Johan HolmqvistProfessional Ethics Mälardalens högskola Västerås, 07-11-21.

Slides:



Advertisements
Similar presentations
TECHNO-TONOMY Privacy & Autonomy in a Networked World Learning Module 2: Legislating Privacy: Your Rights.
Advertisements

Data Protection & Human Rights. Data Protection: a Human Right Part of Right to Personal Privacy Personal Privacy : necessary in a Democratic Society.
Security, Privacy, and Ethics Marsha Woodbury, Ph.D. University of Illinois, Urbana-Champaign
The Price of Freedoms David DavenportDavid Grünberg Bilkent Computer Eng.METU Philosophy Ankara TurkeyAnkara Turkey
FACE RECOGNITION TECHNOLOGY. OUTLINE WHAT IS BIOMETRICS? WHAT IS BIOMETRICS? WHAT IS FACIAL RECOGNITION TECHNOLOGY? WHAT IS FACIAL RECOGNITION TECHNOLOGY?
Ethics in a Computing Culture
Police 3.6 Politics and Government. DNA Data Collection.
1 McGraw-Hill/Irwin Copyright © 2004, The McGraw-Hill Companies, Inc. All rights reserved. Ethical Challenges Ethics Principles of right and wrong that.
The Role of Computers in Surveillance ~ Katie Hatland.
H UMAN R IGHTS. U NIVERSAL D ECLARATION OF H UMAN R IGHTS October 24, 1945, after of World War II the United Nations came into existence United Nations.
Data Integrity and Security. Data integrity  data that has a complete or whole structure  a condition in which data has not been altered or destroyed.
Data Protection & Human Rights. Data Protection: a Human Right Part of Right to Personal Privacy Personal Privacy : necessary in a Democratic Society.
PROVIDING THOROUGH PROTECTION FOR OUR CLIENTS AND THEIR ASSOCIATES. WITH BIOMETRICS INC.
Landline and Mobile Phones Trixie Francisco. What is Wiretapping? Wiretapping is the monitoring of telephone or Internet conversations by a third party,
1 When hate speech tangles privacy... When hate speech tangles privacy...
PRIVACY. In pairs Work out a definition of the word PRIVACY that you think makes sense You’ve got about 7 minutes...
CCTV AND IT’S FUTURE SAMPLEPRESENTATION CCTV What are we doing with CCTV? What will CCTV be like in 10 Years? How about tomorrow?
EHRs and the European Union – current legislation and future directions. Dr Richard Fitton.
Privacy 2. Digital Dossier The data shadow The digital dossier Your own diary of recordable events.
The Universal Declaration of Human Rights
Health research and the protection of personal information rights in international ethics and human rights law Colin M Harper Promoting Health Research.
CSE/ISE 312 Privacy (Part 1). What We Will Cover Privacy risks and principles 4 th Amendment, expectations, and surveillance Business and social sectors.
Privacy, Data Protection and Lex Informatica -- lecture 3 Dr. Lee A. Bygrave,
Slides prepared by Cyndi Chie and Sarah Frye1 A Gift of Fire Third edition Sara Baase Chapter 2: Privacy.
Biometric Technology Dissenters: Alex Feinberg Brad Harris Ashley DiSilvestro Charisma Nelson.
Do you believe in this? Due to its very nature, the Internet is NOT a safe or secure environment. It is an ever-changing medium where anyone and everyone.
IBT - Electronic Commerce Privacy Concerns Victor H. Bouganim WCL, American University.
1 Ethical Issues in Computer Science CSCI 328, Fall 2013 Session 15 Privacy as a Value.
A (very incomplete) talk on digital security A couple of basics Your Your phone Browsing.
Compsci 82, Fall Right to Privacy? l Article 12 No one shall be subjected to arbitrary interference with his privacy, family, home or correspondence,
Surveillance Jeff Saunders Dr. Garrison CSCI 101 Thurs. 12:30.
1 The Broader Picture Laws Governing Hacking and Other Computer Crimes Consumer Privacy Employee Workplace Monitoring Government Surveillance Cyberwar.
Power Point Project Michael Bennett CST 105Y01 ONLINE Course Editor-Paulette Gannett.
The Impact of Social Media Networking On Privacy Protection in Indonesia Sinta Dewi. Faculty of Law, University Padjadjaran, Bandung, Indonesia The 3 rd.
Human Rights Universal Declaration of Human Rights Based on the UN General Assembly Resolution 217 A (III) 10 DEC 1948 By: Jim Long For: HUMA 1100.
STRATEGIC INTELLIGENCE MANAGEMENT Chapter by Mohammad Dastbaz, Eddie Halpin, Steve Wright Chapter 10 - Emerging Technologies and the Human Rights Challenge.
POLITICAL PRISONERS. Rights at stake UDHR, Article 7: All are equal before the law and are entitled without any discrimination to equal protection of.
Information Technology & Ethics. Impact The impact of IT on information and communication can be categorized into 4 groups: privacy, accuracy, property,
Biometrics Chuck Cook Matthew Etten Jeremy Vaughn.
Surveillance For IB-1 ITGS By Indrani.  Surveillance is the use of IT to monitor the actions of people.  For example, monitoring may be used to track,
PRESENTATION ON SURVELLANCE Introduction It is the monitoring of the behavior, activities, or other changing information, usually of people. It is sometimes.
Human Rights Act, Privacy in the context of auditing Phil Huggins Chief Technologist, IRM PLC
Article 1:  All human beings are born free and equal in dignity and rights. They should act towards one another in a spirit of brotherhood.
Biometric Technology Jordan Seaton CIS 320 WKU. Essay Questions Which industries would find biometric technology the most useful? Why?
Securities vs. Liberties Greg Gough & Ben Paulson Those Who Sacrifice Liberty For Security Deserve Neither-Benjamin Franklin.
PRIVACY IN THE ELECTRONIC COMMUNICATIONS SECTOR IN BULGARIA.
LEARNING AREA 1 : INFORMATION AND COMMUNICATION TECHNOLOGY PRIVACY AUTHENTICATION VERIFICATION.
What does it mean to us?.  History  Biometrics Defined  Modern Day Applications  Spoofing  Future of Biometrics.
PRIVACY Carl Hoppe Ted Worthington. OUTLINE What is privacy? What is privacy? 4 TH Amendment Rights 4 TH Amendment Rights Technology Growth and Privacy.
ICT, Communication & related Legislations. Produced by Neil Liggett. Acts of Law – shared data & information.
THE HUMAN RIGHTS. THE RIGHT TO PRIVACY No one shall be subjected to arbitrary interference with his privacy, family, home or correspondence, nor to attacks.
Privacy, anonymity and other confusing words Przemek Jaroszewski CERT Polska/NASK.
Privacy and the Law.
Biometrics.
Biometrics Reg: AMP/HNDIT/F/F/E/2013/067.
Lecture III Surveillance Society Powerpoint by Miyase Christensen
حقوق الملكية الفكرية إعداد الطالبة: مها عبدالله
Data Protection & Human Rights
Biometrics.
The Panopticon and The Hunger Games
Biometric technology.
SURVEILLANCE IN THE WORKPLACE: WHAT YOU SHOULD KNOW
BIOMETRICS: FACIAL RECOGNITION TECHNOLOGY
Cybercrime and Data Protection
Betty Fermin Rajal Patel Amanda Poirier David Pandolfo
Biometrics Biometrics refers primarily to the measurement of physiological and behavioral characteristics to automatically identify people.
Protection of Privacy Online CAIGF2017-Dushanbe, Tajikistan
Universal Declaration of Human Rights
Baltimore Police Department & CitiWatch
15-5 Automated Fingerprint Identification System
Presentation transcript:

Johan HolmqvistProfessional Ethics Mälardalens högskola Västerås,

 Definition Observation/monitoring of a behavior From french, ”Watching over”  Loss of privacy

 The state of being free from intrusion/disturbance in one’s private life

 Telephone tapping  Surveillance cameras  Computer surveillance  Bugs  Electronic trails  Biometric surveillance

 Fingerprints  DNA  Iris recognition  Voice recognition  Facial recognition

Step 1: Image capturedStep 2: Computer software analyzes the picture Step 3: Data from the previous step is checked against a database, a match is found

 Tool for law enforcement  Security companies  Used by shops  Used by companies to monitor employees

 Interception of communication by the police after obtaining court order or a warrant  New legislation has been proposed

 Article 12 in the Universal Declaration of Human Rights: “No one shall be subjected to arbitrary interference with his privacy, family, home or correspondence, nor to attacks upon his honour and reputation. Everyone has the right to the protection of the law against such interference or attacks.”

 Michel Foucault compared modern society with Jeremy Benthams design for prisons; Panopticon.  Social control based on surveillance

 For our protection  There’s a line which we should not cross