Wednesday, February 24, 2010

1. Summary of the 1980 OECD privacy guidelines.
=>
Though they are not law in the United States, the privacy guidelines issued by the Organization for Economic Cooperation and Development (OECD) in 1980 are an important part of privacy debates today. The OECD consists of bureaucrats from 29 countries that work to coordinate policies with the aim of fostering international trade. The United States is a member of the OECD and one of the largest funders of its $200 million dollar annual budget. The Secretariat of the OECD is in Paris, France.

The Guidelines involve eight principles, which in different variations are often touted as "fair information practices":

  1. Collection Limitation Principle: There should be limits to the collection of personal data and any such data should be obtained by lawful and fair means and, where appropriate, with the knowledge or consent of the data subject.
  2. Data Quality Principle: Personal data should be relevant to the purposes for which they are to be used, and, to the extent necessary for those purposes, should be accurate, compete and kept up-to-date.
  3. Purpose Specification Principle: The purposes for which personal data are collected should be specified not later than at the time of collection and the subsequent use limited to the fulfilment of those purposes or such others as are not incompatible with those purposes and as are specified on each occasion of change of purpose.
  4. Use Limitation Principle: Personal data should not be disclosed, made available or otherwise used for purposes other than those specified in accordance with Principle 3 except:
    • with the consent of the data subject; or
    • by the authority of law.
  5. Security Safeguards Principle: Personal data should be protected by reasonable security safeguards against such risks as loss or unauthorised access, destruction, use, modification or disclosure of data.
  6. Openness Principle: There should be a general policy of openness about developments, practices and policies with respect to personal data. Means should be readily available of establishing the existence and nature of personal data, and the main purposes of their use, as well as the identity and usual residence of the data controller.
  7. Individual Participation Principle: An individual should have the right:
    • (a) to obtain from the data controller, or otherwise, confirmation of whether or not the data controller has data relating to him;
    • (b) to have communicated to him, data relating to him
      • within a reasonable time;
      • at a charge, if any, that is not excessive;
      • in a reasonable manner; and
      • in a form that is readily intelligible to him;
    • (c) to be given reasons if a request made under sub-paragraphs (a) and (b) is denied, and to be able to challenge such denial; and
    • (d) to challenge data relating to him and, if the challenge is successful, to have the data erased, rectified, completed or amended.
  8. Accountability Principle: A data controller should be accountable for complying with measures which give effect to the principles stated above.
©2000-2003 Privacilla.org. All content subject to the Privacilla Public License.

2. Key provision of the USA patriot act subject to sunset.
=>

Sixteen provisions of the USA Patriot Act are set to expire Dec. 31 if not renewed.

The provisions are:

Section 201 - Gives federal officials the authority to intercept wire, spoken and electronic communications relating to terrorism.

Section 202 - Gives federal officials the authority to intercept wire, spoken and electronic communications relating to computer fraud and abuse offenses.

Subsection 203(b) - Permits the sharing of grand jury information that involves foreign intelligence or counterintelligence with federal law enforcement, intelligence, protective, immigration, national defense or national security officials

Subsection 203(d) - Gives foreign intelligence or counterintelligence officers the ability to share foreign intelligence information obtained as part of a criminal investigation with law enforcement.

Section 204 - Makes clear that nothing in the law regarding pen registers - an electronic device which records all numbers dialed from a particular phone line _ stops the government's ability to obtain foreign intelligence information.

Section 206 - Allows federal officials to issue roving "John Doe" wiretaps, which allow investigators to listen in on any telephone and tap any computer they think a suspected spy or terrorist might use.

Section 207 - Increases the amount of time that federal officials may watch people they suspect are spies or terrorists.

Section 209 - Permits the seizure of voice mail messages under a warrant.

Section 212 - Permits Internet service providers and other electronic communication and remote computing service providers to hand over records and e-mails to federal officials in emergency situations.

Section 214 - Allows use of a pen register or trap and trace devices that record originating phone numbers of all incoming calls in international terrorism or spy investigations.

Section 215 - Authorizes federal officials to obtain "tangible items" like business records, including those from libraries and bookstores, for foreign intelligence and international terrorism investigations.

Section 217 - Makes it lawful to intercept the wire or electronic communication of a computer hacker or intruder in certain circumstances.

Section 218 - Allows federal officials to wiretap or watch suspects if foreign intelligence gathering is a "significant purpose" for seeking a Federal Intelligence Surveillance Act order. The pre-Patriot Act standard said officials could ask for the surveillance only if it was the sole or main purpose.

Section 220 - Provides for nationwide service of search warrants for electronic evidence.

Section 223 - Amends the federal criminal code to provide for administrative discipline of federal officers or employees who violate prohibitions against unauthorized disclosures of information gathered under this act.

Section 225 - Amends FISA to prohibit lawsuits against people or companies that provide information to federal officials for a terrorism investigation.

News Max.com Wires

Wednesday, January 27, 2010

2nd posting

1.Discussed all about privacy
Privacy (from Latin privatus 'separated from the rest, deprived of sth, esp. office, participation in the government', from privo 'to deprive') is the ability of an individual or group to seclude themselves or information about themselves and thereby reveal themselves selectively. The boundaries and content of what is considered private differ among cultures and individuals, but share basic common themes. Privacy is sometimes related to anonymity, the wish to remain unnoticed or unidentified in the public realm.

Types of privacy

The term "privacy" means many things in different contexts. Different people, cultures, and nations have a wide variety of expectations about how much privacy a person is entitled to or what constitutes an invasion of privacy.

Physical

Physical privacy could be defined as preventing "intrusions into one's physical space or solitude"

This would include such concerns as:

  • preventing intimate acts or one's body from being seen by others for the purpose of modesty; apart from being dressed this can be achieved by walls, fences, privacy screens, cathedral glass, partitions between urinals, by being far away from others, on a bed by a bed sheet or a blanket, when changing clothes by a towel, etc.; to what extent these measures also prevent acts being heard varies
  • video, as aptly named graphics, or intimate acts, behaviors or body part
  • preventing unwelcome searching of one's personal possessions
  • preventing unauthorized access to one's home or vehicle
  • medical privacy, the right to make fundamental medical decisions without governmental coercion or third party review, most widely applied to questions of contraception

An example of the legal basis for the right to physical privacy would be the US Fourth Amendment, which guarantees "the right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures",. Most countries have laws regarding trespassing and property rights also determine the right of physical privacy.

Physical privacy may be a matter of cultural sensitivity, personal dignity, or shyness. There may also be concerns about safety, if for example one has concerns about being the victim of crime or stalking.[

Informational

Data privacy refers to the evolving relationship between technology and the legal right to, or public expectation of privacy in the collection and sharing of data about one's self. Privacy concerns exist wherever uniquely identifiable data relating to a person or persons are collected and stored, in digital form or otherwise. In some cases these concerns refer to how data is collected, stored, and associated. In other cases the issue is who is given access to information. Other issues include whether an individual has any ownership rights to data about them, and/or the right to view, verify, and challenge that information.

Various types of personal information often come under privacy concerns. For various reasons, individuals may not wish for personal information such as their religion, sexual orientation, political affiliations, or personal activities to be revealed. This may be to avoid discrimination, personal embarrassment, or damage to one's professional reputation.

Financial privacy, in which information about a person's financial transactions is guarded, is important for the avoidance of fraud or identity theft. Information about a person's purchases can also reveal a great deal about that person's history, such as places they have visited, whom they have had contact with, products they use, their activities and habits, or medications they have used.

Internet privacy is the ability to control what information one reveals about oneself over the Internet, and to control who can access that information. These concerns include whether email can be stored or read by third parties without consent, or whether third parties can track the web sites someone has visited. Another concern is whether web sites which are visited collect, store, and possibly share personally identifiable information about users. Tools used to protect privacy on the internet include encryption tools and anonymizing services like I2P and tor.

Medical privacy allows a person to keep their medical records from being revealed to others. This may be because they have concern that it might affect their insurance coverage or employment. Or it may be because they would not wish for others to know about medical or psychological conditions or treatment which would be embarrassing. Revealing medical data could also reveal other details about one's personal life (such as about one's sexual activity for example).

Sexual privacy prevents a person from being forced to carry a pregnancy to term and enables individuals to acquire and use contraceptives and safe sex supplies and information without community or legal review

Political privacy has been a concern since voting systems emerged in ancient times. The secret ballotdemocracy, and considered a basic right of citizenship. In fact even where other rights of privacy do not exist, this type of privacy very often does. is the simplest and most widespread measure to ensure that political views are not known to anyone other than the original voter — it is nearly universal in modern

Organizational

Governments agencies, corporations, and other organizations may desire to keep their activities or secrets from being revealed to other organizations or individuals. Such organizations may implement various security practices in order to prevent this. Organizations may seek legal protection for their secrets. For example, a government administration may be able to invoke executive privilege or declares certain information to be classified, or a corporation might attempt to protect trade secrets.


2.Privacy protection and the law

Privacy protection

Free market versus consumer protection approaches

Approaches to privacy can, broadly, be divided into two categories: free market, and consumer protection. In a free market approach, commercial entities are largely allowed to do what they wish, with the expectation that consumers will choose to do business with corporations that respect their privacy to a desired degree. If some companies are not sufficiently respectful of privacy, they will lose market share. Such an approach may be limited by lack of competition in a market, by enterprises not offering privacy options favorable to the user, or by lack of information about actual privacy practices. Claims of privacy protection made by companies may be difficult for consumers to verify, except when they have already been violated.

In a consumer protection approach, in contrast, it is acknowledged that individuals may not have the time or knowledge to make informed choices, or may not have reasonable alternatives available. In support of this view, Jensen and Potts showed that most privacy policies are above the reading level of the average person .Therefore, this approach advocates greater government definition and enforcement of privacy standards.

Privacy law

Privacy law is the area of law concerning the protecting and preserving of privacy rights of individuals. While there is no universally accepted privacy law among all countries, some organizations promote certain concepts be enforced by individual countries. For example, the Universal Declaration of Human Rights, article 12, states:

No one shall be subjected to arbitrary interference with his privacy, family, home or correspondence, nor to attacks upon his honor and reputation. Everyone has the right to the protection of the law against such interference or attacks

For Europe, Article 8 of the European Convention on Human Rights guarantees the right to respect for private and family life, one's home and correspondence. The European Court of Human Rights in Strasbourg has developed a large body of jurisprudence defining this fundamental right to privacy.[citation needed] The European Union requires all member states to legislate to ensure that citizens have a right to privacy, through directives such as the 1995 Directive 95/46/EC on the protection of personal data. It is regulated in the United Kingdom by the Data Protection Act 1998 and in France data protection is also monitored by the CNIL, a governmental body which must authorize legislation concerning privacy before them being enacted.

In the United Kingdom, it is not possible to bring an action for invasion of privacy. An action may be brought under another tort (usually breach of confidence) and privacy must then be considered under EC law. In the UK, it is sometimes a defense that disclosure of private information was in the public interest.[24]

Concerning privacy laws of the United States, privacy is not guaranteed per se by the Constitution of the United States. The Supreme Court of the United States has found that other guarantees have "penumbras" that implicitly grant a right to privacy against government intrusion, for example in Griswold v. Connecticut (1965). In the United States, the right of freedom of speech granted in the First Amendment has limited the effects of lawsuits for breach of privacy. Privacy is regulated in the U.S. by the Privacy Act of 1974, and various state laws.

Canadian privacy law is governed federally by multiple acts, including the Canadian Charter of Rights and Freedoms, and the Privacy Act (Canada). Mostly this legislation concerns privacy infringement by government organizations. Data privacy was first addressed with the Personal Information Protection and Electronic Documents Act, and provincial-level legislation also exists to account for more specific cases personal privacy protection against commercial organizations.

In Australia there is the Privacy Act 1988.

Wednesday, January 6, 2010

MIDTERM QUIZ


1. You have just been hired as an IT security consultant to "fix the security problem" at Acme United Global Manufacturing. The company has been hacked mercilessly over the last six months, with three of the attacks making headlines for the negative impact they have had on the firm and its customers. You have been given 90 days and budget of 1 million dollars. Where would you begin, and what steps would you take to fix the problem?
=>for all we know hackers are those person who accesses a computer system by circumventing its security system as an IT security consultant the first thing that I must do is to implement or to design a computer security or information security.The objective of computer security includes protection of information and property from theft, corruption, or natural disaster, while allowing the information and property to remain accessible and productive to its intended users. The terms computer system security, means the collective processes and mechanisms by which sensitive and valuable information and services are protected from publication, tampering or collapse by unauthorized activities or untrustworthy individuals and unplanned events respectively.

2.Your friend just told you that he is developing a worm to attack the administrative systems at your college. The worm is "harmless" and will simply cause a message - "Let's party!" - to be displayed on all workstations on Friday afternoon at 3 p.m. By 4 p. m., the virus will erase itself and destroy all evidence of its presence. What would you say or do?
=>when we say worm it is "write once, read many".I'm gonna tell my friend that it's unethical to put up a virus to the administrative system of the school especially when most of the student are using that system.

Tuesday, December 15, 2009

Wednesday, December 2, 2009

Are I.T workers professionals?


I.T are professionals, because they are a big help to a big corporation such that the IT professions can make a program so that the owner or the one who manage the business can easily determine the stability of the company. Technical knowledge alone will not do it any longer. This means they have to become more serious about their work and produce better I.T. solutions more quickly, correctly, and less expensively. The I.T. workers have to work both harder and smarter. In other words, job assignments have to be performed in a more professional and craftsman-like manner . This requires a more disciplined, organized, and professional attitude which is the exception as opposed to the rule in a lot of I.T. shops today, executives will become dependent on them and will be less likely to outsource their jobs. IT professions are also called a WHITE-COLLAR workers, means that they refers to a salaried professional or an educated workers who performs semi-professional office, administrative, and sales coordination tasks.

Tuesday, November 17, 2009

First Assignment(PRELIM)


My situation is if "I am pregnant should I abort it or not."

Steps in Ethical Decision Making:
1st step is to get the fact if I am really pregnant, and I come up with the result that I am really pregnant
and came up with the decision to abort it.
I should consider the consequence that what if I get complication from aborting it, and if my partner will gonna know that I am pregnant an I try to abort it.
I should consider also if it is right to kill my own blood that maybe I will regret.
I should consider another option by telling my parents my situation and take a risk that they might forgive me.
I'm gonna review my decision by weighing every aspect,then I choose the option that telling my parents about my situation.
Lastly I'm gonna wait on their reaction.

My Philosophical theories in my situation:
The Virtue of Ethics their is when I came up with the result of aborting it but I just think the consequence.
The Utilitarian Approach is when I realize that I am the one who will get affected if I'm gonna do my plan because this baby is a part of me, and also my partner will affect also not knowing that he is going to be a father, most of all who will get affected is my parents whom I not know that maybe they will be accept my situation.
The Fairness Approach her is when I decide to let my parent and boyfriend know about my situation because it is their right to know and accept it.
The Common Good Approach is that I should be proud that I'm going to be a mother and this baby has been made by love and not by just a mistake or an aggressiveness, despite to the reaction of the community I should show that I never regret what I have done.