ch03 - CHAPTER 3 Ethics, Privacy and Information Security...

Info iconThis preview shows pages 1–14. Sign up to view the full content.

View Full Document Right Arrow Icon
CHAPTER 3 Ethics, Privacy and Information Security
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
CHAPTER OUTLINE 3.1 Ethical Issues 3.2 Threats to Information Security 3.3 Protecting Information Resources
Background image of page 2
TJX: The Worst Data Breach Ever? TJX is a $16 B retail conglomerate 2500 stores worldwide, including Winners and HomeSense stores in Canada Intrusion into its customer transaction management system Credit card information of 46 million customers compromised
Background image of page 3

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Ethics Ethics Code of Ethics Unethical vs. Illegal What is unethical is not necessarily illegal.
Background image of page 4
Fundamental Tenets of Ethics Responsibility Accountability Liability
Background image of page 5

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
The Four Categories of Ethical Issues Privacy Issues Accuracy Issues Property Issues Accessibility Issues
Background image of page 6
Privacy Privacy: The right to be left alone and to be free of unreasonable personal intrusions. Court decisions have followed two rules: 1. The right of privacy is not absolute. Your privacy must be balanced against the needs of society 2. The public’s right to know is superior to the individual’s right of privacy
Background image of page 7

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Threats to Privacy Data aggregators, digital dossiers, and profiling Electronic Surveillance Personal Information in Databases Information on Internet Bulletin Boards, Newsgroups, and Social Networking Sites
Background image of page 8
Data Aggregators, Digital Dossiers, and Profiling
Background image of page 9

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Personal Information in Databases Banks Utility companies Government agencies Credit reporting agencies
Background image of page 10
Information on Internet Bulletin Boards, Newsgroups, and Social Networking Sites
Background image of page 11

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
What Can You Do? First, be careful what information you post on social networking sites. Second, a company, ReputationDefender, says it can remove derogatory information from the Web.
Background image of page 12
Privacy Codes and Policies opt-out model opt-in model Platform for Privacy Preferences (P3P) Developed by WWW Consortium Compares a website’s privacy policy to the visitor’s preferences or to other standards, such as the Canadian Standard’s Association (CSA) Model Code for the Protection of Personal Information
Background image of page 13

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Image of page 14
This is the end of the preview. Sign up to access the rest of the document.

Page1 / 65

ch03 - CHAPTER 3 Ethics, Privacy and Information Security...

This preview shows document pages 1 - 14. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online