Chap 11

advertisement
Chap 11: Legal and Ethical Issues
in Computer Security
 Program
and data protection by patents,
copyrights, and trademarks
 Computer crime
 Ethical analysis of computer security
situations
 Codes of professional ethics
SE571 Security in Computing
Dr. Ogara
2


International, national, state, and city laws can
affect privacy and secrecy
Laws regulate the use, development, and
ownership of data and programs
• Patents
• Copyrights
• Trade secrets

Laws affect actions that can be taken to protect
the secrecy, integrity, and availability of
computer information and service
SE571 Security in Computing
Dr. Ogara
3
 Law
does not always provide an adequate
control
 Laws
do not yet address all improper acts
committed with computers
 Some
judges, lawyers, and police officers
do not understand computing, so they
cannot determine how computing relates to
other, more established, parts of the law
SE571 Security in Computing
Dr. Ogara
4
 Common
legal devices include:
• Copyrights
• Patents
• Trade Secrets
SE571 Security in Computing
Dr. Ogara
5
 Designed
to protect the expression of ideas
 Ideas
are free but once expressed (in a
tangible medium) must be protected
 Intention
of a copyright is to allow regular
and free exchange of ideas
 Gives
the author the exclusive right to make
copies of the expression and sell them to
the public
SE571 Security in Computing
Dr. Ogara
6
 Copyright
must apply to original work
 It
lasts for few years after which it is
considered public domain
 Copyright object is subject to fair use
• Product used in a manner for which it was intended
and does not interfere with the author’s rights, e.g.
comment, criticism, teaching, scholarly research
• Unfair use of copyrighted object is called piracy
SE571 Security in Computing
Dr. Ogara
7
A
U.S. copyright now lasts for 70 years
beyond the death of the last surviving
author

95 years after the date of publication for
organizations
 The
international standard is 50 years after
the death of the last author or 50 years from
publication
SE571 Security in Computing
Dr. Ogara
8
 Algorithm
is the idea, and the statements of
the programming language are the
expression of the idea
 Protection
is allowed for the program
statements themselves, but not for the
algorithmic concept
 Copying
the code intact is prohibited, but
re-implementing the algorithm is permitted
SE571 Security in Computing
Dr. Ogara
9
 Digital
objects can be subject to
copyright
 It
is a crime to circumvent or disable
antipiracy functionality built into an
object
 It
is a crime to manufacture, sell, or
distribute devices that disable antipiracy
functionality or that copy digital objects
SE571 Security in Computing
Dr. Ogara
10
 However, these
devices can be used (and
manufactured, sold, or distributed) for
research and educational purposes
 It
is acceptable to make a backup copy of a
digital object as a protection against
hardware or software failure or to store
copies in an archive
 Libraries
can make up to three copies of a
digital object for lending to other libraries
SE571 Security in Computing
Dr. Ogara
11
 Problems
is deciding what is considered
piracy
Example, how do you transfer music from
your CD to MP3 which is considered a
reasonable fair use?
SE571 Security in Computing
Dr. Ogara
12
 It
is criminal to reproduce or distribute
copyrighted works, such as software or
digital recordings, even without charge?
 When
you purchase a software you only
have the right to use it
 See
Napster: No right to copy lawsuit –
pp. 655
SE571 Security in Computing
Dr. Ogara
13

U.S. Patent and Trademark Office must be
convinced that the invention deserves a patent

Patents were intended to apply to the results of
science, technology, and engineering


A patent can be valid only for something that is
truly novel or unique – usually one patent for a
given invention
Since 1981 the patent law has expanded to
include computer software
SE571 Security in Computing
Dr. Ogara
14
 This
isn’t infringement. The alleged
infringer will claim that the two
inventions are sufficiently different that
no infringement occurred
 The
patent is invalid. If a prior
infringement was not opposed, the patent
rights may no longer be valid.
SE571 Security in Computing
Dr. Ogara
15
 The
invention is not novel. In this case, the
supposed infringer will try to persuade
the judge that the Patent Office acted
incorrectly in granting a patent and that
the invention is nothing worthy of patent
 The
infringer invented the object first. If
so, the accused infringer, and not the
original patent holder, is entitled to the
patent
SE571 Security in Computing
Dr. Ogara
16
 Is
information that gives one company a
competitive edge over others
 Unlike
a patent or copyright it must be kept
a secret
 Employees
should not disclose secrets
 Owners must protect the secrets
• File encryption
• Make employees sign a statement not to disclose a
secret
SE571 Security in Computing
Dr. Ogara
17
 Trade
secret protection allows
distribution of the result of a secret (the
executable program) while still keeping
the program design hidden
 It
does not cover copying a product
(specifically a computer program)
 It
makes it illegal to steal a secret
algorithm and use it in another product
SE571 Security in Computing
Dr. Ogara
18
 Enforcement
Problems
• Does not help if program/code is decoded –
trade secret protection disappears
• Additional protection/safeguards is needed
 Make copies of sensitive documents
 Control access to files
SE571 Security in Computing
Dr. Ogara
19
 Examples”
 Motorola
settles trade secrets lawsuits
 Google Wallet spurs trade-secrets lawsuit
from PayPal
 Ex-DuPont Employee Pleads Not Guilty in
Trade Secrets Case
SE571 Security in Computing
Dr. Ogara
20
SE571 Security in Computing
Dr. Ogara
21
 Hardware
• Patented
 Firmware – Chips and microcode
• Patented
• Data (algorithms, instructions and programs inside
it) are not patentable
• Trade secret – for code inside chip
 Object Code
• Copyrighted
Software
SE571 Security in Computing
Dr. Ogara
22
 Source
Code Software
• Trade secret
• Copyrighted
 Documentation
• Copyrighted
 Web
Content
• Copyrighted
SE571 Security in Computing
Dr. Ogara
23
 Information
as an object
• Is not depletable/may be used repeatedly
• Can be replicated – buyer can resell and deprive
original seller of sales
• Has minimal marginal cost – cost of producing
additional information
• Value of information is time dependent – e.g. Stock
market price
• Often transferred intangibly – difficult to claim
information as flawed if a copy is accurate whereas
underlying information is incorrect or useless.
SE571 Security in Computing
Dr. Ogara
24
 Legal issues relating to information
• Information commerce – how do you protect
software developers and publishers from piracy?
• Electronic publishing – how do you protect news
organization and encyclopedia in the web for being
target for copyright?
• Protecting data in database – how do you protect
them, who owns the data, how do you know which
database the data came from?
• Electronic commerce – how do you prove conditions
for delivery of your order is not damaged or arrives
late
SE571 Security in Computing
Dr. Ogara
25
 Protecting
information
• Criminal and Civil Law
• Tort Law
• Contract Law
SE571 Security in Computing
Dr. Ogara
26

Statutes are laws that state explicitly that certain
actions are illegal

Violation of a statute will result in a criminal trial

Statute law is written by legislators and is
interpreted by the courts

In a civil case, an individual, organization,
company, or group claims it has been harmed

The goal of a civil case is restitution: to make the
victim “whole” again by repairing the harm
SE571 Security in Computing
Dr. Ogara
27
A
tort is harm not occurring from violation
of a statute or from breach of a contract but
instead from being counter to the
accumulated body of precedents
 Tort
law is unwritten but evolves through
court decisions that become precedents for
cases that follow
 Fraud
is a common example of tort law in
which, basically, one person lies to another,
causing harm
SE571 Security in Computing
Dr. Ogara
28
 A contract involves
• an offer
• an acceptance
• a consideration
three things:
 Contracts
help fill the voids among criminal,
civil, and tort law
 One
party makes an offer
 Most
common legal remedy in contract law
is money
SE571 Security in Computing
Dr. Ogara
29
 One
party makes an offer
 Second
party may accept or reject or
ignore
 Contract
is voluntary
 Most
common legal remedy in contract
law is money
SE571 Security in Computing
Dr. Ogara
30
 Employees
want to protect secrecy and
integrity of works produced by the
employees
 Ownership of products
• Who owns the patent?
• Who owns the copyright?
• Work for hire
• Licenses
• Trade secret protection
• Employee contracts
SE571 Security in Computing
Dr. Ogara
31
 Who
owns the patent?
• If an employee lets an employer patent an
invention, the employer is deemed to own the
patent and therefore the rights to the invention
• Employer has the right to patent if the
employee’s job functions included inventing the
product
SE571 Security in Computing
Dr. Ogara
32
 Who
owns the copyright?
• Author (programmer) is the presumed owner of
the work, and the owner has all rights to an
object
• Work for hire applies to many copyrights for
developing software or other products
SE571 Security in Computing
Dr. Ogara
33
 Employer, not
the employee, is
considered the author of a work
 Difficult
to identify and depends in part
on the laws of the state in which the
employment occurs
SE571 Security in Computing
Dr. Ogara
34




The employer has a supervisory relationship,
overseeing the manner in which the creative
work is done.
The employer has the right to fire the employee.
The employer arranges for the work to be done
before the work was created (as opposed to the
sale of an existing work).
A written contract between the employer and
employee states that the employer has hired the
employee to do certain work.
SE571 Security in Computing
Dr. Ogara
35

Licensed software is an alternative to a work for hire

Programmer develops and retains full ownership of
the software

Programmer grants to a company a license to use the
program

License can be granted for a definite or unlimited
period of time, for one copy or for an unlimited
number, to use at one location or many, to use on one
machine or all, at specified or unlimited times
SE571 Security in Computing
Dr. Ogara
36
 No
registered inventor or author
 Owner
can prosecute a revealer for
damages if a trade secret is revealed
 Trade
secrets are held as confidential
data
SE571 Security in Computing
Dr. Ogara
37
 Spells
out rights of ownership
 Spells
out that company claims all rights
to any programs developed, including all
copyright rights and the right to market
 Spells
out that employee agrees not to
reveal those secrets to anyone
SE571 Security in Computing
Dr. Ogara
38
 More
restrictive contracts assign to the
employer rights to all inventions (patents)
and all creative works (copyrights)
 Employee
may be asked not to compete by
working in the same field for a set period of
time after termination
Example: DuPont dismisses trade secrets suit against
former chemist
SE571 Security in Computing
Dr. Ogara
39
 What
role does quality play in various
legal disputes?
 What
should be done when software
faults are discovered?
SE571 Security in Computing
Dr. Ogara
40
 Selling
correct software
• Software malfunctions
• Don’t like look and feel
I
want a refund
• Users entitled to reasonable period to inspect
software
SE571 Security in Computing
Dr. Ogara
41
I
want it to be good
• Mass-market software is seldom totally bad
• Legal remedies typically result in monetary
awards for damages, not a mandate to fix the
faulty software
SE571 Security in Computing
Dr. Ogara
42
 Law
regarding crimes involving
computers are less clear
 New
laws needed to address these
problems
 Rules of property
 Unauthorized access to a computing system is a
crime
 Problem is access by a computer does not involve
physical object so may not be punishable crime
SE571 Security in Computing
Dr. Ogara
43
 Courts
prefer an original source
document to a copy
 Copies
may be inaccurate or modified
 Problem
with computer-based evidence
in court is being able to demonstrate the
authenticity of the evidence
SE571 Security in Computing
Dr. Ogara
44
 It
is difficult to establish a chain of
custody - ensure that nobody has had the
opportunity to alter the evidence in any
way before its presentation in court
SE571 Security in Computing
Dr. Ogara
45
 Integrity
and secrecy of data are also
issues in many court cases
 Example, disclosing
grades or financial
information without permission is a crime
SE571 Security in Computing
Dr. Ogara
46
 Concept
of value and how we determine
it is key to computer based law
 How
do you determine value of credit
report?
 Legal
system must find ways to place a
value on data that is representative of its
value to those who use it
SE571 Security in Computing
Dr. Ogara
47
 Law
lags in determining acceptance of
definitions of computing terms
 Computers
and their software, media,
and data must be understood and
accepted by the legal system
SE571 Security in Computing
Dr. Ogara
48
 Lack of understanding
• Courts, lawyers, police agents, or jurors do not
necessarily understand computers
 Lack of physical evidence
• Police and courts have for years depended on
tangible evidence, such as fingerprints
 Lack of recognition of assets
• Is computer time an asset?
SE571 Security in Computing
Dr. Ogara
49
 Lack
of political impact
• Less attention to obscure high-tech crime
 Complexity
of case
• Jurors may have difficulty understanding high
tech complex crime
 Age
of defendant – many computer
crimes are committed by juveniles
SE571 Security in Computing
Dr. Ogara
50
 Unauthorized
access to a computer
containing data protected for national
defense or foreign relations concerns
 Unauthorized
access to a computer
containing certain banking or financial
information
SE571 Security in Computing
Dr. Ogara
51
 Unauthorized
access, use, modification,
destruction, or disclosure of a computer
or information in a computer operated on
behalf of the U.S. government
 Accessing
without permission a
“protected computer,” which the courts
now interpret to include any computer
connected to the Internet
SE571 Security in Computing
Dr. Ogara
52
 Penalties
range from $5,000 to $100,000
or twice the value obtained by the
offense, whichever is higher, or
imprisonment from 1 year to 20 years, or
both.
SE571 Security in Computing
Dr. Ogara
53
 U.S. Computer
Fraud and Abuse Act 1974
 U.S. Economic Espionage Act 1996
• outlaws use of a computer for foreign espionage
to benefit a foreign country or business or theft
of trade secrets
 U.S. Electronic
Funds Transfer Act
• prohibits use, transport, sale, receipt, or supply
of counterfeit, stolen, altered, lost, or fraudulently
obtained debit instruments in interstate or
foreign commerce
SE571 Security in Computing
Dr. Ogara
54
 Provides
public access to information
collected by the executive branch of the
federal government
 Requires
disclosure of any available data,
unless the data fall under one of several
specific exceptions, such as national
security or personal privacy
SE571 Security in Computing
Dr. Ogara
55
 Protects
the privacy of personal data
collected by the government
• Allow individuals to know information collected
about them
• prevent one government agency from accessing
data collected by another agency for another
purpose
SE571 Security in Computing
Dr. Ogara
56
 Protects
against electronic wiretapping
 An
amendment to the act requires
Internet service providers to install
equipment as needed to permit these
court-ordered wiretaps
 Allows
Internet service providers to read
the content of communications in order to
maintain service
SE571 Security in Computing
Dr. Ogara
57
 Covers
privacy of data for customers of
financial institutions
 Customers
must be given the opportunity to
reject any use of the data beyond the
necessary business uses for which the
private data were collected
 Require
financial institutions to undergo a
detailed security-risk assessment/have
comprehensive security program
SE571 Security in Computing
Dr. Ogara
58
 First
part of the law concerned the rights
of workers to maintain health insurance
coverage after their employment was
terminated
 Second
part of the law required
protection of the privacy of individuals’
medical records
SE571 Security in Computing
Dr. Ogara
59
 Healthcare
providers are required to
perform standard practices such as
Enforce need to know.
Ensure minimum necessary disclosure.
Designate a privacy officer.
Document information security practices.
Track disclosures of information.
Develop a method for patients’ inspection and
copying of their information.
• Train staff at least every three years.
•
•
•
•
•
•
SE571 Security in Computing
Dr. Ogara
60
 Contains
provisions supporting law
enforcement’s access to electronic
communications
 Law
enforcement need only convince a
court that a target is probably an agent of a
foreign power in order to obtain a wiretap
order
 Main
computer security provision of the
Patriot Act is an amendment to the
Computer Fraud and Abuse Act
SE571 Security in Computing
Dr. Ogara
61

Controlling the Assault of Non-Solicited Pornography
and Marketing (CAN SPAM)

Contains provisions supporting law enforcement’s
access to electronic communications


Law enforcement need only convince a court that a
target is probably an agent of a foreign power in
order to obtain a wiretap order
Main computer security provision of the Patriot Act is
an amendment to the Computer Fraud and Abuse
Act
SE571 Security in Computing
Dr. Ogara
62

It bans false or misleading header information

It prohibits deceptive subject lines



It requires commercial e-mail to give recipients
an opt-out method.
It bans sale or transfer of e-mail addresses of
people who have opted out.
It requires that commercial e-mail be identified
as an advertisement
SE571 Security in Computing
Dr. Ogara
63
 Requires
any company doing business in
California or any California government
agency to notify individuals of any
breach that has, or is reasonably believed
to have, compromised personal
information on any California resident
 At
least 20 other states have since
followed with some form of breach
notification
SE571 Security in Computing
Dr. Ogara
64
 Council
of Europe Agreement on
Cybercrime
• Requires countries that ratify it to adopt similar
criminal laws on hacking, computer-related
fraud and forgery, unauthorized access,
infringements of copyright, network disruption,
and child pornography
SE571 Security in Computing
Dr. Ogara
65
 E.U. Data
Protection Act
• Governs the collection and storage of personal
data about individuals, such as name, address,
and identification numbers
• The law requires a business purpose for
collecting the data, and it controls against
disclosure
SE571 Security in Computing
Dr. Ogara
66
 Restricted
Content
• Some countries have laws controlling Internet
content allowed in their countries
 Use
of Cryptography
• use of cryptography imposed on users in certain
countries e.g. China requires foreign
organizations or individuals to apply for
permission to use encryption in China
SE571 Security in Computing
Dr. Ogara
67
 What
are the ethical issues concerning
confidentiality, integrity and availability
of data?
 Ethics
or morals to prescribe generally
accepted standards of proper behavior
 Ethical
system is a set of ethical
principles
SE571 Security in Computing
Dr. Ogara
68
SE571 Security in Computing
Dr. Ogara
69
 Consequence-Based
Principles
• Based on consequence of an action to individual
 Considers which results is the greatest future good and
the least harm
• Based on consequence to all society (principle of
utilitarianism)
 Does the action bring the greatest collective good for all
people with the least possible negative for all?
SE571 Security in Computing
Dr. Ogara
70
 Rule-Based
• Based on rules acquired by individual – religion,
experience and analysis
• Based on universal rules evident to everyone
SE571 Security in Computing
Dr. Ogara
71
Download