Professional Documents
Culture Documents
Table of Contents
What is privacy? ............................................................................................................................................ 1 The impact of large databases ...................................................................................................................... 1 The impact of the Internet, and the web ...................................................................................................... 2 Online identity and the major privacy laws .................................................................................................. 2 Security and Computer Crimes...................................................................................................................... 2 What are a virus, worm and Trojan horses? ................................................................................................. 3 What are the ways of protecting security including restricting access, encrypting data, and preventing data loss? ....................................................................................................................................................... 3 What is Plagiarism? ....................................................................................................................................... 4 What is Copyright? ........................................................................................................................................ 4 Resources ...................................................................................................................................................... 5
What is privacy?
Privacy as a concept is becoming increasingly important in the digital world. People recognize it, but do they know what it is? If web-services rely on advertising to survive, and targeted advertising is the holy grail of advertising doesnt it make sense that privacy as a right is defined? There needs to be an agreement between consumers, publishers, and advertisers of where the lines in the sand are. We cant afford to have this concept hidden in the shadow its too important. For me, privacy is three things. The right to determine: 1) Who can see information about you 2) when people can see information about you 3) what information they can see about you
Identify theft is the illegal assumption of someones identity for the purposes of economic gain. Mistaken identify occurs when an electronic profile of one person is switched with another. The Freedom of Information Act entitles individuals access to governmental records relating to them.
computer crimes are stimulating innovative ways to combat it, giving rise to a wide range of advanced computer security systems and techniques as well as the rapid development of computer-related laws and legislation.
What are the ways of protecting security including restricting access, encrypting data, and preventing data loss?
Data controllers in the private and public sectors hold increasing amounts of personal data on individuals. The decreasing cost of electronic storage and processing has greatly contributed to this. Organizations also increasingly outsource data processing to third parties (data processors). Many organizations also continue to hold large quantities of personal data in manual form often in off-site locations. This large increase in the quantity of personal data processed and held gives rise to security challenges for the organizations that collect the data. Data controllers need to regularly audit their holdings of personal data and the procedures they have in place to protect this data. Questions they should ask include: Do we know what types of personal data we hold - electronically (including less obvious data such as CCTV images)? - on paper?
Can we justify the collection of this information? - Why do we collect it? - What it is used for? - How long do we hold it? - Who has access to it? - To whom do we disclose it? - Is it held securely? - How we dispose of the data? If we outsource processing of personal data to a data processor (including a 'cloud computing' service provider), are we satisfied that their security procedures are adequate?
What is Plagiarism?
Taking the ideas or copying the language of another writer without formal acknowledgment is plagiarism. Students who would never copy another student's exam answers may think nothing of borrowing the ideas or wording from another author. Writers must always document the ideas and information which are outside the realm of common knowledge. For example, well known facts require no documentation, while obscure facts would require documentation. When in doubt, it is always better to err on the side of caution and document your sources. Plagiarism is a violation of NSU's academic policies and honor code. Plagiarism is also a federal crime and violates copyright laws.
What is Copyright?
Copyright laws strive to balance the interests of copyright owners and users. A copyright owner has control or exclusive rights to prohibit users from using a work in specific way without the owner's permission. A copyright owner has the exclusive rights to control distribution of their work reproduction of their work adaptation of their work public performance of their work public display of their work
It protects the copyright owner's monetary rights for a fixed period of timea copyright owner has the right to profit from the sale or performance of a work. The fixed period of time varies, depending on the work, before the work enters the public domain. Some works are in the public domain because they are not protected by copyright law. However, simply because a work is in the public domain, does not mean that the an individual can claim authorship of the work.
Resources
http://eliasbizannes.com/blog/2007/04/define-privacy-what-does-it-mean-to-you/ http://www.webopedia.com/TERM/C/cyber_crime.html http://www.loc.gov/rr/scitech/tracer-bullets/compcrimetb.html http://www.cisco.com/web/about/security/intelligence/virus-worm-diffs.html http://www.dataprotection.ie/viewdoc.asp?DocID=1091 http://www.nova.edu/library/dils/lessons/plagiarism/ Book Chapters