Law, Ethics, and Privacy Flashcards
Cybercrime
broadly describes criminal activity in which computers or computer networks are a tool, a target, or a place of criminal activity
connotation of involving networks, whereas computer crime may or may not involve networks
Role of computers in crimes
Computers as targets
Computers as storage devices
Computers as communication tools
US Computer Fraud and Abuse Act (CFAA)
Defines criminal sanctions against various types of abuse
Unauthorized access to computer containing:
- -data protected for national defense
- -banking or financial information
Unauthorized access, use, modification, destruction, disclosure of computer or information on a system operated by or on behalf of US govt.
Accessing without permission a protected computer (any computer connected to the Internet)
Transmitting code that causes damage to computers (malware)
Trafficking in computer passwords
Cybercrimes
Illegal access
Illegal interception
Data interference
System interference
Misuse of devices
Computer-related forgery
Offenses related to child pornography
Infringement of copyright and related rights
Attempt and aiding or abetting
Difficulties for law enforcement agencies
Proper investigation requires sophisticated grasp of technology
Lack of resources (not enough computer processing power, communications capacity, or storage capacity)
Global nature of cybercrime and lack of cooperation with remote law enforcement agencies
Intellectual property
any intangible asset that consists of human knowledge and ideas. Examples include software, data, novels, sound recordings, the design of a new type of mousetrap, cure for a disease.
Three types of intellectual property and infringment
Patents
–unauthorized making, using, or selling
Trademarks
–unauthorized use or colorable imitation
Copyrights
-unauthorized use
Infringement
the invasion of the rights secured by copyrights, trademarks, or patents
Intellectual property relevant to Network and Computer Security
Software
- programs produced by vendors of commercial software, shareware, proprietary software created by org for internal use, software produced by individuals
- copyright available
- some cases, patent protection available
Databases
- data collected and organized in a fashion that has potential commercial value
- copyright
Digital content
-audio files, video files, multimedia, courseware, Web site content
Algorithms
-RSA public key cryptosystem, patented from 1980 until expiration in 2000
Digital Millennium Copyright Act
Intellectual property: music, software piracy
Digital objects can be copyrighted.
It is a crime to circumvent or disable anti piracy functionality built into an object.
It is a crime to manufacture, sell, and distribute devices that disable anti piracy functionality or copy objects.
Research, educational exclusions (e.g., libraries can make up to three copies for lending).
RIAA lawsuits & P2P music sharing – electronic frontier foundation
Digital Rights Management
Systems and procedures that ensure that holders of digital rights are clearly identified and receive the stipulated payment for their works
Privacy
A user’s ability to control how data pertaining to him/her can be collected, used and shared by someone else.
What is private?
Financial statements, credit card statements, banking records etc. Health/medical conditions Legal matters Biometrics (e.g., fingerprints) Political beliefs School and employer records Web browsing habits? What do we search, what do we browse? Websites we visit? Communication (emails and calls) Past history (right to be forgotten
What is not private?
Where I live? My citizenship?
I am registered to vote? (US)
My salary (state employee because Georgia Tech is a public university)
Threats to Privacy
Traffic analysis (we know who you talk to)
Surveillance (scale and magnitude – cameras everywhere, Snowden disclosures)
Linking and making inferences (big data, data mining, analytics)
Social media (we know your friends)
Tracking of web browsing (cookies)
Location aware applications (we know where you have been)
Sometimes we are willing parties (loyalty cards in stores)