CS5038 The Electronic Society Lecture 7: Legal and Ethical Issues Lecture Outline • • • • • • • • Legal and Ethical Issues Privacy Issues Privacy Policies Protecting Intellectual Property Freedom of Speech Other Legal Issues Avoiding Legal Problems Crime 1 Legal and Ethical Issues Privacy – Collection, Storage, Dissemination Accuracy Who is responsible for errors Are errors intentional or accidental How is injured party compensated Accessibility – right to access information, payment of fees to access it Genealogy Intellectual Property – ownership and value Difficult to protect - easy to copy digitised information, hard to detect Free Speech Internet provides the largest opportunity; but some postings offend people Taxation Especially between different countries Computer crimes Validity of contracts Legality of public key encryption infrastructures Liability of ISPs 2 Privacy Issues Information Privacy = The claim of individuals, groups, or institutions to determine for themselves when, and to what extent, information about them is communicated to others Privacy must be balanced against the needs of society eliminate fraud, organised crime, tax evasion, welfare cheats, terrorists How to collect your private information: Making you register on a Web site Finding you in the Internet Directory Electronic Surveillance – e.g. an employer Reading your e-mail Monitoring your surfing Making your browser record information about you – Cookies Handy for user – website remembers you Potential to gather information about preferences, interests Access information in databases Banks and financial institutions, Cable TV, Telephones, Employers, Schools, Insurance companies, Online vendors 3 Privacy Policies Notice/Awareness To enable consumer to make informed decisions Choice/Consent - aware of options + “opt-out” clauses Individuals must give consent before data can be gathered Data collection Used only for specific, explicit legitimate purpose Retained no longer than necessary for fulfilling original purpose Data should be adequate, relevant, not excessive in relation to objective Data accuracy Data should be accurate and, where and when necessary, kept current The file should be made available, so individual can ensure correctness Data confidentiality Third parties should not be given access to data without the individual’s knowledge or permission, except as required by law Integrity/security – data protected from unauthorised access Enforcement/Redress Obtain judicial remedy and compensation for privacy infringement 4 Protecting Intellectual Property I Copyright = Gives author of intellectual property ownership of it. Lasts for 50 years after death of author in UK (28 years in US) Infringements attracting criminal liability: Commercial production of infringing works Selling or dealing with infringing works Possessing infringing works for trade or business Manufacturing and selling technology for defeating copyright protection systems No Electronic Theft Act: Americans who copy software or other material worth more than $1,000 Copyright Protection Digital watermarks - hidden in source data, inseparable Patent = Grants holder exclusive rights on invention for 20 yrs in UK (17 in US) Must be Novel, involve a sufficiently inventive step and capable of industrial application Stronger than copyright – rights to an idea or invention regardless of how it may be expressed Harder to get – especially in Europe, easier in US – amazon 1-click 5 Protecting Intellectual Property II Trademark = Graphical sign used by a business to identify its goods and services (can be words, designs, letters, numbers shapes) Must be distinctive, original and not deceptive Registered trademarks Can be kept forever (periodic fee) Criminal offense to • Fraudulently use it, including importing goods bearing trademark • Use or possess equipment for forging trademarks Unregistered trademark Cannot pass-off products or services representing them as those of a competitor Domain Names – use the trade name of another company to help attract traffic http://domainmagistrate.com/ 6 Freedom of Speech Governments protective of their role in society Governments attempting to deal with illegal actions – shutting down sites Organised Crime, Anarchy/Terrorism Individuals concerned about their right to information on the Internet Organizations: The Electronic Frontier Foundation / Blue Ribbon Campaign Children Parents concerned about inappropriate Web pages and chat rooms Merchants solicit information from children about their families Approaches to protect children from inappropriate material Parents should be responsible for monitoring their own children Government should protect children from this material Communications decency Act (CDA) unconstitutional Internet providers responsible for all information they enable access to Impossible to control Internet - Freenet 7 Freedom of Speech – Freedom to Spam Spam = Unsolicited Commercial E-mail (UCE) U.S. introduced “Electronic Mailbox Protection Act of 1997” Accepts the use of UCE Prohibits activities that misappropriate the resources of ISPS Disguising the source of the message Distributing an e-mail list with knowledge that a user on list has "opted out“ Sending UCE to a user who has "opted out" Harvesting e-mail addresses for the purpose of sending UCE Enforcement Injunction $500 statutory damages for each violation, and attorney fees Can be increased up to 10 times the amount, if actions were particularly egregious, willful, or knowing violations http://www.spamlaws.com/ 8 Other Legal Issues Internet Taxation – Many unresolved issues – Links: UK EU Point of taxation for a service – Operator or user? Maybe different countries U.S taxes only in state where vendor is located Is a ‘hard’ copy (book, cd, dvd) dealt with the same as a downloaded file? Contracts – legally binding requires: offer, acceptance & consideration Click-wrap contracts – clicking "I agree" button = binding contract Electronic agents can enter contracts with no human present When are electronic documents admissible evidence in courts? Who is liable for errors, software malfunction, theft, fraud? Post disclaimers about content – e.g. sample code that your company does not support Much existing law hinges on physical location of information 9 Avoiding Legal Problems Useful Web warnings: Have attorneys review your Web content Issue written policy guidelines about employee use of Internet Do not use copyrighted or trademarked material without permission Post disclaimers about content – e.g. sample code that your company does not support Post disclaimers of responsibility concerning content of forums/chat sessions Make sure Web content and activity comply with laws in other countries Appoint someone to monitor changing Internet legal and liability issues 10 Computer Crimes Computer fraud (=deception to gain unfair advantage) committed by: Example: illegally promoted stocks on computer bulletin boards, online newsletters and investment Web sites Example: Selling bogus investments, phantom business opportunities, and other fraud schemes Auction Fraud (covered earlier) Computer abuse (maybe not for personal gain) committed by: Misuse of company resources - unauthorised private work or play Compromise of system integrity by: Altering company data Introducing viruses Hacking into the system 11 Summary Legal and Ethical Issues – privacy, free speech, IP, crime Privacy Issues – how to gather your personal information Privacy Policies – notice, consent, collection, accuracy, redress Protecting Intellectual Property – copyright, patent, trademark Freedom of Speech – anarchy, terrorism, children Other Legal Issues – tax, contracts, gambling, liability Avoiding Legal Problems Crime – Fraud, Abuse 12 QUIZ 17 skip questions 12 and 13 13