SlideShare uma empresa Scribd logo
1 de 9
Anita Hemp
AET/531
November 11, 2013
Terri Bubb
When an organization implements new
technology, legal and ethical issues related to
technology can exist. Issues to consider can be
privacy, intellectual property, fair use, and
copyright.
Legal and Ethical Issues
 Privacy Act of 1974
 Consumer Privacy Act
 The Freedom of Information Act (FOIA)
 Acceptable Use Policy (AUP)

 Children’s Internet Protection Act (CIPA)
Privacy Act of 1974
The Privacy Act was amended in 1988 to regulate
public and private entities on the use of personal and
public related information. It also stipulates the rights
for individual to protect his or her personal
information.
Consumer Privacy Act
This Act is the feasibility of using the internet to
purchase items and to share information. The
objective is to set limits on government access to
personal information.
Freedom of Information Act (FOIA)
FOIA is a law that gives you the right to access
information from any government agency. It is often
described as the law that keeps citizens in the know
about their government.
Acceptable Use Policy (AUP)
AUP is a set of rules applied by an organization for its
network, website or large computer system that restrict
the ways in which they are used.
Children’s Internet Protection Act
(CIPA)
CIPA Is a federal law enacted by Congress in 2001 to
regulate access to offensive content over the internet
on school and library computers. The act establishes
protection measures such as block or filter internet
access to pictures that are obscene, child pornography,
and anything harmful to minors.
Many policies are currently being written or
amended to regulate the appropriate use and
practice of information technology tools and the
internet. Organizations must abide by these rules
or face consequences.

http://www.copyright.gov

Mais conteúdo relacionado

Mais procurados

The Data Protection Act
The Data Protection ActThe Data Protection Act
The Data Protection Act
burto111
 
Presentation ICT2
Presentation ICT2Presentation ICT2
Presentation ICT2
safa
 
Privacy and Protection of Personal Information law seminar
Privacy and Protection of Personal Information law seminarPrivacy and Protection of Personal Information law seminar
Privacy and Protection of Personal Information law seminar
Lance Michalson
 
Digital identity theft remedial efforts case of uganda_ruyooka
Digital identity theft  remedial efforts case of uganda_ruyookaDigital identity theft  remedial efforts case of uganda_ruyooka
Digital identity theft remedial efforts case of uganda_ruyooka
Ambrose Ruyooka,PMP,CGEIT, CRISC
 
24227541 cyber-law
24227541 cyber-law24227541 cyber-law
24227541 cyber-law
Md Aktar
 
Presentation ICT3
Presentation ICT3Presentation ICT3
Presentation ICT3
safa
 
Wealth Of Networks Info Intellectual P
Wealth Of Networks Info Intellectual PWealth Of Networks Info Intellectual P
Wealth Of Networks Info Intellectual P
rleslein
 

Mais procurados (20)

Social Media and Legal Ethics
Social Media and Legal EthicsSocial Media and Legal Ethics
Social Media and Legal Ethics
 
Chp10 public policy
Chp10 public policyChp10 public policy
Chp10 public policy
 
Data Privacy Introduction
Data Privacy IntroductionData Privacy Introduction
Data Privacy Introduction
 
The Data Protection Act
The Data Protection ActThe Data Protection Act
The Data Protection Act
 
Presentation ICT2
Presentation ICT2Presentation ICT2
Presentation ICT2
 
Privacy in simple
Privacy in simplePrivacy in simple
Privacy in simple
 
social, legal and ethical issues of e-commerce..
social, legal and ethical issues of e-commerce..social, legal and ethical issues of e-commerce..
social, legal and ethical issues of e-commerce..
 
Privacy and Protection of Personal Information law seminar
Privacy and Protection of Personal Information law seminarPrivacy and Protection of Personal Information law seminar
Privacy and Protection of Personal Information law seminar
 
Digital identity theft remedial efforts case of uganda_ruyooka
Digital identity theft  remedial efforts case of uganda_ruyookaDigital identity theft  remedial efforts case of uganda_ruyooka
Digital identity theft remedial efforts case of uganda_ruyooka
 
Presentation ict3992
Presentation ict3992Presentation ict3992
Presentation ict3992
 
24227541 cyber-law
24227541 cyber-law24227541 cyber-law
24227541 cyber-law
 
Legal issues in technology
Legal issues in technologyLegal issues in technology
Legal issues in technology
 
Presentation ICT3
Presentation ICT3Presentation ICT3
Presentation ICT3
 
Personal privacy and computer technologies
Personal privacy and computer technologiesPersonal privacy and computer technologies
Personal privacy and computer technologies
 
Wealth Of Networks Info Intellectual P
Wealth Of Networks Info Intellectual PWealth Of Networks Info Intellectual P
Wealth Of Networks Info Intellectual P
 
Legal Issues in Online Environment
Legal Issues in Online EnvironmentLegal Issues in Online Environment
Legal Issues in Online Environment
 
Finding balance in the age of open data
Finding balance in the age of open dataFinding balance in the age of open data
Finding balance in the age of open data
 
Cyberlaw
CyberlawCyberlaw
Cyberlaw
 
Uganda cyber laws _ isaca workshop_kampala_by Ruyooka
Uganda cyber laws _ isaca workshop_kampala_by RuyookaUganda cyber laws _ isaca workshop_kampala_by Ruyooka
Uganda cyber laws _ isaca workshop_kampala_by Ruyooka
 
Information Security in the Age of Wikileaks
Information Security in the Age of WikileaksInformation Security in the Age of Wikileaks
Information Security in the Age of Wikileaks
 

Destaque (6)

FTC Emphasizes Privacy Protections, Truth in Advertising in Business Guide fo...
FTC Emphasizes Privacy Protections, Truth in Advertising in Business Guide fo...FTC Emphasizes Privacy Protections, Truth in Advertising in Business Guide fo...
FTC Emphasizes Privacy Protections, Truth in Advertising in Business Guide fo...
 
Tech Use Posters
Tech Use PostersTech Use Posters
Tech Use Posters
 
Legal, Ethical, and Social Issues in Educational Computing
Legal, Ethical, and Social Issues in Educational ComputingLegal, Ethical, and Social Issues in Educational Computing
Legal, Ethical, and Social Issues in Educational Computing
 
Computer Ethics and Legal Issues
Computer Ethics and Legal IssuesComputer Ethics and Legal Issues
Computer Ethics and Legal Issues
 
Ethical and social issues in information systems
Ethical and social issues in information systemsEthical and social issues in information systems
Ethical and social issues in information systems
 
Legal, Ethical and Social Issues in Technology
Legal, Ethical and Social Issues in TechnologyLegal, Ethical and Social Issues in Technology
Legal, Ethical and Social Issues in Technology
 

Semelhante a Week 6 legal and ethical issues associated with modern technologies - anita hemp

Ronit Mathur Cyber Security assesment.pptx
Ronit Mathur Cyber Security assesment.pptxRonit Mathur Cyber Security assesment.pptx
Ronit Mathur Cyber Security assesment.pptx
ManuGupta344215
 
1ITC358ICT Management and Information SecurityChapter 12.docx
1ITC358ICT Management and Information SecurityChapter 12.docx1ITC358ICT Management and Information SecurityChapter 12.docx
1ITC358ICT Management and Information SecurityChapter 12.docx
hyacinthshackley2629
 
Itechlaw conferene presentation 15th feb 2013 the quest over identity the iss...
Itechlaw conferene presentation 15th feb 2013 the quest over identity the iss...Itechlaw conferene presentation 15th feb 2013 the quest over identity the iss...
Itechlaw conferene presentation 15th feb 2013 the quest over identity the iss...
Prof. (Dr.) Tabrez Ahmad
 
httpsdigitalguardian.comblogsocial-engineering-attacks-common.docx
httpsdigitalguardian.comblogsocial-engineering-attacks-common.docxhttpsdigitalguardian.comblogsocial-engineering-attacks-common.docx
httpsdigitalguardian.comblogsocial-engineering-attacks-common.docx
adampcarr67227
 
ACCESS TO INFORMATION Final Eugene (2)
ACCESS TO INFORMATION Final Eugene (2)ACCESS TO INFORMATION Final Eugene (2)
ACCESS TO INFORMATION Final Eugene (2)
JAMAL JUMA
 

Semelhante a Week 6 legal and ethical issues associated with modern technologies - anita hemp (19)

Aet wk 6
Aet wk 6 Aet wk 6
Aet wk 6
 
Aet wk 6
Aet wk 6 Aet wk 6
Aet wk 6
 
Legislation
LegislationLegislation
Legislation
 
Right to privacy on internet and Data Protection
Right to privacy on internet and Data ProtectionRight to privacy on internet and Data Protection
Right to privacy on internet and Data Protection
 
Cyber law
Cyber lawCyber law
Cyber law
 
Ronit Mathur Cyber Security assesment.pptx
Ronit Mathur Cyber Security assesment.pptxRonit Mathur Cyber Security assesment.pptx
Ronit Mathur Cyber Security assesment.pptx
 
Data Protection in India
Data Protection in IndiaData Protection in India
Data Protection in India
 
Cie 2 cyber law
Cie 2  cyber lawCie 2  cyber law
Cie 2 cyber law
 
Chap 4 (1)
Chap 4 (1)Chap 4 (1)
Chap 4 (1)
 
Farm Data: Examining the Legal Issues
Farm Data: Examining the Legal Issues Farm Data: Examining the Legal Issues
Farm Data: Examining the Legal Issues
 
1ITC358ICT Management and Information SecurityChapter 12.docx
1ITC358ICT Management and Information SecurityChapter 12.docx1ITC358ICT Management and Information SecurityChapter 12.docx
1ITC358ICT Management and Information SecurityChapter 12.docx
 
Itechlaw conferene presentation 15th feb 2013 the quest over identity the iss...
Itechlaw conferene presentation 15th feb 2013 the quest over identity the iss...Itechlaw conferene presentation 15th feb 2013 the quest over identity the iss...
Itechlaw conferene presentation 15th feb 2013 the quest over identity the iss...
 
Data theft rules and regulations things you should know (pt.1)
Data theft rules and regulations  things you should know (pt.1)Data theft rules and regulations  things you should know (pt.1)
Data theft rules and regulations things you should know (pt.1)
 
Know your rights protection against facial recognition software.
Know your rights  protection against facial recognition software.Know your rights  protection against facial recognition software.
Know your rights protection against facial recognition software.
 
httpsdigitalguardian.comblogsocial-engineering-attacks-common.docx
httpsdigitalguardian.comblogsocial-engineering-attacks-common.docxhttpsdigitalguardian.comblogsocial-engineering-attacks-common.docx
httpsdigitalguardian.comblogsocial-engineering-attacks-common.docx
 
ACCESS TO INFORMATION Final Eugene (2)
ACCESS TO INFORMATION Final Eugene (2)ACCESS TO INFORMATION Final Eugene (2)
ACCESS TO INFORMATION Final Eugene (2)
 
Privacy and Privacy Law in India By Prashant Mali
Privacy and Privacy Law in India By Prashant MaliPrivacy and Privacy Law in India By Prashant Mali
Privacy and Privacy Law in India By Prashant Mali
 
Chapter 4_dp-pertemuan 6
 Chapter 4_dp-pertemuan 6 Chapter 4_dp-pertemuan 6
Chapter 4_dp-pertemuan 6
 
2010-06 analysis of laws inconsistent with human rights in uganda_hurinet
2010-06 analysis of laws inconsistent with human rights in uganda_hurinet2010-06 analysis of laws inconsistent with human rights in uganda_hurinet
2010-06 analysis of laws inconsistent with human rights in uganda_hurinet
 

Último

Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
vu2urc
 

Último (20)

Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 

Week 6 legal and ethical issues associated with modern technologies - anita hemp

  • 2. When an organization implements new technology, legal and ethical issues related to technology can exist. Issues to consider can be privacy, intellectual property, fair use, and copyright.
  • 3. Legal and Ethical Issues  Privacy Act of 1974  Consumer Privacy Act  The Freedom of Information Act (FOIA)  Acceptable Use Policy (AUP)  Children’s Internet Protection Act (CIPA)
  • 4. Privacy Act of 1974 The Privacy Act was amended in 1988 to regulate public and private entities on the use of personal and public related information. It also stipulates the rights for individual to protect his or her personal information.
  • 5. Consumer Privacy Act This Act is the feasibility of using the internet to purchase items and to share information. The objective is to set limits on government access to personal information.
  • 6. Freedom of Information Act (FOIA) FOIA is a law that gives you the right to access information from any government agency. It is often described as the law that keeps citizens in the know about their government.
  • 7. Acceptable Use Policy (AUP) AUP is a set of rules applied by an organization for its network, website or large computer system that restrict the ways in which they are used.
  • 8. Children’s Internet Protection Act (CIPA) CIPA Is a federal law enacted by Congress in 2001 to regulate access to offensive content over the internet on school and library computers. The act establishes protection measures such as block or filter internet access to pictures that are obscene, child pornography, and anything harmful to minors.
  • 9. Many policies are currently being written or amended to regulate the appropriate use and practice of information technology tools and the internet. Organizations must abide by these rules or face consequences. http://www.copyright.gov