Ethics Presentation

39
Ethics Ethics Presentation Presentation CIS4328 Sr. Project II CIS4328 Sr. Project II Team 2 Team 2 6-3-2002 6-3-2002

description

Ethics Presentation. CIS4328 Sr. Project II Team 2 6-3-2002. Team Members:. David Ritchey David Stoner Sheldon Snyder Jill Bauer Mary Cook. Internet Privacy. With Special Concern For Children. In a December 2001 Harris Poll - PowerPoint PPT Presentation

Transcript of Ethics Presentation

Page 1: Ethics Presentation

EthicsEthicsPresentationPresentation

CIS4328 Sr. Project IICIS4328 Sr. Project II

Team 2Team 2

6-3-20026-3-2002

Page 2: Ethics Presentation

Team Members:Team Members:

David RitcheyDavid Ritchey

David StonerDavid Stoner

Sheldon SnyderSheldon Snyder

Jill BauerJill Bauer

Mary CookMary Cook

Page 3: Ethics Presentation

Internet PrivacyInternet PrivacyWithWith

Special Concern ForSpecial Concern For

ChildrenChildren

Page 4: Ethics Presentation

In a December 2001 Harris PollIn a December 2001 Harris Poll

Loss of Privacy at 29% was the thing Loss of Privacy at 29% was the thing most feared by Americansmost feared by Americans

Terrorism was 2Terrorism was 2ndnd at 23% at 23%

Page 5: Ethics Presentation

OutlineOutline

Invasions of Privacy Invasions of Privacy Constitutional Basis of PrivacyConstitutional Basis of Privacy Current Legislation on PrivacyCurrent Legislation on Privacy Have we been here beforeHave we been here before History of COPPAHistory of COPPA COPPACOPPA FilteringFiltering RatingsRatings

Page 6: Ethics Presentation

Invasions of PrivacyInvasions of Privacy

Page 7: Ethics Presentation

INVASION OF PRIVACYINVASION OF PRIVACY

Search and seizureSearch and seizure Unsolicited e-mailUnsolicited e-mail DefamationDefamation SecrecySecrecy Creation of databases consisting of Creation of databases consisting of

personal information. personal information.

Page 8: Ethics Presentation

Search and seizureSearch and seizure

Without a reasonable expectation of privacy, Without a reasonable expectation of privacy, there is no privacy right to protect. Files stored there is no privacy right to protect. Files stored on disk or tape in the home are protected, but the on disk or tape in the home are protected, but the rule becomes less clear when applied to files rule becomes less clear when applied to files stored on an Internet access provider's server. stored on an Internet access provider's server. Web servers, on the other hand, may be Web servers, on the other hand, may be protected by federal law. Some argue that protected by federal law. Some argue that consent of the access provider, however, is all consent of the access provider, however, is all that is required for law enforcement authorities to that is required for law enforcement authorities to search and seize any files in the possession of search and seize any files in the possession of that access provider. Internet service providers that access provider. Internet service providers may have a lot of information about the users may have a lot of information about the users because servers routinely record information because servers routinely record information about users' e-mail and web browsing habits. about users' e-mail and web browsing habits.

Page 9: Ethics Presentation

Unsolicited e-mailUnsolicited e-mail

Unsolicited email is not regulated by federal Unsolicited email is not regulated by federal law at present. Various states have outlawed law at present. Various states have outlawed unsolicited commercial email.  A federal judge unsolicited commercial email.  A federal judge in Philadelphia has ruled that companies have in Philadelphia has ruled that companies have no no First AmendmentFirst Amendment right to send unsolicited right to send unsolicited messages to online service subscribers. messages to online service subscribers.

Minnesota 5-21-02, Jesse ventura, signed the Minnesota 5-21-02, Jesse ventura, signed the firstfirst

Law that sets up punitive damage guidelines for Law that sets up punitive damage guidelines for those that have been “spammed”those that have been “spammed”

Page 10: Ethics Presentation

DefamationDefamation

Individual states specifically prohibit Individual states specifically prohibit defamation, no matter what form it defamation, no matter what form it takes. Defamation consists of false and takes. Defamation consists of false and unprivileged publication which results unprivileged publication which results in economic damages. Financial loss is in economic damages. Financial loss is not necessary where the statement not necessary where the statement implies that a person is a criminal or implies that a person is a criminal or has an unpleasant disease, or which has an unpleasant disease, or which injures a person in respect to his other injures a person in respect to his other office, profession, or business. office, profession, or business. 

Page 11: Ethics Presentation

SecrecySecrecy Trade secrets and other confidential information can also Trade secrets and other confidential information can also

pose legal problems. Unauthorized entry into a computer pose legal problems. Unauthorized entry into a computer system is illegal, whether the target machine is connected system is illegal, whether the target machine is connected to the Internet or not. Nevertheless, hackers still manage to the Internet or not. Nevertheless, hackers still manage to get past the most difficult of firewalls. Compromise of to get past the most difficult of firewalls. Compromise of company secrets can lead to millions of dollars in damages. company secrets can lead to millions of dollars in damages. Hacking is not the only danger to sensitive information, Hacking is not the only danger to sensitive information, however. however.

Some software can tell webmasters which visitors came Some software can tell webmasters which visitors came from which links. In addition, all e-mail has an address from which links. In addition, all e-mail has an address attached. Even if the message content is encrypted, system attached. Even if the message content is encrypted, system administrators have access to the fact of communication administrators have access to the fact of communication between two parties. The existence of communication can between two parties. The existence of communication can itself often be secret, and the Internet cannot provide itself often be secret, and the Internet cannot provide absolute security. In many ways, the Internet abhors absolute security. In many ways, the Internet abhors secrecy. Many netizens believe in an absolute free-flow of secrecy. Many netizens believe in an absolute free-flow of all information. all information.

Page 12: Ethics Presentation

Creation of databases consisting of Creation of databases consisting of personal information.personal information.

A few companies are creating huge databases full of private A few companies are creating huge databases full of private information. Websites may even collect email addresses information. Websites may even collect email addresses inadvertently. In many cases, there is no prohibition on the inadvertently. In many cases, there is no prohibition on the dissemination of personal information. The federal dissemination of personal information. The federal government regulates only its own databases, leaving government regulates only its own databases, leaving private database owners to decide how and when to private database owners to decide how and when to distribute collected information. distribute collected information.

Webmasters use "cookies" as a means of accumulating Webmasters use "cookies" as a means of accumulating information about web surfers without having to ask for it. information about web surfers without having to ask for it. Cookies attempt to keep track of visitors to a Web site. Cookies attempt to keep track of visitors to a Web site. Criticism of cookies has included fear of the loss of privacy. Criticism of cookies has included fear of the loss of privacy. The information that cookies collect from users may be The information that cookies collect from users may be profitable both in the aggregate and by the individual. profitable both in the aggregate and by the individual. Whether the convenience that cookies provide outweighs Whether the convenience that cookies provide outweighs the loss of privacy is a question each Internet user must the loss of privacy is a question each Internet user must decide for him or herself. decide for him or herself.

Page 13: Ethics Presentation

Constitutional Basis of Constitutional Basis of PrivacyPrivacy

Page 14: Ethics Presentation

While the U.S. Constitution does not While the U.S. Constitution does not explicitly use the word "privacy," explicitly use the word "privacy," several of its provisions protect several of its provisions protect different aspects of this fundamental different aspects of this fundamental right.right.

Privacy is considered a “Penumbra Privacy is considered a “Penumbra Right”Right”

Page 15: Ethics Presentation

Penumbra InterpretationPenumbra Interpretation The Fourth Amendment limits government intrusion into people's The Fourth Amendment limits government intrusion into people's

private lives. The Supreme Court's interpretations of the Fourth private lives. The Supreme Court's interpretations of the Fourth Amendment, however, contain weaknesses that are particularly Amendment, however, contain weaknesses that are particularly troubling in the network environment of the Internet. troubling in the network environment of the Internet.

The First Amendment's freedom of expression and association The First Amendment's freedom of expression and association clause, which protects information about those with whom we clause, which protects information about those with whom we associate (e.g., political groups and social organizations), and associate (e.g., political groups and social organizations), and offers protections for the materials that we create, read, view, offers protections for the materials that we create, read, view, etc., in the privacy of our homesetc., in the privacy of our homes

The Fifth Amendment's privilege against self-incrimination, which The Fifth Amendment's privilege against self-incrimination, which protects the autonomy of our protects the autonomy of our bodies, thoughts and beliefs , thoughts and beliefs

The Ninth Amendment, in which the Supreme Court has found The Ninth Amendment, in which the Supreme Court has found protections for the privacy of our family and reproductive life protections for the privacy of our family and reproductive life

The Fourteenth Amendment, which the Supreme Court has also The Fourteenth Amendment, which the Supreme Court has also cited as the source of some limits on state government intrusions cited as the source of some limits on state government intrusions in the freedom and privacy of intimate decisions that affect our in the freedom and privacy of intimate decisions that affect our sexual, family and reproductive lives.sexual, family and reproductive lives.

Page 16: Ethics Presentation

Current Legislation on Current Legislation on PrivacyPrivacy

Page 17: Ethics Presentation

Legislative ProtectionsLegislative Protections Fair Credit Reporting Act (1970)Fair Credit Reporting Act (1970)

Privacy Act of 1974 Privacy Act of 1974

Family Education Rights and Privacy Act (1974) Family Education Rights and Privacy Act (1974)

Right to Financial Privacy Act (1978) Right to Financial Privacy Act (1978)

Privacy Protection Act of 1980 Privacy Protection Act of 1980

Cable Communications Policy Act of 1984Cable Communications Policy Act of 1984

The Electronic Communications Privacy Act (1986) The Electronic Communications Privacy Act (1986)

Video Privacy Protection Act of 1988 Video Privacy Protection Act of 1988

Telephone Consumer Protection Act of 1991 Telephone Consumer Protection Act of 1991

Driver's Privacy Protection Act of 1994 Driver's Privacy Protection Act of 1994

Customer Proprietary Network Information (CPNI) Customer Proprietary Network Information (CPNI) (part of the Telecommunications Reform Act of 1996) (part of the Telecommunications Reform Act of 1996)

Health Insurance Portability and Accountability Act of 1996 (HIPAA) Health Insurance Portability and Accountability Act of 1996 (HIPAA)

Children's Online Privacy Protection Act (COPPA) of 1998 Children's Online Privacy Protection Act (COPPA) of 1998

Page 18: Ethics Presentation

Legislative ProtectionsLegislative Protections

All legislation has passed not to All legislation has passed not to ensure protection of privacy itself but ensure protection of privacy itself but to calm down constituent fears in to calm down constituent fears in specific problem areas as they arise.specific problem areas as they arise.

This trend needs to stopThis trend needs to stop

Page 19: Ethics Presentation

Have We Been Here Have We Been Here Before?Before?

Page 20: Ethics Presentation

Have We Been Here Before?Have We Been Here Before?

In 1946, there were 6,000 black and white In 1946, there were 6,000 black and white TVs in the entire country, mostly in well-to-TVs in the entire country, mostly in well-to-do homes do homes

Three years later, in 1949, there were Three years later, in 1949, there were three million TVs, and, in 1951, there were three million TVs, and, in 1951, there were 12 million. 12 million.

Today, more Americans have TVs than Today, more Americans have TVs than have telephones have telephones

Page 21: Ethics Presentation

Have We Been Here Before?Have We Been Here Before?

People argued about whether TV was a People argued about whether TV was a tool or a toytool or a toy

Would it just provide mindless Would it just provide mindless entertainment, or teach our children and entertainment, or teach our children and bring the world closer together? bring the world closer together?

People had asked similar questions about People had asked similar questions about the radio, movies, the telephone, and even the radio, movies, the telephone, and even the telegraph in the 1840s! the telegraph in the 1840s!

Page 22: Ethics Presentation

Have We Been Here Before?Have We Been Here Before?

Today, they’re asking the same Today, they’re asking the same kinds of questions about computers kinds of questions about computers and the information superhighway. and the information superhighway.

But the answer is always the same: it But the answer is always the same: it isn’t the technology. It is the way isn’t the technology. It is the way people use the technology that people use the technology that makes the difference. makes the difference.

Page 23: Ethics Presentation

Industry Self-RegulationIndustry Self-RegulationIsIs

Not EnoughNot EnoughThe Internet The Internet NeedsNeeds Rules Rules

No Better Demographic to beginNo Better Demographic to beginTo ProtectTo Protect

ThanThan

Our ChildrenOur Children

Page 24: Ethics Presentation

History of COPPAHistory of COPPA

Page 25: Ethics Presentation

History OfHistory OfChildren's Online Privacy Protection Act Children's Online Privacy Protection Act

(COPPA).(COPPA).

In June 1998, the FTC issued its "Report to Congress In June 1998, the FTC issued its "Report to Congress on Privacy Online" in which it announced the on Privacy Online" in which it announced the findings of its survey of 1,400 web sites. The FTC findings of its survey of 1,400 web sites. The FTC found that 89% of the 212 child-oriented web sites found that 89% of the 212 child-oriented web sites it visited collect personally identifiable information it visited collect personally identifiable information directly from children, and only half of them directly from children, and only half of them disclose their information collection practices. disclose their information collection practices. Fewer than 10% of these sites provide for some Fewer than 10% of these sites provide for some form of parental control over the collection of form of parental control over the collection of information from their children. The FTC information from their children. The FTC recommends that legislation be enacted which recommends that legislation be enacted which places "parents in control of the online collection places "parents in control of the online collection and use of personal identifying information from and use of personal identifying information from their children." their children."

Page 26: Ethics Presentation

Children's Online Privacy Children's Online Privacy Protection Act Protection Act

(COPPA).(COPPA).

Page 27: Ethics Presentation

Children's Online Privacy Protection Act Children's Online Privacy Protection Act (COPPA).(COPPA).

Only for Children 13 years and youngerOnly for Children 13 years and younger

Why are Children 14-18 not protected?Why are Children 14-18 not protected?

No other Demographic currently No other Demographic currently protectedprotected

Page 28: Ethics Presentation

Children's Online Privacy Protection Act Children's Online Privacy Protection Act

(COPPA).(COPPA). (1) (1) Collection limitation.Collection limitation. Data collectors may not Data collectors may not

collect personal information from children, unless collect personal information from children, unless it is relevant, necessary and socially acceptable.it is relevant, necessary and socially acceptable.

(2) (2) Disclosure.Disclosure. Each data collector must Each data collector must prominently display a privacy statement which prominently display a privacy statement which discloses what information is being collected or discloses what information is being collected or tracked, how it is collected, how it will be used, tracked, how it is collected, how it will be used, who is collecting it, and who will use it.who is collecting it, and who will use it.

(3) (3) Parental consent.Parental consent. The child must understand The child must understand that he/she must get parental permission before that he/she must get parental permission before visiting areas where personal information is visiting areas where personal information is collected. The burden is on the collector/tracker to collected. The burden is on the collector/tracker to obtain valid parental consent.obtain valid parental consent.

Page 29: Ethics Presentation

Children's Online Privacy Protection Act Children's Online Privacy Protection Act (COPPA).(COPPA).

(4) (4) Use specification/use limitation.Use specification/use limitation. Personal Personal data should not be disclosed, made available or data should not be disclosed, made available or otherwise used for purposes other than those otherwise used for purposes other than those specified in the disclosure statement.specified in the disclosure statement.

(5) (5) Data quality and security.Data quality and security. Personal data Personal data should be protected against loss, unauthorized should be protected against loss, unauthorized access, destruction, use, modification, or access, destruction, use, modification, or disclosure.disclosure.

(6) (6) Parental participation: access, correction Parental participation: access, correction and prevention of future use.and prevention of future use. The data The data collector must provide access to the information collector must provide access to the information it has collected about the child. It must also allow it has collected about the child. It must also allow the parent the ability to correct erroneous data, the parent the ability to correct erroneous data, have data deleted, and/or prevent further use.have data deleted, and/or prevent further use.

Page 30: Ethics Presentation

FilteringFiltering

Page 31: Ethics Presentation

FilteringFilteringA number of products are available A number of products are available

which, when installed in the personal which, when installed in the personal computer, block access to web sites computer, block access to web sites containing objectionable material. containing objectionable material.

Some products also prevent access to Some products also prevent access to the computer during specified hours of the computer during specified hours of the day. Others provide parents a log the day. Others provide parents a log

of the web sites visited by their of the web sites visited by their children. And some prevent access to children. And some prevent access to such web services as Internet Relay such web services as Internet Relay

Chat.Chat.

Page 32: Ethics Presentation

FilteringFiltering

Cyber Patrol: Cyber Patrol: www.cyberpatrol.comwww.cyberpatrol.com Cyber Sitter: Cyber Sitter: www.solidoak.comwww.solidoak.com Net Nanny: Net Nanny: www.netnanny.comwww.netnanny.com Safesearch: Safesearch: www.safesearch.comwww.safesearch.com SurfWatch: SurfWatch: www.surfwatch.comwww.surfwatch.com Web Chaperone: Web Chaperone:

www.webchaperone.comwww.webchaperone.com X-Stop: X-Stop: www.xstop.comwww.xstop.com

Page 33: Ethics Presentation

Features to look for in filtering softwareFeatures to look for in filtering software blocks "outgoing" transmission of personal information such as blocks "outgoing" transmission of personal information such as

name, address, phone number name, address, phone number limits access by time of day and total amount of connect time limits access by time of day and total amount of connect time clearly states its criteria for blocking sites, and allows parents to clearly states its criteria for blocking sites, and allows parents to

read a list of blocked sites read a list of blocked sites has user-definable options, allowing customization of blocked sites has user-definable options, allowing customization of blocked sites allows user to turn software on and off with password control allows user to turn software on and off with password control is updated frequently is updated frequently blocks image files (JPEG/GIF) and binary downloads, likely to blocks image files (JPEG/GIF) and binary downloads, likely to

contain photos and graphic images contain photos and graphic images blocks transfer of compressed files likely to contain adult content blocks transfer of compressed files likely to contain adult content

(ZIP and SIT) (ZIP and SIT) filters offensive language filters offensive language blocks gopher and FTP (File Transfer Protocol) downloads blocks gopher and FTP (File Transfer Protocol) downloads blocks Internet Relay Chats (IRCs) and Usenet Newsgroups blocks Internet Relay Chats (IRCs) and Usenet Newsgroups works with online service providers like AOL, Prodigy, and MSN works with online service providers like AOL, Prodigy, and MSN works with rating systems like PICS and RSACi works with rating systems like PICS and RSACi

Page 34: Ethics Presentation

Filtering Software ProblemsFiltering Software Problems None of these software programs has been proven entirely

effective when put through a set of controlled tests.

Product testers have found that filtering programs often block access to sites with legitimate non-obscene speech, for example the word "breast," which can be found on the American Cancer Society's web site pages concerning breast cancer.

In addition, reviewers are critical of software products which do not disclose the list of keywords used to block web sites.

A further criticism of filtering software is that it can be difficult to install and can cause the computer to operate more slowly.

Page 35: Ethics Presentation

RatingsRatings

Page 36: Ethics Presentation

RatingsRatings One such system has been developed by One such system has been developed by

the Recreational Software Advisory the Recreational Software Advisory Council, called RSACiCouncil, called RSACi

Originally created as a rating system for Originally created as a rating system for computer games, it is the most widely computer games, it is the most widely used PICS rating system to date. used PICS rating system to date.

RSACi allows Internet web site publishers RSACi allows Internet web site publishers to describe the levels of sex, nudity, to describe the levels of sex, nudity, violence and harsh language, with five violence and harsh language, with five levels within each category. levels within each category.

Page 37: Ethics Presentation

RatingsRatings

SafeSurf, SafeSurf, www.safesurf.comwww.safesurf.com NetShepherd NetShepherd www.netshepherd.comwww.netshepherd.com. .

RSACi and SafeSurf rely on web RSACi and SafeSurf rely on web publishers to self-rate their web sites. publishers to self-rate their web sites. NetShepherd conducts third-party NetShepherd conducts third-party rating of sites.rating of sites.

Page 38: Ethics Presentation

Problems with RatingsProblems with Ratings

Self-RegulatedSelf-Regulated

No way to keep a Universal Standard No way to keep a Universal Standard that every website can agree on.that every website can agree on.

Page 39: Ethics Presentation

Thank You for Your TimeThank You for Your Time

The EndThe End