Legal II Final
Legal II Final
• Marketplace: Households
• Internal Revenue Service Audits
• Syndrome Surveillance System
Marketplace: Households
Protecting Privacy
- Symmetric encryption
• Single key used to encrypt and decrypt a
message
• Both sender and receiver must have the key
• Problem: How does sender get key to receiver?
• If “bad guy” gets key, security is broken
2. Public-Key Encryption
• Until the past few decades, all encryption methods used
require both the sender and the recipient (receiver) to
know the key.
• In the 1970s, a revolution in cryptography occurred, so
Whitfield Diffie and Martin Hellman developed an
encryption scheme called public-key cryptography.
“Lecture 3”
Introduction
• Information collection, exchange, combination, and distribution
easier than ever
Terminology
• Computer matching:
comparing information from different databases (using
social security number, for example, to match records)
• Computer profiling:
analyzing data in computer files to determine
characteristics of people most likely to engage in certain
behavior
• Informed consent
• Opt-in and opt-out policies
-Opt-in: consumer must explicitly give permission
for the organization to share info
-Opt-out: consumer must explicitly forbid an
organization from sharing info
• Fair Information Principles (or Practices)
• Data retention
Location Tracking:
• Global Positioning Systems (GPS): computer or
communication
services that know exactly where a person is at a particular
time
• Hackers
Disclosing Information:
• Public Records: records available to general public
(bankruptcy, census records, salaries of government
employees, etc)
• Personal information: undisclosed information
• Types of disclosures
Identity Theft:
• Identity theft: misuse of another person’s identity to
take actions permitted the owner
• Credit card fraud is #1 type of identity theft
• Ease of opening accounts contributes to problem
• In USA, 10 million victims in 2004 alone with average
loss: $5,000
“Lecture 4”
Hacking
“Lecture 5”
❑ The term digital divide refers to the fact that some groups of people
have
access to modern information technology (and regularly use it), while
others do not.
❑ The concept of digital divide became popular in the mid-1990s with
emergence of World Wide Web.
❑ The digital divide refers to the disparity in Internet access between
more
industrialized and less industrialized nations.
❑ The social divide refers to the difference in access between the rich
and
poor within a particular country.
1. Global Divide:
❑ There is plenty of evidence of the global divide. One evidence is the
percentage of people with internet access, as shown in next figure.
❑ In 2006 about 1.1 billion people, representing about 17% of the
world’s population, had access to the Internet.
❑ Only about 5% of the population had Internet access in Africa in
2006 (1 out of every 20 persons).
2. Social Divide:
❑ Even within wealthy countries, the extent to which people
use the Internet varies widely according to age, wealth,
and educational achievement
“Lecture 6”
Health Issues
Potential Solutions
• Technical
- Ergonomic design of keyboards and workstations
- Some laptop computer makers redesigned the machines to
include a wrist rest
• Managerial
- Show of concern to the problem
- Corporation will suffer due to injuries, lost work time, and
surgeries increased
• Educational
- As computer users, have some responsibility for learning good
keyboard work habits, proper keyboard techniques and the need
for rest breaks