Docstoc

FINAL EXAM REVIEW SHEET

Document Sample
FINAL EXAM REVIEW SHEET Powered By Docstoc
					BLS 437 Final Exam Chapters 9 -13 Chapter 9 Intrusion upon Seclusion - Intent to intrude and knowledge it would be wrong - Reasonable expectation of privacy - Intrusion was substantial and highly offensive to a reasonable person Public Disclosure of private Facts causing Injury to Reputation When highly personal facts about another are publicly disclosed to a lot of people and its transmitted whereby injury to reputation results. Publicity Placing Another in a False Light Misappropriation of a Person’s Name or Likeness Causing Injury to Reputation Pretexting - information is fraudulently obtained by impersonating the actual customer. Children Online Privacy Protection Act – protects children under 13 Electronic Communications Privacy Act –could do wiretapping with probable cause and valid search warrant. Title I – No inception of any wire, oral, or electronic communication. Four major exceptions: 1. ISP’s – can get information from their service about costumers, if it is a rendition to the service or protection to their service. No Random Observations 2. Business Extension Rule or Ordinary Course of Business – Allows interception of e-mails by employers and possibly phone calls too 2. Prior consent to interception of electronic communications 3. Government and law enforcement agencies - Make sure you are mindful of customer data mining and have an easy to read privacy policy. - Take steps to protect your privacy and your companies. - Consider getting a stamp of approval from the FTC or Truste. Be truthful and forthright with employees if you gather data. - Know as employee you have no privacy at work - Communicate privacy expectations at work very clearly to employees

Chapter 10 – Obscenity Miller Test for Obscenity: 1. Community standard – 2. Depicts patently offensive sexual conduct defined by state law 3. Lacks serious literary, artistic, political, or scientific value Communication Decency Act – Must try to attempt to protect minors from obscene material. Defenses – 1. ISP’s are safe they provide access, not content 2. Made good faith effort to prevent 3. Good Samaritan defense – it’s in everyone’s better interest. CPPA –Child Pornography Protection Act – no child porn. Too vague. COPPA! Again – must use bona fide methods to protect against minors Consenting adults defense in child pornography is not applicable. Your not allowed to look at porn at work so make sure your company’s written monitoring and usage policy addresses this. Penalties and procedure for violations should also be established. Get filters to protect company and employees Obscenity is not limited to porn

-

Chapter 11 – Defamation Defamation is a false statement that wrongfully harms a persons reputation Liable – written form Slander – is the oral form 1. The statement must be of fact. 2. Publication of statement without a privilege to do so 3. Fault or negligence 4. Damages – actual or presumed Slander per se – Accusing another of committing a serious crime. Accusing another of having a loathsome or communicable disease. Injuring another in their business or profession. In some states accusing a woman of being unchaste. Defenses – Truth. Absolute Privilege. Qualified Privilege. Anonymous speech for the most part is protected. SLAPP defamation suits Develop company policy regarding comments by employee concerning defamation Remind employees that they can’t assume privacy. Speak at own peril. Monitor employee e-mails

-

Make sure if you make statements about competitors that they aren’t defamatory. If ISP have third party look at your e-mail systems and monitor bogs and stuff Beware of the repercussions of starting a suite. It may just draw attention and make you look worse.

Chapter 12 - Internet and information Security Businesses should engage the assistance of security experts Businesses should conduct internal audits on all electronic transmission as well as hire third parties Should try and provide system that is confidential… Authentic… safe for every use and usable. Be careful about using cryptographic programs.. their use is highly regulated by the government.

Chapter 13 Internet and Computer crimes Computer Fraud and Abuse Act


				
DOCUMENT INFO
Shared By:
Categories:
Tags:
Stats:
views:11
posted:6/28/2009
language:English
pages:3
MincAM MincAM
About