Rethinking The Security of Data in Light of Modern It: What Is at Risk?
Rethinking The Security of Data in Light of Modern It: What Is at Risk?
Internet
Web Sites and the Internet
An overriding consideration in any legal assessment is whether the data are
collected from or accessible to the outside. Where an organization collects
information through a Web site or stores data on a server connected to the
Internet, the potential for unauthorized access and disclosure to someone outside
the organization may be greater than with a closed system. Furthermore, data that
are transmitted or stored unencrypted are at greater risk if intercepted or otherwise
accessed by an intruder. Consumer data collected via a Web site may also subject
a business to certain obligations under consumer protection laws, or perhaps
contractual liability under the business's own privacy policy if the terms in that
policy are not followed.
Outsourcing and Subcontracting
Utilizing third-party service providers may be an attractive option where such
providers are, given the efficiencies created by their niche expertise or their
economies of scale, capable of providing a service at reduced costs when
compared with supporting the service in-house. In other instances, there may be
no alternative to engaging an IT service provider, as is typically the case with a
telecommunications provider. Furthermore, vendors that concentrate on
providing a particular service may have expertise in an area that may be difficult
to replicate inhouse. A hosting company is a good example. Many hosting
companies maintain large server farms on which they host many Web sites for
their customers. A hosting company often negotiates favorable terms with
hardware and software providers, and with an Int
First, the courts tend to be reactive instead of proactive. That is, we have
to wait for a transgression to occur and then adjudicate it, rather than try
to prevent it in the first place. Second, fixing a problem through the courts
can be time consuming (sometimes taking years) and expensive; the latter
characteristic prevents all but the wealthy from addressing most security
issues.
Therefore, we have three motivations for studying the legal section of this
chapter:
to know what protection the law provides for computers and data
to appreciate laws that protect the rights of others with respect to
computers, programs, and data
to understand existing laws as a basis for recommending new laws to
protect computers, data, and people
The next few sections address the following aspects of protection of the security
of computers.
Computer law is complex and emerging rather rapidly as it tries to keep up with
the rapid technological advances in and enabled by computing. We present the
fundamentals in this book not in their full detail as you would expect by someone
with a law degree, but as a situational analysis to heighten the awareness of those
who are not lawyers but who must deal with the law's implications. You should
consult a lawyer who understands and specializes in computer law in order to
apply the material of this section to any specific case. And, as most lawyers will
advise, ensuring legal protection by doing things correctly from the beginning is
far easier—and cheaper—than hiring a lawyer to sort out a web of conflict after
things have gone wrong.
Copy
Add Highlight
Add Note
The next few sections address the following aspects of protection of the security
of computers.
Requirement Yes No No
to distribute
specialist
lawyer
suggested
Unlike tangible things and services, information can be sold again and
again without depleting stock or diminishing quality. For example, a
credit bureau can sell the same credit report on an individual to an
unlimited number of requesting clients. Each client pays for the
information in the report. The report may be delivered on some tangible
medium, such as paper, but it is the information, not the medium, that has
the value.
The value of information is what the buyer will pay the seller. But after
having bought the information, the buyer can then become a seller and
can potentially deprive the original seller of further sales. Because
information is not depletable, the buyer can enjoy or use the information
and can also sell it many times over, perhaps even making a profit.
The marginal cost of an item is the cost to produce another one after
having produced some already. If a newspaper sold only one copy on a
particular day, that one issue would be prohibitively expensive because it
would have to cover the day's cost (salary and benefits) of all the writers,
editors, and production staff, as well as a share of the cost of all equipment
for its production. These are fixed costs needed to produce a first copy.
If you knew for certain what the trading price of a share of Microsoft stock
would be next week, that information would be extremely valuable
because you could make an enormous profit on the stock market. Of
course, that price cannot be known today. But suppose you knew that
Microsoft was certain to announce something next week that would cause
the price to rise or fall. That information would be almost as valuable as
knowing the exact price, and it could be known in advance. However,
knowing yesterday's price for Mic
From these examples, it is clear that the legal community has not
accommodated advances in computers as rapidly as has the rest of society.
Some people in the legal process do not understand computers and
computing, so crimes involving computers are not always treated
properly. Creating and changing laws are slow processes, intended to
involve substantial thought about the effects of proposed changes. This
deliberate process is very much out of pace with a technology that is
progressing as fast as computing.
Many of the threats to privacy are not new. Bribing insiders, especially
poorly paid ones, has worked for centuries. A break-in usually involves
loss of some valuables, such as jewelry, silver, or electronics. But who can
say whether the laptop computer was stolen just because it was a
computer or because it contained sensitive data? And public records have
been, by definition, open to the public. So loss of the privacy in those
records is not new. Or is it?
TRANSACTIONS PERFORMED BY THE PERSON ATM , CREDIT CARDS, CELL PHONE, TRANSPONDERS,ETC
DBMS
People are the weak link in any security system, and insiders are involved
in the majority of computer security incidents [CSI02, DTI02]. Whether
through carelessness, poor understanding, pressure, or simple human
error, insiders unintentionally expose private data. Personal details are
discarded in unprotected trash, inadvertently displayed on web sites, or
unknowingly stored in files on a computer (such as in a cookie or as part
of a query embedded in a “favorite” URL). Add to that the malicious
approaches in which workers are bribed, coerced, or tricked into
compromising security.
Government Threats
Computer Use
This final section helps clarify thinking about the ethical issues involved
in computer security. We offer no answers. Rather, after listing and
explaining some ethical principles, we present several case studies to
which the principles can be applied. Each case is followed by a list of
possible ethical issues involved, although the list is not necessarily all-
inclusive or conclusive. The primary purpose of this section is to explore
some of the ethical issues associated with computer security and to show
how ethics functions as a control.
As we noted earlier, law is not always the appropriate way to deal with
issues of human behavior. It is difficult to define a law to preclude only the
events we want it to. For example, a law that restricts animals from public
places must be refined to permit guide dogs for the blind. Lawmakers,
who are not computer professionals, are hard pressed to think of all the
exceptions when they draft a law. Even when a law is well conceived and
well written, its enforcement may be difficult. The courts are
overburdened, and prosecuting relatively minor infractions may be
excessively time consuming relative to the benefit.
An ethic is different from a law in several important ways. First, laws apply
to everyone: One may disagree with the intent or the meaning of a law, but
that is not an excuse for disobeying the law. Second, the courts have a
regular process for determining which law supersedes which if two laws
conflict. Third, the laws and the courts identify certain actions as right and
others as wrong. From a legal standpoint, anything that is not illegal is
right. Finally, laws can be enforced to rectify wrongs done by unlawful
behavior.
Law Ethics
Ethical values vary by society, and from person to person within a society.
For example, the concept of privacy is important in Western cultures. But
in Eastern cultures, privacy is not desirable because people associate
privacy with having something to hide. Not only is a Westerner's desire
for privacy not understood, but in fact it has a negative connotation.
Therefore, the attitudes of people may be affected by culture or
background.