Introduction

OK, password checks ouw. Now, which photos show a traffice light?

In this assignment you'll explore rights, privacy, and security topics such as intellectual property, fair use, coders' rights, international and national privacy laws, types of threats, and threat legislation.

Your Contribution

  1. Collaborate in the current Google Slides template (available via Canvas) to summarizes your chosen topic and readings.
  2. Then ask each other questions and suggest revisions by using the Slides Commenting feature. Be sure to @name to alert your classmates of your comments.
  3. Download/Print a PDF of your slide and the Bibliography slide that includes your entries.
  4. Submit the PDF in Canvas for a plagiarism check and score.

Rights

Property Rights include real/physical and intellectual private ownership, public open access, public closed access, and government ownership. Real/Physical property includes land, homes, and physical items (Article V, Bill of Rights). Laws about search and seizure of physical and digital property change periodically and may affect your interactions with police at national borders.

Intellectual Property (IP) refers to creations of the mind, such as inventions (patents), works of art and writing (copyrights), trade secrets, and commercial symbols and imagery (trademarks). IP also allows Fair Use of a copyrighted work for certain situations. Brief excerpts of copyrighted material may, under certain circumstances, be quoted verbatim for purposes such as criticism, news reporting, teaching, and research, without the need for permission from or payment to the copyright holder. Some IP laws are internationally accepted and some are not.

Personal data in a database may or may not remain a person's property if they sign away their rights in a Terms of Service Agreement.

Software/data developers may have special rights or a lack of rights when it comes to their work. Accepting contracts with employers may require a lawyer's input to ensure both parties retain adequate rights to their creative works.

Explore these key concepts by reading one or more articles in the next tabs.

  1. Electronic Frontier Foundation (EFF): Know Your Rights regarding digital devices.
  2. Copyright sections of Intellectual Property law (USA).
  3. Patents (USA). See also, how to Protect Yourself Against Invention Promotion Scams.
  4. Trademarks (USA).
  5. Trade Secrets (USA)
  6. Measuring Fair Use: The Four Factors article.
  7. The 'Fair Use' Rule: When Use of Copyrighted Material Is Acceptable. Mashups, remixes, quotations, parody, video/sound clips, and thumbnail images are also acceptable under fair use rules.
  8. Report on Legal Protection for Databases
  9. EFF's Coders' Rights Project section.

Electronic Privacy

Privacy is freedom from observation by other people, tracking by computers, or monitoring by companies and governments. Many country's laws include guidelines for maintaining, allowing, and prosecuting breaches of personal privacy. Explore this key concept by reading one or more of the following:

Reading List

Refer to writing instructions under each page of the template provided in step 4.5. Open articles in new tabs and add them to your bibliography tool.

  1. Privacy’s not an abstraction: An experiment in privacy–and the discussion that ensued–offer unexpected lessons in who gets watched, and how.
  2. EFF's International Privacy Standards section.
  3. Educational privacy (FERPA) Student data is private from parents, businesses, and school staff except for instructors and advisors. PDF.
  4. Medical privacy (HIPAA) A patient's data is private until insurance companies, family, employees and other health works are granted permission.
  5. Business privacy (ECPA) Third parties cannot disclose or intercept personal data without consent.
  6. Finance privacy (Gramm-Leach-Bliley Act) Bankers must provide security and confidentiality of customer data.
  7. Government privacy (The Privacy Act of 1974) The act has loopholes and needs overhauling.
  8. The Clarifying Overseas Use of Data (CLOUD) act refers to American and foreign law enforcement’s ability to target and access people’s data across international borders. (USA Department of Justice)
  9. Electronic Frontier Foundation (EFF)'s Mandatory Data Retention section.
  10. PATRIOT Act's loose rules about wiretapping and electronic surveillance.
  11. DuckDuckGo, EFF, and others just launched privacy settings for the whole internet.
  12. In tech, workers fight for transparency.

Cybersecurity

Radware and other security companies maintain a network of more than 8 million sensors that emulate over 6,000 applications which gather data on cyber attacks. See which countries have the most cyber threats on their interactive threat map:

Hackers and Cyber Attacks: Crash Course Computer Science #32.

Cybersecurity Terms

Nearly every day we must contend with a new kind of malicious online act. These acts are dubbed with interesting names, which are hard to keep track of!

Join your classmates in contributing to a manual of cybersecurity terms in a Google Slides file (linked in Canvas). Choose a topic that is not already represented in the file. Add the topic to a new slide heading. Paste in your synthesis of the meaning and an actual case of its use. Add your name to the NOTES area under the slide. Hyperlink the titles of articles you're referring to and bold key concept names. Bibliographic information is not required for this assignment.

Did you discover a term that is not on the list? Share it in Ed Discussion.

Cybersecurity laws and organizational guidelines

Medsphere's top 10 Syber Security Tips.

Besides devising ethical frameworks, computer scientists are working hard to devise solutions, technical guidelines, and laws to deter malicious acts as well as punish the bad actors. Do you think our current laws are doing the job? Explore laws by reading one or more of the following:

Reading List

Refer to writing instructions under each page of the template provided in step 4.5. Open articles in new tabs and add them to your bibliography tool.

  1. EFF's Computer Fraud And Abuse Act Reform section.
  2. EFF's Cyber Security Legislation section.
  3. National Institute of Standards and Technology (NIST) Cybersecurity Framework
  4. Certified Information Systems Security Auditor (CISSA)
  5. SANS Programs to mitigate cybersecurity problems.
  6. (ISC)² Certified Information Systems Security Professional (CISSP)
  7. Map of Data Protection and Privacy Legislation Worldwide from the United Nations Conference on Trade and Development (UNCTAD)
  8. The ICLG to: Data Protection Laws and Regulations (USA)