Ethics, Privacy and Civil Liberties Ethics of Computing Ethics of

PROFESSIONAL ETHICS
IN SCIENCE AND ENGINEERING
CD5590
Ethics, Privacy and Civil Liberties
Gordana Dodig-Crnkovic
Department of Computer Science and
Engineering
Mälardalen University
2006
1
2
Ethics of Computing
Ethics of Computing
“Descriptive metaphysics is content to describe the actual
structure of our thought about the world; revisionary
metaphysics is concerned to produce better structure.”
Strawson (1959)
Ethics, Values and Practices – Why is it
Important?
Agency implies making choices, which is
related to preferences.
Based on Strawson’s distinction, Debrock (2003) extends the
terms “descriptive” and “revisionary“ to philosophy in
general, arguing that the distinctions regarding what there
is (ontology) are to be extended to the question of how do
we know that (epistemology), and also how should we act
(ethics).
Questions of identity in a digital universe.
3
4
Privacy
Privacy protection vs. Surveillance
The four basic features of computing technology
that makes it unprecedented tools for
monitoring and surveillance:
Privacy is a fundamental human right
recognized in all major international
agreements regarding human
rights such as Article 12 of the
Universal Declaration of Human
Rights (United Nations, 1948).
ƒ
ƒ
ƒ
5
6
Privacy protection vs. Surveillance
Legislation
Disappearance of boundaries between private and
public/professional life:
-
Searching,
Sorting,
Storage
Simulation
ƒ
Privacy and Human Rights Report
Personal Information must be:
ubiquitous computing
ambiental intelligence
–
–
–
–
–
7
obtained fairly and lawfully
used only for the original specified purpose
adequate, relevant and not excessive to purpose
accurate and up to date, and
destroyed after its purpose is completed
8
Legislation
ƒ
The Council of Europe's 1981 Convention for the Protection of
Individuals with regard to the Automatic Processing of Personal
Data
ƒ
The Organization for Economic Cooperation and Development's
Guidelines Governing the Protection of Privacy and Transborder
Data Flows of Personal Data
Why Value Privacy?
Privacy and Democracy
In intruding on privacy, which is closely related to
freedom and autonomy, surveillance can be
considered to have, ultimately, a negative
effect on democracy.
A Privacy Culture
Whether or not privacy is protected by law or
contract, fostering a culture where privacy is
valued and respected contributes to healthy
human relations.
9
10
Legitimacy by Design and
Trustworthy Computing
Legitimacy by Design and
Trustworthy Computing
The first phase of the intentional design for democracy is the
explication of the embedded moral significance of ICT
while the next is the development of the corresponding
technology (Yu and Cysneiros, 2002).
– Trust must be established in the use of ICT, where
both users and the technology will be trustworthy.
– This in the first place presupposes the informed
consent of all the parties involved.
– This trust must be established globally because the
data contained in networked computers virtually knows
no boundaries.
11
12
Some common uses of data about
people
Some common uses of data about
people
Public Information
which can lead to..
Multiple Mailing Lists
Business Transactions
Birth Certificates
Driver Licenses
Car Registrations
Property Records
Marriage License
Census Records
Telephone Directories
Consumer Surveys
Passports
Visas
Mail Orders
Telephone Orders
Subscriptions
Donations
Credit Cards
Warranty Cards
Tattslotto, ...
Accounts Payments
Subscriptions
Entertainment Specials
Donations
Memberships
Catalogues
Social Clubs
Professional Development
13
Ethics, Privacy and Security
Some common uses of data about people
Public Information
Birth Certificates
Driver Licenses
Car Registrations
Property Records
Marriage License
Census Records
Telephone Directories
Consumer Surveys
Passports
Visas
14
Ethics, Privacy and Security
Multiple Mailing Lists
Business Transactions
Subscriptions
Entertainment Specials
Donations
Memberships
Catalogues
Social Clubs
Professional Development
Mail Orders
Telephone Orders
Subscriptions
Donations
Credit Cards
Warranty Cards
Tattslotto, ...
Accounts Payments
15
16
Ethics, Privacy and Security
‰
Privacy: The right of people not to reveal
information about themselves, the right to
keep personal information from being
misused
‰
Electronic invasion of personal data has
become a serious ethical issue
‰
‰
Ethics, Privacy and Security
Invasion of Privacy. Would you agree to:
‰ Your shopping habits, your income, to be
available to any number of businesses ?
‰ Your medical records being used by your
employer as one of the means of making
decision regarding promotions, hiring,
redundancy ?
17
18
Ethics, Privacy and Security
US
Ethics, Privacy and Security
US
The rapid expansion of use of the Internet
and E-Commerce has raised many
problems with privacy aspects.
‰
In America there exists the ‘Association of
Corporate Privacy Officers’ which would
indicate that there is much interest and
concern regarding privacy of data.
19
Privacy Officers :
- train employees about privacy
- examine a company’s policies for
potential risks
- manage customer-privacy disputes
- inform senior executives on how the
company deals with privacy issues
20
Security
Security
AIM
- Confidentiality
- Integrity
- Availability
Database Security: is the protection of a database from
– unauthorised access
– unauthorised modification
– destruction
PRIVACY is the right of individuals to have some control over
information about themselves
INTEGRITY refers to the correctness, completeness and
consistency of data
PREVENTS
- Unauthorised disclosure
- Unauthorised Amendment
- Unauthorised Withholding
Security Systems:
1. Computer Security
2. Communications Security
- transmission
- encryption
3. Procedural security
4. Physical security
http://www.csse.monash.edu.au/courseware/cse1720/Week12.ppt
21
Civil Rights and Civil Liberties
22
What are civil rights and
what are civil liberties?
Civil Rights = The right of every person to
equal protection under the law and
equal access to society’s opportunities
and public facilities.
Civil Liberties = Individual rights that are
protected from infringement by
government.
23
24
CIVIL LIBERTIES
CIVIL LIBERTIES
1. The Bill of Rights
2. First Amendment: Freedom of
Religion
3. First Amendment: Freedom of
Speech and Press
4. The Right to Keep and Bear Arms
5. The Rights of Criminal Defendants
6. The Right to Privacy
25
‰
‰
Civil liberties are the personal rights
and freedoms that the federal
government cannot abridge, either by
law, constitution, or judicial
interpretation.
These are limitations on the power of
government to restrain or dictate how
individuals act.
26
The Right to Privacy
Civil Liberties after Sept 11
‰
‰
Privacy is not specifically mentioned in the
Constitution, nevertheless some areas are to be
off-limits to government interference.
Examples:
– The right to Abortion
– The right to Homosexuality
– The Right to Die
27
28
Privacy before Sept. 11th
Tradeoff between security and privacy
has always been a major issue for most
Americans
‰ Most sided with privacy at the expense
of security
‰ 84% of Americans were concerned
about the government, businesses, or
individuals collecting information on
them
‰
‰
Privacy Before Sept 11th, cont.
54% were “very concerned”
‰ Only a minor portion of America (13%)
supported FBI internet surveillance to
catch criminals
‰ 62% of Americans thought that new
laws should be created to guarantee
that privacy would be protected from
government agencies
‰
29
30
9.11.2001
Shift in Public Opinion
On September 11, 2001, terrorists attacked
the World Trade Center in New York City and
the Pentagon just outside Washington, D.C.
31
NYTimes Poll
4/23/97
29% wanted stronger
laws at cost of civil
liberties
62% did not want new
laws
Majority wanted
protection from
government
NYTimes Poll
9/27/01
55% want stronger
laws at cost of civil
liberties
35% do not want new
laws
72% think
antiencryption laws
would prevent another
attack
32
Government Reaction
‰
‰
‰
‰
The government is reacting to public opinion
polls and are passing new controversial laws
that expand government power
Have already passed many ‘anti-terrorism’
bills that cover matters such as wiretaps,
electronic surveillance, regulation of airports,
etc.
Internet wiretapping scheme
‰ Installed at ISPs (Internet Service
Providers)
‰ Maintained and operated by FBI
‰ Monitors all email, both incoming and
outgoing
‰
33
34
Cryptography
Cryptography
Evidence produced from the Libyan
bombings that Osama bin Laden, the
suspected mastermind behind the 9/11
attacks, used phones scrambled by strong
cryptography to hide the planning of the
Libyan bombings
Evidence produced by the US government
suggests that similar methods were used by
the terrorist network for 9/11 attacks as well
‰
35
The US government has charged that such
cryptography aids terrorism more than it
protects privacy and therefore should be
banned
36
Conclusions
‰
‰
‰
Public opinion will most likely remain
concerned with security for years to come
Government expanding law enforcement
powers
Privacy strongly related to public safety
http://www.cs.dartmouth.edu/~cs7/papers/zachary-pr.ppt
37