Monday, February 15, 2010

Key Provisions of the USA Patriot Act

Section 201 -- Gives federal officials the authority to
intercept wire, spoken and electronic communications
relating to terrorism.

Section 202 -- Gives federal officials the authority to
intercept wire, spoken and electronic communications
relating to computer fraud and abuse offenses.

Subsection 203(b) -- Permits the sharing of grand jury
information that involves foreign intelligence or
counterintelligence with federal law enforcement,
intelligence, protective,immigration, national
defense or national security officials.

Subsection 203(d) -- Gives foreign intelligence or
counterintelligence officers the ability to share
foreign intelligence information obtained as part
of a criminal investigation with law enforcement.

Section 204 -- Makes clear that nothing in the law
regarding pen registers -- an electronic device
which records all numbers dialed from a particular
phone line -- stops the government's ability to0
obtain foreign intelligence information.

Section 206 -- Allows federal officials to issue roving
"John Doe" wiretaps, which allow investigators to
listen in on any telephone and tap any computer they
think a suspected spy or terrorist might use.

Section 207 -- Increases the amount of time that federal
officials may watch people they suspect are spies or
terrorists.

Section 209 -- Permits the seizure of voicemail messages
under a warrant.

Permits Internet service providers and
other electronic communication and remote computing
service providers to hand over records and e-mails
to federal officials in emergency situations.

Section 214 -- Allows use of a pen register or trap and
trace devices that record originating phone numbers
of all incoming calls in international terrorism or
spy investigations.

Section 215 -- Authorizes federal officials to obtain
"tangible items" like business records, including
those from libraries and bookstores,for foreign
intelligence and international terrorism
investigations.

Section 217 -- Makes it lawful to intercept the wire or
electronic communication of a computer hacker or
intruder in certain circumstances.

Section 218 -- Allows federal officials to wiretap or
watch suspects if foreign intelligence gathering is
a "significant purpose" for seeking a Federal
Intelligence Surveillance Act order. The pre-Patriot
Act standard said officials could ask for the
surveillance only if it was the sole or main purpose.

Section 220 -- Provides for nationwide service of search
warrants for electronic evidence.

Section 223 -- Amends the federal criminal code to provide
for administrative discipline of federal officers or
employees who violate prohibitions against unauthorized
disclosures of information gathered under this act.

Section 225 -- Amends FISA to prohibit lawsuits against
people or companies that provide information to federal
officials for a terrorism investigation.



Source:(www.mail-archive.com/infowarrior@g2-forward.org/msg01814.html)

Monday, January 25, 2010

What is Privacy Protection and the Law???

What is Privacy Protection and the Law?

Privacy protection
Approaches to privacy can, broadly, be divided into two categories: free market and consumer protection. In a free market approach, commercial entities are largely allowed to do what they wished, with the expectation that the consumers will choose to do the business with the corporations that respect the privacy to a desired degree. If some companies are not sufficiently respectful of privacy, they will lose market share. Such an approach may be limited by lack of competition in the market, by enterprises not offering privacy options favorable to the user, or by lack of information about actual privacy practices. Claims of privacy protection made by companies may be difficult for consumers to verify, except when they have already been violated.
In a consumer protection approach, in contrast, it is acknowledged that individuals may not have the time or knowledge to make informed choices, or may not have reasonable alternatives available. This approach advocates greater government definition and enforcement of privacy standards.

WHAT IS THE PRIVACY LAW????



PRIVACY LAW:


law is an area of the law which pertains to privacy. Many nations have identified the privacy of individual citizens as an important value, and have created an expectation of privacy through the authoring of privacy law. Laws by nation vary considerably, and in most cases, privacy law has actually been created through a series of legislative actions and legal cases as shifting society has illuminated the need to adapt the law to cover new situations.


The underlying idea behind privacy law is that citizens have a reasonable expectation of privacy about their personal lives. As long as people are not breaking the law, they should assume that they can enjoy privacy and confidentiality in personal matters. One area of privacy law is privacy in the home, which protects people from unreasonable intrusion by government officials. In fact, the home is one of the most heavily protected areas under privacy law.


Another area which privacy law covers is communications. As a general rule, it is not legal to intercept or listen in on communications, from letters sent through the post office to phone calls. In order to do so, it is necessary to have a warrant from a court. People are also protected from recording of conversations, depending on the law. In areas with a one party law, as long as one person knows that the conversation is being recorded, it is legal. With two party laws, both people in a conversation must be aware of the fact that it is being recorded for the recording to be legal.


Financial and medical records are also protected under privacy law, although, like communications, they can be obtained with a warrant. In addition to providing people with privacy, the law is also designed to prevent abuse of such records. When people release financial or medical information, they do so by signing detailed waivers which make them aware of how the information will be used and by which entity. This information must be protected by whichever person or organization has collected it, whether it takes the form of an electronic record in a hospital computer, or a safe deposit box in a bank.


Privacy law also covers online communications and activities. For example, people who process personal information on the Internet must encrypt it so that it cannot be intercepted by a third party. Internet privacy law is especially complicated because people may visit sites hosted in foreign countries, may work with companies all over the world, and may engage in a variety of activities online.

Monday, January 11, 2010

WHAT WOULD I DO????

WHAT WOULD YOU DO?

I CHOOSE THE SECOND SITUATION:

For me if my classmate plan to make a worm virous i would like to ended what he plan to make to the computer.. because this is the big effect to the computer system if this is save to the computer system...
The worn is very harmful virous in computer, It affect to turn off the computer system in a few hours and automatic shotdown. I would like to explain to my classmate what is the result of what he/she thingking...!!!!!

Monday, November 23, 2009

Are I.T workers are professional??



ARE IT WORKERS ARE PROFESSIONAL

For me "yes" because of the lot of knowledge of them.... and know how to manipulate the data in computer system.. all the program in computer that we have some of them is created by the IT workers..And IT is professional because of their skill and talent how to trouble or manage the computer system...


Monday, November 16, 2009

7 STEPS AND 4 THEORIES


SITUATION: ""7 STEPS ETHICAL DECISION MAKING.....""



  • WHEN WE NEED TO HAVE A BUSSINESS....
  • FOR APPLYING A JOB....
  • PLAN TO MAKE A FAMILY....
  • THE LEADERSHIP TRAINING....


GET THE FACTS: WHEN WE HAVE A ASSIGNMENT IN COMPUTER WE NEED TO FIND IN THE INTERNET FOR MORE INFORMATION AND DETAILS..

IDENTIFY STATE: AFTER WE GATHER THE INFORMATION WE NEED TO MAKE A PLAN..

CONSIDER: FOR THE ATTENDING A SEMINAR, ABOUT THE BUSINESS...





SITUATION: """""4 THEORIES...."""""
  • VIRTUE ETHICS APPROACH: THIS IS THE VIRTUE FOR THE INDIVIDUAL GOOD DOING..

  • ETHICAL CHOICE: THIS THE ETHICAL THAT WE NEED TO MAKE A RIGHT DECISION THAT WE NEED...

  • FAIRNESS APPROACH: FOR THE EXAMPLE IN THE BUSINESS THEY NEED TO A PARTNERSHIP FOR THE SUCCESS OF THE COMPANY...

  • COMMON APPROACH: FOR THE EXAMPLE IN THE SEMINAR WE NEED THE COOPERATION OF ALL THE PEOPLE WHO ATTEND IN THE SEMINAR....