1 Ethics of Computing MONT 113G, Spring 2012 Session 31 Privacy as a value.

Slides:



Advertisements
Similar presentations
NIGB NATIONAL INFORMATION GOVERNANCE BOARD Harry Cayton, Chair, National Information Governance Board.
Advertisements

CHAPTER 4 E-ENVIRONMENT
Privacy and the Right to Know Grayson Barber, Esq. Grayson Barber, LLC.
Ethical and Social...J.M.Kizza 1 Module 5: Anonymity, Security, Privacy and Civil Liberties IntroductionAnonymitySecurityPrivacy Ethical and Social Issues.
Policy Design & Creating Effective Privacy Policies Presentation by Travis Pinnick User Experience Designer, TRUSTe NTIA Privacy Multistakeholder Process:
Managerial Ethics What is Ethics? Criteria for Ethical Decision Making
Data Retention LIS 550 Winter 2010 Unsworth Tuesday, March 02, 2010.
Ethics in a Computing Culture
Privacy Chris Kelly iLaw July 5, 2002.
CS294-1 Deeply Embedded Networks Privacy Discussion 11/25/03 David Culler University of California, Berkeley.
Chapter 1 Introduction. Chapter Overview Overview of Operating Systems Secure Operating Systems Basic Concepts in Information Security Design of a Secure.
Ethics and Responsibility
Department of Computer Science City College of New York City College of New York Spring 2006 Copyright © 2006 by Abbe Mowshowitz CSc 375 SOCIAL ISSUES.
D: Chapter 5 Ethics and Social Responsibility. Ethics The code of moral principles and values that govern the behaviors of a person or group with respect.
3 Ethics and Privacy.
Contemporary Issues in Canadian Health Care Nola M. Ries, MPA, LLM Adjunct Assistant Professor, University of Victoria Research Associate, Health Law Institute,
ETHICS, POLICY & SECURITY ISSUES 1CIIT---ETHICS,POLICY AND SECURITY ISSUES.
Personal Data (Privacy) Ordinance Hong Kong Personal Data (Privacy) Ordinance Hong Kong by Stephen Lau Privacy Commissioner for Personal Data Hong Kong.
Control environment and control activities. Day II Session III and IV.
Data Privacy and Security Prof Sunil Wattal. Consumer Analytics  Analytics with consumer data to derive meaningful insights on actions and behaviors.
C4- Social, Legal, and Ethical Issues in the Digital Firm
Legal Responses to Scientific & Technological Development.
2 1.Client protection principles 2.Principle #6 in practice 3.Two components of protecting client data 4.Participant feedback 5.Practitioner lessons and.
0x1A Great Papers in Computer Security Vitaly Shmatikov CS 380S
Slides prepared by Cyndi Chie and Sarah Frye1 A Gift of Fire Third edition Sara Baase Chapter 2: Privacy.
From Privacy to Information Governance Dr Petra Wilson Internet Business Solutions Group - Cisco.
Philosophy 223 Technology in the Workplace: The Concern for Privacy.
Author(s): Steve Jackson, License: Unless otherwise noted, this material is made available under the terms of the Creative Commons Attribution.
T RUST AND R ESPONSIBILITY FOR B IG D ATA P RACTICES Heike Felzmann Centre of Bioethical Research & Analysis; InPrime, Insight Centre for Data Analytics;
ETHICS, POLICY & SECURITY ISSUES
Location, Location, Location: The Emerging Crisis in Wireless Data Privacy Ari Schwartz & Alan Davidson Center for Democracy and Technology
1 Ethical Issues in Computer Science CSCI 328, Fall 2013 Session 15 Privacy as a Value.
Author(s) David A. Wallace and Margaret Hedstrom, 2009 License: Unless otherwise noted, this material is made available under the terms of the Creative.
Basic Nursing: Foundations of Skills & Concepts Chapter 7 ETHICAL RESPONSIBILITIES.
Policies for Information Sharing April 10, 2006 Mark Frisse, MD, MBA, MSc Marcy Wilder, JD Janlori Goldman, JD Joseph Heyman, MD.
LEARNING OBJECTIVES TO UNDERSTAND THE RELATIONSHIP OF ETHICS TO MANAGEMENT IN THE INFORMATION SOCIETY TO APPRECIATE THE MORAL DIMENSIONS INVOVED & THE.
Usable Security – CS 6204 – Fall, 2009 – Dennis Kafura – Virginia Tech Privacy in Context: Contextual Integrity Peter Radics Usable Security – CS 6204.
Copyright © 2004 Pearson Education, Inc. Slide 9-1 Chapter 9 Ethical, Social, and Political Issues in E-commerce.
Data Governance 101. Agenda  Purpose  Presentation (Elijah J. Bell) Data Governance Data Policy Security Privacy Contracts  FERPA—The Law  Q & A.
6 Ethics and Privacy.
Malcolm Crompton APEC Information Privacy Framework: review, impact, & progress APEC Symposium on Information Privacy Protection in E Government & E Commerce.
2 1.Client protection principles 2.Principle #6 in practice 3.The client perspective 4.Participant feedback 5.Tools for improving practice 6.Conclusion.
POLICIES = CONTROL Simply stated, a policy lays out what management wants employees to do and a procedure describes how it should be done.
Ethical and Legal Issues Information Systems 337 Prof. Harry Plantinga.
Approved for Public Release. Distribution Unlimited. 1 Government Privacy Rick Newbold, JD, MBA, CIPP/G Futures Branch 28.
Privacy and Data Protection III Annual Latin American Telecommunications, Technology, and Internet Public Policy Forum Geff Brown, Assistant General Counsel.
MIS 2000 Social Implications of IST. Outline Law & Ethics Accountability and Liability Information Rights Privacy Computer Abuse and Crime Intellectual.
1 Ethical Issues in Computer Science CSCI 328, Fall 2013 Session 11 Democracy and the Internet Privacy.
1 Ethics of Computing MONT 113G, Spring 2012 Session 29 Privacy.
CHAPTER 5 ETHICS & PRIVACY.
APEC Privacy Framework “The lack of consumer trust and confidence in the privacy and security of online transactions and information networks is one element.
1 Ethical Issues in Computer Science CSCI 328, Fall 2013 Session 13 Privacy as a Value.
INFORMATION ASSURANCE POLICY. Information Assurance Information operations that protect and defend information and information systems by ensuring their.
Dr.Amira Yahia, Ph.D (N), M.Sc (N), B.Sc (N).  By the end of this session the student will be able to:  Define some terms related to ethic  Explain.
1 Ethics of Computing MONT 113G, Spring 2012 Session 27 Ethics in IT Societies III Privacy.
Privacy, Discrimination and Review
Privacy and the Law.
PRIVACY.
Ethical, Social, and Political Issues in E-commerce
6th Asian Roundtable on Corporate Governance Theme II, Session 2 Ensuring Capacity, Integrity and Accountability of Regulators and Supervisors Jaweria.
Privacy and Confidentiality in Research
Legal and Ethical Issues
Richard Purcell Corporate Privacy Officer Microsoft Corporation
A Gift of Fire Third edition Sara Baase
A Gift of Fire Third edition Sara Baase
Other Sources of Information
Healthcare Privacy: The Perspective of a Privacy Advocate
IAPP TRUSTe SYMPOSIUM 9-11 JUNE 2004
HIPAA Privacy and Security Update - 5 Years After Implementation
IT and Society Week 2: Privacy.
Presentation transcript:

1 Ethics of Computing MONT 113G, Spring 2012 Session 31 Privacy as a value

2 Privacy as an Individual Good The "right to privacy" is legally complicated. Based on 1st and 4th amendments Protects citizens from intrusion by governments Corporations treated like persons How do we protect individual's privacy from corporations? Privacy act of 1974 legislates some rights.

3 Privacy as a Value Is privacy an intrinsic or instrumental value? Fried (1968): Friendship, intimacy and trust cannot develop in societies under constant surveillance. (E.g. Orwell's 1984) Rachels (1975): Privacy is required for diversity of relationships. Control of information about ourselves is important for our autonomy. Need to release information about ourselves in some contexts, but should have control over whether it flows to other places.

4 Privacy as Contextual Integrity Nissenbaum (2004) argued that there are information norms for every domain of life. People have certain expectations about these in each domain: 1)What kinds of information is appropriate for this context? 2)How will information be distributed in this context? Examples of appropriate information: Applying for a loan Visiting a doctor Examples of distribution norms: Medical information Credit reports

5 Development of Norms Formal norms: Established by legislation or specific policies of an organization. Informal norms: Established and enforced by social expectations. Changing norms: New technology creates a "policy vacuum" for norms. New technology allows collection and distribution of new forms of information. Organizations may use the technology without informing clients. IT tools are often invisible to users and adopted without public announcement. This makes privacy difficult to protect.

6 Privacy as a Social Good Privacy as an Individual Good doesn't influence policy. Utilitarian arguments: Social goods trump individual goods. Example? Privacy as a Social Good provides more balance with other social goods such as security. How can we frame privacy as a social good?

7 Privacy and Democracy Privacy is essential to Democracy because: People under constant surveillance change their behavior. Examples: 1.Bentham's Panopticon 2.IT Society. How are we watched? Benefits of surveillance? Drawbacks of surveillance?

8 Privacy is Essential to Democracy In a democracy, citizens: must be free to exercise autonomy. must be able to think critically. must argue about issues and learn from argument. If it's too risky to argue for something new or challenge authority, democracy will not work. Johnson's view: Privacy, autonomy and democracy are so intertwined that you cannot have one without the other.

9 Data Mining Problems with data mining: The norms are often not subject to public discussion. The norms may be invisible to those being watched. Some people are singled out by the data mining program and others are not. Information may be merged and mined for patterns people may not have realized they were revealing. People are placed in categories based on data mining results. What is wrong with this?

10 Fair Information Practices How do we as a society protect privacy? Adopt, either through legislation or self-regulation, fair information practices. 1.No secret personal data record-keeping. 2.Individuals able to find out what information is recorded and how it is used. 3.Must be able to prevent information that from being used without consent. 4.There must be a way to correct information. 5.Organizations must assure the reliability of the data.

11 Other Safeguards Transparency: Information practices should be made clear to users. (Example of how not to do this--Citizens Bank Privacy statement). Opt-in vs. Opt-out It's better if people are given a choice to opt-in to a policy, rather than having the policy implemented and forcing people to opt-out. Example: Facebook, Beacon