Yunze Wang

ITS 360

02/22/2019

Chapter 4

 

What Would You Do?

 

2. Your friend is going through a tough time with his current significant other and believes she is cheating on him. He is aware of your technical prowess and has asked you to help him purchase and install a stalking app on her cell phone. What would you say?

 

Answer: Installing a stalking app or spying app on someone's phone without their permission is highly illegal. Spying apps can track and forward someone's call logs, messages, their online presence, audio and video files and other confidential information. Therefore, it is clear case of Intrusion upon Seclusion, the first branch of privacy and can be charged with felony or equivalent of a felony potentially punishable by more than one year of imprisonment. Therefore, as much as I would love to help my friend with tech related issues, I would refuse to help him in this regard. Moreover, I will explain the legal side of it and advise him to avoid such action.

 

4. Your auto insurance company has offered you a 15 percent discount (roughly $200 per year) if you agree to let them install a sophisticated vehicle event data recorder (EDR) in your car. You have read over the terms of the agreement and discover that if you are involved in an accident, you must agree to let the data from the device be collected and analyzed by a third-party accident investigation firm. You must also agree to let findings from this analysis be used in a court of law. What questions would you want answered and what advice might you seek before deciding whether to accept this discount offer?

 

Answer: I want to know where this information is stored and what kind of information they are collecting from me. Also, how accurate is this information and how are they using the data they collect. I would then speak to an accident attorney to determine what exactly Iím giving up with this tool.

 

 

Critical Thinking

 

Case 1: Serious Data Breach at OPM

 

1.††††† Do you feel there should be some sort of redress for the 21 million people whose personal information was stolen even if they cannot prove actual monetary damages?

 

Answer: I think there should be some sort of redress for the 21 million people whose personal information was stolen even if they cannot prove actual monetary damages, because I think it get to be some of them are actually victim, not all of the people are lying.

 

2.††††† How might foreign powers and/or terrorists use the stolen data to mount intelligence operations against the United States?

 

Answer: If a foreign power or terrorist organization used the stolen data, they would have direct leverage over a multitude of people through bank records, relatives, and friends, family and so on. That actually has big influence against the US.

 

3.††††† Go online to do research on the steps OPM has taken to improve its cybersecurity? Are you satisfied with these actions? If not, what additional changes would you suggest?

 

Answer: After doing the research online about the steps OPM has taken to improve its cybersecurity, I am pretty much satisfied with these actions. I think they have a good cybersecurity system.

 

 

Case 2: Time to Update the Electronic Communications Privacy Act

 

1.†† †††Do you believe that it is time to consider changes to the ECPA to bring it more in line with the Bill of Rights, or do you believe that concerns about terrorism and crime justify efforts to revise the Bill of Rights?

 

Answer: For me, yes, it is a time to update ECPA to bring it more in line with the Bill of Rights instead of concerning about the terrorism and crime justification efforts to revise the Bill of Rights. Because always prevention is better than cure. Since ECPA is a crime control act, it must be upgrade according to the generation because everything is changing according to the generation. If anything stays the same it won't suit to the new generation and even the crime or hackers are upgrading their technologies and developing in the skills. So, ECPA must change in better way to prevent the unauthorized government access to private electronic communications.

 

2.††††† Congress proposed legislation in both 2013 and 2015 to revise the ECPA; however, the changes never made it through the legislative process. Do research and write a brief summary explaining why no action was taken.

 

Answer: After research, while the House passed a bill 416-0, the legislation died of lobbying by Jeff Sessions and Republican Lobbyists and lawmakers in the Senate.

 

3.††††† Why do you think media organizations would support Microsoft in its suits against the United States over the provisions of the ECPA?

 

Answer: The ECPA was an amendment that essentially would give the government the permits to surveillance and control of the information of people who use private services. If Microsoft would decide to take a stance in order to protect the rights of their consumers and their private data, it is likely that several media organizations would form a syndicate to protect the consumers. That is because such organizations have their businesses running purely because of consumer satisfaction. Availability of private data to the government might decrease or end the consumersí trust and usage of such social media services and hence dent these businesses. That is why several media organizations might support Microsoft in their suits against the United States government over the provisions of ECPA.