StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Illegal Use of Sensitive Information Between the Consumers and the Online Vendors - Research Paper Example

Cite this document
Summary
The paper describes the difference between an unethical act and an illegal act. An unethical act is only against moral standards. Society does not accept it, but there are no laws for the regulation of unethical acts. Contrarily, an illegal act is banned by the country’s laws…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER94.9% of users find it useful
Illegal Use of Sensitive Information Between the Consumers and the Online Vendors
Read Text Preview

Extract of sample "Illegal Use of Sensitive Information Between the Consumers and the Online Vendors"

There are a myriad of computer laws that are being followed in my country (Canada). To name a few, there are: 1984 Computer Fraud and Abuse Act (CFAA), Electronic Communications Privacy Act (ECPA), Children’s Online Privacy Protection Act (COPPA), and Health Insurance Portability and Accountability Act (HIPAA). CFAA deals with penalties for the intruders who gain access to sensitive information stored in a computer without authorized access. Computers have to be protected when the consumers carry out commercial activities, engage in cross-border e-commerce, and make online business transactions and email communications with online traders. The Act applies penalties upon the identity thieves, starting from 10 years to 20 years of imprisonment. ECPA was designed in the 1980s. It applies penalties upon the persons who gain access to and make illegal use of the sensitive information that has been exchanged between the consumers and the online vendors through electronic communication techniques such as electronic mails, text messages, video conferences, chatting, and etcetera. COPPA was designed in 1998 and became effective on April 2000. COPPA put forward rules and regulations that are to be applied on the commercial website owners and internet service providers who know which websites are being used by children and collect personal information from them with or without their parents’ consent. The Canadian province, British Columbia, presented in the 2008 Legislative Session: 4th Session, 38th Parliament, the legislation about e-Health and its services so that the consumers could benefit from e-Health’s secure and steadfast solutions right from the comfort of their homes. This legislation is named as E-Health (Personal Health Information Access and Protection of Privacy) Act that is basically about the security issue of the EHRs. The law clearly states that anybody, who is accessing the data stored in these electronic records either with the idea of adding information or retrieving information for any purpose, must have proper authorization. Moreover, the patients have access to the health information banks and retain the power of disclosing or not disclosing their personal information. The disclosure of information, such as for research purposes, would be the responsibility of the data stewardship committee specially designed for this purpose. The Canadian Press (cited in Swartz 2008) states that any person or organization violating the law will be fined $200,000 (Cdn.). One case that has been tried with the Canadian PIPEDA law (Personal Information Protection and Electronic Documents Act) is that of Nicole Landry v. Royal Bank of Canada, 2011 FC 687 (CanLII), in which the applicant complained to the Office of the Privacy Commissioner of Canada that the Royal Bank of Canada had disclosed her personal bank records to her spouse. She sought $75,000 in damages. The applicant was awarded the money as a compensation for the dishonor that she suffered at the hands of the bank (Feather 2011), although she had hidden certain bank records during the bank proceedings. But since the PIPEDA law requires the court to award the damages if the law is violated, Landry was compensated even when she had concealed important records. References Feather, T., 2011. Federal Court Awards Damages for Breach of Privacy. [Online] Available at [Accessed 8 September 2012] Swartz, N., 2008. B.C. law secures e-health records. Information Management Journal. [Online] Available at [Accessed 8 September 2012] Week 1 DQ 2: Ethics, Laws, and Motives The main issue is “What makes an act right” in thinking about ethical theories, so that we know the implications of our acts upon the society. The strongest contributing factor in deciding what is right, and what is not, is our moral upbringing, which imparts in our personalities that conscientiousness, self-esteem, and integrity, that is necessary for deciding between right and wrong. Kantian ethics describe that those acts should be considered as right which seek our good will. The limitation of this approach is that this good will lies in the motive of the act, and not in the consequences. In the field of information technology, special consideration should be given to social and legal issues. For example, to escape identity theft in the cyber world, it is important to educate the users of internet and computer systems about “intellectual property rights issues, privacy/ surveillance issues, access to data issues and issues of human-computer interaction” (Stahl, Carroll-Mayer & Norris 2006:298). They should be able to relate principled reasoning to ethical cases. They should know that the other person’s identity is something that is his own property and not theirs; that they have no right upon others’ personal information, and they cannot use or disclose it without the owner’s permission. A virtual world businessman should respect his employees’ and clients’ personal identification data and should take measures to lock and protect the databases and data warehouses from unauthorized access. Even at very personal level, an internet user must know that he is supposed to protect and defend the second person’s identification information and at the same time, he should be aware of security breaches proposed by the World Wide Web so the he is able to protect his own identity (Weber 2008). Legal issues involve the implementation of identity theft related laws, rules, and regulations. Similarly, in case of forensic computing, for example, there are many ethical considerations, like the security professionals should be familiar with laws and legislation that have been passed in order to make sure that internet frauds like identity theft do not take place. They should be aware of privacy rights and ethical and moral clauses found in these laws so that they may be able to better solve the case. They must know what legal issues are involved in handling a standalone computer system. There is difference between an unethical act and an illegal act. An unethical act is only against the moral standards. The society does not accept it, but there are no laws for the regulation of unethical acts. Contrarily, an illegal act is banned by the country’s laws, as well as not being accepted by the society. For example, it is unethical for the authorities not to educate the e-consumers on their right of privacy; whereas, it is illegal not to follow privacy protection acts and laws. Hence the difference is in the criminal motive, which in case of unethical acts is simply against the values, and in case of illegal acts, means to violate the law. References Stahl, B., Carroll-Mayer, M., & Norris, P., 2006. Legal, professional, and ethical content. Forensic Computing: The Problem of Developing a Multidisciplinary University Course. [Online] Available at [Accessed 7 September 2012] Weber, E., 2008. Ethics and identity theft: who can you trust? Everyday Ethics. [Online] Available at < http://everyday-ethics.org/2008/08/ethics-and-identity-theft-who-can-you-trust/ > [Accessed 8 September 2012] Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Illegal Use of Sensitive Information Between the Consumers and the Research Paper”, n.d.)
Illegal Use of Sensitive Information Between the Consumers and the Research Paper. Retrieved from https://studentshare.org/law/1456668-week1dq1
(Illegal Use of Sensitive Information Between the Consumers and the Research Paper)
Illegal Use of Sensitive Information Between the Consumers and the Research Paper. https://studentshare.org/law/1456668-week1dq1.
“Illegal Use of Sensitive Information Between the Consumers and the Research Paper”, n.d. https://studentshare.org/law/1456668-week1dq1.
  • Cited: 0 times

CHECK THESE SAMPLES OF Illegal Use of Sensitive Information Between the Consumers and the Online Vendors

Secure Online Payment Methods

Despite numerous benefits offered by the online payment systems, it has been identified that there are certain lacuna and risks associated with the online payment systems.... It is also significant to improve the online payment system by protecting the information provided by the users in a proper manner.... These also face issues related to safety demanded by the consumers, governments as well as businesses in today's fast-paced and ever-dwindling world....
29 Pages (7250 words) Term Paper

Legal Aspects of E-commerce

hellip; commerce so as to have an upper hand evaluating opportunities it may afford, both to competitors and themselves. The law is catching up with the online world; the progressive migration of business to the Web is forcing reappraisal of intellectual property rights and then protector and clarifying the meaning of intellectual property in a connected world.... This may help the image of a startup, however, the ability to prove early and continuos commercial use of technology is likely to be importantMeanwhile the cost of defending a claim of intellectual property infringement will often be more than the cost of paying royalties to the claimant....
16 Pages (4000 words) Essay

Online Consumer Protection

Also there is a brief description of electronic commerce between the consumers and the internet marketplace along with its requirements for protecting the consumers' information.... hellip; The author describes different laws, legislations, regulations and Acts in detail so as to give a full view of what measures are being taken to ensure the consumers' protection in the online community.... The idea of educating the consumers has also been emphasized upon so that they can play their part in protecting their own from the cyber criminals....
18 Pages (4500 words) Term Paper

Information securtiy

Sensitive information about the consumers and employees, finances, inventories, payments, research work, is being maintained by governments, organizations, companies, banks, armed forces, healthcare sectors, so on and so forth.... Threats posed to the sensitive information stored on computers have been discussed along with procedures for their determent.... First part deals with a general discussion about information security.... An introduction is given as to what information security… Then, the importance of designing an information security policy has been discussed....
12 Pages (3000 words) Essay

Identity Theft Computer Forensics to the Rescue

The author of this essay "Identity Theft Computer Forensics to the Rescue" focuses on the identity theft and online consumer protection.... One often has to reveal bits of his personal information while doing online transactions, such as his name, address, telephone number, bank information, credit card information, and etcetera.... Some important laws have been discussed to have a clear view of what steps have been taken to ensure the e-consumers' identity protection....
10 Pages (2500 words) Research Paper

Issues with Introduction and Increased Use of Cloud Computing Services - Magneta

The retailer has a lot of sensitive information including client credit card information or their payment history.... From the paper "Issues with Introduction and Increased use of Cloud Computing Services - Magneta" it is clear that Magneta's target market consists of youth between 18 and 34 years and the firm mostly sells casual, but stylish female outfits.... hellip; The company under analysis represents most of the challenges that retail vendors in the fashion industry encounter....
8 Pages (2000 words) Case Study

Common Identity Theft Crimes

One often has to reveal bits of his personal information while doing online transactions, such as his name, address, telephone number, bank information, credit card information, and etcetera.... hough, internet identity theft has made people uncertain about shopping and selling online, checking their bank statements online, visiting auction websites or entering into business contracts or transactions; however, computer forensics has played its part in helping law enforcement agencies in gathering digital evidence and identifying stolen identities as well as the criminals....
9 Pages (2250 words) Research Paper

Cloud Computing and Three Service Types

In cloud computing, a provider maintains the server computers that store data and applications and a user can use these applications and store their data on the servers by relying on the internet infrastructure and according to the agreement between the provider and consumer.... It allows businesses and consumers to use applications (or software) that they need without the burden of installing and maintaining the applications as well as to access their data at any computer that is connected to the internet....
14 Pages (3500 words) Assignment
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us