WGU C961 Ethics In Technology Suggested Study Leave the first rating Students also studied Terms in this set (163) Save WGU D333 Ethics in Technology - W...332 terms DrkintrudrPreview Ethical Frameworks in Technology 11 terms dasblueeyeddevil Preview
WGU D333
26 terms Final_FelronPreview Ethics i 75 terms ree Title III of the Omnibus Crime Control and Safe Streets Act regulates the interception of wire (telephone) and oral communications.Wiretap ActAnother name for Title III of the Omnibus Crime Control and Safe Streets Act FISAdescribes procedures for the electronic surveillance and collection of foreign intelligence information between foreign powers and agents of foreign powers.Executive Order 12333identifies various government intelligence-gathering agencies and defines what information can be collected, retained, and disseminated by the agencies. It allows for the tangential collection of U.S. citizen data—even when those citizens are not specifically targeted.The ECPAdeals with the protection of communications while in transit from sender to receiver; the protection of communications held in electronic storage; and the prohibition of devices from recording dialing, routing, addressing, and signaling information without a search warrant.The Communications Assistance for Law Enforcement Act
(CALEA)
requires the telecommunications industry to build tools into its products that federal investigators can use—after gaining a court order—to eavesdrop on conversations and intercept electronic communications.The USA PATRIOT Actmodified 15 existing statutes and gave sweeping new powers both to domestic law enforcement and to international intelligence agencies, including increasing the ability of law enforcement agencies to eavesdrop on telephone communication; intercept email messages; and search medical, financial, and other records. The act also eased restrictions on foreign intelligence gathering in the United States.
FISA of 2004authorized intelligence gathering on individuals not affiliated with any known terrorist organization (so-called "lone wolves").The FISA Amendments Act of 2008granted the NSA expanded authority to collect, without court-approved warrants, international communications as they flow through the U.S. telecommunications equipment and facilities.The PATRIOT Sunsets Extension Actgranted a four-year extension of provisions of the USA PATRIOT Act that allowed roving wiretaps and searches of business records. It also extended authorization for intelligence gathering on "lone wolves." The USA Freedom Actterminated the bulk collection of telephone metadata by the NSA, instead requiring telecommunications carriers to hold the data and respond to NSA queries for data. The act also restored authorization for roving wiretaps and the tracking of lone wolf terrorists."Fair information practices"a set of guidelines that govern the collection and use of personal data. Various organizations and countries have developed their own set of such guidelines and call them by different names.The Organisation for Economic Co-operation and Development (OECD) for the Protection of Privacy and Transborder Data Flows of Personal Data created a set of fair information practices that are often held up as the model for organizations to adopt for the ethical treatment of consumer data.The European Union (EU) Data Protection Directive requires member countries to protect data transferred to non-EU countries. It also bars the export of data to countries that do not have data privacy protection standards comparable to those of the EU. After the passage of this directive, the EU and the United States worked out an agreement that allowed U.S. companies that were certified as meeting certain "safe harbor" principles to process and store data of European consumers and companies.The EU-U.S. Privacy Shield Data Transfer Program Guidelines a stop-gap measure that allows businesses to transfer personal data about European citizens to the United States. The guidelines were established after the European Court of Justice declared the Safe Harbor agreement invalid between the EU and the United States.The General Data Protection Regulation (GDPR) addresses the export of personal data outside the EU, enabling citizens to see and correct their personal data, standardizing data privacy regulations within the EU, and establishing substantial penalties for the violation of its guidelines.FOIAgrants citizens the right to access certain information and records of the federal government upon request.The Privacy Actprohibits U.S. government agencies from concealing the existence of any personal data record-keeping system.Personal data arebeing collected electronically in many ways that are not apparent to the consumer. Simply visiting a website or using an app may trigger an automatic permission to collect data about you.identifying personal informationis protected,
anonymous data about youmay be sold to or shared with third parties without explicit consent.Companies use many different methods tocollect personal data about visitors to their websites, including depositing cookies on visitors' hard drives.Consumer data privacy has becomea major marketing issue; companies that cannot protect or do not respect customer information have lost business and have become defendants in class actions stemming from privacy violations.A data breachthe unintended release of sensitive data or the access of sensitive data (e.g., credit card numbers, health insurance member IDs, and Social Security numbers) by unauthorized individuals. The increasing number of data breaches is alarming, as is the lack of initiative by some companies in informing the people whose data are stolen. A number of states have passed data breach notification laws that require companies to notify affected customers on a timely basis.A real risk that exists for society today is a data breach in which personally identifying information is stolen. This can cause financial loss and identity theft.Ethics dictates that significant data breaches of personal information should be found and quickly dealt with. The victims whose data were taken should be notified, though private companies do not have a federal mandate to do this. It is up to each state to enforce laws pertaining to data breaches unless the company is publicly traded.E-discoverythe collection, preparation, review, and production of electronically stored information for use in criminal and civil actions and proceedings.Predictive codinga process that couples human intelligence with computer-driven concept searching in order to "train" document review software to recognize relevant documents within a document universe. Artificial intelligence (AI) techniques allow the software to continually learn.Cyberloafingusing the internet at work for personal use Employers adoptPolicies to guide employees toward acceptable behaviors.Workers have fewPrivacy rights.Employers have taken to monitoring their employees to stop abuses and inappropriate behaviors.CCTV cameras and satellite-based surveillance systems advances in information technology that can pinpoint a person's physical location and provide many data-gathering capabilities EDRvehicle event data recorder (EDR). Auto included in many cars. The data from this device may be used as evidence in a court of law.spy softwarehas been used for years by parents monitoring their children, but stalkers use it too.
bring your own device (BYOD)A business policy that permits—and in some cases, encourages—employees to use their own mobile devices (smartphones, tablets, or laptops) to access company computing resources and applications, including email, corporate databases, the corporate intranet, and the internet black hat hackersSomeone who violates computer or internet security maliciously or for illegal personal gain (in contrast to a white hat hacker who is someone who has been hired by an organization to test the security of its information systems) CrackerAn individual who causes problems, steals data, and corrupts systems Malicious insiderAn employee or contractor who attempts to gain financially and/or disrupt a company's information systems and business operations industrial spyAn individual who captures trade secrets and attempts to gain an unfair competitive advantage CybercriminalsSomeone who attacks a computer system or network for financial gain HacktivistAn individual who hacks computers or Web sites in an attempt to promote a political ideology CyberterroristSomeone who attempts to destroy the infrastructure components of governments; financial institutions; and other corporations, utilities, and emergency response units dramatic increase in the number, variety, and severity of security incidents caused by Increasing computing complexity, expanding and changing systems, increasing in the prevalence of BYOD policies, a growing reliance on software with known vulnerabilities, and the increasing sophistication of those who would do harm have exploitan attack on an information system that takes advantage of a particular system vulnerability. Often this attack is due to poor system design or implementation.Ransomwaremalware that stops you from using your computer or accessing your data until you meet certain demands, such as paying a ransom or sending photos to the attacker.A computer virusan umbrella term for many types of malicious code.virusRequires users to spread infected files to other users. A piece of programming code, usually disguised as something else, that causes a computer to behave in an unexpected and usually undesirable manner. Usually attached to a file.wormcan propagate without human intervention. a harmful program that resides in the active memory of the computer and duplicates itself.Trojan horsea seemingly harmless program in which malicious code is hidden.logic bombtype of Trojan horse which executes when it is triggered by a specific event