Ethics Flashcards
Utilitarian Ethics
Utilitarian ethics is based on the guiding principle that the consequence of an action is the most important factor in determining if the action is moral or not. For example, an action that maximizes the greatest good for the greatest amount of people is an ethical choice.
The rights approach
The rights approach is guided by the principle which states that an individual has the right to make their own choices, which cannot be violated by another person’s decision. This decision must respect and consider the fundamental rights of the individual. These fundamental rights include the right to truth, privacy, safety and for society to apply laws fairly to all members of society.
The common good approach
The common good approach proposes that ethical actions are those that benefit the entire community. It challenges individuals to recognize and pursue the values and goals shared with other members of a community.
Computer-targeted crime
Where a computer is the target of a criminal activity
Computer-assisted crime
Occurs when a computer is used to commit a crime.
Computer-incidental crime
Where a computer provides information that is incidental to an actual crime.
Statutory Law
The U.S. Congress has established federal administrative agencies and a regulatory framework that includes both civil and criminal penalties for failing to follow the rules.
Criminal laws enforce a commonly accepted moral code backed by the authority of the government. For example, the Computer Fraud and Abuse Act is a statutory law that prohibits accessing a computer without authorization, or in excess of authorization. Violating these rules could result in a fine or prison sentence.
Administrative Law
A legal framework that governs the activities of administrative agencies of government, administrative law ensures that public bodies act in accordance with the law.
Common law
Common law cases work their way through the judicial system providing precedents and constitutional bases for lawmaking.
FISMA
The Federal Information Security Management Act
FISMA stipulates that federal agencies must create an information security program that includes:
- Risk assessments
- An annual inventory of IT systems
- Policies and procedures to reduce risk
- Security awareness training
- Testing and evaluation of all IT system controls
- Incident response procedures
- A continuity of operations plan
ECPA
Electronic Communications Privacy Act 1986
The ECPA aims to ensure workplace privacy and protects a range of electronic communications such as email and telephone conversations from unauthorized interception, access, use and disclosure.
CFFA
Computer Fraud and Abuse Act 1986
Enacted in 1986 as an amendment to the Comprehensive Crime Control Act of 1984, CFAA prohibits unauthorized access to computer systems. Knowingly accessing a government computer without permission or accessing any computer used in or affecting interstate or foreign commerce is a criminal offense. The Act also criminalizes the trafficking of passwords or similar access information, as well as knowingly transmitting a program, code or a command that results in damage.