Page 170 -
P. 170

Chapter 4 Ethical and Social Issues in Information Systems  169


               policies changed without our participation and permission.” (The full report
               is available at knowprivacy.org.)


               Technical Solutions
               In addition to legislation, there are a few technologies that can protect user
               privacy  during  interactions with Web sites. Many of these tools are used for
               encrypting e-mail, for  making e-mail or surfing activities appear anonymous,
               for preventing client computers from  accepting cookies, or for detecting and
               eliminating spyware. For the most part, technical solutions have failed to
                 protect users from being tracked as they move from one site to another.
                  Because of growing public criticism of behavioral tracking and targeting of
               ads, and the failure of industry to self-regulate, attention has shifted to brows-
               ers. Many browsers have Do Not Track options. For users who have selected
               the Do Not Track browser option, their browser will send a request to Web
               sites requesting the user’s behavior not be tracked. Both Internet Explorer 9
               and Mozilla’s Firefox browsers implement this opt-out option. However, these
               browsers are shipped with tracking turned on as the default. And most consum-
               ers never visit the Options Privacy tab in their browser. The online advertising
               industry has bitterly opposed Microsoft’s plans and warns that Web sites are not
               obligated to follow users’ requests to Do Not Track. There is no online advertis-
               ing industry agreement on how to respond to Do Not Track requests, and cur-
               rently no legislation requiring Web sites to stop tracking.
                  The Interactive Session on Technology, Life on the Grid: iPhone Becomes iTrack,
               describes how mobile phones are used to track the location of individuals.


               PROPERTY RIGHTS: INTELLECTUAL PROPERTY

               Contemporary information systems have severely challenged existing laws
               and social  practices that protect private intellectual property. Intellectual
               property is considered to be intangible property created by individu-
               als or  corporations. Information technology has made it difficult to protect
                 intellectual property because computerized information can be so easily
               copied or distributed on networks. Intellectual property is subject to a variety
               of  protections under three different legal traditions: trade secrets, copyright,
               and patent law.

               Trade Secrets
               Any intellectual work product—a formula, device, pattern, or compilation of
               data—used for a business purpose can be classified as a trade secret, pro-
               vided it is not based on  information in the public domain. Protections for
               trade secrets vary from state to state. In general, trade secret laws grant a
               monopoly on the ideas behind a work product, but it can be a very tenuous
               monopoly.
                  Software that contains novel or unique elements, procedures, or compilations
               can be included as a trade secret. Trade secret law protects the actual ideas in
               a work product, not only their manifestation. To make this claim, the creator
               or owner must take care to bind employees and customers with nondisclosure
               agreements and to prevent the secret from  falling into the public domain.
                  The limitation of trade secret protection is that, although virtually all  software
               programs of any complexity contain unique elements of some sort, it is difficult
               to prevent the ideas in the work from falling into the public domain when the
               software is widely distributed.








   MIS_13_Ch_04_Global.indd   169                                                                             1/18/2013   10:27:41 AM
   165   166   167   168   169   170   171   172   173   174   175