SlideShare a Scribd company logo
1 of 27
Download to read offline
1
Social and Ethical
Consideration
of IT Use
Abdisalam Issa-Salwe
Thames Valley University
Abdisalam Issa-Salwe, Thames Valley University
2
Topic list
 Ethics and IT use
 Social, political issues raised by
information systems
 Data protection
 Moral dimensions of information
society
Abdisalam Issa-Salwe, Thames Valley University
3
IT Dilemma
 Computing technology is the most
powerful and flexible technology
ever devised.
 It is changing everything - where
and how we work, learn, shop, eat,
vote, receive medical care, spend
free time, make war and friends.
Abdisalam Issa-Salwe, Thames Valley University
4
IT Dilemma (cont…)
 The information revolution has
become a tidal wave that threatens
to engulf and change all that
humans value.
 Governments, organisations and
individual citizens therefore would
make a grave mistake if they view the
computer revolution as "merely
technological".
 It is fundamentally social and ethical.
Abdisalam Issa-Salwe, Thames Valley University
5
IT Dilemma (cont…)
 IT revolution widens to satisfy human
thirst for knowledge and the desire to be
the dominant species on the globe and in
the universe.
 The newly-found powers of computing
come at a price - dependence.
 Information is now the life blood of
society and its organisations, and our
dependence grows daily with the advance
of the global information net and
multimedia
Abdisalam Issa-Salwe, Thames Valley University
6
IT dilemma (cont…)
 Utilising new technology, needs
implementing better security.
 Digital technology as a double-edge
sword that has many benefits but also
presents ethical dilemmas.
 Information can be gathered,
manipulated and disseminated more
quickly now than ever in our history.
Abdisalam Issa-Salwe, Thames Valley University
7
Data protection principles
 Personal data is information about a
living individual, including
expression of opinion about him or
her.
 Data about organisation is not
personal data
 Data users are organisation or
individuals who control personal
data and the use of personal data
 A data subject is an individual who
is the subject of personal data
Abdisalam Issa-Salwe, Thames Valley University
8
Ethics
 Principles of right and wrong
 Can be used by individuals acting as
free moral agents to make choices
to guide their behaviour
 Understanding the moral risks of
new technology
 Establishing corporate ethics
policies that include information
systems issues
Abdisalam Issa-Salwe, Thames Valley University
9
Ethics (cont…)
 The dynamics connecting ethical,
social, and political issues
 Identifies the moral dimensions of
the “information society”, across
individual, social, and political levels
of action
 Information:
 the new life-blood of society, empowers
those who have it;
 but it also disenfranchises those who
do not
Abdisalam Issa-Salwe, Thames Valley University
10
Moral Dimensions
 Information rights and obligations
 Property rights
 Accountability and control
 System quality
 Quality of life
Abdisalam Issa-Salwe, Thames Valley University
11
ETHICAL, SOCIAL & POLITICAL ISSUES
INDIVIDUAL
SOCIETY
POLITY
ETHICAL ISSUES
SOCIAL ISSUES
POLITICAL ISSUES
QUALITY OF LIFE
INFORMATION
RIGHTS &
OBLIGATIONS
PROPERTY
RIGHTS &
OBLIGATIONS
ACCOUNTABILITY
& CONTROL
SYSTEM
QUALITY
INFORMATION
&
TECHNOLOGY
Abdisalam Issa-Salwe, Thames Valley University
12
Basic concepts
 Responsibility: accepting costs,
duties, obligations for decisions
 Accountability: assessing
responsibilities for decisions &
actions
 Liability: must pay for legal
damages
 Due process: insures laws are
applied properly
Abdisalam Issa-Salwe, Thames Valley University
13
Edward F. Gehringer
Abdisalam Issa-Salwe, Thames Valley University
14
Privacy and data protection
 Privacy:
 The right of the individual to control
the use of information about him or
her, including information on financial
status, health and lifestyle (I.e. prevent
unauthorised disclosure).
Abdisalam Issa-Salwe, Thames Valley University
15
Information rights
 The right of the individual to control
the use of information about him or
her, including information on
financial status, health and lifestyle
(i.e. prevent unauthorised
disclosure).
 Fair information practices: Set of
principles governing the collection
and use of information on the basis
of U.S. and European privacy laws
Abdisalam Issa-Salwe, Thames Valley University
16
Privacy protection tools
Abdisalam Issa-Salwe, Thames Valley University
17
Property rights
 Intellectual property: Intangible creations
protected by law
 Trade secret: Intellectual work or product
belonging to business, not in public
domain
 Copyright: Statutory grant protecting
intellectual property from getting copied
for 28 years
 Patents: Legal document granting the
owner an exclusive monopoly on the
ideas behind an invention for 20 years
Abdisalam Issa-Salwe, Thames Valley University
18
Property rights (cont…)
 Ethical issues: Production of
intellectual property
 Social issues: Current intellectual
property laws breaking down
 Political issues: Creation of new
property protection measures
Abdisalam Issa-Salwe, Thames Valley University
19
Property rights (cont…)
 Computer crime: Commission of
illegal acts through the use of a
computer or against a computer
system
 Computer abuse: Commission of
acts involving a computer that may
not be illegal but are considered
unethical
Abdisalam Issa-Salwe, Thames Valley University
20
Data Protection Act 1998
 The Data Protection Act 1998
regulates how and when
information relating to individuals
may be obtained, used and
disclosed.
 Makes new provision for the
regulation of the processing of
information relating to individuals,
including the obtaining, holding, use
or disclosure of such information.
Abdisalam Issa-Salwe, Thames Valley University
21
Data Protection Act 1998 (cont…)
In this Act, unless the context otherwise requires
- "data" means information which
(a) is being processed by means of equipment
operating automatically in response to
instructions given for that purpose,
(b) is recorded with the intention that it should
be processed by means of such equipment,
(c) is recorded as part of a relevant filing
system or with the intention that it should form
part of a relevant filing system, or
(d) does not fall within paragraph (a), (b) or
(c) but forms part of an accessible record as
defined by section 68
Abdisalam Issa-Salwe, Thames Valley University
22
Data Protection Act 1998 (cont…)
 The Act also allows individuals
access to personal data relating to
them, to challenge misuse of it and
to seek redress.
 Enforcement of the Act is through
the Information Commissioner
Abdisalam Issa-Salwe, Thames Valley University
23
Data Protection Act 1998 (cont…)
 The Act places a duty on any person
or organisation that holds personal
information about living individuals
on computer or in certain manual
data systems (or has such
information processed on computer
by others)
 Comply with the eight data
protection principles and to notify
the Commissioner about the
processing carried out.
Abdisalam Issa-Salwe, Thames Valley University
24
Data Protection Act 1998 (cont…)
The Act principles require personal data to be:
 fairly and lawfully obtained;
 held only for specific and lawful purposes and not
processed in any manner incompatible with those
purposes;
 adequate, relevant and not excessive for those
purposes;
 accurate and where necessary kept up-to-date,
not kept for longer than necessary;
 processed in accordance with the rights of the
person to whom the data refers;
 kept securely to ensure data is not lost, disposed
of or misused;
 not transferred out of the European Economic
Area unless the destination has an adequate level
of data protection.
Abdisalam Issa-Salwe, Thames Valley University
25
Data Protection Act 1998 (cont…)
 Data controller means, subject to subsection (4), a
person who (either alone or jointly or in common with
other persons) determines the purposes for which and
the manner in which any personal data are, or are to
be, processed;
 Data processor, in relation to personal data, means any
person (other than an employee of the data controller)
who processes the data on behalf of the data controller;
 Data subject means an individual who is the subject of
personal data;
 Personal data means data which relate to a living
individual who can be identified –
(a) from those data, or
(b) from those data and other information which is in the
possession of, or is likely to come into the possession of,
the data controller
Abdisalam Issa-Salwe, Thames Valley University
26
Data Protection Act 1998 (cont…)
 Sensitive personal data: "sensitive personal
data" means personal data consisting of
information as to
(a) the racial or ethnic origin of the data subject,
(b) his political opinions,
(c) his religious beliefs or other beliefs of a similar nature,
(d) whether he is a member of a trade union
(e) his physical or mental health or condition,
(f) his sexual life,
(g) the commission or alleged commission by him of any
offence, or
(h) any proceedings for any offence committed or alleged to
have been committed by him, the disposal of such
proceedings or the sentence of any court in such proceedings.
Abdisalam Issa-Salwe, Thames Valley University
27
Task
Find out from the Internet
how organisations are
committed to protecting
privacy information.
Discuss

More Related Content

What's hot

Overview of privacy and data protection considerations for DEVELOP
Overview of privacy and data protection considerations for DEVELOPOverview of privacy and data protection considerations for DEVELOP
Overview of privacy and data protection considerations for DEVELOPTrilateral Research
 
Privacy & Data Protection
Privacy & Data ProtectionPrivacy & Data Protection
Privacy & Data Protectionsp_krishna
 
Information Privacy
Information PrivacyInformation Privacy
Information Privacyimehreenx
 
Data Protection Act
Data Protection ActData Protection Act
Data Protection Actmrmwood
 
Data privacy Legislation in India
Data privacy Legislation in IndiaData privacy Legislation in India
Data privacy Legislation in IndiaLATHA H C
 
Privacy and personal information
Privacy and personal informationPrivacy and personal information
Privacy and personal informationUc Man
 
Presentation on Information Privacy
Presentation on Information PrivacyPresentation on Information Privacy
Presentation on Information PrivacyPerry Slack
 
Data Protection and Privacy
Data Protection and PrivacyData Protection and Privacy
Data Protection and PrivacyVertex Holdings
 
Data protection act
Data protection act Data protection act
Data protection act Iqbal Bocus
 
Privacy and Data Protection Act 2014 (VIC)
Privacy and Data Protection Act 2014 (VIC)Privacy and Data Protection Act 2014 (VIC)
Privacy and Data Protection Act 2014 (VIC)Russell_Kennedy
 
The Data Protection Act What You Need To Know
The Data Protection Act   What You Need To KnowThe Data Protection Act   What You Need To Know
The Data Protection Act What You Need To KnowEamonnORagh
 
The Data Protection Act
The Data Protection ActThe Data Protection Act
The Data Protection Actburto111
 
Information governance
Information governanceInformation governance
Information governanceGerardo Medina
 
The Data Protection Act
The Data Protection ActThe Data Protection Act
The Data Protection ActSaimaRafiq
 
E governance dushanbe 2012 katrin-nymanmetkalf
E governance dushanbe 2012 katrin-nymanmetkalfE governance dushanbe 2012 katrin-nymanmetkalf
E governance dushanbe 2012 katrin-nymanmetkalfE-Journal ICT4D
 

What's hot (20)

Overview of privacy and data protection considerations for DEVELOP
Overview of privacy and data protection considerations for DEVELOPOverview of privacy and data protection considerations for DEVELOP
Overview of privacy and data protection considerations for DEVELOP
 
Privacy & Data Protection
Privacy & Data ProtectionPrivacy & Data Protection
Privacy & Data Protection
 
Information Privacy
Information PrivacyInformation Privacy
Information Privacy
 
Data Protection Act
Data Protection ActData Protection Act
Data Protection Act
 
Data privacy Legislation in India
Data privacy Legislation in IndiaData privacy Legislation in India
Data privacy Legislation in India
 
Data and software privacy
Data and software privacyData and software privacy
Data and software privacy
 
Chapter 4
Chapter 4Chapter 4
Chapter 4
 
Privacy and personal information
Privacy and personal informationPrivacy and personal information
Privacy and personal information
 
Presentation on Information Privacy
Presentation on Information PrivacyPresentation on Information Privacy
Presentation on Information Privacy
 
Data Protection and Privacy
Data Protection and PrivacyData Protection and Privacy
Data Protection and Privacy
 
Data protection act
Data protection act Data protection act
Data protection act
 
Privacy and Data Protection Act 2014 (VIC)
Privacy and Data Protection Act 2014 (VIC)Privacy and Data Protection Act 2014 (VIC)
Privacy and Data Protection Act 2014 (VIC)
 
Privacy & Data Protection in the Digital World
Privacy & Data Protection in the Digital WorldPrivacy & Data Protection in the Digital World
Privacy & Data Protection in the Digital World
 
The Data Protection Act What You Need To Know
The Data Protection Act   What You Need To KnowThe Data Protection Act   What You Need To Know
The Data Protection Act What You Need To Know
 
Information Privacy
Information PrivacyInformation Privacy
Information Privacy
 
The Data Protection Act
The Data Protection ActThe Data Protection Act
The Data Protection Act
 
Information governance
Information governanceInformation governance
Information governance
 
The Data Protection Act
The Data Protection ActThe Data Protection Act
The Data Protection Act
 
E governance dushanbe 2012 katrin-nymanmetkalf
E governance dushanbe 2012 katrin-nymanmetkalfE governance dushanbe 2012 katrin-nymanmetkalf
E governance dushanbe 2012 katrin-nymanmetkalf
 
Privacy and Data Protection
Privacy and Data ProtectionPrivacy and Data Protection
Privacy and Data Protection
 

Similar to Here are a few key points regarding how organizations are committed to protecting privacy information:- Many organizations have detailed privacy policies posted on their websites that outline how customer data is collected, stored, used and shared. These policies are intended to be transparent about data practices.- Important privacy principles that organizations often commit to include only collecting necessary personal information, securing data appropriately, being transparent about data uses, and giving customers access and control over their own information. - Financial and healthcare organizations tend to have especially rigorous privacy programs due to regulations around sensitive customer data. They may undergo annual audits, training for employees, and have chief privacy officers overseeing compliance.- Large technology companies have also faced public pressure to strengthen privacy protections

Legal, Ethical, and Professional Issues In Information Security
Legal, Ethical, and Professional Issues In Information SecurityLegal, Ethical, and Professional Issues In Information Security
Legal, Ethical, and Professional Issues In Information SecurityCarl Ceder
 
02 Legal, Ethical, and Professional Issues in Information Security
02 Legal, Ethical, and Professional Issues in Information Security02 Legal, Ethical, and Professional Issues in Information Security
02 Legal, Ethical, and Professional Issues in Information Securitysappingtonkr
 
Right to privacy on internet and Data Protection
Right to privacy on internet and Data ProtectionRight to privacy on internet and Data Protection
Right to privacy on internet and Data Protectionatuljaybhaye
 
1ITC358ICT Management and Information SecurityChapter 12.docx
1ITC358ICT Management and Information SecurityChapter 12.docx1ITC358ICT Management and Information SecurityChapter 12.docx
1ITC358ICT Management and Information SecurityChapter 12.docxhyacinthshackley2629
 
Biometric Personal Data, Legal and Technological Utilization Issues
Biometric Personal Data, Legal and Technological Utilization IssuesBiometric Personal Data, Legal and Technological Utilization Issues
Biometric Personal Data, Legal and Technological Utilization IssuesGiannisBasa
 
Lesson4-Privacy and Data Protection.pptx
Lesson4-Privacy and Data Protection.pptxLesson4-Privacy and Data Protection.pptx
Lesson4-Privacy and Data Protection.pptxadnis1
 
Ronit Mathur Cyber Security assesment.pptx
Ronit Mathur Cyber Security assesment.pptxRonit Mathur Cyber Security assesment.pptx
Ronit Mathur Cyber Security assesment.pptxManuGupta344215
 
PRIVACY RIGHTS ARE HUMAN RIGHTS (2).pdf
PRIVACY RIGHTS ARE HUMAN RIGHTS (2).pdfPRIVACY RIGHTS ARE HUMAN RIGHTS (2).pdf
PRIVACY RIGHTS ARE HUMAN RIGHTS (2).pdflinda gichohi
 
Legal, Ethical and professional issues in Information Security
Legal, Ethical and professional issues in Information SecurityLegal, Ethical and professional issues in Information Security
Legal, Ethical and professional issues in Information SecurityGamentortc
 
PLA Legal aspects of Big Data analytics final
PLA Legal aspects of Big Data analytics finalPLA Legal aspects of Big Data analytics final
PLA Legal aspects of Big Data analytics finalSofie van der Meulen
 
Paperless Lab Academy 'legal aspects of big data analytics'
Paperless Lab Academy 'legal aspects of big data analytics' Paperless Lab Academy 'legal aspects of big data analytics'
Paperless Lab Academy 'legal aspects of big data analytics' Axon Lawyers
 
Ethics in IT Security
Ethics in IT SecurityEthics in IT Security
Ethics in IT Securitymtvvvv
 
Revision Data Protection Act ( Eduardo And Salvador)
Revision    Data  Protection  Act ( Eduardo And  Salvador)Revision    Data  Protection  Act ( Eduardo And  Salvador)
Revision Data Protection Act ( Eduardo And Salvador)itgsabc
 
Freedom of Information and Data Protection
Freedom of Information and Data ProtectionFreedom of Information and Data Protection
Freedom of Information and Data ProtectionEquiGov Institute
 
Ubicomp challenges for privacy law
Ubicomp challenges for privacy lawUbicomp challenges for privacy law
Ubicomp challenges for privacy lawblogzilla
 
Running head THE FUTURE OF ORGANIC FOOD.Surname 7NameIns.docx
Running head THE FUTURE OF ORGANIC FOOD.Surname 7NameIns.docxRunning head THE FUTURE OF ORGANIC FOOD.Surname 7NameIns.docx
Running head THE FUTURE OF ORGANIC FOOD.Surname 7NameIns.docxtoltonkendal
 

Similar to Here are a few key points regarding how organizations are committed to protecting privacy information:- Many organizations have detailed privacy policies posted on their websites that outline how customer data is collected, stored, used and shared. These policies are intended to be transparent about data practices.- Important privacy principles that organizations often commit to include only collecting necessary personal information, securing data appropriately, being transparent about data uses, and giving customers access and control over their own information. - Financial and healthcare organizations tend to have especially rigorous privacy programs due to regulations around sensitive customer data. They may undergo annual audits, training for employees, and have chief privacy officers overseeing compliance.- Large technology companies have also faced public pressure to strengthen privacy protections (20)

Legal, Ethical, and Professional Issues In Information Security
Legal, Ethical, and Professional Issues In Information SecurityLegal, Ethical, and Professional Issues In Information Security
Legal, Ethical, and Professional Issues In Information Security
 
02 Legal, Ethical, and Professional Issues in Information Security
02 Legal, Ethical, and Professional Issues in Information Security02 Legal, Ethical, and Professional Issues in Information Security
02 Legal, Ethical, and Professional Issues in Information Security
 
Right to privacy on internet and Data Protection
Right to privacy on internet and Data ProtectionRight to privacy on internet and Data Protection
Right to privacy on internet and Data Protection
 
Cie 2 cyber law
Cie 2  cyber lawCie 2  cyber law
Cie 2 cyber law
 
whitman_ch04.ppt
whitman_ch04.pptwhitman_ch04.ppt
whitman_ch04.ppt
 
1ITC358ICT Management and Information SecurityChapter 12.docx
1ITC358ICT Management and Information SecurityChapter 12.docx1ITC358ICT Management and Information SecurityChapter 12.docx
1ITC358ICT Management and Information SecurityChapter 12.docx
 
Biometric Personal Data, Legal and Technological Utilization Issues
Biometric Personal Data, Legal and Technological Utilization IssuesBiometric Personal Data, Legal and Technological Utilization Issues
Biometric Personal Data, Legal and Technological Utilization Issues
 
Lesson4-Privacy and Data Protection.pptx
Lesson4-Privacy and Data Protection.pptxLesson4-Privacy and Data Protection.pptx
Lesson4-Privacy and Data Protection.pptx
 
Ronit Mathur Cyber Security assesment.pptx
Ronit Mathur Cyber Security assesment.pptxRonit Mathur Cyber Security assesment.pptx
Ronit Mathur Cyber Security assesment.pptx
 
PRIVACY RIGHTS ARE HUMAN RIGHTS (2).pdf
PRIVACY RIGHTS ARE HUMAN RIGHTS (2).pdfPRIVACY RIGHTS ARE HUMAN RIGHTS (2).pdf
PRIVACY RIGHTS ARE HUMAN RIGHTS (2).pdf
 
Legal, Ethical and professional issues in Information Security
Legal, Ethical and professional issues in Information SecurityLegal, Ethical and professional issues in Information Security
Legal, Ethical and professional issues in Information Security
 
PLA Legal aspects of Big Data analytics final
PLA Legal aspects of Big Data analytics finalPLA Legal aspects of Big Data analytics final
PLA Legal aspects of Big Data analytics final
 
Paperless Lab Academy 'legal aspects of big data analytics'
Paperless Lab Academy 'legal aspects of big data analytics' Paperless Lab Academy 'legal aspects of big data analytics'
Paperless Lab Academy 'legal aspects of big data analytics'
 
4482LawEthics.ppt
4482LawEthics.ppt4482LawEthics.ppt
4482LawEthics.ppt
 
Ethics in IT Security
Ethics in IT SecurityEthics in IT Security
Ethics in IT Security
 
Revision Data Protection Act ( Eduardo And Salvador)
Revision    Data  Protection  Act ( Eduardo And  Salvador)Revision    Data  Protection  Act ( Eduardo And  Salvador)
Revision Data Protection Act ( Eduardo And Salvador)
 
Freedom of Information and Data Protection
Freedom of Information and Data ProtectionFreedom of Information and Data Protection
Freedom of Information and Data Protection
 
Ubicomp challenges for privacy law
Ubicomp challenges for privacy lawUbicomp challenges for privacy law
Ubicomp challenges for privacy law
 
VIAF GDPR
VIAF GDPRVIAF GDPR
VIAF GDPR
 
Running head THE FUTURE OF ORGANIC FOOD.Surname 7NameIns.docx
Running head THE FUTURE OF ORGANIC FOOD.Surname 7NameIns.docxRunning head THE FUTURE OF ORGANIC FOOD.Surname 7NameIns.docx
Running head THE FUTURE OF ORGANIC FOOD.Surname 7NameIns.docx
 

More from Taibah University, College of Computer Science & Engineering

More from Taibah University, College of Computer Science & Engineering (20)

Lecture 1- Computer Organization and Architecture.pdf
Lecture 1- Computer Organization and Architecture.pdfLecture 1- Computer Organization and Architecture.pdf
Lecture 1- Computer Organization and Architecture.pdf
 
The paper the welfare state of the somali nation - a possible solution to t...
The paper   the welfare state of the somali nation - a possible solution to t...The paper   the welfare state of the somali nation - a possible solution to t...
The paper the welfare state of the somali nation - a possible solution to t...
 
Colonial intrusion and_the_somali_resistance
Colonial intrusion and_the_somali_resistanceColonial intrusion and_the_somali_resistance
Colonial intrusion and_the_somali_resistance
 
Lecture 3 (Contemporary approaches to Information Systems)
Lecture 3 (Contemporary approaches to Information Systems)Lecture 3 (Contemporary approaches to Information Systems)
Lecture 3 (Contemporary approaches to Information Systems)
 
Lecture 7 (business-level strategy and the value chain model)
Lecture 7  (business-level strategy and the value chain model)Lecture 7  (business-level strategy and the value chain model)
Lecture 7 (business-level strategy and the value chain model)
 
Lecture 4 (using information technology for competitive advantage)
Lecture 4 (using information technology for competitive advantage)Lecture 4 (using information technology for competitive advantage)
Lecture 4 (using information technology for competitive advantage)
 
Lecture 2 (major types of information systems in organizations)
Lecture 2 (major types of information systems in organizations)Lecture 2 (major types of information systems in organizations)
Lecture 2 (major types of information systems in organizations)
 
Practical session 1 (critical path analaysis)
Practical session 1 (critical path analaysis)Practical session 1 (critical path analaysis)
Practical session 1 (critical path analaysis)
 
Chapter 2 modeling the process and life-cycle
Chapter 2  modeling the process and life-cycleChapter 2  modeling the process and life-cycle
Chapter 2 modeling the process and life-cycle
 
Historical Perspective on the Challenge Facing the Somali Sacral Unity
Historical Perspective on the Challenge Facing the Somali Sacral UnityHistorical Perspective on the Challenge Facing the Somali Sacral Unity
Historical Perspective on the Challenge Facing the Somali Sacral Unity
 
Colonial intrusion and the Somali Resistance
Colonial intrusion and the Somali ResistanceColonial intrusion and the Somali Resistance
Colonial intrusion and the Somali Resistance
 
Lecture 8 (information systems and strategy planning)
Lecture 8  (information systems and strategy planning)Lecture 8  (information systems and strategy planning)
Lecture 8 (information systems and strategy planning)
 
Lecture 4 (using information technology for competitive advantage)
Lecture 4 (using information technology for competitive advantage)Lecture 4 (using information technology for competitive advantage)
Lecture 4 (using information technology for competitive advantage)
 
Lecture1 data structure(introduction)
Lecture1 data structure(introduction)Lecture1 data structure(introduction)
Lecture1 data structure(introduction)
 
Lecture2 is331 data&infomanag(databaseenv)
Lecture2 is331 data&infomanag(databaseenv)Lecture2 is331 data&infomanag(databaseenv)
Lecture2 is331 data&infomanag(databaseenv)
 
Lecture1 is322 data&infomanag(introduction)(old curr)
Lecture1 is322 data&infomanag(introduction)(old curr)Lecture1 is322 data&infomanag(introduction)(old curr)
Lecture1 is322 data&infomanag(introduction)(old curr)
 
Lecture6 is353(ea&data viewpoint )
Lecture6 is353(ea&data viewpoint )Lecture6 is353(ea&data viewpoint )
Lecture6 is353(ea&data viewpoint )
 
Lecture4 is353-ea(fea)
Lecture4 is353-ea(fea)Lecture4 is353-ea(fea)
Lecture4 is353-ea(fea)
 
Lecture3 is353-ea(togaf)
Lecture3 is353-ea(togaf)Lecture3 is353-ea(togaf)
Lecture3 is353-ea(togaf)
 
Lecture2 is353-ea(the zachma framework)
Lecture2 is353-ea(the zachma framework)Lecture2 is353-ea(the zachma framework)
Lecture2 is353-ea(the zachma framework)
 

Recently uploaded

Call Girls In Connaught Place Delhi ❤️88604**77959_Russian 100% Genuine Escor...
Call Girls In Connaught Place Delhi ❤️88604**77959_Russian 100% Genuine Escor...Call Girls In Connaught Place Delhi ❤️88604**77959_Russian 100% Genuine Escor...
Call Girls In Connaught Place Delhi ❤️88604**77959_Russian 100% Genuine Escor...lizamodels9
 
Call Girls In Radisson Blu Hotel New Delhi Paschim Vihar ❤️8860477959 Escorts...
Call Girls In Radisson Blu Hotel New Delhi Paschim Vihar ❤️8860477959 Escorts...Call Girls In Radisson Blu Hotel New Delhi Paschim Vihar ❤️8860477959 Escorts...
Call Girls In Radisson Blu Hotel New Delhi Paschim Vihar ❤️8860477959 Escorts...lizamodels9
 
Youth Involvement in an Innovative Coconut Value Chain by Mwalimu Menza
Youth Involvement in an Innovative Coconut Value Chain by Mwalimu MenzaYouth Involvement in an Innovative Coconut Value Chain by Mwalimu Menza
Youth Involvement in an Innovative Coconut Value Chain by Mwalimu Menzaictsugar
 
Contemporary Economic Issues Facing the Filipino Entrepreneur (1).pptx
Contemporary Economic Issues Facing the Filipino Entrepreneur (1).pptxContemporary Economic Issues Facing the Filipino Entrepreneur (1).pptx
Contemporary Economic Issues Facing the Filipino Entrepreneur (1).pptxMarkAnthonyAurellano
 
APRIL2024_UKRAINE_xml_0000000000000 .pdf
APRIL2024_UKRAINE_xml_0000000000000 .pdfAPRIL2024_UKRAINE_xml_0000000000000 .pdf
APRIL2024_UKRAINE_xml_0000000000000 .pdfRbc Rbcua
 
Case study on tata clothing brand zudio in detail
Case study on tata clothing brand zudio in detailCase study on tata clothing brand zudio in detail
Case study on tata clothing brand zudio in detailAriel592675
 
Keppel Ltd. 1Q 2024 Business Update Presentation Slides
Keppel Ltd. 1Q 2024 Business Update  Presentation SlidesKeppel Ltd. 1Q 2024 Business Update  Presentation Slides
Keppel Ltd. 1Q 2024 Business Update Presentation SlidesKeppelCorporation
 
8447779800, Low rate Call girls in Saket Delhi NCR
8447779800, Low rate Call girls in Saket Delhi NCR8447779800, Low rate Call girls in Saket Delhi NCR
8447779800, Low rate Call girls in Saket Delhi NCRashishs7044
 
NewBase 19 April 2024 Energy News issue - 1717 by Khaled Al Awadi.pdf
NewBase  19 April  2024  Energy News issue - 1717 by Khaled Al Awadi.pdfNewBase  19 April  2024  Energy News issue - 1717 by Khaled Al Awadi.pdf
NewBase 19 April 2024 Energy News issue - 1717 by Khaled Al Awadi.pdfKhaled Al Awadi
 
(Best) ENJOY Call Girls in Faridabad Ex | 8377087607
(Best) ENJOY Call Girls in Faridabad Ex | 8377087607(Best) ENJOY Call Girls in Faridabad Ex | 8377087607
(Best) ENJOY Call Girls in Faridabad Ex | 8377087607dollysharma2066
 
8447779800, Low rate Call girls in Tughlakabad Delhi NCR
8447779800, Low rate Call girls in Tughlakabad Delhi NCR8447779800, Low rate Call girls in Tughlakabad Delhi NCR
8447779800, Low rate Call girls in Tughlakabad Delhi NCRashishs7044
 
Intro to BCG's Carbon Emissions Benchmark_vF.pdf
Intro to BCG's Carbon Emissions Benchmark_vF.pdfIntro to BCG's Carbon Emissions Benchmark_vF.pdf
Intro to BCG's Carbon Emissions Benchmark_vF.pdfpollardmorgan
 
/:Call Girls In Indirapuram Ghaziabad ➥9990211544 Independent Best Escorts In...
/:Call Girls In Indirapuram Ghaziabad ➥9990211544 Independent Best Escorts In.../:Call Girls In Indirapuram Ghaziabad ➥9990211544 Independent Best Escorts In...
/:Call Girls In Indirapuram Ghaziabad ➥9990211544 Independent Best Escorts In...lizamodels9
 
8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR
8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR
8447779800, Low rate Call girls in New Ashok Nagar Delhi NCRashishs7044
 
Flow Your Strategy at Flight Levels Day 2024
Flow Your Strategy at Flight Levels Day 2024Flow Your Strategy at Flight Levels Day 2024
Flow Your Strategy at Flight Levels Day 2024Kirill Klimov
 
2024 Numerator Consumer Study of Cannabis Usage
2024 Numerator Consumer Study of Cannabis Usage2024 Numerator Consumer Study of Cannabis Usage
2024 Numerator Consumer Study of Cannabis UsageNeil Kimberley
 
8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR
8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR
8447779800, Low rate Call girls in Shivaji Enclave Delhi NCRashishs7044
 
Investment in The Coconut Industry by Nancy Cheruiyot
Investment in The Coconut Industry by Nancy CheruiyotInvestment in The Coconut Industry by Nancy Cheruiyot
Investment in The Coconut Industry by Nancy Cheruiyotictsugar
 

Recently uploaded (20)

Call Girls In Connaught Place Delhi ❤️88604**77959_Russian 100% Genuine Escor...
Call Girls In Connaught Place Delhi ❤️88604**77959_Russian 100% Genuine Escor...Call Girls In Connaught Place Delhi ❤️88604**77959_Russian 100% Genuine Escor...
Call Girls In Connaught Place Delhi ❤️88604**77959_Russian 100% Genuine Escor...
 
Corporate Profile 47Billion Information Technology
Corporate Profile 47Billion Information TechnologyCorporate Profile 47Billion Information Technology
Corporate Profile 47Billion Information Technology
 
Call Girls In Radisson Blu Hotel New Delhi Paschim Vihar ❤️8860477959 Escorts...
Call Girls In Radisson Blu Hotel New Delhi Paschim Vihar ❤️8860477959 Escorts...Call Girls In Radisson Blu Hotel New Delhi Paschim Vihar ❤️8860477959 Escorts...
Call Girls In Radisson Blu Hotel New Delhi Paschim Vihar ❤️8860477959 Escorts...
 
Youth Involvement in an Innovative Coconut Value Chain by Mwalimu Menza
Youth Involvement in an Innovative Coconut Value Chain by Mwalimu MenzaYouth Involvement in an Innovative Coconut Value Chain by Mwalimu Menza
Youth Involvement in an Innovative Coconut Value Chain by Mwalimu Menza
 
Contemporary Economic Issues Facing the Filipino Entrepreneur (1).pptx
Contemporary Economic Issues Facing the Filipino Entrepreneur (1).pptxContemporary Economic Issues Facing the Filipino Entrepreneur (1).pptx
Contemporary Economic Issues Facing the Filipino Entrepreneur (1).pptx
 
APRIL2024_UKRAINE_xml_0000000000000 .pdf
APRIL2024_UKRAINE_xml_0000000000000 .pdfAPRIL2024_UKRAINE_xml_0000000000000 .pdf
APRIL2024_UKRAINE_xml_0000000000000 .pdf
 
Case study on tata clothing brand zudio in detail
Case study on tata clothing brand zudio in detailCase study on tata clothing brand zudio in detail
Case study on tata clothing brand zudio in detail
 
Japan IT Week 2024 Brochure by 47Billion (English)
Japan IT Week 2024 Brochure by 47Billion (English)Japan IT Week 2024 Brochure by 47Billion (English)
Japan IT Week 2024 Brochure by 47Billion (English)
 
Keppel Ltd. 1Q 2024 Business Update Presentation Slides
Keppel Ltd. 1Q 2024 Business Update  Presentation SlidesKeppel Ltd. 1Q 2024 Business Update  Presentation Slides
Keppel Ltd. 1Q 2024 Business Update Presentation Slides
 
8447779800, Low rate Call girls in Saket Delhi NCR
8447779800, Low rate Call girls in Saket Delhi NCR8447779800, Low rate Call girls in Saket Delhi NCR
8447779800, Low rate Call girls in Saket Delhi NCR
 
NewBase 19 April 2024 Energy News issue - 1717 by Khaled Al Awadi.pdf
NewBase  19 April  2024  Energy News issue - 1717 by Khaled Al Awadi.pdfNewBase  19 April  2024  Energy News issue - 1717 by Khaled Al Awadi.pdf
NewBase 19 April 2024 Energy News issue - 1717 by Khaled Al Awadi.pdf
 
(Best) ENJOY Call Girls in Faridabad Ex | 8377087607
(Best) ENJOY Call Girls in Faridabad Ex | 8377087607(Best) ENJOY Call Girls in Faridabad Ex | 8377087607
(Best) ENJOY Call Girls in Faridabad Ex | 8377087607
 
8447779800, Low rate Call girls in Tughlakabad Delhi NCR
8447779800, Low rate Call girls in Tughlakabad Delhi NCR8447779800, Low rate Call girls in Tughlakabad Delhi NCR
8447779800, Low rate Call girls in Tughlakabad Delhi NCR
 
Intro to BCG's Carbon Emissions Benchmark_vF.pdf
Intro to BCG's Carbon Emissions Benchmark_vF.pdfIntro to BCG's Carbon Emissions Benchmark_vF.pdf
Intro to BCG's Carbon Emissions Benchmark_vF.pdf
 
/:Call Girls In Indirapuram Ghaziabad ➥9990211544 Independent Best Escorts In...
/:Call Girls In Indirapuram Ghaziabad ➥9990211544 Independent Best Escorts In.../:Call Girls In Indirapuram Ghaziabad ➥9990211544 Independent Best Escorts In...
/:Call Girls In Indirapuram Ghaziabad ➥9990211544 Independent Best Escorts In...
 
8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR
8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR
8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR
 
Flow Your Strategy at Flight Levels Day 2024
Flow Your Strategy at Flight Levels Day 2024Flow Your Strategy at Flight Levels Day 2024
Flow Your Strategy at Flight Levels Day 2024
 
2024 Numerator Consumer Study of Cannabis Usage
2024 Numerator Consumer Study of Cannabis Usage2024 Numerator Consumer Study of Cannabis Usage
2024 Numerator Consumer Study of Cannabis Usage
 
8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR
8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR
8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR
 
Investment in The Coconut Industry by Nancy Cheruiyot
Investment in The Coconut Industry by Nancy CheruiyotInvestment in The Coconut Industry by Nancy Cheruiyot
Investment in The Coconut Industry by Nancy Cheruiyot
 

Here are a few key points regarding how organizations are committed to protecting privacy information:- Many organizations have detailed privacy policies posted on their websites that outline how customer data is collected, stored, used and shared. These policies are intended to be transparent about data practices.- Important privacy principles that organizations often commit to include only collecting necessary personal information, securing data appropriately, being transparent about data uses, and giving customers access and control over their own information. - Financial and healthcare organizations tend to have especially rigorous privacy programs due to regulations around sensitive customer data. They may undergo annual audits, training for employees, and have chief privacy officers overseeing compliance.- Large technology companies have also faced public pressure to strengthen privacy protections

  • 1. 1 Social and Ethical Consideration of IT Use Abdisalam Issa-Salwe Thames Valley University
  • 2. Abdisalam Issa-Salwe, Thames Valley University 2 Topic list  Ethics and IT use  Social, political issues raised by information systems  Data protection  Moral dimensions of information society
  • 3. Abdisalam Issa-Salwe, Thames Valley University 3 IT Dilemma  Computing technology is the most powerful and flexible technology ever devised.  It is changing everything - where and how we work, learn, shop, eat, vote, receive medical care, spend free time, make war and friends.
  • 4. Abdisalam Issa-Salwe, Thames Valley University 4 IT Dilemma (cont…)  The information revolution has become a tidal wave that threatens to engulf and change all that humans value.  Governments, organisations and individual citizens therefore would make a grave mistake if they view the computer revolution as "merely technological".  It is fundamentally social and ethical.
  • 5. Abdisalam Issa-Salwe, Thames Valley University 5 IT Dilemma (cont…)  IT revolution widens to satisfy human thirst for knowledge and the desire to be the dominant species on the globe and in the universe.  The newly-found powers of computing come at a price - dependence.  Information is now the life blood of society and its organisations, and our dependence grows daily with the advance of the global information net and multimedia
  • 6. Abdisalam Issa-Salwe, Thames Valley University 6 IT dilemma (cont…)  Utilising new technology, needs implementing better security.  Digital technology as a double-edge sword that has many benefits but also presents ethical dilemmas.  Information can be gathered, manipulated and disseminated more quickly now than ever in our history.
  • 7. Abdisalam Issa-Salwe, Thames Valley University 7 Data protection principles  Personal data is information about a living individual, including expression of opinion about him or her.  Data about organisation is not personal data  Data users are organisation or individuals who control personal data and the use of personal data  A data subject is an individual who is the subject of personal data
  • 8. Abdisalam Issa-Salwe, Thames Valley University 8 Ethics  Principles of right and wrong  Can be used by individuals acting as free moral agents to make choices to guide their behaviour  Understanding the moral risks of new technology  Establishing corporate ethics policies that include information systems issues
  • 9. Abdisalam Issa-Salwe, Thames Valley University 9 Ethics (cont…)  The dynamics connecting ethical, social, and political issues  Identifies the moral dimensions of the “information society”, across individual, social, and political levels of action  Information:  the new life-blood of society, empowers those who have it;  but it also disenfranchises those who do not
  • 10. Abdisalam Issa-Salwe, Thames Valley University 10 Moral Dimensions  Information rights and obligations  Property rights  Accountability and control  System quality  Quality of life
  • 11. Abdisalam Issa-Salwe, Thames Valley University 11 ETHICAL, SOCIAL & POLITICAL ISSUES INDIVIDUAL SOCIETY POLITY ETHICAL ISSUES SOCIAL ISSUES POLITICAL ISSUES QUALITY OF LIFE INFORMATION RIGHTS & OBLIGATIONS PROPERTY RIGHTS & OBLIGATIONS ACCOUNTABILITY & CONTROL SYSTEM QUALITY INFORMATION & TECHNOLOGY
  • 12. Abdisalam Issa-Salwe, Thames Valley University 12 Basic concepts  Responsibility: accepting costs, duties, obligations for decisions  Accountability: assessing responsibilities for decisions & actions  Liability: must pay for legal damages  Due process: insures laws are applied properly
  • 13. Abdisalam Issa-Salwe, Thames Valley University 13 Edward F. Gehringer
  • 14. Abdisalam Issa-Salwe, Thames Valley University 14 Privacy and data protection  Privacy:  The right of the individual to control the use of information about him or her, including information on financial status, health and lifestyle (I.e. prevent unauthorised disclosure).
  • 15. Abdisalam Issa-Salwe, Thames Valley University 15 Information rights  The right of the individual to control the use of information about him or her, including information on financial status, health and lifestyle (i.e. prevent unauthorised disclosure).  Fair information practices: Set of principles governing the collection and use of information on the basis of U.S. and European privacy laws
  • 16. Abdisalam Issa-Salwe, Thames Valley University 16 Privacy protection tools
  • 17. Abdisalam Issa-Salwe, Thames Valley University 17 Property rights  Intellectual property: Intangible creations protected by law  Trade secret: Intellectual work or product belonging to business, not in public domain  Copyright: Statutory grant protecting intellectual property from getting copied for 28 years  Patents: Legal document granting the owner an exclusive monopoly on the ideas behind an invention for 20 years
  • 18. Abdisalam Issa-Salwe, Thames Valley University 18 Property rights (cont…)  Ethical issues: Production of intellectual property  Social issues: Current intellectual property laws breaking down  Political issues: Creation of new property protection measures
  • 19. Abdisalam Issa-Salwe, Thames Valley University 19 Property rights (cont…)  Computer crime: Commission of illegal acts through the use of a computer or against a computer system  Computer abuse: Commission of acts involving a computer that may not be illegal but are considered unethical
  • 20. Abdisalam Issa-Salwe, Thames Valley University 20 Data Protection Act 1998  The Data Protection Act 1998 regulates how and when information relating to individuals may be obtained, used and disclosed.  Makes new provision for the regulation of the processing of information relating to individuals, including the obtaining, holding, use or disclosure of such information.
  • 21. Abdisalam Issa-Salwe, Thames Valley University 21 Data Protection Act 1998 (cont…) In this Act, unless the context otherwise requires - "data" means information which (a) is being processed by means of equipment operating automatically in response to instructions given for that purpose, (b) is recorded with the intention that it should be processed by means of such equipment, (c) is recorded as part of a relevant filing system or with the intention that it should form part of a relevant filing system, or (d) does not fall within paragraph (a), (b) or (c) but forms part of an accessible record as defined by section 68
  • 22. Abdisalam Issa-Salwe, Thames Valley University 22 Data Protection Act 1998 (cont…)  The Act also allows individuals access to personal data relating to them, to challenge misuse of it and to seek redress.  Enforcement of the Act is through the Information Commissioner
  • 23. Abdisalam Issa-Salwe, Thames Valley University 23 Data Protection Act 1998 (cont…)  The Act places a duty on any person or organisation that holds personal information about living individuals on computer or in certain manual data systems (or has such information processed on computer by others)  Comply with the eight data protection principles and to notify the Commissioner about the processing carried out.
  • 24. Abdisalam Issa-Salwe, Thames Valley University 24 Data Protection Act 1998 (cont…) The Act principles require personal data to be:  fairly and lawfully obtained;  held only for specific and lawful purposes and not processed in any manner incompatible with those purposes;  adequate, relevant and not excessive for those purposes;  accurate and where necessary kept up-to-date, not kept for longer than necessary;  processed in accordance with the rights of the person to whom the data refers;  kept securely to ensure data is not lost, disposed of or misused;  not transferred out of the European Economic Area unless the destination has an adequate level of data protection.
  • 25. Abdisalam Issa-Salwe, Thames Valley University 25 Data Protection Act 1998 (cont…)  Data controller means, subject to subsection (4), a person who (either alone or jointly or in common with other persons) determines the purposes for which and the manner in which any personal data are, or are to be, processed;  Data processor, in relation to personal data, means any person (other than an employee of the data controller) who processes the data on behalf of the data controller;  Data subject means an individual who is the subject of personal data;  Personal data means data which relate to a living individual who can be identified – (a) from those data, or (b) from those data and other information which is in the possession of, or is likely to come into the possession of, the data controller
  • 26. Abdisalam Issa-Salwe, Thames Valley University 26 Data Protection Act 1998 (cont…)  Sensitive personal data: "sensitive personal data" means personal data consisting of information as to (a) the racial or ethnic origin of the data subject, (b) his political opinions, (c) his religious beliefs or other beliefs of a similar nature, (d) whether he is a member of a trade union (e) his physical or mental health or condition, (f) his sexual life, (g) the commission or alleged commission by him of any offence, or (h) any proceedings for any offence committed or alleged to have been committed by him, the disposal of such proceedings or the sentence of any court in such proceedings.
  • 27. Abdisalam Issa-Salwe, Thames Valley University 27 Task Find out from the Internet how organisations are committed to protecting privacy information. Discuss