1 agenda – 11/04/2013 friday- unit 29 howard j rattliff, jr. – principles of technology - course...

22
1 Agenda – 11/04/2013 Friday- Unit 29 Howard J Rattliff, Jr. – Principles of Technology - Course # 130227200 -

Upload: alberta-alisha-patrick

Post on 19-Jan-2016

219 views

Category:

Documents


3 download

TRANSCRIPT

Page 1: 1 Agenda – 11/04/2013 Friday- Unit 29 Howard J Rattliff, Jr. – Principles of Technology - Course # 130227200 -

1

Agenda – 11/04/2013 Friday- Unit 29

Howard J Rattliff, Jr. –

Principles of Technology - Course # 130227200 -

Page 2: 1 Agenda – 11/04/2013 Friday- Unit 29 Howard J Rattliff, Jr. – Principles of Technology - Course # 130227200 -

Legend:

Instructor

Class

Individuals

Assignment/ Discussions

SME = Subject Matter Expert

Unit 29 Agenda

<Monday>, <Nov 04>, Rm 219 - On CampusDress: Business Casual

   

Start End Topic/Discussion Teacher / Instructor

DurationTime

Elapse Time

Counter

1:25 1:30Meeting Final Checks (and Dial in - Not Applicable)

Howard Rattliff0:05 0:00

1:30 1:35<< CLASS BEGINS >> -- Welcome - Introductions of any /Guests?

Howard Rattliff0:05 0:05

1:35 1:40 Class Roster (1st 10 minutes of Class) - Howard Rattliff 0:05 0:10

1:40 1:40 Unit 29 Agenda for Today & Logistics Howard Rattliff 0:00 0:15

1:40 1:55Class Discussion / Review - Test Howard Rattliff

0:15 0:20

1:55 2:10 Class Discussion – Assigned ReadingLecture

0:15 0:30

2:10 2:20Copyright markings Lecture /CLASS

Discussion0:10 0:55

2:20 2:25Next steps and assignments (Unit 30 –Wednesday – Nov 04 )

Howard Rattliff

0:05 1:00

   

Unit 30 Assignment -- 1. Use UME instructor website to view /access lecture notes; 2)

   

Page 3: 1 Agenda – 11/04/2013 Friday- Unit 29 Howard J Rattliff, Jr. – Principles of Technology - Course # 130227200 -

Data Marking and Data Use and Security

Page 4: 1 Agenda – 11/04/2013 Friday- Unit 29 Howard J Rattliff, Jr. – Principles of Technology - Course # 130227200 -

Data Marking and Data Use and Security

Unit 29 – Monday 11/4/2013

Page 5: 1 Agenda – 11/04/2013 Friday- Unit 29 Howard J Rattliff, Jr. – Principles of Technology - Course # 130227200 -

PRIVACY -- Key lesson objectives: Today Units 28 and Monday Unit 29

1. Learning to Handle Data in a Professional Manner- as an IT Professional!

2. Basics of assessing what should be protected and mark appropriately.

3. What is valuable and why.

Privacy: the condition of being secluded or isolate from view of, or from contact with others. Concealment ; secrecy.

1. Anonymous – from the Greek an (without) onoma (name) – therefore “without name” / “nameless” ) (1)

2. In the context of world of technology “The right of information privacy” refers to an individual’s ability or right to choose 1) the extent to which, and the 2) time and 3) circumstances under which his or her attitude /behavior/ beliefs can or will be shared with others.

Cited: (1). American Heritage Dictionary

Page 6: 1 Agenda – 11/04/2013 Friday- Unit 29 Howard J Rattliff, Jr. – Principles of Technology - Course # 130227200 -

Ownership And Rights?

1. Your Physical1. Facial recognition2. Voice3. DNA materials4. Signature

2. Personal Privacy.1. Your accts (email, Drivers

License, etc2. Medical data3. Student data & grades4. Your trash?5. Digital signature6. Cell phone & Telephone

calls (US and international)

7. Facebook, tweets and other electronic media

Key Issues in Technology

Data

Privacy ?

1. States Rights2. Individual Rights3. Business Rights

Page 7: 1 Agenda – 11/04/2013 Friday- Unit 29 Howard J Rattliff, Jr. – Principles of Technology - Course # 130227200 -

Ownership And Rights?

Data

Privacy ?

Name

Address

Social Security Numbers

Driver License photo and #

Credit Card#

Credit history

Credit limit on a credit card

Payment history

Medical History

Cancer

Medical Treatment (ADHD)

Diabetes

Race or ethnic origin

Salary

College

Social org memberships

Religious affiliations

Eyes color

Tattoos and identifying marks

Blood type

DNA

Time on facebook

Websites visited

Books checked out of Library

Height, weight, waist line, etc.

Home Phone

Email

Overseas telephone calls

Place of work

Time of work

Criminal Background

Legal History

Bank Account

Place of Brith

Date of Birth

Mothers Maiden Name

Pet name

Spouse name

Children name

Child DOB

Leisure Interest (travel, golf, horses, etc)

Nickname AKA

Salary

University affiliations

Degree major

TV and cable network

channels and downloads

Utility bills

Political Affiliations

Company Affiliations (corporate and public foundation boards)

Text Fields

Cell phone #

WHO OWNS THIS DATA ABOUT YOU – Your do but only if you protect it.

The Data Stru

cture

•Typica

l Data headers

Camera image of you in public on a DART Train or on driving on the freeway?

Voice recording of you in public on a DART Train in public or at the train depot while you are on a cell phone?

Reasonable expectation of Privacy?

4th Amendment to the US Constitution

- Private vs The Public Domain

Page 8: 1 Agenda – 11/04/2013 Friday- Unit 29 Howard J Rattliff, Jr. – Principles of Technology - Course # 130227200 -

1st – Evaluate and Assess the data and how to treat it: An Example of a Key Law and Standard

Family Educational Rights and Privacy Act of 1974 (FERPA) governs Academic Transcripts request and release. The Family Educational Rights and Privacy Act (FERPA) (20 U.S.C. § 1232g; 34 CFR Part 99) is a Federal

law that protects the privacy of student education records. The law applies to all schools that receive funds under an applicable program of the U.S. Department of Education.

Transcripts of the academic record may be obtained by the individual personally or will be released to another party based on the student's written authorization.

Generally, schools must have written permission from the parent or eligible student in order to release any information from a student's education record. However, FERPA allows schools to disclose those records, without consent, to the following parties or under the following conditions (34 CFR § 99.31): School officials with legitimate educational interest; Other schools to which a student is transferring; Specified officials for audit or evaluation purposes; Appropriate parties in connection with financial aid to a student; Organizations conducting certain studies for or on behalf of the school; Accrediting organizations; To comply with a judicial order or lawfully issued subpoena; Appropriate officials in cases of health and safety emergencies; and State and local authorities, within a juvenile justice system, pursuant to specific State law.

Schools may disclose, without consent, "directory" information such as a student's name, address, telephone number, date and place of birth, honors and awards, and dates of attendance. However, schools must tell parents and eligible students about directory information and allow parents and eligible students a reasonable amount of time to request that the school not disclose directory information about them. Schools must notify parents and eligible students annually of their rights under FERPA. The actual means of notification (special letter, inclusion in a PTA bulletin, student handbook, or newspaper article) is left to the discretion of each school.

Page 9: 1 Agenda – 11/04/2013 Friday- Unit 29 Howard J Rattliff, Jr. – Principles of Technology - Course # 130227200 -

Not one policy of standard but many …….

Yahoo and Gmail have their privacy and data rights policy Cloud computing and storage companies have their privacy and

data rights policy Federal codes and policies, State Each business (credit card processors (VISA, MC, Amer Express

Pay-pal, Ebay, etc.)

Read the privacy policies; if too onerous then shopping elsewhere or try another product. You are in control of your digital footprint !

Limit personal information you give out to only what is necessary for that purpose. Especially SSN, DL, Passport id, etc Phishing and other schemes to exploit you into providing vital information. Sometimes

referred to as Social Engineering. Handle and destroy personal private data and request other to do so in accordance with

their privacy policies.

Steps you can take to become a better consumer and manage your digital identity;

Page 10: 1 Agenda – 11/04/2013 Friday- Unit 29 Howard J Rattliff, Jr. – Principles of Technology - Course # 130227200 -

The Risk - Spear Phishing

Spear phishing is a type of targeted phishing. Based upon Trusted Associations or Authority Figure or association as proxy for Trust And spontaneous (not thinking before acting responses.

Spear phishers send e-mails that appear to be from inside your organization. For example, a message might appear as if it came from your: A school administrator, your bank, etc, Human Resources, or The IT department.

The message might include requests for user names or passwords. Spear phishers attempt to gain access to an organization's entire network, putting the security

of that organization's information at risk. Or, spear phishers may make you a victim of identity theft.

Protect yourself and your network or organization’s information systems from spear phishers by following these security tips: Never give out your password, to anyone! IT, or any legitimate person from your organization, will

never ask you for your password. If someone from the IT department requires access to your computer, they will use their administrator user name and password.

Never reveal any information system related information, or personal information, in response to an unsolicited e-mail. This includes: User name, Address, or Date of birth.

Page 11: 1 Agenda – 11/04/2013 Friday- Unit 29 Howard J Rattliff, Jr. – Principles of Technology - Course # 130227200 -

Unit 29 – Monday 11/4/2013

Data Marking and Data Use and Security

- Lecture Continued. -

Page 12: 1 Agenda – 11/04/2013 Friday- Unit 29 Howard J Rattliff, Jr. – Principles of Technology - Course # 130227200 -

Identity Theft -- is a Real Threat Identity theft occurs when someone uses your identifying information, without your knowledge, to

commit fraud or other crimes. Such information may include your: Name, Address, Social security number, or Bank or credit card account number.

Identity thieves can use the information they obtain to: Open credit card accounts, Take out loans, or Drain a bank account without your knowledge.

Identity theft is a serious problem with extreme consequences for its victims. You are the first line of defense against identity theft. It is important that you take action to minimize your risk.

Follow these guidelines to reduce the likelihood of someone obtaining your personal information and making you a victim of identity theft. It's your identity; protect it: Never give out personal information, especially your Social Security number, without knowing how it will

be used. Pay attention to credit card and bank statements for unauthorized activity. Avoid using common names or dates when creating passwords or personal identification numbers

(PINs). Pick up your mail promptly. Shred all personal documents and mail that contain sensitive information, especially pre-approved

credit card offers. Do not carry your Social Security card or passport in your purse or wallet unless absolutely necessary,

such as for travel. Order copies of your credit report every year.

Page 13: 1 Agenda – 11/04/2013 Friday- Unit 29 Howard J Rattliff, Jr. – Principles of Technology - Course # 130227200 -

Data Rights and Markings/ Privacy and Security

Both an ethical and a technical issue Data and information security is major issue for computers,

software, social media, and personal privacy advocates. Privacy Is built into our constitution. A keystone principle.

A tough balancing act since the advent of computers and technology Storage, data, computers, bandwidth (the internet, satellites),

cameras and software etc are all cheap. Big Data is a term used by industry to refer to the tera-bytes of data that exist and that is being generate continuously and on demand. Big Data – large databases, video, national collection

systems, satellite and intel information sources, social media system applications such as facebook (one account where a large number of people can be searched)

Page 14: 1 Agenda – 11/04/2013 Friday- Unit 29 Howard J Rattliff, Jr. – Principles of Technology - Course # 130227200 -

2nd Step: Data Rights and Markings/ Privacy and Security

Markings for original content & materials. Copyright /Use + Authorship information.

1. Copyright Marking > i.e. for UME: “ © 2014 All Rights Reserved. UME Preparatory”.

2. Two ways used in most applications programs like Excel/Word/Powerpoint:

1. Use Character mapping feature: Selected via windows menu START/Programs/Accessories/System Tools/Character Map/ ©

2. Use shortcut on keyboard sequence (+ c +) will result in © displayed on the screen as the copyright symbol. This will not always work and depends on the application software on whether this shortcut is available.

3. Authorship information markings in the document involve: Your name or Business Name / Date Created to allow traceability to authorship and authenticate origin.

Page 15: 1 Agenda – 11/04/2013 Friday- Unit 29 Howard J Rattliff, Jr. – Principles of Technology - Course # 130227200 -

2nd Step: Data Rights and Markings/ Privacy and Security

Copyrights for Software: Copyright is a form of protection granted by the laws of the United States for original

works of authorship. includes: literary, dramatic, musical, architectural, cartographic, choreographic,

pantomimic, pictorial, graphic, sculptural, and audiovisual creations. “Copyright” literally means the right to copy. Software is included and protected under US Copyright Laws. Classified in business world as “Intellectual Property”

Copyright concept originated in England (18th century) For Software, Copyright laws applies to: Object code, source code

listings, documentation. Software Object code (aka Micro-code)– The computer executable

version of a computer program the runs on the computer . Sometimes referred to as machine language i.e. ( 1’s and 0’s ) digits.

Software Source code – the computer program in human-readable form

Page 16: 1 Agenda – 11/04/2013 Friday- Unit 29 Howard J Rattliff, Jr. – Principles of Technology - Course # 130227200 -

Typical Usage or License for Software

1. License and Copyright laws apply for both Proprietary and Open-source Software. International trade controls and defense department restriction can also apply for certain software and hardware.

2. End User License is what is typically signed or acknowledged a. Signed when you download and install new software

b. License can vary (site, computer device, transferable, etc)

c. Users of the software agree to use in the prescribed manner in the User License Agreement (legal agreement or contract ) or face legal or other remedies in court or by mediation, etc.

d. “© 2013. All Rights Reserved.” is the standard copyright marking.

e. No need to file for copyright protection. Laws changed to allow originator to mark data and use symbol with year to establish protection and rights.

3. Software is copyright protected by US laws and normally by treaty with the governments of other countries.

4. In addition the software (such as algorithms) can be patented as well.

5. Remember to give credit to sources and references for your materials

Page 17: 1 Agenda – 11/04/2013 Friday- Unit 29 Howard J Rattliff, Jr. – Principles of Technology - Course # 130227200 -

Preparing a computer program –

All Element Affected by Copyrights 1. Design Stage - purpose or goal , flow chart of key steps (expected inputs and the

desired outputs), storage values and the calculationsa) Complex computer programs are know as systems. The more complex the program

the more complex the design stage.

2. Coding stage – writing the code. Uses source code languages (simliar to English but uses Syntax for commands and a command library of words that will be recognized as commands)

3. Compiling Stage – a translation of command and syntax of the program into machine language – 1’s and 0’s that the computer processor and memory can understand. Object code.a) The results of the translation into machine code or object code are the object modules; A

Software Data Library is typically used in industry to archive and manage code versions and listings, etc. A central part of this phase is the Concept of Software Configuration Management in which version control is used to manage the product.

4. Verification Phase – testing of program modules and overall testing for use/test under various conditions ( 1) nominal, 2) suboptimal conditions, and then 3) stress testing conditions, etc).

5. Delivery Phase - Storage and Retrieval/ Release & Distribution

DOUCUMENTATION INVOLVED IN ALL PHASES

Page 18: 1 Agenda – 11/04/2013 Friday- Unit 29 Howard J Rattliff, Jr. – Principles of Technology - Course # 130227200 -

3rd Step – Understanding the Value of Intellectual Property

Bottomline: The Value is Mostly Driven by Marketing

1. Ability to Sell/ Advertise

Page 19: 1 Agenda – 11/04/2013 Friday- Unit 29 Howard J Rattliff, Jr. – Principles of Technology - Course # 130227200 -

Value in the Marketplace – your data could be included

Data has value $$ in that it can be converted into useful information; Data List are bought and sold by list brokers. Some are stolen via security breaches – hackers, etc.

A good high-end client list used for email marketing could be cost upwards of $1000 or more on the market

Email - Most Common Phone list - Most Common SIM cards Software application licenses Your social security number

Used for a many purposes – legal and illegal, etc:

fake ids to open bogus accounts Phone banks for marketing companies Insurance / home refinance companies/ lawyers Employers to find workers that were laid-off Political campaigns Non profits and organizations.

Gamblers & Betting

Income Targeted (High Income)

Insurance Inquiries

Job SeekersHealth & NutritionHome OwnersMortgage Loans & Refinancing

Music (general music lovers)

Online ShoppersPayDay LoansReligion (General Religion)

Social Networking Sports EnthusiastsTravel & Vacation Planning

Weight Loss Men & Woman

Gamblers & Betting

Income Targeted (High Income)

Insurance Inquiries

Job SeekersHealth & NutritionHome OwnersMortgage Loans & Refinancing

Music (general music lovers)Online ShoppersPayDay LoansReligion (General Religion)Social Networking Sports EnthusiastsTravel & Vacation PlanningWeight Loss Men & Woman

Page 20: 1 Agenda – 11/04/2013 Friday- Unit 29 Howard J Rattliff, Jr. – Principles of Technology - Course # 130227200 -

Top selling domain names - YTD Sales 2013

Please note that this list is only comprised of Domain sales that have been reported. Many top end sales are subject to an N.D.A wich is a Non Disclosure Arrangement.

Source: list top sales published by Ron Jackson since he commenced reporting domain sales in 2003.

Top 30 YTD Reported Sales 2013 (Correct as of April 28th 2013) 1.Booker.com $375,000 Pvt Sale 1/16/13

2.tie Yinhang.com $300,000 Sedo 5/1/132.tie Mojo.com $300,000 DomainAdvisors 2/15/134.Apuestas.com (“bets” in Spanish) €165,000=$221,100 Sedo 2/15/135.tie “ edited sitename” - $200,000 HuntingMoon 4/24/135.tie “edited sitename” - $200,000 HuntingMoon 4/24/137.Estate.com $165,000 UpMarketDNS 1/31/138.Mobile.xxx $160,000 ICM Regsitry 2/15/139.eLend.com $140,000 Sedo 4/3/1310.Partners.com $125,000 Sedo 2/20/1311.ConnectNow.com $120,000 Sedo 4/10/1312.Adib.com $117,000 GoDaddyAuctions 4/3/1313.tie Breathalyzer.com $115,000 Sedo/DomainHoldings 4/17/1313.tie Unit.com $115,000 DomainHoldings/Zenchi.net 3/20/1315.Torrents.com €84,700=$112,651 Sedo 1/23/1316.Banque.com €68,000=$91,210 Sedo 2/20/1317.LawHelp.com $85,000 Afternic 3/6/1318.Schokolade.de (“chocolate” in German) €63,000=$80,640 Sedo 4/3/1319. VagaDeEmprego.com (“job vacancy” in Portuguese”) €60,000= $78,600 Sedo 2/27/1320.tie Numi.com $75,000 DomainNameSales 4/3/1320.tie Medicine.org $75,000 Sedo 3/20/13

Source: list top sales published by Ron Jackson since he commenced reporting domain sales in 2003.

http://upmarketdns.com/highest-sales/

Page 21: 1 Agenda – 11/04/2013 Friday- Unit 29 Howard J Rattliff, Jr. – Principles of Technology - Course # 130227200 -

The Bottom Line

The companies and entities you give your data free of charge are selling it to others,

1. Using it for their own financial gain, marketing efforts2. Realize how much harm can result to an individual/an organization

a. The seriousness of the crime these days for improper use /threats/bullying etc on social media and other forms of technology (District policy/ state laws / and federal laws)

b. Use these tools and applications in Professional Manner and primarily for business /school c. The Rewards are Great but There Exist Lots of Risk regarding Information Technology. Be

smart user and consumer!

Personal benefit: 1. Protect and mark your original creations – copyright when needed.2. Mark your data (id /date/ include reference sources where necessary)3. Control your brand. Your are your own brand! Protect your reputation and identity.

Intellectual property has value even more since the advent of the internet and digital technology.

4. Limiting the amount of junk mail / scams/ and other threats to your in the future. Visit reputable sites only. Do a little research before you act/download, etc. For example call by phone to verify a friend sent you an email if it look suspicious.

Page 22: 1 Agenda – 11/04/2013 Friday- Unit 29 Howard J Rattliff, Jr. – Principles of Technology - Course # 130227200 -

END