Week 3 Legal Issues
Week 3 Legal Issues
PROFESSIONAL
PRACTICES
Chapter 3:
An Insight Into
Legal issues
Privacy
Copyrights
Patents
Trademarks
Trade Secrets
1-16
Copyright 2013 Pearson Education, Inc, Publishing on Pearson Addison-Wesley
Consequences of Proprietary Software
1-17
Copyright 2013 Pearson Education, Inc, Publishing on Pearson Addison-Wesley
Beneficial Consequences of Open-Source Software
1-18
Copyright 2013 Pearson Education, Inc, Publishing on Pearson Addison-Wesley
Critique of the Open-Source
Software Movement
■ Without critical mass of developers, quality can be
poor
■ Without an “owner,” incompatible versions may arise
■ Relatively weak graphical user interface
■ Poor mechanism for stimulating innovation (no
companies will spend billions on new programs)
1-19
Copyright 2013 Pearson Education, Inc, Publishing on Pearson Addison-Wesley
Peer to Peer Networks (P2P)
Peer-to-Peer Networks Facilitate
Data Exchange
■ Peer-to-peer network
– Transient network
– Connects computers running same networking program
– Computers can access files stored on each other’s hard drives
■ How P2P networks facilitate data exchange
– Give each user access to data stored in many other computers
– Support simultaneous file transfers among arbitrary pairs of computers
– Allow users to identify systems with faster file exchange speeds
1-21
Napster FastTrack
• Peer-to-peer music exchange
network • Second-generation peer-to-peer
• Began operation in 1999 network technology
• Sued by RIAA for copyright • Used by KaZaA and Grokster
violations • Distributes index among large
• Courts ruled in favor of RIAA number of “supernodes”
• Went off-line in July 2001 • Cannot be shut down as easily
• Re-emerged in 2003 as a as Napster
subscription music service
BitTorrent
• Broadband connections: download much faster
than upload
• BitTorrent speeds downloading
• Files broken into pieces
• Different pieces downloaded from different
computers
• Used for downloading large files
Computer programs, Television shows, Movies
1-22
Privacy
Types of disclosures
■ Voluntary (e.g. form filling)
■ Involuntary (e.g. CCTV)
■ Statutory (e.g. obtaining license, loan)
1-34
Syndromic Surveillance Systems
■ Syndromic surveillance system: A data mining system that
searches for patterns indicating the outbreak of an epidemic or
bioterrorism
– 911 calls
– emergency room visits
– school absenteeism
– Internet searches
■ Example: A system in New York City detected an outbreak of a virus in 2002
1-35
Protecting Privacy
■Acts (Law)
■Cryptography &
Encryption
■Good habits
http://www.cyber-rights.org/crypto/cryptog.htm
http://nitc.kkmm.gov.my/index.php/national-ict-
policies/cyberlaws-in-malaysia
Telemedicine Act 1997
Healthcare systems and providers around the world are becoming interconnected. People and
local healthcare providers can thus source quality healthcare advice and consultation from
specialists from around the world, independent of geographical location. Conversely,
interconnectivity also allows for non-quality healthcare advice and consultation from around
the world. The Act serves to regulate the practice of teleconsultations in the medical profession.
http://nitc.kkmm.gov.my/index.php/national-ict-
policies/cyberlaws-in-malaysia
The Communications and Multimedia Act 1998
Convergence of technologies is also resulting in the convergence of the following
industries: telecommunications, broadcasting, computing and content. Previously,
each of these industries was regulated by several different pieces of legislation
(example: the Telecommunications Act 1950 and the Broadcasting Act 1988). The
old regulatory framework cannot cope with convergence and inhibits the growth of
the new converged industry.
http://nitc.kkmm.gov.my/index.php/national-ict-
policies/cyberlaws-in-malaysia
Privacy Act in Malaysia
Personal Data Protection Act (PDPA) 2010
■ The Personal Data Protection Act 2010 (PDPA) was passed by the Malaysian Parliament in May
2010 and received Royal Assent on 2 June 2010. The PDPA came into force on 15 November
2013 by way of notification in the Government Gazette, with a three month sunrise period
which ended on 15 February 2014.
■ The PDPA confers the following rights (subject to qualifications) on the individual vis-à-vis a
data user in relation to their personal data:
– the right to access personal data;
– the right to correct personal data;
– the right to withdraw consent to process personal data;
– the right to prevent processing likely to cause damage and distress; and
– the right to prevent processing for direct marketing.
Debate the morality of the bargain proposed by the fisherman. One group should explain why the
fisherman’s position is morally wrong. The other group should explain why the fisherman’s position
is morally acceptable.