# D333-Ethics in Technology
Notes
- Ethics is a code of behavior that is defined by the group to which an individual belongs.
- Morals are the persoonal principles upon which an individual bases his or her decisions about what is right and wrong.
- Law is a system of rules that tells us what we can or cannot do.
- A code of ethics states the principles and core values that are essential to one’s work.
- Corporate social responsability is the concept that an organization should act ethically by taking responsability for its actions.
- A corporate compliance officer/corporate ethics officer is a senior-level manager that provides vision and leadership in the area of business conduct.
- Internal control is the process that is established by an organization’s board of directors, managers, and IT group to provide reasonable assurance for the effectivness and efficiency of operations, the reliability of finantial reporting, and compliance with applicable laws and regulations.
- Policies are guidelines and laws by which the organization must abide.
- Processes are a collection of tasks designed to acomplish an objective.
- A code of ethics states the principles and core values that are essential to the work of a particular occupational group.
- The Fair Credit Reporting Act regulates the collection storage and use of credit information in possesion of the credit reporting bureaus.
- The Fair and Accurate Credit Transaction Act allows consumers to request and obtain a free credit report each year.
- The American Recovery and Reinvestment Act included strong privacy provisions for EHRs, including banning the sale of health information, promoting the use of audit trails and ecryption, and provising right of access for patients.
- Title III of the Omnibus Crime Control and Safe Street Act(AKA the wiretap act) regulates the interception of wire or oral communications.
- The USA PATRIOT Act modified 15 existing statutes and gave sweeping new powers both to domestic law enforcement and international intelligence agencies, including the ability of law enforcement to eavesdrop on telephone communication, intercept email messages, and search medical, finantial, and other records.
- The Foriegn Intelligence Surveillance Act Admendments Act of 2004 authorized intelligence gathering on individuals not affiliated with any known terrorist organization (AKA Lone wolfs)
- The Foriegn Intelligence Surceillance Act of 1978 Amendments Act of 2008 granted the NSA expanded authority to collect, without court-approved warrents, international communications as they flow through the U.S. telecommunications equipment and facilities.
- The PATRIOT Sunsets Extension Act granted a four-year extension of provisions of the USA PATRIOT Act and extended authorization for intelligence gathering on “Lone wolfs”.
- USA Freedom Act terminated the bulk collection of telephone metadata by the NSA. It requires that the telecommunications carriers to hold the data and respond to NSA queries for data. This act also restored authorization for roving wiretaps and the tracking of “lone wolfs”.
- The Privacy Act prohibits the U.S. government agencies from concealing the existance of any personal data record-keeping system.
- The First Amedment protects americans rights to freedom of religion, freedom of expression, freedom to assemble peacefuly, and the right to speak anonymously.
- The Second Amedment protects americans right to arm themselves with guns(basically).
- The Third Amedment restricts the quartering of soldiers in private home without the owner’s concent.
- THe Fourth Amedment protects citizens from unreasonable searches and seizures by the government.
- The Communications Decency Act(CDA) aims to protect children from porn.
- The Child Online Protection Act(COPA) prohibits making harmful material available to minors via the internet.
- The Children’s Internet Protection Act(CIPA) requires federally financed schools and libraries to use filters to block computer access to any material considered harmful to minors.
- THe Children’s Online Privace Protection Act(COPPA) gives parents control over what information websites can collect from their kids.
- Intellectual propery is a term used to describe works of the mind that are distinct and owned or created by a single person or group.
- A copyright is the exclusive right to distribute, display, perform, or reproduce an original work in copies; to prepare derivative works based on the work; and grant these exclusive rights to others.
- Copyright infringement is a violation of the rights secured by the owner of the copyright.
- The Fair Use Doctrine established four factors for courts to consider when deciding wether a particular use of copyrighted property is fair and can be allowed without penalty:
- The purpose and character of the use.
- The nature of the copyrighted work.
- The portion of the copyrighted work used.
- The effect of the use on the value of the copyrighted work.
- The Prioritizing resources and Organization for Intellectual Property Act(PRO-IP) of 2008 created the position of Intellectual Property Enforcement Coordinator within the Executive Office of the President and increased trademark and copyright enforcement and penalties for infringement.
- The original General Agreement on Tariffs and Trade(GAAT) in 1993 created the World Trade Organization(WTO).
- The World Trade Organization(WTO) is a global organization that deals with rules of international trade based on WTO agreements that help producers of goods and services, exporters and importers conduct their business.
- The World Intelectual Propery Organization(WIPO) is an agency of the UN dedicated to “the use of intellectual propery as a means to stimulate innovation and creativity”
- The Digital Millennium Copyright Act(DMCA) signed in 1998, implements two WIPO treaties in the U.S. It also makes it illegal to circumvent technical protection or develop and provide tools that allow others to access a technilogically protected work.
- A patent is a grant of property right issued by the U.S. Patent and Trademark Office(USPTO) to an inventor that permits its owner to exclude the public from making, using or selling a protected invention and allows for legal action against violators.
- The Leahy-Smith America Invents Act changed the U.S. patent system from a “first-to-invent” to “first-inventor-to file” system and expanded the definition of prior art which is used to determine the novelty of an invention and whether it can be patented.
- Plagiarism is the act of stealing someone’s ideas or words and passing them off as one’s own.
- Reverse engineering is the process of breaking something down in order to understand it, build a copy of it, or improve it.
- Competetive intelligence is legally obtained information that is gathered to help a company gain an advantage over its rivals.
- A trademark is a logo, package design, phrase, sound, or word that enables a consumer to differentiate one company’s products from anothers.
- A software defect is any error that, if not removed, could cause a software system to fail to meet its user’s needs.
- Software quality is the degree to which a software product meet the needs of its users.
- Capability Maturity Model Integration(CMMI) defines 5 levels of software development maturity:
- Initial
- Managed
- Defined
- Quantitively managed
- Optimizing
- A safty-critical system is one whose failure may cause human injury or death.
- Risk is the potential of gaining or losing something of value. Risk can be quantified by three elements:
- A risk element
- The probability of the even happening
- The impact on the business outcome
- The Annualized Rate of Occurance(ARO) isan estimate of the probability that an even will occur over the course of a year.
- The Single Loss Expectancy(SLE) is the estimated loss that would be incurred if the even happens.
- The Annualized Loss Expectancy(ALE) is the estimated loss from this risk over the course of a year. It is calculated using the following formula:
ARO * SLE = ALE
- Risk management is the process of identifying, monitoring, and limiting risks to exceptable levels.
- Reliability is a measure of the rate of failure in a system that would render it unusable over its expected lifetime.
- Labor productivity is a measure of the economic performance that compares the number of goods/services produced with the number of labor hours used in producing said goods/services.
- An Electronic Medical Record(EMR) is a collection of health-related information on an individual that is collected and managed by a single heathcare organization. This information is not easily shared with others outside of the healthcare organization.
- An Electronic Health Record(EHR) is a comprehensive view of the patient’s complete medical history designed to be shared among multiple healthcare organizations.
- An Health Information Exchange(HIE) is the process of sharing patient-level electronic health information between different organizations.
- A Personal Health Record(PHR) includes those portions of the EHR that an individual patient owns/controls.
- Clinical Decision Support(CDS) is a process and a set of tools designed to enhance health-related decision making through the use of clinical knowledge and patient-specific data. This approach can increase healthcare quality while reducing the costs.
- Telehealth is the use of telecommunications and IT to provide medical care to a broader ammount of patients.
- Telemedicine is the component of telehealth that provides medical care to people at a location different from the healthcare providers.
- Store-and-forward telemedicine is the acquiring of data, sound, images, and video from a patient and then transmitting everything to a medical specialist for later evaluation.
- Earned media refers to media exposure an organization gets through press and social media mentions.
- Viral marketing is an approach to social media marketing that encourages individuals to pass along a marketing message to others. Like Andrew Tate’s video reuploaders who get money from Tate if the video does well.
- Cyberabuse is any form of mistreatment or lack of care, both physical and mental, based on the use of an electronic communications device that causes harm and distress to others.
- Cyberharassment is a form of cyberabuse in which the abusive behavior, which involves the use of an electronic communications device, is degrading, humiliating, hurtful, insulting, intimidating, malicious, or otherwise offensive to an individual or group of individuals causing substantial emotional distress.
- Cyberstalking is also a form of cyberabuse that consists of a long-term pattern of unwanted persistent pursuit and intrusive behavior that is directed by one person against another that causes fear distress in the victim.
- Cyberloafing describes employees who use work time to engage in non-work-related activities on the internet such as going on social media or checking private messages.
- Cybersquatting is the act of buying up domains of a known trademark before the company that owns it can buy it to try to get them to buy it at a high price from yourself.
- The 1994 Jacob Wetterling Crimes Against Children and Sexually Violent Offender Registration Act set requirements for sec offender registration and notification in the United States. It also requires States to create websites that procive information on sex offenders within the state.
- The Sex Offender Registration and Notification Provisions(SORNA)/Adam Walsh Child Protection and Safety Act of 2006 set national standards that govern which sex offenders must register and what data must be captured.
- Contigent work is a job situation in which an individual does not have ana explicit or implicit contract for long-term employment.
- Temporary staffing firms recruit, train, and test job seekers in a wide range of job categories and skill levels, and then assign them to clients as needed.
- A coemployment relationship is one in which two emploters have actual or potential legal rights and duties with respect to the same emplotee or group of employees.
- A PEO is a business entity that hires the employees of its clients and them assumes all responsibility for all human resource management functions, including administration of benefits while the client compay remain responsible for directing and controlling the daily activities of the employees.
- The gig economy refers to a work enviornment in which temporary positions are common and organiztions contract with independent workers for short-term engagements.
- An independent contractor is an individual who provides services to another individual or organization according to term defined in a written contract or within a verbal agreement.
- An H-1B is a temporary work visa granted by the U.S. Citizenship and Immigration Services(USCIS) for people who work in specialty occupations.
- Outsourcing is a long-term business arrangement in which a company contracts for services with an outside organization that has expertise in providing a specific function.
- Offshore outsourcing is a form of outsourcing in which the services are provided by an organization whose employees are in a foreign country.
- Whistle-blowing is an effort to attract public attention to an illegal, unethical, abusive, or dangerous act by an organization.
- Green computing is concerned with the efficient and environmentally responsible design, manufacture, operation, and disposal of IT-related products
- Electronic Product Environmental Assessment Tool(EPEAT) is a system that enables purchasers to evaluate, compare, and select electronic products based on 51 environmental criteria.
- Virtue ethics is an approach to ethics organized around the idea of human flourishing and human excellence. Virtue ethics focuses on the qualities of character and patterns of living that reveal those qualities.
- Virtues are the capacity to excersize qualities like kindness and self-respect. Therefore what differentiates us from one another is wether or not we developed the ability to excersize the virtue. They are revealed throught pattern of action as virues must be kept continuosly.
- Communitarianism is an aproach to ethics that assumes humans exists in a state of mutual reliance. It states that individuals goals can take place only within a community. While a person’s goals can be different than most of the communiy it is still shaped to some degree by the community that person is a part of.
- Utilitarianism is an approach to ethics that assumes humans are motivated by happiness. It states that when we are determining how we should act, we should first consider what kinds of actions bring about the most happiness for the greatest number of people. It also focuses on the results/consequences of our actions while treating intent irrelevant.
- Deontology is an ethical theory that uses rules to distinguish right from wrong. The rules should be followed without exception. Like Batman and his rule to never kill which is demonstrated by not killing the Joker even though he could which will probably lead to less victims in the future as the Joker always escapes prison.
- Relativism states that there is not set rules as these rules change in every culture/place.
- Egoism is the tendency to see things in relation to oneself.
- Altruism is the unselfish concern for the welfare of others.
- Software & Information Industry Association (SIIA) is an organization that represents the world’s largers software and hardware manufacturers.
- Association for Computing Machinery(ACM) is the world’s largest educational and scientific society dedicated to IT.
- SANS Institue is a company that offers cybersecurity training and certifications.
- CompTIA is a non-profit association that issues professional certifications for the IT industry. It is also headquartered in Chicago.
- Smishing is a social engineering attack that uses fake mobile text messages to trick people into downloading malware/sharing information/sending money.
- Vising is similar to smishing except the victims are scammed via voice-mail.
- The Gramm-Leach-Bliley Act(GLBA) requires financial institutions/financial product companies to expand their information-sharing practices to their customers and to safeguard sensitive data.
- The Sarbanes Oxley Act was made to help protect investors from fraudulent financial reporting by corporations. It mandated strict reforms to existing securities regulations and imposed tough new penalties on lawbreakers.
- The Department of Homeland Security(DHS) is a large federal agency whose goal is to provide security against terrorism and other potential threats.
- The Federal Information Security Modernization Act Codifies the DHS’s authority to administer the implementation of information security policies for non-national security federal Executive Branch systems, including providing technical assistance and deploying technologies to such systems. It also clarifies the Office of Management and Budget’s (OMB) oversight authority over federal agency information security practices.
- The Payment Card Industry Data Security Standard (PCI DSS) is a widely accepted set of policies and procedures intended to optimize the security of credit, debit and cash card transactions. It also protects cardholders against misuse of their personal information.
- The Health Insurance Protability and Accountability Act(HIPPA) improves portability and continuity of health insurance coverage to reduce fraud, and abuse in health insurance and healthcare delivery. It protects the privacy and security of health information and gives patients rights to their health information by establishing standards to safeguard the protected health information that the following entities and their business associates hold:
- Health plan.
- Health care clearinghouse.
- Health care provider that conducts certain health care transactions electronically.
- The Family Educational Rights and Privacy Act(FERPA) affords parents the right to access their children’s education records, the right to seek to have the records amended, and the right to have some control over the disclosure of personally identifiable information from the education records.
- The Foreign Intelligence Surveillance Act of 1987(FISA) describes procedures for the electronic survallience and collection of foreign intelligence information in communication between foreign powers and the agents of foreign powers.
- The Foreign Intelligence Surveillance Act(FISA) Court meets in secret to hear applications for orders approving electronic surveillance anywhere within the U.S.
- The Foreign Intelligence Surveillance Amendments Act of 2008(FISA) grants the NSA expanded authority to collect internation communications and they flow throught U.S. telecommunications network equipment and facilities without court approved warrents.
- The Controlling the Assualt of Non-Solicited Pornography and Marketing(CAN-SPAM) is a law that sets the rules for commercial email, established requirements for commercial messages, gives recipients the right to have you stop emailing them, and spells out tough penalties for violations.
- The Communications Assistance for Law Enforcement Act(CALEA) amended the Wiretap Act and Electronic Communications Privacy Act, which required the telecommunications industry to build tools into its products that federal investigators could use after obtaining a court order to evesdrop on conversations and intercept electronic communications.
- The Commision on Accreditation for Law Enforcement Agencies(CALEA) is a credentialing authority whose primary mission is to accredit public safety agencies such as law enforcement, training academies, communications centers, and campus public safety.
- The Fair and Accurate Credit Transactions Act(FACTA) is a law that adds provisions designed to improve the accuracy of consumers’ credit-related records. It gives consumers the right to one free credit report a year from the credit reporting agencies, and consumers may also purchase for a reasonable free, a credit score along with information about how the credit score is calculated.
- The WTO’s Agreement on Trade-Related Aspects of Intellectual Propery Rights(TRIPS) establishes minimum standards for the regulation by national governments of the different areas of intellectual property such as copyright, trademarks, patents and other areas of intellectual propery.
- The Defend Trade Secrets Act(DTSA) allows an owner of a trade secret to sue in federal court when its trade secrets have been misappropriated. This provides robust legal protections for trade secrets.
- The Uniform Trade Secrets Act(UTSA) brings uniformity to all of the U.S in the area of trade secret law.
- Sensationalism is when a news was posted with the goal of becoming popular/viral insthead of trying to potray things accuratly.
- Editorialism implies that the contents of an article are opinions and not facts. So the article should be read with that in mind.
- Data lineage is the process of understanding, recording, and visualizing data as it flows from data sources to consumption.
- The International Organization for Standardization (ISO) 9001 is a global standard for quality management to increase quality control of products/services, cost savings and productivity gains.
- The International Organization for Standardization (ISO) 9000 uses the failure mode and effects analysis to determain if a system is compliant or not.
- The International Organization for Standardization (ISO) 31000 is a risk management framework to help organizations manage risks regardless of its size, activity or sector.
- The International AUditing and Assurance Standards Board is a standards body that issues international standards on audition, quality management, and other services. Apperantly its also an international version of the Statement on Standards for Attestation Engagements No.16.
- The Statement on Standards for Attestation Engagements No.16 is a set of standards developed specifically for certified public accountants to evaluate an organization’s internal controls and how service companies report on these controls.
- The False Claims Act(FCA) imposes liability on individuals and companies who defraud governmental programs. Any person who knowingly submits, or causes to submit, false claims to the government is liable for three times the government’s damages + an inflation linked penalty. It also protects the employee if he/she file’s a lawsuit against the contractor’s/company’s unethicals acts to defraud the government.
- The Age Discrimination in Employment Act of 1967 prohibits employment discrimination against people 40 years or older.
- A Computerized Provider Order Entry(CPOE) is a system that enables physicians to place orders(for drugs, lab tests, etc…) electronically, with the orders transmitted directly to the recipient.
- Contingent work is a job without explicit or implicit contract for long-term employment.
- A Decision Suport System(DSS) is a business information system used to improve decision making in a variety of industries.
- Duty of care is the obligation to protect people against any unreasonable harm or risk.
- The Economic Espoinage Act(EEA) of 1996 emposes penalties up to $10 million and 15 years in prison for theft of trade secrets.
- The Electronic Communications privacy Act(ECPA) protects three main things:
- The protection of communications while in transfer from sender to reciever.
- The protection of communications held in electronic storage.
- The prohibition of devices from recording dialing, routing, addressing, and signaling information without a search warrant.
- Electronic discovery(e-discovery) is the collection, preperation, review, and production of electronic information to be used in criminal, civil actions and proceedings.
- The European Union Data Protection Directive is a directive that requires any company doing business within the borders of EU countries to follow a set of privacy directives on the fair use of information. The following list summarizes the basic tenets of the directive:
- Notice: An individual has the right to know if his or her personal data are being collected, and any data must be collected for clearly stated, legitimate purposes.
- Choice: An individual has the right to elect not to have his or her personal data collected.
- Use: An indivudual has the righ to know how personal data will be used and the right to restrict their use.
- Security: Organizations must “implement appropriate technical and organizations measures” to protect personal data, and the individual has the right to know what these measures are.
- Correction: An individual has the right to challenge the accuracy of the data and to provide corrected data.
- Engorcement: An individual has the right to seek legal relief through appropriate channels to protect privacy rights.
- The Foriegn Corrupt Practices Act(FCPA) makes bribing foriegn officer, foriegn political party official, or a canidate for foriegn political office a criminal act.
- The Freedom of Information Act(FOIA) grants citizens the right to access certain information and records of federal, state, and local governments upon request.
- An Information Security Group manages the processes, tools, and policies necessary to prevent, detect, document, and counter threats to digital and nondigital information, whether its in transit, being processed, or at the rest in storage
- The ISEA No.3402 was developed to provide an internation assurance standard for allowing public acountants to issue a report for use by user organizations their auditors on controls at a service organization that are likely to impact or be part of the user organization’s system of internal control over financial reporting.
- The John Doe lawsuit is a type of lawsuit organizations may file in order to gain the power to try to identify an anonimuos user that caused harm to the organization through their postings.
- A libel is a written defamatory statement.
- A litigation hold notice are instructions sent by organizations to inform its or other employees to save relevant data and to suspend data that might be due to be destroyed based on normal data-retention rules.
- Live telemedicine is a form of telemedicine in which patients and healthcare providers are present at different sites at the same time, usually done via a video conference.
- A Managed Security Service Provider(MSSP) is a company that monitors, manages, and maintains computer and network security for other organizations.
- A National Security Letter(NSL) comples holders of your personal data to turn them over to the government and is not subject to judicial review or oversight
- A NSL gag provision prohibits the NSL recipients from informing anyone, even the person who is the subject of the NSL request, that the government secretly requested his/her records.
- A Next-Generation Firewall(NGFW) is a hardware/software based network security system that is able to detect and block attacks by filtering network traffic dependent on the packet contents.
- An N-version programming is a programming technique that aims to reduce the impact of software errors by independently implementing the set of user requirements N times. The implementation are then run in parallel, and if a difference is found a “voting algorithm” is executed to determine which results to use.
- A Profession Employer Organization(PEO) is a business entity that coemploys the employees of its clients and typically assumes responsability for all human resources management functions.
- Qui tam a provision of the False Claims Act that allows a private citizen to file a suit in the name of the U.S. government chargin fraud by government contractors and other entities who recieve or use government funds.
- The Right to Financial Privacy Act protects records of financial institution customers from unauthorized scrutiny by the federal government.
- A social audit is when an organization reviews how well its meeting its ethical and social responsability goals and communicates its new goal for the upcoming year.
- An SSEA No.16 audit report is an auditing standard issued by the Auditing Standards Board of the American Institue of Certified Public Accountants(AICPA). It demonstrates that an outsourcing firm has effective internal controls in accordance with Sarbanes-Oxley Act of 2002.
- A Strategic Lawsuit Against Public Participation(SLAPP) is a lawsuit filed by corporations, government officials, and others against citizens and community groups who oppose them on matters of concern. The lawsuit is typically without merit and is used to intimidate critics out of fear of the cost and effort associated with a major legal battle.
- Strict liability is a situation in which the defendant is held responsible for injuring anothe rperson, regardless of negligence or intent.
- A system safety engineer is someone who is responsible for ensuring that a system operates in a safe and reliable manner while meeting its user’s needs.
- System testing is testing done after successfull intergarion testing where the various subsystems are combined to test the entire system as a complete entity.
- A Transport Layer Security(TLS) is a communications protocol or system of rules that ensures privacy between communicating applications and their users on the Internet.
- U.S Computer Emergency Readiness Team(US-CERT) was established in 2003 to protect the nation’s internet infrastructure against cyberattackes, it serves as a clearinghouse for information on new viruses, worms, and other computer security topics.
- User Acceptance Testing is done independently by trained end users to ensure the system operates as expected.
- Vehicle Event Data Recorder(EDR) is a device that records vehicle and occupant data for a few seconds before, during and after any behicle crash taht is severe enough to deploy the vehicle’s air bags.
- A vice is a habit of unacceptable behavior.
- A virtue is a habit of acceptable behavior.
- A zombie is a computer in a botnet without the computer’s owner consent or knowladge.
- An Acceptable Use Policy(AUP) is a document that establishes restrictions and practices a user must agree to in order to use organizational computing and network resources.
- The 5 key elements of an Acceptable Use Policy(AUP) are:
- Purpose of the AUP: why its needed and what are its goals?.
- Scope: who and what is covered under the AUP?.
- Policy: How are both acceptable use and unacceptable use defined; what are some examples of each?.
- Compliance: Who is responsible for monitoring compliance and how will it be measured?.
- Sanctions: What actions will be taken against an individual who violates the policy?.
- The I.T software engineering code of ethics states that software engineering shall adhear to the following eight principles:
- Public: Software engineers shall act consistently with the public interest.
- Client and Employer: Software engineers shall act in a manner that is in the best interests of their client and employer consistent with the public interest.
- Product: Software engineers shall ensure that their products and related modifications meet the highest professional standards possible.
- Judgment: Software engineers shall maintain integrity and independence in professional judgment
- Management: Software engineering managers and leaders shall subscribe to and promote an ethical approach to the management of software development and maintainance.
- Profession: Software engineers shall advance the integrity and reputation of the profession consistent with the public interest.
- Colleagues: Software engineers shall be fair to and supportive of their colleagues.
- Self: Software engineers shall participate in lifelong learning regarding the practice of their profession and shall promote an ethical approach to the practice of the profession.
- Cracker is an individual who causes problems, steals data, and corrupts systems.
- Malicious insider is an employee or contractor who attempts to gain financially and/or distrupt company’s information systems and business operations.
- Industrial spy is an individual who captures trade secrets and attempts to gain an unfair competitive advantage.
- Cybercriminal is someone who attacks a computer system or network for financial gain.
- Hacktivist is an individual who hacks computer or website in an attempt to promote a political ideology.
- Cyberterorrist is someone who attempts to destroy the infrastructure components governments, financial institutions, and other corporations, utilities, and emergency response units.
- Computer Fraud and Abuse Act addresses fraud and related activities inassociation with computers, including the following:
- Accessing a computer without authorization or exceeding authorized access.
- Transmitting a program, code, or command that causes harm to a computer.
- Trafficing of computer passwords.
- Threatening to cause damage to a protected computer.
- Fraud related Activity in Connection with Access Devices Statue covers false claims regarding unauthorized use of credit cards.
- Stored Wire and Electronic Communications and Transactional Records Access Statues focuses on unlawful access to stored communications to obtain, alter, or prevent authorized access to a wire or electronic communication while its in electronic storage.
- Executive order 12333 identifies the various U.S. governmental intelligence-gathering, agencies, and defines what information can be collected, retained, and disseminated by these agencies.
- General Data Protetion Regulation(GDPR) strengthens data protection for individuals within the EU by addressing the export of personal data outside the EU.
- Consequentialism is an ethical theory that judges whether or not something is right by what its consequences are. For example, most people would agree that lying is wrong but if telling a lie would help save a person’s life, consequentialism would state that lying in that situation is moral.