Premium Essay

Data Privacy

In:

Submitted By gmaruthi007
Words 1053
Pages 5
Data Privacy
G.Maruthi

What is data privacy?
• Protection of personal data • Why do we need protect personal data?
– The need to control personal data
• • • • Fear of misuse Identity Theft Cases of Fraud Other form of cyber crimes

What is Personal Information?
• According to the European Directive on Data Protection
– Article 2: “Personal Data shall mean any information relating to an identified or identifiable natural person (‘data subject’); an identifiable person is one who can be identified , directly or indirectly, in particular, by reference to an identification number or to one or more factors specific to his physical, physiological, mental economic , cultural or social identity” – Article 8: Personal data revealing racial or ethnic origin, political opinions, religious or philosophical beliefs, trade-union membership, data concerning health

How collected?
• Some examples:
– Registering with email service – Online shopping – Online bill payment – Social networking – Online gaming

Recent Incidents
• The Vodafone Germany case (12 September 2013, BBC News):
– Personal information of customers stolen by hackers – Affected – Two million – What kind of information?
• • • • Names Addresses Bank Account Numbers and Birth Dates

Recent Incidents
• Adobe Data Stolen(4 October, 2013, BBC News):
– Personal information stolen – About 2.9 million customers affected – Nature of information stolen
• Encrypted customer passwords • Other private information

The OCED Guidelines
• Guidelines on the Protection of Privacy and Trans border Flows of Personal Information (1980)
– The Collection Limitation Principle
• Collection of personal data should be limited • Data only obtained through legal means • Appropriate consent has been obtained

– The Data Quality Principle
• Accurate • Kept up-to-date • To the extent required for processing of

Similar Documents

Premium Essay

Data Privacy Trends

...Bessie Napper IT 547 OL Data Privacy Trends April 28, 2016 Abstract: The purpose of this paper is a reflection on Data Privacy Trends of 2015. This paper will summarize my opinion on the talk about what matters most in data privacy. It will show how the panel has laid out a compelling discussion about the issues facing data privacy. Churchill Data Privacy Trends 2015 presented on what matters most in data privacy. They talked about the ever-growing demand for big data. How increasingly effective “bad actors,” leading to the worst year on record for data breaches. That privacy practices was designed only to deal with compliance or breach response. The conflicting global privacy laws and a growing concern among consumers about whose doing what with their data. Businesses are very aware of how consumers are increasingly aware of the risks and options as their personal data has effectively become a form of currency. As an example, telemarketers are always selling your information to other telemarketers in ways of contacting you in order to get you to buy things from them. As we live and breathe privacy all day we want to feel safe that we are not being violated whenever we go online and open a web page or email attachment. So by choosing the encrypted form of email is one way they talked about helping with privacy issues. With privacy and security one of the things they talked about is understanding where the risks are and how you can alter your behavior. This to me would mean...

Words: 621 - Pages: 3

Free Essay

Data and Privacy

...Data Privacy and Security Table of Contents Introduction 3 Why Protection 4 Computer Virus 4 How Viruses Infect Computer 5 How People Hack Computer Systems 6 How to Keep Computers Safe from Online Predators 7 Conclusion 10 REFERENCES 11 Introduction The role of computer systems is very vital in our daily lives. Since computers help us to deal with approximately all the major functions of our lives as well as are so inevitable that spending even a day or two away from the computer can leave us feeling powerless. In this prospect, many people control their routine lives by means of their personal computers. However, at the present computer security has become a very critical issue. Additionally, security refers to the technique to discover as well as stop illicit utilization of our secret information or computer. In this scenario, some preventive measures enable us to stop criminal users (as well known as "intruders") from accessing and using some part of our computer system. In addition, recognition of such intrusions helps us in deciding whether or not somebody tried to gain access into our computer system, if they were successful in their attempt, as well as what they could have acquired from the system (ComputerSecurityService, 2011), (Armor2net Software Ltd., 2004) and (Norton, 2001). In addition, the term “computer security” is very commonly used, though; the information and data saved on a computer...

Words: 2264 - Pages: 10

Free Essay

Facebook Has Always Been Accused for Giving Users a False Sense of Control over Their Data Privacy.

...has always been accused for giving users a false sense of control over their data privacy. Firstly, it is because Facebook places too much burden on users to navigate a complex web of settings, including for privacy, advertisements and followers. Since the process of changing setting is so tedious, many users may just do not care about the privacy setting. Opt-outs for sponsored stories or collection of location data aren’t provided so users are forced to tell their locations to Facebook. Secondly, Facebook’s ability to track users’ activity outside Facebook have increased exponentially as time has passed. Facebook now gathers information through these plugins regardless of whether the buttons are used. Every time a user goes on a website with a Facebook like button, the browsing history with be recorded and Facebook may give the information to a third party for advertising and other purposes. In addition, Facebook’s acquisition of Instagram and WhatsApp has allowed them to collect more kinds of user data, which enables more detailed profiling. Facebook’s terms don’t properly acknowledge the data subject rights of users as well. Though users have some options to control the visibility of their information within their networks, they are not able to prevent Facebook from further using this information for its purposes. The privacy settings were less clear in relation to the collection and use of data by Facebook itself or by third-parties like application developers. Other...

Words: 496 - Pages: 2

Premium Essay

Bring Your Own Device

...Bring your own device Victor Morgan CIS330 Strayer University Bring your own device As practice shows, a growing number of employees use at work their own mobile devices. This year, many tech sites are increasingly flashes by acronym BYOD (Bring Your Own Device) – “Take your own devices to work”. As of today, when it is posible connect to different cloud services and harness the power of personal device to perform the work steps, literally holding the phone, and the range of devices has become a truly enormous, sometimes for an employee computer standing on his desk has no value. With the ability to perform the same work tasks, but with the help of his personal device employee, in practice, will seek to do so. The task of company IT-service – is to provide him such. BYOD (bring your own device) – is a term that describes a situation where an employee of organization instead of corporate computer uses to run his own device, whether it is his personal laptop, tablet, or, in extreme cases, even a smartphone. BYOD term appeared at least since 2004. However, the explosive popularity of this idea is found only recently and mainly due to the activity of suppliers of IT-services and the rapid development of functional diversity and cloud services. Today, the growing popularity of BYOD concept affects the number of positions in many areas of IT: from the technical support department to department of development of mobile applications and security management and monitoring of compliance...

Words: 1133 - Pages: 5

Premium Essay

Privacy Endangerment with the Use of Data Mining

...Privacy Endangerment with the Use of Data Mining An emergent Information Technology (IT) issue that has been rising in the past few years has been data mining. Data mining is utilized to retrieve personal identifiable information provided by individuals through the use of Internet services such as: social media networks, email, and other networks that contain data bases full of personal information. If such data retrieval if not done careful, it can cause ethical issues for the companies that are involved. The ethical issues related to data mining are violation of privacy, confidentiality, and respect of persons’ rights. Issues that required the immediate attention regarding data mining are: What stops corporations from sharing personal identifiable information with other companies?; How effectively and ethically data mining is use by the government?; Is our privacy and confidentiality truly protected? Social network companies such as Facebook, Twitter, and Google provide users agreements upon joining their services. These agreements underline how the information provided by the user will be utilize by the company and it allows the user to understand how to protect their personal identifiable information while utilizing these social network sites. These companies pride themselves in protecting users’ personal information. However, what happens when the company or an unethical company employee violates these agreements? Personal identifiable information is then released...

Words: 1027 - Pages: 5

Free Essay

Hr Policies and Hr Prospectives

...proposals include the following: Acts      Limitation Act 1980 Data Protection Act 1998 Freedom of Information Act 2000 The Regulation of Investigatory Powers Act 2000 Anti-Terrorism, Crime and Security Act 2001 Statutory instruments    Privacy and Electronic Communications (EC Directive) Regulations 2003 (SI 2003/2426) The Regulation of Investigatory Powers (Acquisition and Disclosure of Communications Data: Code of Practice) Order 2007 (SI 2007/2197) The Data Retention (EC Directive) Regulations 2009 (SI 2009/859) Directives   Data Protection Directive 95/46/EC Privacy and electronic communications Directive 2002/58/EC Further special provisions may arise affecting the retention of or access to data, for example:    In the context of the criminal law, the Anti Terrorism, Crime and Security Act 2001 Part 11 provides a lengthy code of practice for voluntary retention of communications data. To provide security services with a reliable log of mobile and fixed phone calls, telecommunication companies must keep telephone call logs for one year. Internet service providers must retain communications data (including internet access, email and telephone calls - mobile and landline) for one year. In the field of immigration, the UK Borders Act 2007 and the Immigration, Asylum and Nationality Act 2006 may enable access to HR records in certain circumstances. Access to HR records The Data Protection Act (DPA) applies to most HR records, whether...

Words: 1158 - Pages: 5

Premium Essay

Manage Market Research

...Develop market research plan Assessment objective: Establish guidelines for researching and gathering information and work with the staff to gather and evaluate the data. Written organizational guidelines for conducting research OHS: Compliance with legislation. Ensure safety of customers, contractors and staff at all the times. The enjoyment of these standards at the highest levels is a basic human right that should be accessible by each and every worker. Regardless of the nature of their work, workers should be able to carry out their responsibilities in a safe and secure working environment, free from hazards. These rights are set out in legislation to ensure that employers are clear about the obligations and the consequences for neglecting them. Data privacy: the relationship between collection and dissemination of data, technology, the public expectation of privacy, and the legal and political issues surrounding them. To keep safe all recorded interviews, audio tapes, video recordings and group interviews. Privacy concerns exist wherever personally identifiable information or other sensitive information is collected, stored, used, and finally destroyed or deleted – in digital form or otherwise. Improper or non-existent disclosure control can be the root cause for privacy issues. Data privacy issues can arise in response to information from a wide range of sources, Staff involvement: The direct participation of staff to help an organization fulfill its...

Words: 716 - Pages: 3

Premium Essay

Privacy

...Running Head: THE EXISTENCE OF PRIVACY WITH TECHNOLOGY THE EXISTENCE OF PRIVACY WITH TECHNOLOGY Obediah Howard Bellevue University   THE EXISTENCE OF PRIVACY WITH TECHNOLOGY Abstract This research paper will discuss the relationship between privacy and technology. It will attempt to ascertain if technology and privacy can share the same plane of existence. Benefits and deficiencies of a particular technology are not hereditary to that technology, but are depend on their application. The public insists on accountability of technological innovation and assurance that privacy will remain intact. Striking a balance between enabling technology to enrich lives and restricting it from invading privacy has to be addressed. Implementing controls to protect private data is imperative. Technological advances over the years have challenged the public’s perception and expectation of privacy. Technology and one of its preeminent by-products, convenience, will continue to grow exponentially for the foreseeable future; there is no evidence to suggest otherwise. Privacy finds itself in a precarious position in the face of evolving technology. The collective concept of privacy has to be revisited. With the advent of technological innovations and the accessibilities they bring, privacy in its purest form does not exist. From an anthropological perspective, privacy is a relatively modern development. Ancient cultures practiced communal...

Words: 1783 - Pages: 8

Premium Essay

Conducting a Business

...When conducting any form of business in general, privacy is always a factor. Most people conduct business with the impression that their information is going over a secure network as well as being protected by the overall privacy guidelines used by many businesses. However, many companies uses data mining as a means of directly accommodating potential customers by observing their purchase history and interests. The issue at hand is merely determining how to minimize data mining as it is seen as a violation of privacy to some people. In the article by Minda Zetlin “The Latest Privacy Invasion: Retailer Tracking” the advantages, disadvantages, uses, and tips for minimizing data mining are discussed. Data mining is a statistical process that retailers use to understand their customer’s needs. Any time a customer uses a credit card that customer’s purchase and demographic data can be collected and used for retailer product placement or coupon mailings. Legal questions and concerns, like privacy and consumer rights, about data mining are debated on a regular basis. According to Jacob D. Furst, director of DePaul Information Assurance Center in an article from Zetlin (2012), “Every quarter we have a discussion about privacy with my students, and there’s always a debate” (para. 9). A concern about retailers collecting personal data includes purchasing information that could be used to determine insurance rates for a consumer who eats a large amount of fast food. Currently, consumers...

Words: 511 - Pages: 3

Premium Essay

Persuasive Essay: The Right To Privacy?

...support of mass surveillance, the ‘if you have nothing to hide, then you have nothing to fear’ argument is used commonly against privacy advocates. However, there are those that have discredited this claim and argue against it. In this essay, arguments will be made to explain why I disagree with the statement ‘if you have nothing to hide, then you have nothing to fear from surveillance’. This will be done by exploring the right to privacy, the problem with not knowing...

Words: 1130 - Pages: 5

Premium Essay

The Internet: an Unrestrained Accomplice in Unlawful Search and Seizure

...and that you “browse entertainment news and like to take quizzes” (Angwin, 2010). Would you feel your privacy had been sbreached because someone must have spied on you without your knowledge? That is what happened to Ashley Hayes-Beaty. “Miss Hayes-Beaty is being monitored by Lotame Solutions Inc., a New York company that uses sophisticated software called ‘beacon’ to capture what people are typing on a website” (Angwin, 2010). According to PCWorld Magazine (Sullivan, 2012), personal web habits are being tracked by companies such as Lotame Inc. and Facebook, advertisers, and corporations that “stalk” consumers on the web, and then sold to marketers and the government without web users being informed or aware of it. People like Ashley are suing data brokers that “sold consumer profiles to other companies without taking steps required under the U.S. Fair Credit Reporting Act to protect consumers” (Gross, 2012). Digital consumer monitoring is a breach of privacy that needs to be addressed. Personal data is being collected and sold without consumer consent, and the current regulatory environment is weak. As this issue becomes more prominent, a variety of solutions have been proposed, such as personal data “lockers,” Shine the Light Law, and transparency within companies. These solutions will make it more difficult for unknown parties to track unknowing consumers. Personal data is being collected online by a variety of agencies without consumer consent. In fact, the government...

Words: 4209 - Pages: 17

Free Essay

Casro

...CASRO Code of Standards and Ethics DBA student Natasha Johnson There are four main responsibilities in the CASRO Code if Standards and Ethics: Responsibilities to Respondents, Responsibilities to Clients, Responsibilities in Reporting to Clients and the Public, and Responsibilities to Outside Contractors and Interviewers. The CASRO Code of Standards and Ethics This Code of Standards and Ethics for Survey Research sets forth the agreed-upon rules of ethical conduct for survey research organizations. Acceptance of this Code is mandatory for all CASRO members. The Code has been organized into sections describing the responsibilities of a survey research organization to Respondents, Clients and Outside Contractors and in reporting study results. This Code is not intended to be, nor should it be, an immutable document. Circumstances may arise that are not covered by this Code or that may call for modification of some aspect of this Code. The Standards Committee and the Board of Directors of CASRO will evaluate these circumstances as they arise and, if appropriate, revise the Code. The Code, therefore, is a living document that seeks to be responsive to the changing world of survey research. To continue to be contemporary, CASRO advocates ongoing, two-way communication with Members, Respondents, Clients, Outside Contractors, Consultants and Interviewers. I. Responsibilities to Respondents Preamble Researchers have professional and legal responsibilities...

Words: 6613 - Pages: 27

Premium Essay

Hie Course Project

...send and receive secure information electronically between care providers to support coordinated care Query-based Exchange – ability for providers to find and/or request information on a patient from other providers, often used for unplanned care Consumer Mediated Exchange – ability for patients to aggregate and control the use of their health information among providers c. Privacy and security concerns The U.S. Department of Health and Human Services' HIPAA requires HIEs to have privacy and security policies and procedures in place to safeguard health information when it is exchange. Privacy and security considerations include the following: * data-sharing agreements among the providers and between the providers and the HIE are all in place. * trust agreements with all HIE participants. These agreements define who can access and change data. All HIE participants must agree to follow the privacy and security policies that govern data protection and use. There are also federal and state laws regarding who can access data. Audits should be continuously performed to monitor data access. * permission controls and...

Words: 603 - Pages: 3

Premium Essay

Privacy

...Privacy ‘The Limits of Privacy’ and ‘The Case for privacy’ are written by Amitai Etzioni and David D. Friedman respectively. Both of them have opposite views about privacy, which Etzioni states that less privacy is good for us and Friedman claims that more privacy makes the world a better place. In this paper, I will argue that Etzioni’s argument fails because privacy is really important for us to protect ourselves. I am going to explain in detail based on three different points in the next three paragraphs. First, in ‘The Limits of Privacy’, Etzioni argues that privacy is not important as many other goods. Based on his argument, he claims that “there are numerous values that trump or take precedence over privacy” (p.254) such as safety. However, I totally disagree his standpoint. Although safety also considers as a part of importance, it does not mean that safety can take priority over privacy consideration. Privacy does have significance effect for us to protect ourselves. Some people may think that it is worth to sacrifice their individual privacy in order to get freedom for safety. Once you give up your own privacy and allow anyone like governments to access to your information freely, your information is disclosed and you cannot get them back anymore. For example, after 9/11 attack in the United States, a lot of new measures about surveillance are introduced. The government can have authorities to wiretap, record or trace orders for email made by all Americans. These...

Words: 1250 - Pages: 5

Free Essay

Af 302 Essay on Web 2.0 Technologies

...publishing skills to participate, making it easy for people to create and publish or communicate their work to the world. The nature of this technology makes it easy and popular way to communicate information to a much wider audience. There are number of different types of web 2.0 applications including wikis, blogs, social networking, folksonomies, podcasting & content hosting service, YouTube, Facebook, MySpace, and Flickr (Thomson, 2008). However, despite it greater advantageous to our world today, there are some threats involved on the other hand. In this essay, I will discuss some number of privacy and ethical issues associated with the use of this type of technologies. As well some threats such technologies pose for small Pacific Island communities. Lastly, I will discuss the reasons why a privacy bill should or should not be adopted in the Pacific. Ethical and privacy issues related with the use of web 2.0 technologies? Copyright is one of a major issue related with the use of web 2.0 technologies. This ethical issue is referring to copy of others information illegally, by means without the permission of the copyright holder. Using of web 2.0 technologies like Facebook, you tube and other applications nowadays are rapidly growth all over the world. So, this great revolution supports us in every aspects of life. For example, businesses use it to enhance business activities such as advertisement of their products and other related activities. In somehow, these great...

Words: 774 - Pages: 4