TTS1133 : INTERNET ETHICS AND CYBER LAW CHAPTER THREE: Privacy.

28
TTS1133 : INTERNET TTS1133 : INTERNET ETHICS AND CYBER LAW ETHICS AND CYBER LAW CHAPTER THREE: Privacy

Transcript of TTS1133 : INTERNET ETHICS AND CYBER LAW CHAPTER THREE: Privacy.

Page 1: TTS1133 : INTERNET ETHICS AND CYBER LAW CHAPTER THREE: Privacy.

TTS1133 : INTERNET TTS1133 : INTERNET ETHICS AND CYBER LAWETHICS AND CYBER LAWCHAPTER THREE:Privacy

Page 2: TTS1133 : INTERNET ETHICS AND CYBER LAW CHAPTER THREE: Privacy.

CONTENTSCONTENTS IT privacy protection and the law The right of privacy History of privacy protection – a case example Key privacy and anonymity issues

◦ Data encryption◦ Consumer profiling◦ Consumer data treatment – database and marketing◦ Workplace monitoring◦ Spamming◦ Advanced surveillance technology

Protecting privacy◦ Awareness

The cyber law and regulations

Page 3: TTS1133 : INTERNET ETHICS AND CYBER LAW CHAPTER THREE: Privacy.

IntroductionIntroduction

The use of information technology in business requires the balancing of the needs of those who use information about individuals against the right and desires.

Handling information responsibly means understanding the following issues◦ Ethics◦ Personal privacy◦ Threats to information◦ Protection of information

Page 4: TTS1133 : INTERNET ETHICS AND CYBER LAW CHAPTER THREE: Privacy.

PrivacyPrivacyPrivacy – the right to left alone

when you want to be, to have control over your own personal possessions, and not to be observed without your consent

Dimensions of privacy◦Psychological: to have a sense of control◦Legal: to be able to protect yourself

Page 5: TTS1133 : INTERNET ETHICS AND CYBER LAW CHAPTER THREE: Privacy.

What is Information Privacy?What is Information Privacy?

Information privacy is the ability of an individual or group to stop information about themselves from becoming known to people other than those they choose to give the information to.

Privacy is sometimes related to anonymity although it is often most highly valued by people who are publicly known.

Privacy can also be seen as an aspect of security—one in which there are trade-offs between the interests of one group and another can become particularly clear

Page 6: TTS1133 : INTERNET ETHICS AND CYBER LAW CHAPTER THREE: Privacy.

Privacy and EmployeesPrivacy and Employees

Companies need information about their employees to run their business effectively

As of March 2005, 60% of employers monitored employee e-mails

70% of Web traffic occurs during work hours

78% of employers reported abuse60% employees admitted abuse

Page 7: TTS1133 : INTERNET ETHICS AND CYBER LAW CHAPTER THREE: Privacy.

Privacy and Government Privacy and Government AgenciesAgencies

About 2,000 government agencies have databases with information on people

Government agencies need information to operate effectively

Whenever you are in contact with government agency, you leave behind information about yourself

Page 8: TTS1133 : INTERNET ETHICS AND CYBER LAW CHAPTER THREE: Privacy.

Issues on PrivacyIssues on Privacy

A Canadian funeral home obtained the names and addresses of people diagnosed with cancer, and contacted a Montreal woman on the list about buying a burial plot and pre-paid funeral services. 

A candy company got hold of the names of people in a weight watchers program, and sent them chocolate bars in the mail. 

Part of a Toronto woman's medical record was printed on the back of real estate flyers which were delivered to hundreds of mailboxes. 

Participants in a medical research study on sickle cell anemia reported an increase in difficulties getting employment and insurance after they gave genetic samples to the researchers.

Phone Busters National Call Centre reports that over 7,600 Canadians had their identities stolen in 2002, with total losses of more than $8.5 million.

Page 9: TTS1133 : INTERNET ETHICS AND CYBER LAW CHAPTER THREE: Privacy.

Laws on PrivacyLaws on Privacy

Health Insurance Portability and Accountability Act (HIPAA) protects personal health information

Financial Services Modernization Act requires that financial institutions protect personal customer information

Page 10: TTS1133 : INTERNET ETHICS AND CYBER LAW CHAPTER THREE: Privacy.

Security And EmployeesSecurity And Employees

Attacks on information and computer resources come from inside and outside the company

Computer sabotage costs about $10 billion per year

In general, employee misconduct is more costly than assaults from outside

Page 11: TTS1133 : INTERNET ETHICS AND CYBER LAW CHAPTER THREE: Privacy.

Security and EmployeesSecurity and Employees

Page 12: TTS1133 : INTERNET ETHICS AND CYBER LAW CHAPTER THREE: Privacy.

IT Privacy & ProtectionIT Privacy & Protection

In Malaysia, we have:Akta Komunikasi dan Multimedia 1998 merupakan satu Akta berkenaan

undang-undang siber dan dibentuk sebagai satu rangkakerja bagi

campurtangan kerajaan Malaysia dalam memantau industri komunikasi

dan multimedia.Communications and Multimedia Act

1998 is an Act of cyber laws and established as a framework for the intervention of the government in monitoring communications and

multimedia industry

Page 13: TTS1133 : INTERNET ETHICS AND CYBER LAW CHAPTER THREE: Privacy.

Communications and Communications and Multimedia Act 1998Multimedia Act 1998

The activities and services controlled under this Act, ◦ Traditional broadcasting◦ Telecommunications◦ Online services, - including facilities and

networks However, there is no provision in the Act that

allow Internet censorship. Under the MSC Malaysia Bill Guarantees (MSC

Malaysia Bill of Guarantees), the government pledged not to censor the Internet.

Page 14: TTS1133 : INTERNET ETHICS AND CYBER LAW CHAPTER THREE: Privacy.

ACT - RelatedACT - Related

This Act is the cyber laws of the longest among the six cyber laws enacted in Malaysia so far.

Apart from this Act, there are another five related:◦Computer Crimes Act 1997.◦Digital Signature Act 1997.◦Telemedicine Act 1997.◦Copyright Amendment Act 1997.◦Malaysian Communications Council and

Multimedia Act 1998.

Page 15: TTS1133 : INTERNET ETHICS AND CYBER LAW CHAPTER THREE: Privacy.

Computer Crime Act 1997Computer Crime Act 1997

Computer Crimes Act 1997 was associated with offenses related to misuse of computers for the purpose of committing crimes.

Under this act, unauthorized access or modify any program or data contained in a computer is wrong and punishable.

This Act is effective to any crime committed outside of Malaysia even though the offense is committed by a person or from any place outside Malaysia as long as the computer, program or data is located in Malaysia or accessible, connected or used with a computer in Malaysia .

Page 16: TTS1133 : INTERNET ETHICS AND CYBER LAW CHAPTER THREE: Privacy.

Digital Signature Act 1997Digital Signature Act 1997

Digital Signature Act 1997 is a deed made to give confidence and encourage the public to conduct secure electronic transactions both locally and internationally.

This Act into force on October 1, 1998. Under this act, providing a digital signature verification system to confirm the identity of the sender and verify that the message is sent.

To enable the digital signature is certified, a certificate of authority must be obtained.

Certificates will be sent with a message to confirm the message was correct as sent and received.

Page 17: TTS1133 : INTERNET ETHICS AND CYBER LAW CHAPTER THREE: Privacy.

Telemedicine Act 1997Telemedicine Act 1997

Telemedicine Act 1997 is an Act of Malaysia for the regulation and control of the practice of telemedicine, and for matters connected therewith.

This Act is one of six cyber laws enacted in Malaysia so far. This Act is not enforceable, and subject to the discretion of the Minister of Health.

Page 18: TTS1133 : INTERNET ETHICS AND CYBER LAW CHAPTER THREE: Privacy.

Data EncryptionData Encryption

Encryption is the process of converting data (plaintext) into something that appears to be random and meaningless (ciphertext), which is difficult to decode without a secret key.

Encryption is used to provide message confidentiality.

Decryption is the reverse process which is transforming an encrypted message back into normal.

Encipher, decipher, encode, decode is the same word for encryption and decryption.

Page 19: TTS1133 : INTERNET ETHICS AND CYBER LAW CHAPTER THREE: Privacy.

19

TYPES OF ENCRYPTIONTYPES OF ENCRYPTION

Two main types of encryption: ◦Asymmetric encryption (public-key

encryption)◦Symmetric encryption (secret-key

encryption).Encryption is the method to make sure

that the message didn’t access by illegal person.

Page 20: TTS1133 : INTERNET ETHICS AND CYBER LAW CHAPTER THREE: Privacy.

20

Figure Encryption with KeysFigure Encryption with Keys

Page 21: TTS1133 : INTERNET ETHICS AND CYBER LAW CHAPTER THREE: Privacy.

21

Figure: Symmetric Figure: Symmetric EncryptionEncryption

Page 22: TTS1133 : INTERNET ETHICS AND CYBER LAW CHAPTER THREE: Privacy.

22

Table: Comparing Secret Key and Table: Comparing Secret Key and Public Key EncryptionPublic Key Encryption

Page 23: TTS1133 : INTERNET ETHICS AND CYBER LAW CHAPTER THREE: Privacy.

Consumer ProfilingConsumer ProfilingCompanies openly collect personal

information about people who surf the Internet.

Many companies also obtain information about Web surfers without their manual input, through the use of cookies.

Cookies are small files that are written to the hard disk by many of the web site that have been visited.

A message given to a Web browser by a Web server and it stores the message in a text file.

Page 24: TTS1133 : INTERNET ETHICS AND CYBER LAW CHAPTER THREE: Privacy.

COOKIESCOOKIESThe main purpose of cookies is to identify users and

possibly prepare customized Web pages for them. These are tokens that are attached to a user or

program and change depending on the areas entered by the user or program.

For example, online retail sites use cookies to implement shopping charts, which enable you to make selections on shopping activities.

Several Internet and networks, such as DoubleClick, use cookies to track user’s browsing actions across thousands of the most popular Internet sites.

Prepared By: Razif Razali 24

Page 25: TTS1133 : INTERNET ETHICS AND CYBER LAW CHAPTER THREE: Privacy.

Prepared By: Razif Razali 25

Page 26: TTS1133 : INTERNET ETHICS AND CYBER LAW CHAPTER THREE: Privacy.

SPAMMINGSPAMMING Spam is the use of electronic messaging systems

(including most broadcast media, digital delivery systems) to send unsolicited bulk messages indiscriminately.

Some people define spam even more generally as any unsolicited e-mail.

However, if a long-lost brother finds your e-mail address and sends you a message, this could hardly be called spam, even though it's unsolicited.

Real spam is generally e-mail advertising for some product sent to a mailing list or newsgroup.

People who create electronic spam are called spammers.

Page 27: TTS1133 : INTERNET ETHICS AND CYBER LAW CHAPTER THREE: Privacy.

Protecting PrivacyProtecting Privacy

Steps in protecting privacy from the risks of computer technology is awareness of how:◦ Technology works◦ How it’s being used◦ What the risks are?◦ What tools are available?◦ Unwanted uses of personal data.

Page 28: TTS1133 : INTERNET ETHICS AND CYBER LAW CHAPTER THREE: Privacy.

Advanced Surveillance Advanced Surveillance TechnologyTechnologyAdvance technology:

◦ Thermal imaging devices◦ Surveillance cameras◦ Face recognition

Example:◦ Police can use thermal imaging devices from

outside a house to detect patterns of heat being generated from inside to find a marijuana in the house.

◦ The police department of Tampa, Florida placed 36 security cameras in the town and connected them to a powerful computer loaded with face recognition software.