SlideShare une entreprise Scribd logo
1  sur  30
ICSE 6205:Legal and Ethical Issues on
            CyberWorld


        Student: KASITA, Chande
        Instructor: Mr. Mussa Ally
Cyber Ethics
• Cyberethics is the field of applied ethics that
  examines moral, legal, and social issues in the
  development and use of cybertechnology.
• Cybertechnology refers to a broad range of
  technologies from stand-alone computers to
  the cluster of networked
  computing, information and communication
  technologies.
Definitions
Differences between ETHICS and LAWS
Computer Ethics
• Computer Ethics is a branch of practical philosophy which
  deals with how computing professionals should make
  decisions regarding professional and social conduct.
• Margaret Anne Pierce, a professor in the Department of
  Mathematics and Computers at Georgia Southern
  University has categorized the ethical decisions related to
  computer technology and usage into 3 primary influences:
 1. The individual's own personal code.
 2. Any informal code of ethical behavior that exists in the
work place.
 3. Exposure to formal codes of ethics.
Ethical standards

• Various national and international professional
  societies and organizations have produced code of
  ethics documents to give basic behavioral guidelines to
  computing professionals and users. They include:
• Association for Computing Machinery: ACM Code of
  Ethics and Professional Conduct
• British Computer Society: BCS Code of Conduct & Code
  of Good Practice
• IEEE: IEEE Code of Ethics
• Computer Ethics Institute: Ten Commandments of
  Computer Ethics
Open source ethics
What is Open Source Software?
• any program whose source code is made available for
  use or modification as users or other developers wants.
• Most Open Source software is distributed under the
  GNU General Public License (GPL), additionally requires
  that if a modified version of the software is
  distributed, the source code for such modified version
  must be made freely available.
• In essence, creators of Open Source software hold the
  copyright for their work, but grant a license (the GPL)
  to anyone who wants to use it.
Definition of Net Neutrality
Net Neutrality is a network design paradigm
that argues for broadband network providers
to be completely detached from what
information is sent over their networks.
This chart shows the world’s Internet restrictions. Internet black holes mean that
data information is really sucked up in a void meaning that it is there but it will just
keep coming and coming. A lot of smaller under developed countries surveillance
their Internet like Iran that blocks twitter feeds because of the recent Iran elections.
Some countries as you can see have minor or no restrictions on the Internet.
The Seven Reasons for N.N.
1.   Economic Recovery and Prosperity
2.   Free Speech
3.   Civic Participation
4.   Marketplace of Ideas
5.   Social Justice
6.   Rise of Telecom companies
7.   Political Opportunity
Digital rights
• The term digital rights describes the protections
  that allow individuals to access, use, create, and
  publish digital media or to access and use
  computers, other electronic
  devices, or communications networks.
• The term is particularly related to the protection
  and realization of existing rights, such as the right
  to privacy or freedom of expression, in the
  context of new digital technologies, especially
  the Internet
e-Democracy
• E-democracy (electronic + democracy) refers to the use of
  information technologies and communication technologies and
  strategies in political and governance processes.
• E-democracy is concerned with the use of ICT to engage
  citizens, support the democratic decision- making processes and
  strengthen representative democracy.
• Democratic actors and sectors in this context include
  governments, elected officials, the media, political
  organizations, and citizens/voters.
• E-democracy aims for broader and more active citizen participation
  enabled by the Internet, mobile communications, and other
  technologies in today's representative democracy, as well as
  through more participatory or direct forms of citizen involvement in
  addressing public challenges.
A Four Way Classification
  Automate         Inform       Change scale      Transform

   e-Voting       Webcasting       On-line        Discussion
                                  referenda          fora
   On-line          Web             Local           On-line
   voting         publication     Initiatives     consultation

On-line opinion    On-line       e-Lobbying      Direct citizen
    polling       databases                       legislation

    e-                Party                     On-line decision
Campaigning        literature                       Making

    Voter
 registration

     e-
Representation
Privacy Law
• Information privacy laws cover the protection of
  information on private individuals from intentional or
  unintentional disclosure or misuse.
• The European Directive on Protection of Personal
  Data, released on July 25, 1995 was an attempt to unify the
  laws on data protection within the European Community.
• As a result, customers of international organizations such as
  Amazon and eBay in the EU have the ability to review and
  delete information, while Americans do not. In the United
  States the equivalent guiding philosophy is the Code of Fair
  Information Practice (FIP).
Privacy Law
Introduction
• Computers are not needed for the invasion of
  privacy.
• Computers simply make new threats possible
  and old threats more potent.
• Privacy can mean:
     • Freedom from intrusion.
     • Control of information about oneself.
     • Freedom from surveillance.
Tanzania Privacy Law
• The URT Constitution of 1977 defines privacy
   as:-
“‘…Every person is entitled to respect and
protection of his person, the privacy of his own
person, his family and of his matrimonial
life, and respect and protection of his residence
and private communications…’
”
Tanzania Privacy Law
Article 16(2) goes further stipulating that:
“…For the purpose of preserving the person’s
right in accordance with this Article, the state
authority shall lay down legal procedures
regarding the circumstances, manner and extent
to which the right to privacy, security of his
person, his property and residence may be
encroached upon without prejudice to the
provisions of this Article…”
What was done..
• Law Reform Commission 2005 :Discussion paper
  on legal framework for electronic commerce
• Contracts: e-Contract not recognized
• Cyber crimes not covered in the laws
• Computer Frauds
• Data Protection
• Cyber attacks
• Spam
• ……….
Laws restricting privacy
• Criminal Procedure Act 1985,
• Law of Evidence Act 1967,
• Anti Money Laundering Act 2006:Section VI Reporting
  persons to verify customer's identity and reporting
  persons to establish and maintain customer record
• Prevention of Terrorism Act 2002: Powers to intercept
  communications and the admissibility of intercepted
  communication
• DNA Act 2009: The question of privacy has not
  between treated well.
  The country will establish DNA database but there is no
  framework for privacy protection.
Impact of Computer Technology on
                Privacy
• Invisible Information Gathering
   – Examples:
      •   Satellite surveillance.
      •   Caller ID.
      •   Loyalty cards.
      •   Web-tracking data; cookies.
      •   Peer-to-peer monitoring.
      •   Others…
• Secondary Use
   – Using information for a purpose other than the one for which it
     was obtained. A few examples:
      • Sale (or trade) of consumer information to other businesses.
      • Credit check by a prospective employer.
      • Government agency use of consumer database.
Impact of Computer Technology on
            Privacy cont…..
• Computer Matching
   – Combining and comparing information from more than
     one database. Some examples:
• Profiling
   – Using data in computer files to predict likely behaviors of
     people.
• Monitoring and Tracking
   – Examples:
      •   GPS (global positioning system).
      •   Cell-phones.
      •   Blackboxes in automobiles.
      •   Other wireless appliances.
Consumer Information
• Marketing: Using Consumer Information
     •   Trading/buying customer lists.
     •   Telemarketing.
     •   Data Mining.
     •   Mass-marketing.
     •   Web ads.
     •   Spam (unsolicited e-mail).
National Identity Card System Number
     and Social Security Number
•   SSN can reveal
          •   Employer records.
          •   Government databases.
          •   School records.
          •   Credit reports.
          •   Consumer applications.
          •   Many other databases.
•   National ID Card System
     – If implemented, the card could contain your:
          •   Name.
          •   Address.
          •   Telephone number(s).
          •   Photo.
          •   SSN.
     – system could allow access to your:
          •   Medical information.
          •   Tax records.
          •   Citizenship.
          •   Credit history.
          •   Much more…
Protecting Privacy:
  Education, Technology, and Markets
• Education
   – Must include awareness of:
       •   How the technology works.
       •   How the technology is being used.
       •   The risks brought on by the technology.
       •   How to limit unwanted use of personal information.
       •   Applicable laws and regulations
• Technology
   – Enhance privacy using:
       •   Cookie disablers.
       •   Opt-in/opt-out options.
       •   Anonymous Web services.
       •   P3P (Platform for Privacy Preferences).
       •   ‘Good’ passwords.
       •   Audit trails.
       •   etc
Protecting Privacy:
 Education, Technology, and Markets
               cont…
• Market Response
  – Markets can protect your privacy by:
     • Using trusted third parties.
     • Adhering to established privacy policies.
     • Purchasing consumer information directly from the
       consumer.
     • Developing and selling privacy-enhancing technologies
       and services
What do we expect ?
– Expectation of Privacy:
   • Government’s rights are limited.
   • Government must have probable cause to search
     private premises or seize documents.
– Privacy Challenges:
   • New sensing and surveillance technologies enable the
     government access to private premises without
     physical entry.
   • New technologies provide the government with access
     to huge amounts of personal data in business
     databases.
   • Courts allow some searches and seizures of computers
     without search warrants.
What then…
• the Internet should be a neutral place for all of
  its users. Not all cars are created are the
  same, but all should be allowed on the
  highway. The same is true with Internet traffic.
  File sharing and increased usage, as well as
  profits are all issues to the Internet
  corporations. What this is about, though, is
  the consumer. It’s the consumer that the
  corporations should cater too, and it’s the
  consumer that counts.
Economic and Technological effect of
            cybercrime
• http://www.senderbase.org (near real time
  reports
• Class and I will discuss
Reference
• Discussion paper on the introduction of a legal framework
  for electronic commerce in Tanzania page 10
• Clift, S. (2004). E-Democracy Resource Links from Steven
  Clift - E-Government, E-Politics, E-Voting Links and more.
• Norris, P. (2001). Digital divide: Civic
  engagement, information poverty, and the Internet
  worldwide. Cambridge: University Press
• The International Journal of Cyber Ethics in Education
  (IJCEE) www.igi-global.com/ijcee
• Constitution of United Republic of Tanzania.
• www.fiu.go.tz/POTA.pdf
• http://www.senderbase.org/

Contenu connexe

Tendances

Legal & moral issues in e commerce
Legal & moral issues in e commerceLegal & moral issues in e commerce
Legal & moral issues in e commerce
Damo Ward
 
Ethics in e commerce n it
Ethics in e commerce n itEthics in e commerce n it
Ethics in e commerce n it
amitmitkar
 

Tendances (20)

legal and ethcal issues of e business
legal and ethcal issues of e businesslegal and ethcal issues of e business
legal and ethcal issues of e business
 
Chap 4 (1)
Chap 4 (1)Chap 4 (1)
Chap 4 (1)
 
Legal & moral issues in e commerce
Legal & moral issues in e commerceLegal & moral issues in e commerce
Legal & moral issues in e commerce
 
Review questions
Review questionsReview questions
Review questions
 
Mobile, Secure E - Voting Architecture for the Nigerian Electoral System
Mobile, Secure E - Voting Architecture for the Nigerian Electoral SystemMobile, Secure E - Voting Architecture for the Nigerian Electoral System
Mobile, Secure E - Voting Architecture for the Nigerian Electoral System
 
Ethical issues and social issues related to systems upload
Ethical issues and social issues related to systems uploadEthical issues and social issues related to systems upload
Ethical issues and social issues related to systems upload
 
Cyber laws in pakistan
Cyber laws in pakistanCyber laws in pakistan
Cyber laws in pakistan
 
Online Crime and New Cyber Laws in Pakistan
Online Crime and New Cyber Laws in PakistanOnline Crime and New Cyber Laws in Pakistan
Online Crime and New Cyber Laws in Pakistan
 
Ethics in e commerce n it
Ethics in e commerce n itEthics in e commerce n it
Ethics in e commerce n it
 
Internet of Things TCLG Oct 23 2014
Internet of Things TCLG Oct 23 2014Internet of Things TCLG Oct 23 2014
Internet of Things TCLG Oct 23 2014
 
The Cyber Law Regime in India
The Cyber Law Regime in IndiaThe Cyber Law Regime in India
The Cyber Law Regime in India
 
EFFECTIVENESS OF THE EXISTING LEGAL FRAMEWORK GOVERNING CYBER-CRIMES IN SRI L...
EFFECTIVENESS OF THE EXISTING LEGAL FRAMEWORK GOVERNING CYBER-CRIMES IN SRI L...EFFECTIVENESS OF THE EXISTING LEGAL FRAMEWORK GOVERNING CYBER-CRIMES IN SRI L...
EFFECTIVENESS OF THE EXISTING LEGAL FRAMEWORK GOVERNING CYBER-CRIMES IN SRI L...
 
Legal instrumentation in e commerce
Legal instrumentation in e commerceLegal instrumentation in e commerce
Legal instrumentation in e commerce
 
Cyber Crime Laws of Pakistan
Cyber Crime Laws of PakistanCyber Crime Laws of Pakistan
Cyber Crime Laws of Pakistan
 
Chapter 3_dp-pertemuan 4&5
 Chapter 3_dp-pertemuan 4&5 Chapter 3_dp-pertemuan 4&5
Chapter 3_dp-pertemuan 4&5
 
IT LAW PRESENATION
IT LAW PRESENATIONIT LAW PRESENATION
IT LAW PRESENATION
 
3 - Social Media and Enterprise
3 - Social Media and Enterprise3 - Social Media and Enterprise
3 - Social Media and Enterprise
 
social, legal and ethical issues of e-commerce..
social, legal and ethical issues of e-commerce..social, legal and ethical issues of e-commerce..
social, legal and ethical issues of e-commerce..
 
Information system ethics
Information system ethicsInformation system ethics
Information system ethics
 
Chapter 6_dp-pertemuan_9
 Chapter 6_dp-pertemuan_9 Chapter 6_dp-pertemuan_9
Chapter 6_dp-pertemuan_9
 

Similaire à Kasita's presentation

Similaire à Kasita's presentation (20)

Ethical and social issues in information systems
Ethical and social issues in information systemsEthical and social issues in information systems
Ethical and social issues in information systems
 
GCCS-privacy-PP-final presentation-3-1.pptx
GCCS-privacy-PP-final presentation-3-1.pptxGCCS-privacy-PP-final presentation-3-1.pptx
GCCS-privacy-PP-final presentation-3-1.pptx
 
The internet of things..perspectives for the Nigerian legal system
The internet of things..perspectives for the Nigerian legal systemThe internet of things..perspectives for the Nigerian legal system
The internet of things..perspectives for the Nigerian legal system
 
Legal And Ethical Aspects.pptx
Legal And Ethical Aspects.pptxLegal And Ethical Aspects.pptx
Legal And Ethical Aspects.pptx
 
IoT & Big Data - A privacy-oriented view of the future
IoT & Big Data - A privacy-oriented view of the futureIoT & Big Data - A privacy-oriented view of the future
IoT & Big Data - A privacy-oriented view of the future
 
Digital Repression and Techno-Authoritarianism
Digital Repression and Techno-AuthoritarianismDigital Repression and Techno-Authoritarianism
Digital Repression and Techno-Authoritarianism
 
3-Professional Ethics Issues.pptx
3-Professional Ethics Issues.pptx3-Professional Ethics Issues.pptx
3-Professional Ethics Issues.pptx
 
Privacy issues in data analytics
Privacy issues in data analyticsPrivacy issues in data analytics
Privacy issues in data analytics
 
Chapter1 Cyber security Law & policy.pptx
Chapter1 Cyber security Law & policy.pptxChapter1 Cyber security Law & policy.pptx
Chapter1 Cyber security Law & policy.pptx
 
How you can protect your online identity, online privacy and VPNs
How you can protect your online identity, online privacy and VPNsHow you can protect your online identity, online privacy and VPNs
How you can protect your online identity, online privacy and VPNs
 
Obstacles to Cybercrime Investigations
Obstacles to Cybercrime InvestigationsObstacles to Cybercrime Investigations
Obstacles to Cybercrime Investigations
 
Cyber law2
Cyber law2Cyber law2
Cyber law2
 
Chapter 3
Chapter 3Chapter 3
Chapter 3
 
Raji unit3 ppt_blaw_bba.ppt
Raji unit3 ppt_blaw_bba.pptRaji unit3 ppt_blaw_bba.ppt
Raji unit3 ppt_blaw_bba.ppt
 
Raji unit3 ppt_blaw_bba.ppt
Raji unit3 ppt_blaw_bba.pptRaji unit3 ppt_blaw_bba.ppt
Raji unit3 ppt_blaw_bba.ppt
 
Policies and Law in IT
Policies and Law in ITPolicies and Law in IT
Policies and Law in IT
 
Digital Authoritarianism, Asian Techno-Geopolitics and Technology Fragmentation
Digital Authoritarianism, Asian Techno-Geopolitics and Technology FragmentationDigital Authoritarianism, Asian Techno-Geopolitics and Technology Fragmentation
Digital Authoritarianism, Asian Techno-Geopolitics and Technology Fragmentation
 
PPT for Business.Law B.com and BBA
PPT for Business.Law B.com and BBAPPT for Business.Law B.com and BBA
PPT for Business.Law B.com and BBA
 
Cr4 tpp leesburg2012
Cr4 tpp leesburg2012Cr4 tpp leesburg2012
Cr4 tpp leesburg2012
 
Cr4 tpp fgv
Cr4 tpp fgvCr4 tpp fgv
Cr4 tpp fgv
 

Dernier

Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Victor Rentea
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
WSO2
 

Dernier (20)

Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdf
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Cyberprint. Dark Pink Apt Group [EN].pdf
Cyberprint. Dark Pink Apt Group [EN].pdfCyberprint. Dark Pink Apt Group [EN].pdf
Cyberprint. Dark Pink Apt Group [EN].pdf
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUKSpring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 

Kasita's presentation

  • 1. ICSE 6205:Legal and Ethical Issues on CyberWorld Student: KASITA, Chande Instructor: Mr. Mussa Ally
  • 2. Cyber Ethics • Cyberethics is the field of applied ethics that examines moral, legal, and social issues in the development and use of cybertechnology. • Cybertechnology refers to a broad range of technologies from stand-alone computers to the cluster of networked computing, information and communication technologies.
  • 5. Computer Ethics • Computer Ethics is a branch of practical philosophy which deals with how computing professionals should make decisions regarding professional and social conduct. • Margaret Anne Pierce, a professor in the Department of Mathematics and Computers at Georgia Southern University has categorized the ethical decisions related to computer technology and usage into 3 primary influences: 1. The individual's own personal code. 2. Any informal code of ethical behavior that exists in the work place. 3. Exposure to formal codes of ethics.
  • 6. Ethical standards • Various national and international professional societies and organizations have produced code of ethics documents to give basic behavioral guidelines to computing professionals and users. They include: • Association for Computing Machinery: ACM Code of Ethics and Professional Conduct • British Computer Society: BCS Code of Conduct & Code of Good Practice • IEEE: IEEE Code of Ethics • Computer Ethics Institute: Ten Commandments of Computer Ethics
  • 7. Open source ethics What is Open Source Software? • any program whose source code is made available for use or modification as users or other developers wants. • Most Open Source software is distributed under the GNU General Public License (GPL), additionally requires that if a modified version of the software is distributed, the source code for such modified version must be made freely available. • In essence, creators of Open Source software hold the copyright for their work, but grant a license (the GPL) to anyone who wants to use it.
  • 8. Definition of Net Neutrality Net Neutrality is a network design paradigm that argues for broadband network providers to be completely detached from what information is sent over their networks.
  • 9. This chart shows the world’s Internet restrictions. Internet black holes mean that data information is really sucked up in a void meaning that it is there but it will just keep coming and coming. A lot of smaller under developed countries surveillance their Internet like Iran that blocks twitter feeds because of the recent Iran elections. Some countries as you can see have minor or no restrictions on the Internet.
  • 10.
  • 11. The Seven Reasons for N.N. 1. Economic Recovery and Prosperity 2. Free Speech 3. Civic Participation 4. Marketplace of Ideas 5. Social Justice 6. Rise of Telecom companies 7. Political Opportunity
  • 12. Digital rights • The term digital rights describes the protections that allow individuals to access, use, create, and publish digital media or to access and use computers, other electronic devices, or communications networks. • The term is particularly related to the protection and realization of existing rights, such as the right to privacy or freedom of expression, in the context of new digital technologies, especially the Internet
  • 13. e-Democracy • E-democracy (electronic + democracy) refers to the use of information technologies and communication technologies and strategies in political and governance processes. • E-democracy is concerned with the use of ICT to engage citizens, support the democratic decision- making processes and strengthen representative democracy. • Democratic actors and sectors in this context include governments, elected officials, the media, political organizations, and citizens/voters. • E-democracy aims for broader and more active citizen participation enabled by the Internet, mobile communications, and other technologies in today's representative democracy, as well as through more participatory or direct forms of citizen involvement in addressing public challenges.
  • 14. A Four Way Classification Automate Inform Change scale Transform e-Voting Webcasting On-line Discussion referenda fora On-line Web Local On-line voting publication Initiatives consultation On-line opinion On-line e-Lobbying Direct citizen polling databases legislation e- Party On-line decision Campaigning literature Making Voter registration e- Representation
  • 15. Privacy Law • Information privacy laws cover the protection of information on private individuals from intentional or unintentional disclosure or misuse. • The European Directive on Protection of Personal Data, released on July 25, 1995 was an attempt to unify the laws on data protection within the European Community. • As a result, customers of international organizations such as Amazon and eBay in the EU have the ability to review and delete information, while Americans do not. In the United States the equivalent guiding philosophy is the Code of Fair Information Practice (FIP).
  • 16. Privacy Law Introduction • Computers are not needed for the invasion of privacy. • Computers simply make new threats possible and old threats more potent. • Privacy can mean: • Freedom from intrusion. • Control of information about oneself. • Freedom from surveillance.
  • 17. Tanzania Privacy Law • The URT Constitution of 1977 defines privacy as:- “‘…Every person is entitled to respect and protection of his person, the privacy of his own person, his family and of his matrimonial life, and respect and protection of his residence and private communications…’ ”
  • 18. Tanzania Privacy Law Article 16(2) goes further stipulating that: “…For the purpose of preserving the person’s right in accordance with this Article, the state authority shall lay down legal procedures regarding the circumstances, manner and extent to which the right to privacy, security of his person, his property and residence may be encroached upon without prejudice to the provisions of this Article…”
  • 19. What was done.. • Law Reform Commission 2005 :Discussion paper on legal framework for electronic commerce • Contracts: e-Contract not recognized • Cyber crimes not covered in the laws • Computer Frauds • Data Protection • Cyber attacks • Spam • ……….
  • 20. Laws restricting privacy • Criminal Procedure Act 1985, • Law of Evidence Act 1967, • Anti Money Laundering Act 2006:Section VI Reporting persons to verify customer's identity and reporting persons to establish and maintain customer record • Prevention of Terrorism Act 2002: Powers to intercept communications and the admissibility of intercepted communication • DNA Act 2009: The question of privacy has not between treated well. The country will establish DNA database but there is no framework for privacy protection.
  • 21. Impact of Computer Technology on Privacy • Invisible Information Gathering – Examples: • Satellite surveillance. • Caller ID. • Loyalty cards. • Web-tracking data; cookies. • Peer-to-peer monitoring. • Others… • Secondary Use – Using information for a purpose other than the one for which it was obtained. A few examples: • Sale (or trade) of consumer information to other businesses. • Credit check by a prospective employer. • Government agency use of consumer database.
  • 22. Impact of Computer Technology on Privacy cont….. • Computer Matching – Combining and comparing information from more than one database. Some examples: • Profiling – Using data in computer files to predict likely behaviors of people. • Monitoring and Tracking – Examples: • GPS (global positioning system). • Cell-phones. • Blackboxes in automobiles. • Other wireless appliances.
  • 23. Consumer Information • Marketing: Using Consumer Information • Trading/buying customer lists. • Telemarketing. • Data Mining. • Mass-marketing. • Web ads. • Spam (unsolicited e-mail).
  • 24. National Identity Card System Number and Social Security Number • SSN can reveal • Employer records. • Government databases. • School records. • Credit reports. • Consumer applications. • Many other databases. • National ID Card System – If implemented, the card could contain your: • Name. • Address. • Telephone number(s). • Photo. • SSN. – system could allow access to your: • Medical information. • Tax records. • Citizenship. • Credit history. • Much more…
  • 25. Protecting Privacy: Education, Technology, and Markets • Education – Must include awareness of: • How the technology works. • How the technology is being used. • The risks brought on by the technology. • How to limit unwanted use of personal information. • Applicable laws and regulations • Technology – Enhance privacy using: • Cookie disablers. • Opt-in/opt-out options. • Anonymous Web services. • P3P (Platform for Privacy Preferences). • ‘Good’ passwords. • Audit trails. • etc
  • 26. Protecting Privacy: Education, Technology, and Markets cont… • Market Response – Markets can protect your privacy by: • Using trusted third parties. • Adhering to established privacy policies. • Purchasing consumer information directly from the consumer. • Developing and selling privacy-enhancing technologies and services
  • 27. What do we expect ? – Expectation of Privacy: • Government’s rights are limited. • Government must have probable cause to search private premises or seize documents. – Privacy Challenges: • New sensing and surveillance technologies enable the government access to private premises without physical entry. • New technologies provide the government with access to huge amounts of personal data in business databases. • Courts allow some searches and seizures of computers without search warrants.
  • 28. What then… • the Internet should be a neutral place for all of its users. Not all cars are created are the same, but all should be allowed on the highway. The same is true with Internet traffic. File sharing and increased usage, as well as profits are all issues to the Internet corporations. What this is about, though, is the consumer. It’s the consumer that the corporations should cater too, and it’s the consumer that counts.
  • 29. Economic and Technological effect of cybercrime • http://www.senderbase.org (near real time reports • Class and I will discuss
  • 30. Reference • Discussion paper on the introduction of a legal framework for electronic commerce in Tanzania page 10 • Clift, S. (2004). E-Democracy Resource Links from Steven Clift - E-Government, E-Politics, E-Voting Links and more. • Norris, P. (2001). Digital divide: Civic engagement, information poverty, and the Internet worldwide. Cambridge: University Press • The International Journal of Cyber Ethics in Education (IJCEE) www.igi-global.com/ijcee • Constitution of United Republic of Tanzania. • www.fiu.go.tz/POTA.pdf • http://www.senderbase.org/