owner can prosecute for damages

Ownership Rights of Employees and Employers (2) Type of employment has ownership consequences Work for h ire All work done by employee is owned by employer Employment c ontract s Often spell out ownership rights Often includes agreement not to compete (for some time after termination) Non-competition is not always enforceable by law License s Programmer retains full ownership of developed s/w Grants license for a fee

Software Failures (& Customers ) - If not correct: ask for refund, replacement, fixing Refund: possible Replacement: if this copy damaged, or improved in the meantine Fixing: rarely legally enforced; instead, monetary awards for damages Correctness of s/w difficult to define/enforce legally Individual can rarely sue a major s/w vendor Prohibitive costs for individual

Issue 2: Reporting software flaws Should we share s/w vulnerability info? Both pros and cons Vendor interests Vendors don’t want to react to individual flaws Prefer bundle a number of flaw fixes User interests Would like to have fixes quickly Responsible vulnerability reporting How to report vulnerability info responsibly? E.g. First notify the vendor, give vendor a few weeks to fix If vendor delays fixes, ask „coordinator” for help Coordinator—e.g., computer emergency response center

Computer Crime Separate category for computer crime is needed Because special laws are needed for CC Value of i ntegrity and c onfidentiality /privacy Value of privacy is now recognized by several federal/state laws Value of d ata Courts understand value of data better Acceptance of c omputer t erminolog y Law lags behind technology in acceptance of new terminology

Privacy Identity t heft – the most serious crime against privacy Threats to privacy Aggregation and d ata m ining Poor s ystem s ecurity The Internet as privacy threat Unencrypted e-mail / web surfing / attacks Corporate r ights and p rivate b usiness

Controls for protecting privacy Authentication Anonymity Pseudonymity

Introduction to Ethic s Law vs. Ethics Law alone can’t restrict human behavior Impractical/impossible to describe/enforce all acceptable behaviors Ethics/morals are sufficient self-controls for most people

Most ethical and legal issues in computer system are in the area of individual’s right to privacy versus the greater good of a larger entity i.e. a company or a society. For example, tracking how employees use computers, crowd surveillance, managing customer profiles, tracking a person’s travel with passport and so on. A key concept in resolving this issues is to find out, what is a person’s expectation of privacy. Classically, the ethical issues in security system are classified into following 4 categories: Privacy:  This deals with the right of an individual to control personal information. It is the protection of personal or sensitive information. Privacy is subjective. Different people have different ideas of what privacy is and how much privacy they will trade for safety or convenience. Accuracy:  This talks about the responsibility for the authenticity, fidelity an accuracy of the information. Property:  This determines who the owner of the information is and who controls access. Accessibility:  This deals with the issue of the type of information, an organization has the right to collect. And in that situation, it also expects to know the measures which will safeguard against any unforeseen eventualities.
Tags