PRIVACY.

Slides:



Advertisements
Similar presentations
TECHNO-TONOMY Privacy & Autonomy in a Networked World Learning Module 2: Legislating Privacy: Your Rights.
Advertisements

Darton College Information Systems Use Policies. Introduction Dartons Information Systems are critical resources. The Information Systems Use Policies.
Greg Lamb. Introduction It is clear that we as consumers and entrepreneurs cannot expect complete privacy when discussing business matters. However… There.
Data Retention LIS 550 Winter 2010 Unsworth Tuesday, March 02, 2010.
Ethical Behavior 7-12 Conforming to moral standards or conforming to standards of conduct of profession or group Conforming to moral standards or conforming.
Slides prepared by Cyndi Chie and Sarah Frye A Gift of Fire Third edition Sara Baase Chapter 2: Privacy.
Ethics and Responsibility
1 The Engineer as a Professional Privacy. 2 After reading the articles please answer the following questions. 1) Is privacy a concern that engineers have.
Introduction to Computer Ethics
ATP Winter 2008 Workshop Jim Valkenburg Delta College.
Information Systems Controls for System Reliability -Information Security-
Property of Common Sense Privacy - all rights reserved THE DATA PROTECTION ACT 1998 A QUESTION OF PRINCIPLES Sheelagh F M.
Human Rights and Patient Care Anahit Harutyunyan Armenia.
HIPAA PRIVACY AND SECURITY AWARENESS.
Anonymity, Security, Privacy and Civil Liberties
Computer and Internet privacy University of Palestine University of Palestine Eng. Wisam Zaqoot Eng. Wisam Zaqoot Feb 2010 Feb 2010 ITSS 4201 Internet.
CSE/ISE 312 Privacy (Part 1). What We Will Cover Privacy risks and principles 4 th Amendment, expectations, and surveillance Business and social sectors.
Slides prepared by Cyndi Chie and Sarah Frye1 A Gift of Fire Third edition Sara Baase Chapter 2: Privacy.
The Eighth Asian Bioethics Conference Biotechnology, Culture, and Human Values in Asia and Beyond Confidentiality and Genetic data: Ethical and Legal Rights.
Ch5 1 ETHC303 Chapter 5- Privacy Instructor: Dr. Hassan Ismail Abdalla Room: E236.
Philosophy 223 Technology in the Workplace: The Concern for Privacy.
Privacy & Confidentiality
1 Ethical Issues in Computer Science CSCI 328, Fall 2013 Session 15 Privacy as a Value.
Academic Year 2014 Spring Academic Year 2014 Spring.
Information Technology & Ethics. Impact The impact of IT on information and communication can be categorized into 4 groups: privacy, accuracy, property,
1 Ethical Issues in Computer Science CSCI 328, Fall 2013 Session 11 Democracy and the Internet Privacy.
Copyright © 2015 by Saunders, an imprint of Elsevier Inc. All rights reserved. Chapter 3 Privacy, Confidentiality, and Security.
1 Ethics of Computing MONT 113G, Spring 2012 Session 29 Privacy.
DATA ACCURACY- one of the issues of computer ethics. Providing inaccurate data input results in erroneous information & decision making. Information on.
1 Ethical Issues in Computer Science CSCI 328, Fall 2013 Session 13 Privacy as a Value.
1 Ethics of Computing MONT 113G, Spring 2012 Session 31 Privacy as a value.
Understanding Privacy An Overview of our Responsibilities.
DIGITAL FOOTPRINTS 11 TIPS FOR MONITORING YOUR DIGITAL FOOTPRINT AND 5 TIPS TO MAKE IT POSITIVE.
Privacy Issues at Work Training for Supervisors. ©SHRM Introduction More than 50 years ago, George Orwell wrote the novel Nineteen Eight- Four.In.
Understanding Privacy An Overview of our Responsibilities.
Ethical consideration in research Before you move any further look at the ethics ……!
1 Ethics of Computing MONT 113G, Spring 2012 Session 27 Ethics in IT Societies III Privacy.
CompSci 280 S Introduction to Software Development
Auditing Concepts.
Judicial Training on Data Protection and Privacy Rights
Data Protection GCSE ICT Mrs N Steventon-2005.
Privacy principles Individual written policies
Issues of personal data protection in scientific research
Uses and Limitations of ICT
IT Applications Theory Slideshows
Human Rights and Patient Care
LATIHAN MID SEMINAR AUDIT hiday.
Societal Issues in Computing (COMP466)
Protecting Your Credit
Digital Citizenship Background & Definitions
By Madison Daugherty edu
is not secure is not secure..
Privacy Dr. Hassan Abdalla
A Gift of Fire Third edition Sara Baase
Introduction to Computer Ethics
Ethical questions on the use of big data in official statistics
A Gift of Fire Third edition Sara Baase
Investor protection and MIFID
OBSERVE ETHICAL PRACTICES
 How does GDPR impact your business? Pro Tip: Pro Tip: Pro Tip:
HIPAA Overview.
Introduction to Computer Ethics
Privacy and Dignity 7 Standard.
IAPP TRUSTe SYMPOSIUM 9-11 JUNE 2004
A Gift of Fire Third edition Sara Baase
Student Privacy in the age of big data
INFS 452 – Computer Ethics & Society
Inclusion and Ethics Professor Simon Rogerson
IT and Society Week 2: Privacy.
Presentation transcript:

PRIVACY

Why is it so important, valuable? Why is it in danger in ICT society? What is privacy? Why is it so important, valuable? Why is it in danger in ICT society? What can be done to prevent/ solve problems which are related with privacy? Gözde Dedeoğlu Lecture Notes

If privacy disappears, what exactly be lost? How does surveillance affect social arrangements, institutions, and practices? What sort of beings do we become when we live in surveillance societies? Gözde Dedeoğlu Lecture Notes

Privacy concept is overlapped with the concepts – the right for liberty, autonomy, secrecy, to control the information about us. Gözde Dedeoğlu Lecture Notes

Private organizations and government agencies have been gathering/ collecting information for many, many years; but in ICT society: Technology enables to collect, store, alter and distribute huge amount of data (in respect with the increase in disk capacities and other advancement/ innovations in technology) Gözde Dedeoğlu Lecture Notes

The scale of information gathering changed, has expanded exponentially The scale of information gathering changed, has expanded exponentially. Easy to create, store, maintain, manipulate, search, and share. Thus, many more records are created and used. Kind of information changed (ex: Transaction Generated Information –TGI- Automatic. Ex: When a shopping action is conducted, detailed info. is being generated automatically. The record resides in a server somewhere in the world; can be accessed from any number places, downloaded and forwarded) Although profiles of individuals were produced before ICT, profiles today are expanded and much more detailed. The scale of info. exchange changed. Distribution of personal information is broader and more extensive than it was ten or twenty years ago. Erroneous personal information also can be distributed and it can effect person’s life. The erronous information may spread so quickly that it is impossible for an individual to track down all the places it exists. Gözde Dedeoğlu Lecture Notes

Combinations of data can be mined to find patterns and correlations Once information about an individual is recorded on a server, it can be bought and sold, given away, traded, or stolen. The distribution of information can take place with or without the knowledge of the person whom the information is about, and it can take place intentionally as well as unintentionally. In addition to these; information tends to endure for much longer periods of time. The data collected in different databases, and in different context can be merged to create comprehensive profiles of individuals. Combinations of data can be mined to find patterns and correlations Gözde Dedeoğlu Lecture Notes

Information gathered for one purpose is merged and mined to identify patterns of behavior that no individual could have imagined they were revealing when they (intentionally or unintentionally) disclosed information. Sorting/ categorizing people according to a certain quality may cause prejudice, injustice, discrimination and inequality. (Different treatments, different opportunities) Gözde Dedeoğlu Lecture Notes

In ICT society, information is given/ collected for many different purposes; ex: for; health analysis, telephone usage, a hotel reservation transaction, sending a CV, opening a deposit account in a bank, info. gathering via surveys, personal information of clients for customer relations management, and so on… Gözde Dedeoğlu Lecture Notes

Some Topics From The Range of Issues: (on privacy.org) Biometrics technologies Video surveillance Online privacy Workplace monitoring Wireless communications and location tracking Data profiling Identity theft Background checks Public records on Internet Financial privacy Medical records confidentiality and genetic privacy Wiretapping and electronic communications Radio Frequency Identification (RFID) Gözde Dedeoğlu Lecture Notes

The Importance of Privacy: * Privacy is a human right. * Privacy is intrinsically good. * Privacy is an instrumental good. * Privacy is an individual good. * Privacy is a social good. Gözde Dedeoğlu Lecture Notes

Privacy as an Individual and Instrumental Good: Instrumental good --> Leads to other goods. Privacy is a complex value that is intertwined with autonomy, equality, and democracy, and its importance ought to be recognized in ICT-based practices. Where privacy does not exist, in societies or context in which individuals are under surveillance, trust and friendship cannot develop. (Charles Fried) Gözde Dedeoğlu Lecture Notes

Privacy is necessary for diversity in relationships Privacy is necessary for diversity in relationships. Our teacher, neighbour, doctor, family have different information about us. (James Rachel) Rachel thinks about privacy as the control of information about oneself. Control of personal information is a means by which we control the relationships we have and how we are treated in those relationships. Control of information about ourselves is an important component of our autonomy. Gözde Dedeoğlu Lecture Notes

Privacy as Contextual Integrity: There are information norms in every domain of life. (Helen Nissanbaum) Vary from domain to domain but in each context individuals have expectations about: 1. what kind of information are appropriate and inappropriate, 2. how that information will be distributed . There are norms with regard to what is appropriate information in particular context. Similarly, there are norms about how the information revealed in particular context will be distributed. (Who can access particular kinds of records as well as requirements for disclosing records to other agencies.) According to Nissenbaum, when information norms are violated, an individual’s privacy is violated. Gözde Dedeoğlu Lecture Notes

Privacy as a Social Good Essential For Democracy: Democracy requires citizens who are capable of critical thinking, individuals who can argue about the issues of the day and learn from the argument so that they can vote intelligently. People who have autonomy can develop independent thinking. In democratic societies, people can develop independent thinking and express their opinions. Privacy, autonomy and democracy are so intertwined that one is inconceivable without the other. Autonomy is essential for what it means to be a human. Rational beings are capable of thinking, processing of information and making judgements, rather than objects or entities to be watched and manipulated. Gözde Dedeoğlu Lecture Notes

Many people think that today’s society is a panopticon Many people think that today’s society is a panopticon. Society is under surveillance by “big brother” as referred the novel “1984” of George Orwell. Where people are watched, under surveillance; they evaluate themselves from their observer’s eye and behave as their observer wants. In Panapticon =) Independent thinking and free expression in danger/ or not possible. Privacy enables making the practice to develop your own sense and develop the potential for self-discovery and creativity which lurk within rich inner life. (Jeffrey Reiman) Gözde Dedeoğlu Lecture Notes

Legislative Background: In 1973, in USA – Fair information Practices – not law, accepted as a standart and became a model for law. 1.There must be no personal data record-keeping system whose existence is secret, 2.There must be a way for an individual to find out what information about him or her is in a record and how it is used, 3. There must be away for an individual to prevent information about him or her that was obtained for one purpose from being used or made available for other purposes without his or her consent. 4.There must be a way for an individual to correct or amend a record of identifiable information about him or her, and 5.Any organization creating, maintaining, using, or disseminating records of identifiable personal data must assure the reliability of the data for their intended use and must take precautions to prevent the misuse of data. Gözde Dedeoğlu Lecture Notes

What can be done to protect privacy? Computer Professionals can do: - Taking precautions to ensure the accuracy of data - Protecting it from unauthorized access or accidental disclosure to inappropriate individuals - Provide proper security for the data - Ensure proper disposal of the data - Privacy enhancing technologies – cryptographic techniques. Gözde Dedeoğlu Lecture Notes

Private and Public Organizations can: Adopt internal policies with regard to the handling of personal information. Gözde Dedeoğlu Lecture Notes

Indivuduals: – Don’t give away the information more than necessary - Aware of the information you are giving - Keep copies of the information you give - Ask the reason when there is a negative decision Gözde Dedeoğlu Lecture Notes

Bibliography: Computer Ethics, Deborah Johnson, Pearson Education International, 2009 (4th edtn.) p. 81-107 Gözde Dedeoğlu Lecture Notes