Ethics and Responsibility

Slides:



Advertisements
Similar presentations
Information Security Domains Computer Operations Security By: Shafi Alassmi Instructor: Francis G. Date: Sep 22, 2010.
Advertisements

29e CONFÉRENCE INTERNATIONALE DES COMMISSAIRES À LA PROTECTION DES DONNÉES ET DE LA VIE PRIVÉE 29 th INTERNATIONAL CONFERENCE OF DATA PROTECTION AND PRIVACY.
Introduction to Monitoring and Evaluation
© Craig McDonald 2005 UC Ethics and Systems Quality Craig McDonald School of Information Sciences and Engineering University of Canberra
1 Privacy Prof. Ravi Sandhu Executive Director and Endowed Chair March 8, © Ravi Sandhu World-Leading Research.
Health Insurance Portability and Accountability Act HIPAA Education for Volunteers and Students.
Increasing public concern about loss of privacy Broad availability of information stored and exchanged in electronic format Concerns about genetic information.
Criteria For Approval 45 CFR CFR Minimized risks Reasonable risk/benefit ratio Equitable subject selection Informed consent process Informed.
© 2009 The McGraw-Hill Companies, Inc. All rights reserved 3-1 LEGAL AND ETHICAL ISSUES in Medical Practice, Including HIPAA PowerPoint® presentation.
Today’s Schools face:  Numerous State and Federal Regulations  Reduced Technology Funding  More Stringent Guidelines for Technology Use.
HEALTH INSURANCE PORTABILITY AND ACCOUNTABILITY ACT OF 1996 (HIPAA)
PIPA PRESENTATION PERSONAL INFORMATION PROTECTION ACT.
Data Protection.
ICS 417: The ethics of ICT 4.2 The Ethics of Information and Communication Technologies (ICT) in Business by Simon Rogerson IMIS Journal May 1998.
Identity Management In A Federated Environment Identity Protection and Management Conference Presented by Samuel P. Jenkins, Director Defense Privacy and.
Ethics CS-480b Network Security Dick Steflik. ACM Code of Ethics This Code, consisting of 24 imperatives formulated as statements of personal responsibility,
The Australian Privacy Principles Protecting information rights –­ advancing information policy.
Brief Synopsis of Computer Security Standards. Tenets of Information Systems Security Confidentiality Integrity Availability Over the years, standards.
Security Controls – What Works
1 SAP Security and Controls Use of Security Compliance Tools to Detect and Prevent Security and Controls Violations.
1 The Engineer as a Professional Privacy. 2 After reading the articles please answer the following questions. 1) Is privacy a concern that engineers have.
Chapter 9 Information Systems Controls for System Reliability— Part 2: Confidentiality and Privacy Copyright © 2012 Pearson Education, Inc. publishing.
Spring 2010 Marco Valtorta CSCE 390 Professional Issues in Computer Science and Engineering Privacy Concerns (Chapters [B]) Spring.
Privacy & Personal Information -- Why do we care or do we?
4/3/20011 Ethics in Special Education Assessment and Testing and Maintenance of Student Information.
ITGS Standard Level Mr Gavin Johnson. ITGS The Diploma Programme information technology in a global society (ITGS) course is the study and evaluation.
Ethical principles Honesty – be honest in the way you communicate as well as how you act. Integrity – Earn the trust of others.
Legal and Ethical Issues. Major Topics Protecting Programs and Data Information and the Law Rights of Employees and Employers Software Failures Computer.
2 1.Client protection principles 2.Principle #6 in practice 3.Two components of protecting client data 4.Participant feedback 5.Practitioner lessons and.
Risk Assessment. InfoSec and Legal Aspects Risk assessment Laws governing InfoSec Privacy.
Policy Review (Top-Down Methodology) Lesson 7. Policies From the Peltier Text, p. 81 “The cornerstones of effective information security programs are.
FERPA: What you Need to Know The Family Educational Rights and Privacy Act & SEI.
HIPAA Michigan Cancer Registrars Association 2005 Annual Educational Conference Sandy Routhier.
Privacy in computing Material/text on the slides from Chapter 10 Textbook: Pfleeger.
Privacy in Healthcare Challenges Associated with Implementing Privacy in an Electronic Health Records Environment John P. Houston, J.D. Vice President,
Data Warehousing Data Mining Privacy. Reading Bhavani Thuraisingham, Murat Kantarcioglu, and Srinivasan Iyer Extended RBAC-design and implementation.
1 Ethical Issues in Computer Science CSCI 328, Fall 2013 Session 15 Privacy as a Value.
Robert Guerra Director, CryptoRights Foundation Implementing Privacy Implementing Privacy: Rules of the Game for Developers Mac-Crypto Conference on Macintosh.
IT Applications Theory Slideshows By Mark Kelly Vceit.com Privacy Laws.
C HAPTER 34 Code Blue Health Sciences Edition 4. Confidentiality of sensitive information is an important issue in healthcare. Breaches of confidentiality.
Tad and Terry Legal Issues in ILP. 28 CFR Part 23 The federal rule that governs or provides guidance for these issues. § 23.3 Applicability: These policy.
Data Governance 101. Agenda  Purpose  Presentation (Elijah J. Bell) Data Governance Data Policy Security Privacy Contracts  FERPA—The Law  Q & A.
What Institutional Researchers Should Know about the IRB Susan Thompson Senior Research Analyst Office of Institutional Research Presented at the Texas.
Information Technology & Ethics. Impact The impact of IT on information and communication can be categorized into 4 groups: privacy, accuracy, property,
By Bernard Ikoli.  Introduction  What is Internet?  Impact of the Internet in the society  What is Ethic ?  Applying Ethic to the internet  Conclusion.
Copyright © 2015 by Saunders, an imprint of Elsevier Inc. All rights reserved. Chapter 3 Privacy, Confidentiality, and Security.
1 Copyright © International Security, Trust & Privacy Alliance -All Rights Reserved Making Privacy Operational International Security, Trust.
By: Dr. Mohammed Alojail College of Computer Sciences & Information Technology 1.
Data Ethics Levette Williams Associate Superintendent Technology Services Brad Bryant, State Superintendent of Schools “We will lead the nation in improving.
LEARNING AREA 1 : INFORMATION AND COMMUNICATION TECHNOLOGY INTRODUCTION TO ICT COMPUTER ETHICS AND LEGAL ISSUES.
Security Methods for Statistical Databases. Introduction  Statistical Databases containing medical information are often used for research  Some of.
Privacy/Confidentiality – Principles and Regulations in the Social Sciences and Behavioral Research Moira Keane, MA, CIP University of Minnesota May 4,
HIPAA Overview Why do we need a federal rule on privacy? Privacy is a fundamental right Privacy can be defined as the ability of the individual to determine.
Data Warehousing Data Mining Privacy. Reading FarkasCSCE Spring
Safeguarding Sensitive Information. Agenda Overview Why are we here? Roles and responsibilities Information Security Guidelines Our Obligation Has This.
Biomedical Informatics Research Network DATA SHARING HIPAA Compliance & IRB Approvals Martha Payne, Jeffrey Grethe October 10, nd Annual All Hands.
1 Ethics of Computing MONT 113G, Spring 2012 Session 31 Privacy as a value.
Table of Contents. Lessons 1. Introduction to HIPAA Go Go 2. The Privacy Rule Go Go.
Professional Ethics and Responsibilities Part-II
INFORMATION ASSURANCE POLICY. Information Assurance Information operations that protect and defend information and information systems by ensuring their.
Health Insurance Portability and Accountability Act (HIPAA) © 2013 Project Lead The Way, Inc.Principles of Biomedical Science.
Privacy and the Law.
Red Flags Rule An Introduction County College of Morris
Ethical questions on the use of big data in official statistics
CONTRACTS PRIVILEGED COMMUNICATION PRIVACY ACT
Data Warehousing Data Mining Privacy
CONTRACTS PRIVILEGED COMMUNICATION PRIVACY ACT
Reflections on information sharing in health privacy law in New Zealand There are at least five sides to every issue – the patient’s right to medical privacy,
Evaluation and assessment
Presentation transcript:

Ethics and Responsibility

Definitions Etiology Ethics Morals Greek "ethos" meaning "character" Latin Moral "mos" meaning "custom" Ethics The rules that govern what is right and what is wrong for a person to do Morals The principles of right and wrong based on a standard (society or religion), on which ethics are based Ethics: A set of rules that govern behavior; A set of moral principles or values; the science of morality; a branch of Philosophy Morals: Some equate morals and ethics

Ethical Considerations Privacy Data security Accuracy Research

Technology and Ethics Ethical considerations follow technological innovations Stick & stones Nuclear fission Information technology File sharing Passwords Data storage

Codes of Ethics ACM Code of Ethics IEEE Code of Ethics Medical Code of Ethics Manataka American Indian Council Greek Fraternity Code of Ethics

Application of Ethics Ethics implies social considerations Involves Privacy Data security Accuracy Research

DI and Privacy Large files may contain private information Data could be used long after its original collection date Data could be used beyond its collection purpose The purpose of knowledge discovery may not be known until some pattern is revealed in the data The information revealed by DI may be inappropriate

Protecting Privacy Privacy is contextual and a based on individual perceptions so a global assurance of privacy cannot be achieved Steps to enhance privacy protection Anonymization of personal data Provide to the user a method to review their personal data that is to be used in DI and decide for themselves

Privacy The type and amount of information a person is willing to share defines their privacy Notion of privacy violation Organization of Economic Cooperation and Development guidelines – 1980 Family Educational Rights and Privacy Act (FERPA - 1974) Health Insurance Portability and Accountability Act (HIPAA - 1996) On the Impact of Knowledge Discovery and Data Mining Kirsten Wahlstrom and John F. Roddick

Problems with Privacy Current practices fall short of protecting privacy People are unaware of the need to communicate with data holders People must be assertive and proactive The government as Big Brother The Patriot Act

DI and Databases Two positions to consider: DI operations authorized by an individual or organization that hold full access to the data DI operations unauthorized to mine the data, but have access for other reasons

Protecting Databases Authorization Encryption Auditing Precautions Single level vs Multi-Level Security Encryption Auditing Precautions Mining only one security level can prevent inference from less sensitive data to more sensitive data Render the data useless for mining Introduction of noise in the data Introduction of instability in the data

DI and Data Accuracy DI uses data from many diverse, possibly external data sources Initial data quality cannot be known Noisy, obsolete, inaccurate, incomplete Expired data can lead to inaccurate patterns discovered

Data Accuracy Inaccuracies are difficult to correct Expired data is undetectable until a person is affected by applying the patterns discovered in the data Adopt data quality management Correct errors in data with expediency Frequent data cleaning

DI and Research Science is founded in truth and relies on ethical behavior in practice Clearly defined ethical guidelines for DI are not yet stated Consider ethical strategies for Data collection, data storage, retention, authorship, publication, supervision of students and research assistants, disclosure, misconduct rules Human subjects

User-defined Sensitivity Factors Reference: Wahlstrom K, Roddick J. On the Impact of Knowledge Discovery and Data Mining. 2nd Australian Institute of Computer Ethics Conference (AICE2000), Canberra, 2001. Users are the most qualified to qualify the sensitivity of their own data within context Provide users with a tool to specify sensitivity level when data is being collected Use sensitivity value with data in DI methods

DI Code of Ethics There isn’t one. Should there be?