Opening Case: The Privacy Commissioner of Canada’s Work McGraw-Hill-Ryerson ©2015 The McGraw-Hill Companies, All Rights Reserved Chapter Ten Overview • SECTION 10.1 – INFORMATION ETHICS AND PRIVACY – Introduction – Information Ethics – Information Privacy – Developing Information Management Policies • SECTION 10.2 – INFORMATION SECURITY – Introduction – Protecting Information – Protecting Data – People: The First Line of Defence – The Second Line of Defence: Technology Copyright © 2015 McGraw-Hill Ryerson Limited 10-2 Learning Outcomes 1. Explain what information ethics is and its importance in the workplace. 2. Describe what information privacy is and the differences in privacy legislation around the world. 3. Identify the differences between various information ethics and privacy policies in the workplace. 4. Describe information security, and explain why people are the first line of defence for protecting information. 5. Describe how information technologies can be used to enhance information security. Copyright © 2015 McGraw-Hill Ryerson Limited 10-3 INFORMATION ETHICS AND PRIVACY McGraw-Hill-Ryerson ©2015 The McGraw-Hill Companies, All Rights Reserved Introduction Learning Outcome 10.1 • Ethics – The principles and standards that guide our behaviour towards other people • Privacy is a major ethical issue – Privacy is the right to be left alone when you want to be, to have control over your own personal possessions, and not to be observed without your consent – Confidentiality is the assurance that messages and information are available only to those who are authorized to view them Copyright © 2015 McGraw-Hill Ryerson Limited 10-5 Technology-Related Ethical Issues & Concepts Learning Outcome Intellectual Property Intangible creative work that is embodied in physical form Copyright The legal protection afforded an expression of an idea, such as a song, video game, and some types of proprietary documents Fair Dealing The principle by which, in certain situations, it is legal to use copyrighted material Pirated Software Copyrighted software that is used, duplicated, or sold without authorization by the copyright holder 10.1 Counterfeit Software Software that is manufactured to look like the real thing and sold as such Figure 10.1 Copyright © 2015 McGraw-Hill Ryerson Limited 10-6 Trust Supports Business Learning Outcome 10.1 Trust between companies, partners, and suppliers is the support structure of business, in particular, e-business Primary Reasons Privacy Issues Reduce Trust for E-Business 1. There is a loss of personal privacy. 2. Internet users are more inclined to purchase a product on a website that has a privacy policy. 3. Effective privacy would convert more Internet users to Internet buyers. From Figure 10.2 Copyright © 2015 McGraw-Hill Ryerson Limited 10-7 Information Ethics Learning Outcome Ethics 10.1 • The principles and standards that guide our behaviour towards other people Acting Ethically and Legally Are Not Always the Same Information Ethics • The ethical and moral issues arising from the development and use of information technologies, as well as the creation, duplication, processing and distribution of information itself. Copyright © 2015 McGraw-Hill Ryerson Limited Figure 10.4 10-8 Information Has No Ethics Learning Outcome 10.1 Examples of Ethically Questionable or Unacceptable Use of Information Systems Individuals copy, use and distribute software. Employees search organizational databases for sensitive corporate and personal information. Organizations collect, buy, and use information without checking validity or accuracy of the information. Individuals create and spread viruses that cause trouble for those using and maintaining information systems. Individuals hack into computers to steal proprietary information. Employees destroy or steal proprietary organizational information such as schematics, sketches, customer lists and reports. From Figure 10.3 Copyright © 2015 McGraw-Hill Ryerson Limited 10-9 Information & Ethical Concerns Learning Outcome 10.1 • Information Ethics in the Workplace – Replacing people with computers, one set of boring jobs with a new set of boring jobs • Systems & Respect for Human Dignity – “Dehumanizing” jobs, making jobs overly regimented & inflexible, disrespecting human intelligence – Health & safety concerns from poorly designed interfaces • Tracking People’s Activities – Monitoring Web browsing and social media use at work – Cyberstalking—tracking individuals through social media for malicious or criminal reasons – Spyware—unauthorized tracking of browsing Copyright © 2015 McGraw-Hill Ryerson Limited 10-10 Employee Monitoring Learning Outcome Effects of Employee Monitoring 10.1 Employee absenteeism reached its highest point in several years in 2009. Studies indicate that electronic monitoring results in lower job satisfaction, in part, because people begin to believe the quantity of their work is more important than the quality. Electronic monitoring also induces what psychologists call “psychological reactance”: the tendency to rebel against constraint. From Figure 10.5 Copyright © 2015 McGraw-Hill Ryerson Limited 10-11 Protecting Digital Content Learning Outcome 10.1 Canada’s Copyright Modernization Act received royal assent on June 29, 2012. Key changes include: • Legalizing format shifting • Legalizing time shifting • Allowing back up copies of content to be made against loss or damage • Allowing “mash ups” (create blend of copies) if not for re-sale • Enacting a system where copyright holders can inform ISPs of possible privacy by their customers Copyright © 2015 McGraw-Hill Ryerson Limited 10-12 Protecting Digital Content Learning Outcome 10.1 Additional changes from Canada’s Copyright Modernization Act include: • Protecting search engines and ISPs from copyright violations of their users • Differentiating commercial and individual copyright violations in terms of penalties • Expanding the meaning of fair dealing to include purposes of parody, satire and education • Criminalizing cracking a digital lock placed on a device, disc, or file Copyright © 2015 McGraw-Hill Ryerson Limited 10-13 Information Privacy Learning Outcome 10.2 Information privacy deals with how personal information is collected and stored on computer systems; it also covers how the information is shared. • Personal Information – Data or information that can be directly related to an identified person – Regardless of data format and content • Breaches of Information Privacy – Not about preventing collection of information to complete business transactions – Breaches occur with inappropriate disclosure or unauthorized access • Protecting Personal Data – Just as steps are taken to protect physical assets, personal information must be proactively protected Copyright © 2015 McGraw-Hill Ryerson Limited 10-14 Information Privacy in Europe Learning Outcome 10.2 • Strong Privacy Laws – Directives indicate the required results but allow EU members to determine their own methods • Citizens are granted the following rights: – To know the source of the personal data processing and the purpose of such processing – To access and/or rectify inaccuracies in one’s personal data – To disallow the use of personal data with the proviso that personal data can only be transferred outside the borders to countries offering the same level of protection – Based on eight key principles that have also been adopted in Canada Copyright © 2015 McGraw-Hill Ryerson Limited 10-15 Information Privacy in the US Learning Outcome 10.2 • Less Centralized approach than in Canada or Europe – No single encompassing law – Access to public information is culturally acceptable • Exceptions: – California legislates an individual’s inalienable right to privacy and 2003 Online Privacy & Protection Act ensures websites post privacy policies – COPPA, US Federal law established in 1998, governs collection of personal information from children under 13 – HIPAA, 1996, governs protects personal health care information Copyright © 2015 McGraw-Hill Ryerson Limited 10-16 Information Privacy Canada Learning Outcome 10.2 • Federal Legislation – PIPEDA (Personal Information Protection and Electronic Documents Act) follows the European model. It governs all organizations in Canada. It is concerned about protecting personal information of all Canadians. – The Privacy Act protects personal information collected and used by the Federal Government – The Bank Act is an example of a federal law with specific privacy protections, in this case, financial data held by financial institutions. • Provincial Legislation – Each province has its own ‘public-sector’ legislation – Almost all provinces have the equivalent of PIPEDA to govern those enterprises operating only within provincial boundaries Copyright © 2015 McGraw-Hill Ryerson Limited 10-17 Ten Guiding Principles of PIPEDA for Organizations Learning Outcome 1. Accountability An organization is responsible for personal information under its control and shall designate an individual or individuals who are accountable for the organization’s compliance with the following principles. 10.2 2. Identifying Purpose The purposes for which personal information is collected shall be identified by the organization at or before the time the information is collected. 3. Consent The knowledge and consent of the individual are required for collection, use, or disclosure of personal information, except when inappropriate. 4. Limiting Collection The collection of personal information shall be limited to that which is necessary for the purposes identified by the organization. Information shall be collected by fair and lawful means. Figure 10.6 Copyright © 2015 McGraw-Hill Ryerson Limited 10-18 Ten Guiding Principles of PIPEDA for Organizations Learning Outcome 10.2 5. Limiting Use, Personal information shall not be used or disclosed for purposes other than those for which it was collected, disclosure, and retention except with the consent of the individual or as required by the law. Personal information shall be retained only as long as necessary for fulfillment of those purposes. 6. Accuracy Personal information shall be as accurate, complete, and up to date as is necessary for the purposes for which it is to be used. 7. Safeguards Personal information shall be protected by security safeguards appropriate to the sensitivity of the information. Figure 10.6 Copyright © 2015 McGraw-Hill Ryerson Limited 10-19 Ten Guiding Principles of PIPEDA for Organizations Learning Outcome 8. Openness The collection of personal information shall be limited to that which is necessary for the purposes identified by the organization. Information shall be collected by fair and lawful means. 9. Individual Access Upon request, an individual shall be informed of the existence, use, and disclosure of his or her personal information and shall be given access to that information. An individual shall be able to challenge the accuracy and completeness of the information and have it amended as appropriate. 10. Challenging Compliance An individual shall be able to address a challenge concerning compliance with the above principles to the designated individual or individuals for the organization’s compliance. 10.2 Figure 10.6 Copyright © 2015 McGraw-Hill Ryerson Limited 10-20 Developing Information Management Policies Learning Outcome 10.3 E-Policies are guidelines and procedures that encourage ethical use of computers and the Internet in business. Overview of E-Policies Figure 10.7 Copyright © 2015 McGraw-Hill Ryerson Limited 10-21 Ethical Computer Use and Information Privacy E-Policies Learning Outcome 10.3 • Ethical Computer Use Policy – Established as an essential step in creating an ethical corporate culture – Ensures that employees know how to behave, communicates expectations and penalties – Control should be by informed consent through corporate training or other forms of education and direction • Information Privacy Policy – Contains general principles regarding information privacy – Processes and penalties should prevent unauthorized access to information for malicious or fraudulent reasons but also accidental, non-malicious access that may have equally serious repercussions Copyright © 2015 McGraw-Hill Ryerson Limited 10-22 Acceptable Use and Internet Use E-Policies Learning Outcome 10.3 • Acceptable Use Policy – Requires the user to agree to follow it to be provided access to corporate email, information systems, and the Internet – Nonrepudiation occurs when a user denies their action. Acceptable Use Policies often have nonrepudiation clauses – Also included are stipulations for lawful use, respect of others in the community and outside • Internet Use Policy – – – – Describes the Internet services available to the user Defines the purpose of Web access and any restrictions to it Describes guidelines for protecting the user and the company States penalties if the policy is violated Copyright © 2015 McGraw-Hill Ryerson Limited 10-23 Email Privacy Learning Outcome 10.3 • Email Privacy Policy – Details the extent to which email may be read by others – Defines legitimate email uses and responsibly manages accounts after employee has left the company – Explains backup procedures to employees – Discourages junk mail or SPAM – Prohibits disruptive email behaviour – Describes legitimate grounds for reading employee mail – Limits the organization’s responsibility for mail leaving the organization – Some companies include a specific Anti-Spam policy to restrict the sending of unsolicited mail Copyright © 2015 McGraw-Hill Ryerson Limited 10-24 Managing Email Privacy Learning Outcome 10.3 Email Is Stored on Multiple Computers Figure 10.8 Copyright © 2015 McGraw-Hill Ryerson Limited 10-25 Social Media Policy Learning Outcome 10.3 • Social Media is public communication not controlled by a company, but concerning it, that can be beneficial or risky – Social Media Policy outlines guidelines or principles that should govern employee online communications about the company – Should include blog and personal blog policies – Cover employee social network and personal social network policies including Facebook, Twitter, LinkedIn and You Tube – Control communications detailing brand activity and organizational proprietary information of any kind Copyright © 2015 McGraw-Hill Ryerson Limited 10-26 Workplace Monitoring Policy Learning Outcome 10.3 • Is a risk management obligation – Ensures that actions and activities harmful to the organization are discovered and terminated or deterred – Is virtually unregulated, employees should act as though they are being observed – Workplace MIS monitoring tracks computer activity by number of keystrokes, error rate, transactions processed etc. – Employee Monitoring Policy provides transparency and informs employees when, how, why and where the company is watching – Should provide specific details as appropriate, indicate consequences of violating the policy and enforce the policy evenly Copyright © 2015 McGraw-Hill Ryerson Limited 10-27 Internet Monitoring Technologies Learning Outcome 10.3 Key logger or key trapper, software A program that records every keystroke and mouse click a user makes. Hardware key logger A device that captures keystrokes from keyboard to motherboard. Cookie A small file deposited in the user’s hard drive to record browsing information. Adware Software attached to a download that generates ads on a user’s machine. Spyware(sneakware or stealthware) An unauthorized app hidden within legitimate software to record browsing behaviour. Web log Browser data stored on a web server. Clickstream Records user browsing sessions including what websites, how long, what was viewed/purchased Figure 10.9 Copyright © 2015 McGraw-Hill Ryerson Limited 10-28 OPENING CASE QUESTIONS The Privacy Commissioner of Canada’s Work 1. Why is protecting personal information in the best interests of both Canadians and the Government of Canada? 2. What policies has the Government of Canada implemented to protect citizen information privacy? 3. What lessons can be learned from the opening case study that will help other organizations better protect the personal information they collect? 4. How does the recent trend of governments allowing public access to data raise awareness of the need for governments to embrace privacy planning as part of normal, everyday business practice? Copyright © 2015 McGraw-Hill Ryerson Limited 10-29 Data Warehousing McGraw-Hill-Ryerson ©2015 The McGraw-Hill Companies, All Rights Reserved Sources of Unplanned Downtime Learning Outcome 10.4 Figure 10.10 Copyright © 2015 McGraw-Hill Ryerson Limited 10-31 The Cost of Downtime Learning Outcome 10.4 Figure 10.11 Copyright © 2015 McGraw-Hill Ryerson Limited 10-32 Protecting Information Learning Outcome 10.4 • Vulnerabilities to an organization can occur for reasons that have nothing to do with IS decisions. – Moving smoking outside opened a security door – Loss of CDs sent through internal mail caused a breach of customer information – Poor hiring practices lead to negligent and malicious employees • Data and information are intangible. Difficult to know what is not secure, stolen or re-directed. • Solid security processes & practices are critical. • Information security is a broad term encompassing protection of information assets from accidental or intentional misuse Copyright © 2015 McGraw-Hill Ryerson Limited 10-33 Data Backup and Recovery Learning Outcome 10.4 Data Backup and Recovery, Disaster Recovery, and Business Continuity Planning Figure 10.12 Copyright © 2015 McGraw-Hill Ryerson Limited 10-34 Disaster Recovery Learning Outcome 10.4 • Disaster – Natural: such as flood, fire, earthquake; Malicious: such as hackers; Negligence: due to employee ignorance, fatigue, or human fallibility • Fault Tolerance – A system that has a back up component when it does collapse. • Failover – Provides a secondary system to take over the duties of one that becomes unavailable. • Disaster Recover Plan – Detailed process regaining data and making the system operationally available again • Hot Site A fully equipped failover facility • Cold Site A separate wired facility to which a company can move Copyright © 2015 McGraw-Hill Ryerson Limited 10-35 Business Continuity Planning Learning Outcome 10.4 A Plan for the recovery and restoration of partly or completely interrupted critical business functions within a pre-determined time after a disaster or extended disruption. 1. Establish a committee that makes sure control is established after a disaster. 2. Ensure a business impact analysis exists to identify the organization’s goals and priorities. 3. Ensure plans, measures and arrangements are available for the business to continue operating. 4. Establish quality assurance techniques to assess the plan’s accuracy, relevance effectiveness and identify weak spots. Copyright © 2015 McGraw-Hill Ryerson Limited 10-36 Disaster Recovery Cost Curve Learning Outcome 10.4 Figure 10.13 Copyright © 2015 McGraw-Hill Ryerson Limited 10-37 Securing Data Learning Outcome 10.4 • Prevent system intrusion – – – – Network security management Anti-SPAM Content filtering Upgrade encryption • Apply patches which are sent out by software companies to correct anomalies in the applications that otherwise could be exploited • Train employees in safe computing practices such as password protection Copyright © 2015 McGraw-Hill Ryerson Limited 10-38 People: The First Line of Defence Learning Outcome 10.4 • Computer Security Survey reported 41.1% of respondents had experienced a security incident • Insiders – Legitimate users who maliciously or accidentally create a computer incident – Most computer incidents are due to insiders • Social Engineering – Techniques to persuade people to do something against policy or the law – Used by hackers to get insiders to give access to the system to them – Employees need to be trained to resist these techniques Copyright © 2015 McGraw-Hill Ryerson Limited 10-39 Information Security Plan Objectives Learning Outcome 10.4 Figure 10.14 Copyright © 2015 McGraw-Hill Ryerson Limited 10-40 Information Security Plan Objectives Learning Outcome 10.4 Figure 10.15 Copyright © 2015 McGraw-Hill Ryerson Limited 10-41 Top 10 Questions Managers Should Ask Regarding Information Security Learning Outcome 10.5 Figure 10.16 Copyright © 2015 McGraw-Hill Ryerson Limited 10-42 Authentication and Authorization Learning Outcome 10.5 • Authentication – Method for confirming user identity – Something a user knows (password), something a user has (smart card, ID), something that is a part of a user (biometric) – Biometrics IDs user through a unique physical attribute of user such as a fingerprint or retinal scan – Identity Theft is fraud that occurs when the perpetrator uses a victim’s personal information to fraudulently acquire their assets • Authorization – Giving someone permission to do something – Different degrees of data access – Read, Read-Write, Read-Write-Copy privileges Copyright © 2015 McGraw-Hill Ryerson Limited 10-43 Examples of Identity Theft Learning Outcome 10.5 Figure 10.17 Copyright © 2015 McGraw-Hill Ryerson Limited 10-44 Methods to Secure Data Learning Outcome 10.5 • Prevention & Resistance – Intrusion Detection System (IDS) monitors incoming network traffic and flags any communication, usually at the packet level, that does not conform to the usual patterns • Content Filtering – An application that reviews the content of network incoming and outgoing traffic to prevent transmission of confidential information, SPAM, and viruses • Encryption – Systems that encode and decode messages – Public Key Encryption (PKE) provides a public key for anyone wishing to send a message to a recipient whose private key is the only one that can decrypt the message Copyright © 2015 McGraw-Hill Ryerson Limited 10-45 Public Key Encryption (PKE) System Learning Outcome 10.5 Figure 10.18 Copyright © 2015 McGraw-Hill Ryerson Limited 10-46 Methods to Secure Data Learning Outcome 10.5 • Firewalls – Hardware or software that guards a private network by analyzing data entering and leaving it – Detects machine-to-machine interaction as well as human-sourced transmissions • Detection and Response – Based on the premise that prevention is never 100% – Provides corrective procedures for unauthorized intrusion into the system once an event happens Copyright © 2015 McGraw-Hill Ryerson Limited 10-47 Public Key Encryption (PKE) System Learning Outcome 10.5 Sample Firewall Architecture Connecting Systems Located in Toronto, New York and Munich Figure 10.19 Copyright © 2015 McGraw-Hill Ryerson Limited 10-48 Types of Hackers Learning Outcome 10.5 Figure 10.20 Copyright © 2015 McGraw-Hill Ryerson Limited 10-49 Types of Malicious Software (Malware) Learning Outcome 10.5 Figure 10.21 Copyright © 2015 McGraw-Hill Ryerson Limited 10-50 Technology-Related Ethical Issues & Concepts Learning Outcome Elevation of Privilege A user misleads a system into granting unauthorized rights. Hoaxes A real virus is transmitted in a message appearing to be a harmless hoax virus. Malicious Code The broad term describing a variety of threats including virus, worms and Trojans. Sniffer A program or device that can monitor data travelling over a network. Packet tampering Consists of altering content of packets as they travel over the Internet. Pharming Reroutes requests for legitimate websites to false ones to collect user information. 10.5 From Figure 10.22 Copyright © 2015 McGraw-Hill Ryerson Limited 10-51 OPENING CASE QUESTIONS The Privacy Commissioner of Canada’s Work 5. In the example, how can the company’s embrace of privacy mitigate future information security problems? 6. What is the biggest information security roadblock facing organizations attempting to achieve compliance with privacy legislation? Can technology alone guarantee that information is kept secure? Why or why not? 7. 8. Unfortunately, privacy and security breaches are a common occurrence in organizations today. What recent privacy and security breaches have been in the media lately? Do you think things will get worse before they get better? How can organizations better prepare themselves against future privacy and security breaches? Copyright © 2015 McGraw-Hill Ryerson Limited 10-52 CLOSING CASE ONE: WestJet Accepts Blame for Spying on Air Canada 1. Was WestJet’s access to Air Canada’s website information ethical? Legal? Explain. 2. How common in organizations is unauthorized access to private competitor information? 3. Does Air Canada have any responsibility in WestJet’s ability to access Air Canada’s private information? Explain. 4. What people measures could Air Canada implement to prevent future unauthorized access to private information? 5. What technology measures might Air Canada implement to prevent future unauthorized access to private information? Copyright © 2015 McGraw-Hill Ryerson Limited 10-53 CLOSING CASE TWO: Information Ethics and Privacy Issues with Facebook Make Headlines 1. Was Nationale Suisse justified in its online monitoring of employees who called in sick? If companies want to conduct such monitoring activities, what steps can they take to lesson negative backlash from the public and their employees? What steps can employees take? 2. Do you think the Privacy Commissioner went to far in her demands? Is this a bit of “much ado about nothing”? 3. Will the changes that Facebook implements to address the Commissioner’s concerns negatively affect the site in any way? What do you think the average Facebook user thinks of the new features? Copyright © 2015 McGraw-Hill Ryerson Limited 10-54 CLOSING CASE TWO: Information Ethics and Privacy Issues with Facebook Make Headlines 4. Do you know of any other examples in the popular press that showcase information ethics or privacy issues with the use of social networking sites like Facebook? 5. Does the above case make you wish to change how you use Facebook in any way? Copyright © 2015 McGraw-Hill Ryerson Limited 10-55 CLOSING CASE THREE: Thinking Like the Enemy 1. How could an organization benefit from attending one of the courses offered at the Intense School? 2. What are the two primary lines of security defence, and how can organizational employees use the information taught by the Intense School when drafting an information security plan? 3. If your employer sent you to take a course at the Intense School, what type of course would interest you and why? 4. What ethical dilemmas are involved in having such a course offered by a private company? Copyright © 2015 McGraw-Hill Ryerson Limited 10-56