Data Modeling - Hiram College

Data Modeling - Hiram College

Professional, Legal and Ethical Issues CPSC 356 Database Ellen Walker Hiram College (Includes figures from Database Systems by Connolly & Begg, Addison Wesley 2002) Data is Valuable Clickstream data (terabytes) Data mining for business advantage

Financial transactions (petabytes) Personal information Open to identity theft and fraud Ethical vs. Legal Behavior Ethics A set of principles of correct conduct or a theory or a system of moral values Law A set of rules enacted by and enforced by a government

Not all ethical behavior is legal Not all unethical behavior is illegal Sample (US) Laws with Implications Sarbanes Oxley Act Health Insurance Portability and Accountability Act (HIPAA) Family Educational Rights and Privacy Act (FERPA) Sarbanes Oxley Act (SOX)

Goal is to tighten requirements on how companies form boards of directors, interact with auditors and report finances Created in aftermath of Enron scandal To comply, companies must consider how data is collected, processed, secured, and reported Complying with SOX COBIT is an IT governance framework and supporting toolset that allows managers to bridge the gap between control requirements,

technical issues, and business risks. COSO is a framework that focuses more narrowly on internal controls, including culture, risk assessment, control activities, reporting and monitoring Health Insurance Portability and Accountability Act (HIPAA) Release of patient information requires consent forms We cant tell you anything we cant even tell you that we know anything Lynn Taylor

Standards for electronic health/medical records and insurance claims Establishing a nationally recognized identifier (NOT SSN) to be used by all employee health plans Standards for security of patient data and transactions Need for a nationally recognized identifier for healthcare providers Family Educational Rights and Privacy Act (FERPA) Protects privacy of student educational records

Parents have rights until age 18 or until student graduates from HS, then rights transfer to student Schools must have written permission from student (or parent if pre-college) to release any information FERPA Exceptions Directory information Name, address, date & place of birth, honors Designated parties

School officials with legitimate need to know Other schools to which student transfers Specified officials for audit or evaluation Whoever needs to know for financial aid Compliance with a judicial order or state law Health and safety emergencies

Codes of Ethics ACM Code (see www.acm.org) BCS code (www.bcs.org) Areas covered Public interest Duty to relevant authority

Duty to the profession Professional competence and integrity Intellectual Property IP = The product of human creativity in the industrial, scientific, literary and artistic fields Examples:

Invention Program Play Painting Musical composition Protecting IP Patent Very strong protection for limited time, requires disclosure

Copyright Protects the expression of an idea Romeo & Juliet vs. boy loves girl with tragic ending Much longer term than patent Trademark Protects a word, symbol, image, sound, etc. with regard to a specific company (type of goods) Trade Secret A trade secret is protected not by law (no

disclosure), but by secrecy If you can figure it out (by reverseengineering), you can legally use it in your own product Not by reading the source code Not by theft Clean room reverse engineering technique Software Generally, protected by copyright, but there are software patents Patent must be for the idea, not the program Example: pull-down menu

Copyright protects the expression, not the idea Look and feel lawsuits Software License Commercial software (perpetual use)

Commercial software (annual fee) Shareware Freeware Note: only some freeware is open-source; open-source software can still carry a license, e.g. GPL

Recently Viewed Presentations

  • Vocabulary Review words units 1-5 - Mrs. Clifford's English Class

    Vocabulary Review words units 1-5 - Mrs. Clifford's English Class

    indomitable-adjective. not able to be defeated in courage, will, determination. Synonym-unconquerable
  • 1.1 Silicon Crystal Structure - University of California ...

    1.1 Silicon Crystal Structure - University of California ...

    Lecture #43 OUTLINE Short-channel MOSFET (reprise) SOI technology Reading: Finish Chapter 19.2 Short-Channel MOSFET IDS does not saturate with increasing VDS due to DIBL, and also channel-length modulation for VDS>VGS-VT Silicon on Insulator (SOI) Technology Partially Depleted SOI (PD-SOI) Fully...
  • Canadian English (Mainland)

    Canadian English (Mainland)

    canadian english (mainland) a presentation by ber!l Öktem, markus wirtz and florian zÜndorf
  • Rhetoric: The power of language

    Rhetoric: The power of language

    define rhetorical terms and types of figurative language used in speeches and memoir. discuss how rhetoric and figurative language impact my personal experience as an audience member of a speech or reader of a memoir. What is a Speech?
  • 2012 Idaho PowerPoint Template - Holland & Hart

    2012 Idaho PowerPoint Template - Holland & Hart

    Minor's Capacity: Mature Minor Doctrine. Risks of allowing minor to consent to their own care absent express statute or case: May expose practitioner to liability if court concludes minor lacked capacity to consent. May limit ability to disclose info to...
  • Phương Án Kỳ Thi Quốc Gia

    Phương Án Kỳ Thi Quốc Gia

    * * * * Ví dụ 1: Nung nóng hỗn hợp gồm 9,45 gam Al và 27,84 gam Fe3O4 với hiệu suất phản ứng là 80%. Cho thêm V lít dung dịch NaOH 0,5 M vào hỗn hợp sản phẩm...
  • Diapositive 1 - EMPLASA

    Diapositive 1 - EMPLASA

    Em março de 2008, ele cria o ministério da Grande Paris que confia a Christian Blanc. Em abril de 2009, este revela o seu projeto para o Grand Paris. A lei de 3 de junho de 2010 sobre o Grand...
  • System Models for Distributed and Cloud Computing

    System Models for Distributed and Cloud Computing

    Host H1 Router R1 Router R2 Router R3 Host H2 Ethernet FDDI Pt.-to-pt, Ethernet ETH IP 1400 FDDI IP 1400 P2P IP 512 P2P IP 512 P2P IP 376 ETH IP 512 ETH IP 512 ETH IP 376 IP Fragmentation...