Ethical Impacts Flashcards
(125 cards)
What is a patent?
Grant of property right issued by the US Patent and Trademark Office (USPTO) to an inventor, permitting owner to exclude public from making, using, or selling the protected invention, and allows for legal action in violations.
Which law grants citizens the right to access certain information and records of the federal government upon request?
The Freedom of Information Act (FOIA)
What is a utility patent?
Issued for a new process, machine, manufacture, or composition of matter
What are three advantages of trade secret law over patents and copyrights?
- No time limitations on trade secret protections
- No need to file an application or otherwise disclose to outsiders for protection
- No risk that trade secret will be found invalid in court
What is the focus of CALEA?
To require telecom industry to build tools into its products that federal investigators can use to eavesdrop on conversations and intercept electronic communications
Which law defined standards to improve portability and continuity of health insurance coverage, reduce fraud, and simplify administration?
The Health Insurance Portability and Accountability Act
Which law prohibits US government agencies from concealing the existence of any personal data record keeping system?
The Privacy Act
What are the three areas addressed by ECPA?
- Protection of communications while in transfer
- Protection of communications held in electronic storage
- Prohibition of devices from recording dialling, routing, addressing, and signalling information without a search warrant
What type of information is excluded from FOIA requests?
Freedom of Information Act prohibits request for excessively wide range searches of records.
What are fair information practices?
Guidelines that govern the collection and use of personal data
Which law mandates websites catering to children to offer comprehensive privacy policies, notify parents or guardians about their data collection practices, and receive parental consent before collecting any personal information from children under 13?
Children’s Online Privacy Protection Act (COPPA)
Which law has strong privacy provisions for electronic health records (EHRs) - banning sale of info, promoting audit trails and encryption, and rights of access for patients?
The American Recovery and Reinvestment Act
What is a trademark?
A logo, package design, phrase, sound, or word that differentiates a brand
What is cyberterrorism?
Intimidation of the government or civilian population by using IT to disable national infrastructure (energy, transportation, finance, law enforcement, and emergency response) to achieve political, religious, or ideological goals.
What is the basis for protecting personal privacy under law?
The Fourth Amendment’s defence against unreasonable searches and seizures without a warrant or probable cause.
What types of speech are not protected by the First Amendment?
- Perjury
- Fraud
- Defamation
- Obsenity
Which law ensures accuracy, fairness, and privacy of information gathered by credit card companies?
Fair Credit Reporting Act
What is a copyright?
Exclusive right to distribute, display, perform, or reproduce an original work in copies, to prepare derivative works, and to grant these exclusive rights to others.
Which law granted a four year extension of the US PATRIOT Act that allowed roving wiretaps and searches of business records, and extended authorization intelligence gathering on lone wolves?
The PATRIOT Sunsets Extension Act
Which agreement created the World Trade Organization in Geneva to enforce compliance and has a section called Agreement on Trade Related Aspects of Intellectual Property Rights (TRIPS)?
The General Agreement on Tariffs and Trade (GATT), 1993
What are key elements of end user security layer?
- Security education
- Authentication methods
- Antivirus software
- Data encryption
What is the difference between data manipulation and misrepresentation?
Manipulation is largely illustrative
Misrepresentation deliberately influences audiences toward an outcome
How does an organization implement a risk-based security strategy?
- Risk assessment
- Disaster recovery plan
- Define security policies
- Periodic security audits
- Compliance standards defined by external parties
- Track with security dashboard
What are the keys laws establishing the legal framework for electronic surveillance?
- Communication Act (1934)
- Foreign Intelligence Surveillance Act (FISA) (1978, amended 2008)
- Title III of the Omnibus Crime Control and Safe Streets Act (1968, amended 1986) (the “Wiretap Act”)
Also:
- Electronic Communication Privacy Act (ECPA) (1986)
- Communication Assistance for Law Enforcement Act (1994)
- USA PATRIOT Act (2001)