Webster U COSC 5130 - Legal and Ethical Aspects

Unformatted text preview:

Cryptography and Network Security Chapter 23Chapter 23 – Legal and Ethical AspectsCybercrime / Computer CrimeLaw Enforcement ChallengesIntellectual PropertyCopyrightCopyright RightsPatentsTrademarksIntellectual Property Issues and Computer SecurityU.S. Digital Millennium Copyright ACT (DMCA)DMCA ExemptionsDigital Rights Management (DRM)DRM ComponentsDRM System ArchitecturePrivacyEU Privacy LawUS Privacy LawOrganizational ResponseCommon Criteria Privacy ClassPrivacy and Data SurveillanceEthical IssuesEthical HierarchyEthical Issues Related to Computers and Info SystemsEthical Question ExamplesCodes of ConductSlide 27SummaryCryptography and Cryptography and Network SecurityNetwork SecurityChapter 23Chapter 23Fifth EditionFifth Editionby William Stallingsby William StallingsLecture slides by Lawrie BrownLecture slides by Lawrie BrownChapter 23 – Chapter 23 – Legal and Legal and Ethical AspectsEthical Aspectstouch on a few topics including:touch on a few topics including:cybercrime and computer crimecybercrime and computer crimeintellectual property issuesintellectual property issuesprivacy privacy ethical issuesethical issuesCybercrime / Computer CrimeCybercrime / Computer Crime““criminal activity in which computers or computer criminal activity in which computers or computer networks are a tool, a target, or a place of criminal networks are a tool, a target, or a place of criminal activity”activity”categorize based on computer’s role:categorize based on computer’s role:as targetas targetas storage deviceas storage deviceas communications toolas communications toolmore comprehensive categorization seen in more comprehensive categorization seen in Cybercrime Convention, Computer Crime SurveysCybercrime Convention, Computer Crime SurveysLaw Enforcement ChallengesLaw Enforcement ChallengesIntellectual PropertyIntellectual PropertyCopyrightCopyrightprotects tangible or fixed expression of an idea protects tangible or fixed expression of an idea but not the idea itselfbut not the idea itselfis automatically assigned when createdis automatically assigned when createdmay need to be registered in some countriesmay need to be registered in some countriesexists when:exists when:proposed work is originalproposed work is originalcreator has put original idea in concrete formcreator has put original idea in concrete forme.g. literary works, musical works, dramatic works, e.g. literary works, musical works, dramatic works, pantomimes and choreographic works, pictorial, pantomimes and choreographic works, pictorial, graphic, and sculptural works, motion pictures and graphic, and sculptural works, motion pictures and other audiovisual works, sound recordings, other audiovisual works, sound recordings, architectural works, software-related works.architectural works, software-related works.Copyright RightsCopyright Rightscopyright owner has these exclusive copyright owner has these exclusive rights, protected against infringement:rights, protected against infringement:reproduction rightreproduction rightmodification rightmodification rightdistribution rightdistribution rightpublic-performance rightpublic-performance rightpublic-display rightpublic-display rightPatentsPatentsgrant a property right to the inventorgrant a property right to the inventorto exclude others from making, using, offering for sale, to exclude others from making, using, offering for sale, or selling the inventionor selling the inventiontypes:types:utility - any new and useful process, machine, article of utility - any new and useful process, machine, article of manufacture, or composition of mattermanufacture, or composition of matterdesign - new, original, and ornamental design for an design - new, original, and ornamental design for an article of manufacturearticle of manufactureplant - discovers and asexually reproduces any distinct plant - discovers and asexually reproduces any distinct and new variety of plantand new variety of plante.g. RSA public-key cryptosystem patente.g. RSA public-key cryptosystem patentTrademarksTrademarksa word, name, symbol, or device a word, name, symbol, or device used in trade with goodsused in trade with goodsindicate source of goods indicate source of goods to distinguish them from goods of othersto distinguish them from goods of otherstrademark rights may be used to:trademark rights may be used to:prevent others from using a confusingly similar markprevent others from using a confusingly similar markbut not to prevent others from making the same but not to prevent others from making the same goods or from selling the same goods or services goods or from selling the same goods or services under a clearly different markunder a clearly different markIntellectual Property Issues Intellectual Property Issues and Computer Securityand Computer Securitysoftware programssoftware programsprotect using copyright, perhaps patentprotect using copyright, perhaps patentdatabase content and arrangementdatabase content and arrangementprotect using copyrightprotect using copyrightdigital content audio / video / media / webdigital content audio / video / media / webprotect using copyrightprotect using copyrightalgorithmsalgorithmsmay be able to protect by patentingmay be able to protect by patentingU.S. Digital Millennium U.S. Digital Millennium Copyright ACT (DMCA)Copyright ACT (DMCA)implements WIPO treaties to strengthens implements WIPO treaties to strengthens protections of digital copyrighted materialsprotections of digital copyrighted materialsencourages copyright owners to use encourages copyright owners to use technological measures to protect their technological measures to protect their copyrighted works, including:copyrighted works, including:measures that prevent access to the work measures that prevent access to the work measures that prevent copying of the workmeasures that prevent copying of the workprohibits attempts to bypass the measuresprohibits attempts to bypass the measureshave both criminal and civil penalties for thishave both criminal and civil penalties for thisDMCA ExemptionsDMCA Exemptionscertain actions are exempted from the certain actions are exempted from the DMCA provisions:DMCA provisions:fair usefair usereverse engineeringreverse engineeringencryption researchencryption researchsecurity


View Full Document

Webster U COSC 5130 - Legal and Ethical Aspects

Download Legal and Ethical Aspects
Our administrator received your request to download this document. We will send you the file to your email shortly.
Loading Unlocking...
Login

Join to view Legal and Ethical Aspects and access 3M+ class-specific study document.

or
We will never post anything without your permission.
Don't have an account?
Sign Up

Join to view Legal and Ethical Aspects 2 2 and access 3M+ class-specific study document.

or

By creating an account you agree to our Privacy Policy and Terms Of Use

Already a member?