Privacy: protection of your informationPii personally identifiable information, used with security laws to identify a single personWithin ftc guidelines if it is pii you have to opt in, they can't collect pii info unless you let them. If you're logged into yahoo pii can track where you're searching, if not logged in not pii
What is privacy? What is PII? How does PII impact your privacy rights online?
Need Most difficult to utilize: access/participation - you have the right to go through and fix information collected about you if it is wrong but there is so much it is hard to do
What is the FTC's Fair Information Practice Principles? What is the purpose for these principles? From a user's standpoint, which of the principles is the most difficult to utilize?
Protects works:Copying apples computer software for macs and used and sold it elsewhere its copyright law protectsIf you just use algorithms it is protected by patent law
What does copyright law protect? Describe an IT-related example where copyright law is violated.
Protects anything used to identity a productCyber-squatting, cyber-piracy,Name, color scheme, name
What does trademark law protect? Describe an IT-related example where trademark law is violated.
moral right
The claim to privacy rests on the _______ ________ of individuals to be left alone, free from surveillance or interference from other individuals or organizations, including the state
individuals have a moral right to
Be able to control the use of whatever information is collected about them Know when info is being collected about themHave personal info due process where the process of collecting, sharing, and disseminating personal info is fair and transparent to everyoneHave their personal info stored in a secure manner
notice/awareness
sits must disclose their information practices before collecting data
choice/consent
opt-in for PII, opt-out for non-PII
access/participation
Should be able to review and contest the accuracy and completeness of data collected about them in a timely, inexpensive process
security
Reasonable steps to assure that consumer information is accurate and secure
enforcement
there must be a mechanism to enforce FIP principles in place
stricter rules
there are ______ _______ for collecting info about sensitive financial or medical info, sexual behavior or sexual orientation, and social security numbers
stronger
In Europe, privacy protection is much ___________ than it is in the US.
US
In the ___, private organizations and businesses are permitted to use PII gathered in commercial transactions for other business purposes without the prior consent of the consumer (Secondary use)
self-regulation
In the US, privacy laws are enforced primarily through ____________ and suing in court to recover damages - this is expensive and rarely done.
European
_________ countries do not allow business firms to use PII without the prior consent of consumers.
data protection agencies
European countries enforce their privacy laws by creating....
being committed
Law enforcement authorities have long claimed the right under numerous statutes to monitor any form of electronic communication pursuant to a court order and judicial review and based on the reasonable belief that a crime is ________ ___________.
data collection
Several congressional privacy initiatives are currently under consideration regarding unique information gathering scenarios such as _____ ____________ by drones and personal geo-location data.
copyright, patent, trademark
Three main types of intellectual property protection
copy right law protects
original forms of expression such as writings, art, drawing, photographs, music, motion pictures, performances, and computer programs from being copied by others for a period of time.
Copyright protection is for a period of
95 years for corporate owned works, and life plus 70 years for works created by individuals
Federal Copyright Act of 1790
intent behind copyright laws has been to encourage creativity and authorship by ensuring that people receive financial and other benefits from their work
Fair use doctrine
permits teachers, writers, and others to use copyrighted materials without permission under certain circumstances:
Digital Millennium Copyright Act (DMCA) of 1998
the first major effort to adjust the copyright laws to the internet age
DMCA includes sections that:
Make it illegal to circumvent technological measure to protect worksLimits liability of ISPs and search engines for copyright infringement if they comply with safe harborsRequires ISPS to "take down" sites they host if they are infringing on copyrightsPermits users to make a copy of software for maintenance or repair ocf the computerAllows libraries to make digital copies of works for internal useExtends musical copyrights to include "webcasting
patent
grants the owner a 20-year exclusive monopoly on the ideas behind an invention
new and useful
Whoever invents or discovers any ______ _ ________l process, machine, manufacture, or composition of matter, or any new and useful improvement thereof, may obtain a patent thereof,, subject to the conditions and requirements of this title
trademark
any word, name, symbol, or device, or any combo thereof... used in commerce... to identify and distinguish... goods... from those manufactured or sold by others and to indicate the source of the goods
internet trademark examples
Cybersquatting Cyberpiracy Metatagging and keywording Linking and framing