Presentation is loading. Please wait.

Presentation is loading. Please wait.

3 Ethics and Privacy 35 Slides.

Similar presentations


Presentation on theme: "3 Ethics and Privacy 35 Slides."— Presentation transcript:

1 3 Ethics and Privacy 35 Slides

2 [ LEARNING OBJECTIVES]
Define ethics, list and describe the three fundamental tenets of ethics, and describe the four categories of ethical issues related to information technology. Identify three places that store personal data, and for each one, discuss at least one potential threat to the privacy of the data stored there.

3 3.1 Ethical Issues Ethical Frameworks
Ethics in the Corporate Environment Ethics and Information Technology When you’re dealing with people’s information, you’re going to make decisions based on that information. People will challenge those decisions. They might feel treated unfairly. We’re going to explore some of the ways that you can make sure you have done the right thing.

4 3.1 Ethical Issues Ethics The principles of right and wrong that individuals use to make choices that guide their behavior. Have students copy

5 Ethical Frameworks Four Widely Used Standards Utilitarian Approach
There are four approaches to determining what is right or moral Utilitarian Approach: states that an ethical action is the one that provides the most good or does the least harm. There are drugs that we don’t test on human because in order to test them, we would have to make the human sick.

6 Ethical Frameworks Four Widely Used Standards Utilitarian Approach
Rights Approach Rights Approach: maintains that an ethical action is the one that best protects and respects the moral rights of the affected parties. Were people’s rights respected?

7 Ethical Frameworks Four Widely Used Standards Utilitarian Approach
Rights Approach Fairness Approach Fairness Approach: posits that ethical actions treat all human beings equally, or, if unequally, then fairly, based on some defensible standard. For example, most people might believe it is fair to pay people higher salaries if they work harder or if they contribute a greater amount to the firm.

8 Ethical Frameworks Four Widely Used Standards Utilitarian Approach
Rights Approach Fairness Approach Common Good Approach Common Good Approach: This approach argues that respect and compassion for all others is the basis for ethical actions. Respect and compassion underlie all societies.

9 Ethical Frameworks Four Widely Used Standards
Utilitarian Approach Rights Approach Fairness Approach Common Good Approach Combine Four Standards to Create a Framework for Ethical Decision Making Which approach is best? The best thing to do is to use all four…

10 Ethical Frameworks Five Steps in Ethical Decision Making Framework
Recognize an ethical issue Get the facts Evaluate alternative actions Make a Decision and Test It Act and Reflect on the Outcome of Decisions There are five steps in making an ethical or morally correct decision… Recognize an ethical issue: • Could this decision or situation damage someone or some group? • Does this decision involve a choice between a good and a bad alternative? • Does this issue involve more than simply legal considerations? If so, then in what way? Get the facts: • What are the relevant facts of the situation? • Do I have sufficient information to make a decision? • Which individuals and/or groups have an important stake in the outcome? • Have I consulted all relevant persons and groups? Evaluate alternative actions: • Which option will produce the most good and do the least harm? (the utilitarian approach) • Which option best respects the rights of all stakeholders? (the rights approach) • Which option treats people equally or proportionately? (the fairness approach) • Which option best serves the community as a whole, and not just some members? (the common good approach) Make a decision and test it: • Considering all the approaches, which option best addresses the situation? Act and reflect on the outcome of your decision: • How can I implement my decision with the greatest care and attention to the concerns of all stakeholders? • How did my decision turn out, and what did I learn from this specific situation?

11 Ethics in the Corporate Environment
Code of Ethics Fundamental Tenets of Ethics Responsibility – accepting consequences Accountability – accepting responsibility Liability - damages A code of ethics describes actions that are considered morally correct in an organization. Fundamental Tenets of Ethics: Responsibility: means that you accept the consequences of your decisions and actions. Accountability: refers to determining who is responsible for actions that were taken. Liability: is a legal concept that gives individuals the right to recover the damages done to them by other individuals, organizations, or systems. How is something that is unethical different from something that is illegal?

12 Ethics in the Corporate Environment
Code of Ethics Fundamental Tenets of Ethics Responsibility – accepting consequences Accountability – accepting responsibility Liability - damages What is Unethical is not necessarily Illegal You can be fired for doing something unethical. You could go to jail for doing something illegal.

13 Cheating Is Risky for Business Students
3.1 Cheating Is Risky for Business Students Why do professors get so uptight about cheating? After all, everybody does it. I know someone who got laid off from Waldbaum’s after 20 years as a butcher. His wife is a nurse, so she convinced him to go back to school and take up nursing as well. She even told him that she would write all his papers for him. So he becomes a nurse, even though he hasn’t passed his boards yet. They’re so desperate for nurses that they’re willing to let people into the profession as long as they have a college degree. Do you want this person working on you?

14 Ethics & Information Technology
Four General Categories of Ethical Issues Related to IT: Privacy Issues Accuracy Issues Property Issues Accessibility Issues There are four general issues related to ethics when it comes Privacy issues involve collecting, storing, and disseminating information about individuals. When you sign into Engrade, you’re only able to see your grades. How would you like it if anybody other than you was able to see your grades? 2. Accuracy issues involve the authenticity, fidelity, and correctness of information that is collected and processed. A lot of attention is being paid to credit reports today. If there’s a mistake on your credit report, it can affect you for years. You could pay more money to borrow. 3. Property issues involve the ownership and value of information. Who owns a blog that you post on the internet? Who own a picture that you might have taken and post on Facebook? 4. Accessibility issues revolve around who should have access to information and whether a fee should be paid for this access. How do you stop the general public from getting their hands on information that’s only meant for people that need to work with it.

15 3.2 Privacy Electronic Surveillance Personal Information in Databases
Information on Internet Bulletin Boards, Newsgroups, and Social Networking Sites Privacy Codes and Policies International Aspects of Privacy Let’s talk about privacy… Have students read

16 3.2 Privacy Privacy The right to be left alone and to be free of unreasonable personal intrusions. There’s privacy…. Have students copy and call on a student to read

17 3.2 Privacy Privacy Information Privacy
The right to be left alone and to be free of unreasonable personal intrusions. Information Privacy The right to determine when, and to what extent, information about you can be gathered and/or communicated to others. Then there’s information privacy…. Have students copy and call on a student to read You work in a bank. Your brother is undergoing a nasty divorce from his wife. Your brother has reason to believe that his wife ran off with all the money in their joint bank account. His wife has an account with just her name on it at your bank. Your brother asks you to look and see how much money in that account. What do you do?

18 3.2 Privacy Court Decisions in Many Countries have followed two rules:
The right of privacy is not absolute. Privacy must be balanced against the needs of society. If it involves the safety of other people, then public safety comes before privacy.

19 3.2 Privacy Court Decisions in Many Countries have followed two rules:
The right of privacy is not absolute. Privacy must be balanced against the needs of society. The public’s right to know supersedes the individual’s right of privacy. Indeed, the public’s right to know supersedes the individual’s right of privacy.

20 3.2 Privacy Profiling - putting a dossier together Data Aggregators
Digital Dossier – data gathered about you in a typical day Profiling - putting a dossier together Data Aggregators LexisNexis ChoicePoint Acxiom Digital Dossier: data integrated from data gathered about you in a typical day (surveillance cameras located on toll roads, on other roadways, in busy intersections, in public places, and at work; credit card transactions; telephone calls (landline and cellular); banking transactions; queries to search engines; and government records (including police records).

21 3.2 Privacy Profiling - putting a dossier together Data Aggregators
Digital Dossier – data gathered about you in a typical day Profiling - putting a dossier together Data Aggregators LexisNexis ChoicePoint Acxiom Profiling: The process of forming a digital dossier.

22 3.2 Privacy Data Aggregators – companies that keep dossiers LexisNexis
Digital Dossier – data gathered about you in a typical day Profiling - putting a dossier together Data Aggregators – companies that keep dossiers LexisNexis ChoicePoint Acxiom Data Aggregators: companies that collect public data such as real estate records and published telephone numbers, in addition to nonpublic information such as Social Security numbers; financial data; and police, criminal, and motor vehicle records.

23 Electronic Surveillance
Using technology to monitor individuals as they go about their daily routines. Is conducted by employers, governments, and other institutions. Examples: Surveillance cameras in airports, subways, banks, and other public venues. A large part of the information in your digital profile is compiled through Electronic Surveillance: conducted by employers, the government, and other institutions. Surveillance cameras track you at airports, subways, banks, and other public venues. Inexpensive digital sensors are now incorporated into laptop webcams, video-game motion sensors, smartphone cameras, utility meters, passports, employee ID cards high-resolution photographs taken from the air or from the street by Google or Microsoft , your license plates will be recorded and time-stamped as you drive down a city street, cross a toll bridge, or park at a shopping mall.

24 Electronic Surveillance
Inexpensive digital sensors are found in laptop webcams, video game sensors, smartphone cameras, utility meters, passports, and ID cards. Smartphones create geotags Google and Microsoft street view images Satellite imaging Have students copy and call on a student to read

25 Personal Information in Databases
Personal Data / Record Keepers Credit Reporting Agencies Banks and Financial Institutions Utility Companies Employers Hospitals Schools Government Agencies (IRS, State, City) Have students copy and call on a student to read

26 Personal Information in Databases
Major Concerns about Information You Provide Record Keepers Do you know where the records are? Are the records accurate? Can you change inaccurate data? How long will it take to make a change? Under what circumstances will personal data be released? Have students copy and call on a student to read

27 Personal Information in Databases
Major Concerns about Information You Provide Record Keepers How are the data used? To whom are the data given or sold? How secure are the data against access by unauthorized people?

28 Information on Internet Bulletin Boards, Newsgroups, and Social Networking Sites
Free Speech versus Privacy on the Internet Derogatory Information Can Influence Hiring Decisions Little to No Recourse for Victims Have students copy and call on a student to read There was a police detective upstate who was fired for a racist post on Facebook. Employers and insurance companies now look at credit scores before they hire or insure you

29 Privacy Codes & Policies
Opt-out Model – you can share my data unless I tell you not to Opt-in Model – you can’t share my data unless I specifically allow you to. Now we’re going to talk about 2 models for protecting people's privacy… Privacy Policies (or Privacy Codes): an organization’s guidelines for protecting the privacy of its customers, clients, and employees. Opt-Out Model of Informed Consent: permits the company to collect personal information until the customer specifically requests that the data not be collected. Opt-In Model of Informed Consent: Privacy advocates prefer this model, which prohibits an organization from collecting any personal information unless the customer specifically authorizes it.

30 Privacy Codes & Policies
Opt-out Model – you can share my data unless I tell you not to Opt-in Model – you can’t share my data unless I specifically allow you to. Platform for Privacy Preferences (P3P) A protocol that communicates privacy policies between a web site and its visitors Platform for Privacy Preferences (P3P): a protocol that automatically communicates privacy policies between an electronic commerce Web site and visitors to that site. P3P enables visitors to determine the types of personal data that can be extracted by the sites they visit. You know the terms of service that you never both reading, they communicate these preferences. If you look at the fine print, you’ll see exactly who they are sharing your data with and for what reasons.

31 Privacy Codes & Policies
US Federal Trade Commission’s Fair Information Practices Standard European Directive on Data Privacy The United States and Europe both have rules regarding how data can be shared. Why do you think we need to have all these codes and policies? Because business is now no longer about selling you a product. A lot of companies make money by selling your information to other companies. If you use your discount card at the Vitamin Shoppe, for instance, they might sell your information and buying history with other supermarkets or with Fitness cneters.

32 International Aspects of Privacy
The Global Nature of the Internet Complicates Data Privacy Approximately 50 Countries Have Data-Protection Laws Inconsistent standards from country to country Transborder data flow. Have students read Why is it necessary to know the rules regarding the sharing of data in the country where you’re working? Because you can be held liable for the damages that come from sharing data that you’re not supposed to

33 3 Ethics and Privacy The End


Download ppt "3 Ethics and Privacy 35 Slides."

Similar presentations


Ads by Google