Skip to main content

Home/ ITGS News/ Group items tagged law

Rss Feed Group items tagged

Elisavet M

Data Security Laws Seem Likely, So Consumers and Businesses Vie to Shape Them - 0 views

  •  
    During 2005, political organizations advocated for strict laws implementing data security enforcement, as rising concerns stemmed out of alarming statistical studies and research, revealing identity theft, credit card frauds and hacking as emerging and terrorizing practices overtaking much of the internet realm. This article introduces the beginning of the rise in public awareness, as technology strongly began to redirect the business world into another more digital phase. It was during that year, the primary stakeholders, also known as the businesses ( participants of e-commerce that stored, verified and utilized private consumer data), vocalized their needs clarifying their desire for the creation of constraints in regards to the consequences or negative implications of passing certain bills (for data security). The past exemplifies the various influences the introduction of data security measures, passed by the government legislatures, had upon newly initiated businesses; among the most significant implications discussed were: the need to build a secure database for reliable storage of clientele digital data with the utilization of particular software as well as improving business organizational structure in order to maximize the rate of security notifications towards consumers based on a foundation of rigid security standards. Far from the adaptation to such implications, the political crisis of establishing solid ground for a new set of security data policies and standards became an overwhelming process for politicians, congress members in conjunction with consumer and data privacy groups that rivaled in attaining the responsibilities of passing the needed laws. The politicians (stakeholders, holding the role of administering governmental legislation to stabilize data security breaches), came into opposition with the concerns of many members of advocacy groups (stakeholders, holding the responsibility of supervising and publicly navigating the direction of th
  •  
    continuation: the adjusted standards enforced by politicians). The problem of adhering to the instruction of newly created laws motioning businesses to appoint data security officers, draft policies, to comply with policies and procedures involving giving access to files in business databases for the Federal Trade Commission to check comes into collision with what most online businesses want to go through the process of doing. However, with the issue of security surfacing future consumer problems, as security breaches become major forces threatening the safe entering of digitally encrypted information (such as credit card codes), many companies become increasingly aware of the needed adherence to the strict security data laws, in order to continue profiting financially in order to keep the rate of consumer trust and payment increasing.
Madeline Brownstone

Copyright Laws for Teachers: Educational CyberPlayGround™ - 1 views

  •  
    "K-12 COPYRIGHT LAWS: PRIMER FOR TEACHERS COPYRIGHT LAWS DO'S AND DON'TS WHAT IS LEGAL IN THE SCHOOL CLASSROOM "
Madeline Brownstone

BBC News - Ministers offer concessions on copyright changes - 0 views

  •  
    "Critics said the proposed powers were disproportionate and would damage one of the UK's fast-growing industries. Section 17 of the bill, which has attracted the most anger, would give ministers "reserve powers" to draft fresh laws to tackle net-based copyright infringement without needing parliamentary approval. Ministers argued that such powers were needed to support copyright laws against future, more technically advanced forms of piracy. "
Karen M

Armies of Expensive Lawyers, Replaced by Cheaper Software - 4 views

  •  
    The stakeholders in this article are lawyers, clients, the software developers, and law firms. The social and ethical issue is people and machines, more specifically, the fact that software is replacing the work of "armies of expensive lawyers." The area of impact is business and employment. The issue here is that law firms are now starting to use this new software in order to replace spending a lot of money of many lawyers to get the same job done. Law firms are able to save their money by investing in this software instead of multiple lawyers. They are also able to save time because the software is able to go through information faster than humans are able to. Clients are also able to save their money because they are paying law firms less to get the same job done. This is a chain reaction. The software developers are also able to make more money now that this is becoming more popular because they are able to continue building on and improving the software they have now and then selling it later on. The issue is that lawyers are being replaced by this new software. A job that used to take 500 lawyers, could now take 1 lawyer, along with this new software. This is an important issue to pay attention to because eventually it might lead to unemployment, even though there are no signs of it now.
  •  
    This was a pretty interesting article and I actually enjoyed reading it. You seem to have hit all the points and from the article what really stood out to me was when Bill Herr said,"People get bored, people get headaches. Computers don't." This is basically the issue that we are faced with when losing jobs. For those jobs that are repetitive is is more efficent and time saving to have a robot rather than a person doing the job. You hit this point by saying, "A job that used to take 500 lawyers, could now take 1 lawyer, along with this new software." Though I wonder if this is completely a bad thing. You say it is and important issue because it can lead to unemployment, but isn't it also the case that new jobs would arise? Would those jobs be able replace or be more than what was lost?
Madeline Brownstone

BBC NEWS | Technology | Public to shape smart tag policy - 0 views

  •  
    The stakeholders may eventually draft new regulations to police the tags, but, for now, the commission proposes no new laws to govern their use.
  •  
    The stakeholders may eventually draft new regulations to police the tags, but, for now, the commission proposes no new laws to govern their use.
Kristin O

Law or no, it's simple: Don't text and drive - OregonLive.com - 0 views

  • In the first place, you'd think you wouldn't need a law, that simple common sense would be enough to tell us it's unsafe to divert attention to a tiny keyboard and screen while simultaneously piloting 2 tons of metal, rubber, glass and, let us not forget, flesh
    • Kristin O
       
      he is trying to understand why people still text while they are driving when they know its dangerous
Jackie C

RFID tags: Big Brother in small packages - 1 views

  •  
    A relatively old news article, that details concerns and issues about RFID tags that remain relevant, or have become more relevant over time. The article clearly defines law enforcement agents, criminals, marketing corporations, and the average consumer as stakeholders in the development and widespread use of RFID tags. The article describes the issue of privacy and unauthorized or undetected monitoring, whether for illegal use or law enforcement or for marketing schemes as rising from the continued functionality of RFID tags after they have served their purpose -- outside of the stores and past the RFID scanners. The article mentions several concerns, including the more widespread adoption of long-range RFID scanners by non-commercial groups or people, and their ability to be used as an invasion of privacy. Evidently, the technology that makes the continued functionality of RFID tags a privacy issue is in the way that each tag, which can be as small as a few centimeters long, can store various bits of data, such as when the item was bought, where the item was bought, for what price, and who bought it, in combination with the ability to use long-range RFID scanners to scan and detect this information outside of a store.
Jaymee C

Government Surveillance Of Social Networks Challenged -- InformationWeek - 0 views

  • Frontier Foundation (EFF) and the Samuelson Law, Technology, and Public Policy Clinic at the University of California, Berkeley, School of Law filed a lawsuit against six government agencies seeking to force the disclosure of policies governing the use of social networking sites for investigations, data-collection, and surveillance.
  • The complaint cites various media reports about how government agencies have used social networking sites like Facebook and MySpace, along with social video sites like YouTube, to investigate people and catch criminals.
Joel Lubi

Outsourcing to India Draws Western Lawyers - 2 views

  •  
    This article is about outsourcing of lawyers in India to cut costs and do work that would otherwise be reserved for those often unskilled young lawyers. By relying on outsourcing to do the petty and tedious tasks of Western law firms, lawyers are saving their time, money, and are given access to a much larger work force for a given price. The combination of these main points greatly increases efficiency around the law firm and allows the lawyers to be more focused on doing their job effectively and with more depth. People with experience in outsourcing from a variety of industries strongly encourage the use of outsourcing for the simple and mundane tasks of the business for a multitude of reasons described before that could save the company a great deal of time and money.
Madeline Brownstone

Keeping Uncle Sam from spying on citizens | InSecurity Complex - CNET News - 1 views

  •  
    "But things might be turning around. The CDT and other civil liberties groups have been able to convince Congress to consider reforming a part of the law that gave the FBI the authority to issue "National Security Letters" (NSL) ordering ISPs and other types of businesses to turn over sensitive customer records. A measure before the U.S. House of Representatives would require that records sought with an NSL pertain to somebody who is either a terrorist or a spy or someone known to be in contact with a terrorist or spy, Nojeim said. For Americans with no ties to such individuals, the FBI can require a company to turn over its financial information and communications only after judicial review or with a subpoena in a criminal investigation, he said. The issue is likely to be resolved in the spring, he added."
Madeline Brownstone

ISIS: Protecting children in online social networks - 0 views

  •  
    "The aim of the Isis project is to develop an ethics-centred monitoring framework and tools for supporting law enforcement agencies in policing online social networks for the purpose of protecting children. The project will develop natural language analysis techniques to help identify paedophiles from chat logs and monitoring mechanisms that can be non-invasively attached to file sharing systems for identifying the distributors of child abuse media. "
Madeline Brownstone

Smuggling Europe's Waste to Poorer Countries - NYTimes.com - 1 views

  •  
    "In the United States, more states are passing laws that require the recycling of goods, especially electronics. But because the United States places fewer restrictions on trash exports and monitors them far less than Europe, that increasing volume is flowing relatively freely overseas, mostly legally, experts say"
Madeline Brownstone

F.B.I. Queries Webcam Use by Schools - NYTimes.com - 2 views

  •  
    "A Pennsylvania school district accused of secretly switching on laptop computer cameras inside students' homes is under investigation by federal authorities, a law enforcement official with knowledge of the case said."
Noreen C

Keeping Secrets WikiSafe - NYTimes.com - 0 views

  •  
    WikiLeaks has led to several problems related to privacy and security of government data. The legal debate weighs whether the posting of this data is against Constitutional laws, but many others in the Government fear the magnitude of this problem. Some people ask, what would the founding fathers have done....but the world of the internet is a whole other ball field. The latest on the WikiLeaks threats claim that Assange still has more documents which were uploaded onto the website. However, the files are encrypted. Many people have access to these files, but because they are in cipher text, they cannot be read. As soon as Assange, or anyone who has access to the information publishes the Public Key, the encrypted documents will be decoded, using the same software that Assange used to encrypt it. If these documents have material in them that could threaten national security, then the USFG will have a stronger case against Assange on the basis of a privacy breach. Because of the high security, and the reliability of the encryption software, these documents have little value at the moment. The Obama Administration is clearly keeping an eye on the situation, because they wish to protect the privacy of the documents, but also because they want to find a way to take down the documents before they create damage. However, there is an extreme level of difficulty in decrypting the data, which is protected by a mathematical algorithm specific to the software that Assange initially used. The intersection of the privacy of the Government and the reliable security that Assange used comes to show that the IT world is constantly expanding, beyond the prediction of one business, or even the Government. But these Assange and the USFG aren't the only ones involved. Many people around the world are trying to attain access to these documents, primarily in the US in order to understand national secrets that have been held back from the public. The internet as a form of media has transfo
  •  
    continued.....transformed the notion of what is private and what isn't, and clearly now more than ever privacy needs to be secured. Maybe the USFG should look into some high security protocols such as encryption, and their data files wouldn't be intercepted and posted on the internet.
Madeline Brownstone

Dr. Dobb's | ACLU Launches dotRights | November 23, 2009 - 0 views

  •  
    "The ACLU of Northern California (ACLU-NC) has launched Demand Your dotRights, an online privacy initiative designed to spotlight the need to upgrade laws protecting consumer data. An interactive web hub for the campaign, features a two-minute Flash video that explains the digital information trail and illustrates what happens to our personal information after we log off. "
Madeline Brownstone

BBC NEWS | Technology | Who is responsible in the cloud? - 0 views

  • The Center for Democracy & Technology
  • Global Online Freedom Act (passed by a US Senate committee, but currently floating in legislative limbo), could actually become law.
Lenny H

Citizens Around the Country Consider Banning Traffic Cameras - 0 views

  •  
    "Petition drives are under way in six cities with the goal of offering local residents the opportunity to vote in the next election on whether automated ticketing should continue or not."
  •  
    This article on the banning of traffic cameras meets all of the requirements for ITGS because the article introduces and establishes/expands on the ideas found on the ITGS Triangle. Various Social and Ethical issues are established by the protest currently occurring with the protest to get red of these "robot cops". One of the Social and Ethical issues introduces is Policies. The government currently enforces the policies that allow the use of these traffic cameras on highways and on many of the streets in our communities/societies today. These policies restrict drivers from ever attempting to cross a red light or do thing that may be inappropriate when driving. With these policies, traffic cameras are allowed to take pictures of drivers and their license plate if committing a crime. States like Maryland a protesting against these policies and laws enforced by the government. This article also introduces stakeholders, which are the people driving in their cars, and the government that enforces the practice of these cameras. These Cameras are also the IT system that the article introduces. This article including or referencing an IT system is the single most important aspect of the article. If this article did not introduce the importance of an IT system it would not be reliable to analyze for the ITGS triangle.
Carmen M

RFID security, data protection and privacy, health and safety issues - 0 views

  •  
    This was a rather long but interesting article to read regarding RFID. It starts out by stating what RFID is and how it is being planned on being introduced across many stores. What made this article informative was that it discussed not only the first thing that comes to mind when we hear this, privacy and security, but also possible health and environmental issues. Security was a big issue discussed. Concerns that came up was who would manage the information picked up by RFID's? Can this be used to track people? Can personal items or documents integrated with RFID track a specific person? Would they know? To what extent does this violate privacy? Are there laws to prevent any form of privacy violation? The article also stated people might have a choice whether or not to use the RFID and what would be the other option. Another issue stated was a health issue. Since this uses radio frequency waves, can this pose any damage to lets say tissue cells? The hypothesis was that no because it uses different kinds of waves than other technologies. However, this technology is too early in its stage to know for sure. Another concern was the disposal of this technology. What effect would it have on the environment. Again, it was too early to determine for sure.
Madeline Brownstone

Why no one cares about privacy anymore | Politics and Law - CNET News - 0 views

  •  
    "The truth about privacy is counter-intuitive: less of it can lead to a more virtuous society. "
1 - 20 of 22 Next ›
Showing 20 items per page