PROFESSIONAL ETHICS IN SCIENCE AND ENGINEERING CD5590 Ethics, Privacy and Civil Liberties Gordana Dodig-Crnkovic Department of Computer Science and Engineering Mälardalen University 2006 1 2 Ethics of Computing Ethics of Computing “Descriptive metaphysics is content to describe the actual structure of our thought about the world; revisionary metaphysics is concerned to produce better structure.” Strawson (1959) Ethics, Values and Practices – Why is it Important? Agency implies making choices, which is related to preferences. Based on Strawson’s distinction, Debrock (2003) extends the terms “descriptive” and “revisionary“ to philosophy in general, arguing that the distinctions regarding what there is (ontology) are to be extended to the question of how do we know that (epistemology), and also how should we act (ethics). Questions of identity in a digital universe. 3 4 Privacy Privacy protection vs. Surveillance The four basic features of computing technology that makes it unprecedented tools for monitoring and surveillance: Privacy is a fundamental human right recognized in all major international agreements regarding human rights such as Article 12 of the Universal Declaration of Human Rights (United Nations, 1948). 5 6 Privacy protection vs. Surveillance Legislation Disappearance of boundaries between private and public/professional life: - Searching, Sorting, Storage Simulation Privacy and Human Rights Report Personal Information must be: ubiquitous computing ambiental intelligence – – – – – 7 obtained fairly and lawfully used only for the original specified purpose adequate, relevant and not excessive to purpose accurate and up to date, and destroyed after its purpose is completed 8 Legislation The Council of Europe's 1981 Convention for the Protection of Individuals with regard to the Automatic Processing of Personal Data The Organization for Economic Cooperation and Development's Guidelines Governing the Protection of Privacy and Transborder Data Flows of Personal Data Why Value Privacy? Privacy and Democracy In intruding on privacy, which is closely related to freedom and autonomy, surveillance can be considered to have, ultimately, a negative effect on democracy. A Privacy Culture Whether or not privacy is protected by law or contract, fostering a culture where privacy is valued and respected contributes to healthy human relations. 9 10 Legitimacy by Design and Trustworthy Computing Legitimacy by Design and Trustworthy Computing The first phase of the intentional design for democracy is the explication of the embedded moral significance of ICT while the next is the development of the corresponding technology (Yu and Cysneiros, 2002). – Trust must be established in the use of ICT, where both users and the technology will be trustworthy. – This in the first place presupposes the informed consent of all the parties involved. – This trust must be established globally because the data contained in networked computers virtually knows no boundaries. 11 12 Some common uses of data about people Some common uses of data about people Public Information which can lead to.. Multiple Mailing Lists Business Transactions Birth Certificates Driver Licenses Car Registrations Property Records Marriage License Census Records Telephone Directories Consumer Surveys Passports Visas Mail Orders Telephone Orders Subscriptions Donations Credit Cards Warranty Cards Tattslotto, ... Accounts Payments Subscriptions Entertainment Specials Donations Memberships Catalogues Social Clubs Professional Development 13 Ethics, Privacy and Security Some common uses of data about people Public Information Birth Certificates Driver Licenses Car Registrations Property Records Marriage License Census Records Telephone Directories Consumer Surveys Passports Visas 14 Ethics, Privacy and Security Multiple Mailing Lists Business Transactions Subscriptions Entertainment Specials Donations Memberships Catalogues Social Clubs Professional Development Mail Orders Telephone Orders Subscriptions Donations Credit Cards Warranty Cards Tattslotto, ... Accounts Payments 15 16 Ethics, Privacy and Security Privacy: The right of people not to reveal information about themselves, the right to keep personal information from being misused Electronic invasion of personal data has become a serious ethical issue Ethics, Privacy and Security Invasion of Privacy. Would you agree to: Your shopping habits, your income, to be available to any number of businesses ? Your medical records being used by your employer as one of the means of making decision regarding promotions, hiring, redundancy ? 17 18 Ethics, Privacy and Security US Ethics, Privacy and Security US The rapid expansion of use of the Internet and E-Commerce has raised many problems with privacy aspects. In America there exists the ‘Association of Corporate Privacy Officers’ which would indicate that there is much interest and concern regarding privacy of data. 19 Privacy Officers : - train employees about privacy - examine a company’s policies for potential risks - manage customer-privacy disputes - inform senior executives on how the company deals with privacy issues 20 Security Security AIM - Confidentiality - Integrity - Availability Database Security: is the protection of a database from – unauthorised access – unauthorised modification – destruction PRIVACY is the right of individuals to have some control over information about themselves INTEGRITY refers to the correctness, completeness and consistency of data PREVENTS - Unauthorised disclosure - Unauthorised Amendment - Unauthorised Withholding Security Systems: 1. Computer Security 2. Communications Security - transmission - encryption 3. Procedural security 4. Physical security http://www.csse.monash.edu.au/courseware/cse1720/Week12.ppt 21 Civil Rights and Civil Liberties 22 What are civil rights and what are civil liberties? Civil Rights = The right of every person to equal protection under the law and equal access to society’s opportunities and public facilities. Civil Liberties = Individual rights that are protected from infringement by government. 23 24 CIVIL LIBERTIES CIVIL LIBERTIES 1. The Bill of Rights 2. First Amendment: Freedom of Religion 3. First Amendment: Freedom of Speech and Press 4. The Right to Keep and Bear Arms 5. The Rights of Criminal Defendants 6. The Right to Privacy 25 Civil liberties are the personal rights and freedoms that the federal government cannot abridge, either by law, constitution, or judicial interpretation. These are limitations on the power of government to restrain or dictate how individuals act. 26 The Right to Privacy Civil Liberties after Sept 11 Privacy is not specifically mentioned in the Constitution, nevertheless some areas are to be off-limits to government interference. Examples: – The right to Abortion – The right to Homosexuality – The Right to Die 27 28 Privacy before Sept. 11th Tradeoff between security and privacy has always been a major issue for most Americans Most sided with privacy at the expense of security 84% of Americans were concerned about the government, businesses, or individuals collecting information on them Privacy Before Sept 11th, cont. 54% were “very concerned” Only a minor portion of America (13%) supported FBI internet surveillance to catch criminals 62% of Americans thought that new laws should be created to guarantee that privacy would be protected from government agencies 29 30 9.11.2001 Shift in Public Opinion On September 11, 2001, terrorists attacked the World Trade Center in New York City and the Pentagon just outside Washington, D.C. 31 NYTimes Poll 4/23/97 29% wanted stronger laws at cost of civil liberties 62% did not want new laws Majority wanted protection from government NYTimes Poll 9/27/01 55% want stronger laws at cost of civil liberties 35% do not want new laws 72% think antiencryption laws would prevent another attack 32 Government Reaction The government is reacting to public opinion polls and are passing new controversial laws that expand government power Have already passed many ‘anti-terrorism’ bills that cover matters such as wiretaps, electronic surveillance, regulation of airports, etc. Internet wiretapping scheme Installed at ISPs (Internet Service Providers) Maintained and operated by FBI Monitors all email, both incoming and outgoing 33 34 Cryptography Cryptography Evidence produced from the Libyan bombings that Osama bin Laden, the suspected mastermind behind the 9/11 attacks, used phones scrambled by strong cryptography to hide the planning of the Libyan bombings Evidence produced by the US government suggests that similar methods were used by the terrorist network for 9/11 attacks as well 35 The US government has charged that such cryptography aids terrorism more than it protects privacy and therefore should be banned 36 Conclusions Public opinion will most likely remain concerned with security for years to come Government expanding law enforcement powers Privacy strongly related to public safety http://www.cs.dartmouth.edu/~cs7/papers/zachary-pr.ppt 37
© Copyright 2026 Paperzz