INFORMATION TECHNOLOGY PROGRAM STUDENTS AWARENESS AND PERCEPTIONS TOWARDS PERSONAL DATA PROTECTION AND PRIVACY. BY LIM FUNG CHEN COLLEGE OF INFORMATION.

Slides:



Advertisements
Similar presentations
MEDEFs View on Dot EU Domain Day – 5 novembre 2002 – Palazzo Stelline – Milano Catherine GABAY – Director Innovation and Research - Medef.
Advertisements

Chapter 15 Legal & Ethical Issues
Digital Citizenship in the Classroom
Stay Safe Online in Six Steps Presented by: Scott Rhinehart 540 Lake Center Parkway, Suite 102 Cumming, GA Office: ext Fax:
Cyber Security and Data Protection Presented by Mrs Drudeisha Madhub (Data Protection Commissioner ) Tel: Helpdesk:+230.
Acceptable Use Policy (or Fair Use): For Users of Computers and other technology.
STOP.THINK.CONNECT™ NATIONAL CYBERSECURITY AWARENESS CAMPAIGN SMALL BUSINESS PRESENTATION.
Birnhack & Elkin-Koren, Feb Privacy Practices of Israeli Public Web Sites February 2004 Dr. Michael Birnhack & Dr. Niva Elkin-Koren Haifa Center.
JCSD-aw Citizenship in an e-World Johnston Community School District.
Are Large Scale Data Breaches Inevitable? Douglas E. Salane Center for Cybercrime Studies John Jay College of Criminal Justice Cyber Infrastructure Protection.
Software Fundamentals Done by Shakila Sattar. Scenario and the Main Stakeholders Everybody now-a-days are linked to internet either for their work purpose.
Presented by Manager, MIS.  GRIDCo’s intentions for publishing an Acceptable Use Policy are not to impose restrictions that are contrary to GRIDCo’s.
Privacy and Encryption The threat of privacy due to the sale of sensitive personal information on the internet Definition of anonymity and how it is abused.
Course: Introduction to Computers Lecture: 6.  Commercial software is covered by Copyrights.  You have to pay for it and register to have the license.
Chapter 1. Electronic Commerce  Brief History of Commerce and Communication  Introduction to Electronic Commerce  Laws Guiding E-commerce  Are we.
Information Systems Today, 2/C/e ©2008 Pearson Education Canada 9-1 ACS 1803 Lecture Outline 15 ETHICS AND COMPUTER CRIME.
PRIVACY Britt, Beattie and Amy. What are the issues regarding privacy on the internet? Privacy issues arise everyday. Examples of when privacy becomes.
 The purpose of this report is to inform people that the spyware and virus threat is growing and what people can do to stop the spread of spyware and.
What it is About  This poster is about The Nine Elements of Digital Citizenship.  It also has a lot of information about Cyber bullying.  There were.
Charlotte Greene EDTC 630 A document of set rules by the school district that explains what you can and cannot do with district owned information systems.
McGraw-Hill/Irwin ©2008 The McGraw-Hill Companies, All Rights Reserved ETHICS Business Plug-In 7.
Criticism Of Google By: Kyle Singler. Privacy Policies One of the main concerns regarding online search is that an individual’s information is kept private.
Aware the Effect of Social Network For 1 Malaysia’s Safety Towards A Healthy Virtual Socialization.
Do you believe in this? Due to its very nature, the Internet is NOT a safe or secure environment. It is an ever-changing medium where anyone and everyone.
Digital Citizenship: Active Participants in a Digital World.
Monitoring Employees on Networks: Unethical or Good Business?
Identity Crisis: Global Challenges of Identity Protection in a Networked World Alison Knight.
Our Acceptable Use Policy An Overview What is an Acceptable Use Policy (AUP)?
Settling the Frontier: The Convergence and Impact of Privacy and Security Practices Chris Israel Deputy Assistant Secretary for Technology Policy U.S.
Tech and Small Biz: Attitudes and Uses Andrew Langer Phoenix Center Retreat Presentation October 7, 2005.
Electronic Commerce By: Shannon McManus. Background  The process of buying, selling, or exchanging products through a computer.  Transactions are usually.
Get Safe Online Expert advice for everyone In association with.
Internet Safety Presentation by Diahn Hess. Overview Internet Safety Private and personal information Meeting people online Safe interactions Cyberbullying.
Postgraduate Course LAW AND NEW TECHNOLOGIES Facultad de Derecho Universidad de Valladolid España.
SSL Certificates for Secure Websites Dan Roberts Kent Network Users Group Wednesday, 17 March 2004.
Information Technology & Ethics. Impact The impact of IT on information and communication can be categorized into 4 groups: privacy, accuracy, property,
By Bernard Ikoli.  Introduction  What is Internet?  Impact of the Internet in the society  What is Ethic ?  Applying Ethic to the internet  Conclusion.
© 2010 Pearson Education, Inc., publishing as Prentice-Hall 1 INTERNET LAW AND E-COMMERCE © 2010 Pearson Education, Inc., publishing as Prentice-Hall CHAPTER.
Credit:  Cyber law refers to any laws relating to protecting the Internet and other online communication technologies.
Anti-spam activities in Korea Billy MH Cheon / Korea Network Information Center.
Intellectual Property. Confidential Information Duty not to disclose confidential information about a business that would cause harm to the business or.
IT Security in Nepal: Issues and challenges Rajan R. Pant ITSERT-NP.
LEARNING AREA 1 : INFORMATION AND COMMUNICATION TECHNOLOGY INTRODUCTION TO ICT COMPUTER ETHICS AND LEGAL ISSUES.
1 Law, Ethical Impacts, and Internet Security. 2 Legal Issues vs. Ethical Issues Ethics — the branch of philosophy that deals with what is considered.
Whats it all about?.  C omputer crime refers to any crime that involves a computer and a network. The computer may have been used in the commission of.
WHAT IS CYBER SECURITY? Governments, military, corporations, financial institutions, hospitals and other businesses collect, process and store a great.
 Cyber crime encompasses any criminal act dealing with computers and networks (called hacking). Additionally, cyber crime also includes traditional crimes.
Montgomery College Acceptable Use Policy (AUP). 2 This Acceptable Use Policy (AUP) PowerPoint presentation was developed by the Office of the Information.
Creating a Culture of Privacy Michael Kaiser Executive Director National Cyber Security
E-Commerce services.
Ani Mkrtchyan ISOC Armenia
RECORDS MANAGEMENT Judith Read and Mary Lea Ginn
McGraw-Hill/Irwin Copyright © 2007 by The McGraw-Hill Companies, Inc. All rights reserved.
Hotspot Shield Protect Your Online Identity
Soft Law in China’s regulation of the Internet
The Argument against Regulation The Argument for Regulation
Data Protection Act and Other Laws
Freedom Independence Transition
Using a Computer Network
UNIT 4 – THE COST OF FREE LESSON 4.
The introduction and the essential elements of E- Commerce.
Computer Ethics.
Learning Area 1 Information And Communication Technology and Society
Internet safety By DAGAS YACMAS team.
E-Commerce and Social Networks
UNIT 4 – THE COST OF FREE LESSON 6.
Tools & Approaches for Ongoing Privacy Compliance
Howard Rosenbaum "Your Vulnerability in CyberSpace - FBI and IU perspectives on Internet security, intellectual property,
Information Technology and E-Commerce
Presentation transcript:

INFORMATION TECHNOLOGY PROGRAM STUDENTS AWARENESS AND PERCEPTIONS TOWARDS PERSONAL DATA PROTECTION AND PRIVACY. BY LIM FUNG CHEN COLLEGE OF INFORMATION TECHNOLOGY UNIVERSITI TENAGA NASIONAL

PERSONAL DATA, PRIVACY, DATA SUBJECT & DATA USER Malaysia Personal Data Protection Act 2010 defines: Personal Data means any Information is (a) being processed wholly or partly by means of equipment operating automatically in response to instructions given for that purpose; (b) recorded with the intention that it should wholly or partly be processed by means of such equipment; or (c) recorded as part of a relevant filing system or with the intention that it should form part of a relevant filing system, that relates directly or indirectly to a data subject.

PERSONAL DATA, PRIVACY, DATA SUBJECT & DATA USER Privacy is the right to be free from secret surveillance and to determine whether, when, how, and to whom, one's personal or organizational information is to be revealed. Data Subject –the data subject is the subject that the personal data is referring to. Data User - a person who either alone or jointly or in common with other persons processes any personal data or has control over or authorizes the processing of any personal data.

INTERNET USERS, GROWING PACE There are 17,723,000 internet users in Malaysia, which is 60.7% of the Malaysian population. Tremendous growing pace of 566.4% as reported in Internet World Stats had post personal data security concern to global online users.

INTERNET USERS, GROWING PACE There are 17,723,000 internet users in Malaysia, which is 60.7% of the Malaysian population. Tremendous growing pace of 566.4% as reported in Internet World Stats had post personal data security concern to global online users. Out of the RM1 billion in losses from cyber crime in the first six months of this year, 9,857 cases were reported with 7,801 of these solved and 3,385 people detained. Last year, the losses amounted to RM1.115 billion with 8,920 of the 11,543 reported cases solved and 3,712 people arrested.

GIVING OUT PERSONAL DATA. BY FORCE? VOLUNTARILY? TRADE OFF? Social Network Online transaction Online shopping IT services registration processes Free software E-commerce websites

SURVEY OUTCOMES

Willing to bend the privacy tenet to provide personal data in exchange with the token as the reward.

SURVEY OUTCOMES Personal data are reviewed due to the companys rules and regulations.

SURVEY OUTCOMES Students are aware of the importance to protect their personal data. Students mentality on the importance of personal data protection. It is a norm to provide data. The students trust the company for not illegally use their personal data. It had became a habit of providing data without questioning. When there is an online form given, student will complete it as required. Students are brought up in this environment. Carrot and stick situation.

Thank you. Suggestions.