The Privacy Act and implications for social media

571 views
492 views

Published on

This is a presentation for Her function in Wellington. It was designed to raise awareness of the issues around internet use at work, the use of social media at work and the Privacy Act

Published in: Business, Technology
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total views
571
On SlideShare
0
From Embeds
0
Number of Embeds
2
Actions
Shares
0
Downloads
3
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide

The Privacy Act and implications for social media

  1. 1. Indecent Exposure – Are Your Private Parts Truly Private? (Social Media and Technology) Barbara Buckett Barbara Buckett & Associates 16 June 2010
  2. 2. Tension: Between the Private (Personal and the Public) <ul><li>The right to know </li></ul><ul><li>The right to control </li></ul><ul><li>The right to use </li></ul><ul><li>The right to disseminate </li></ul>
  3. 3. Core Conflict: Public vs Private <ul><li>What should the public know? </li></ul><ul><li>At what point does the public subsume the private? </li></ul><ul><li>How much control should individuals release or have over their information and private lives? </li></ul><ul><li>How much intrusion is warranted? </li></ul><ul><li>Regulation governing intrusion / commercial acumen? </li></ul>
  4. 4. Outing Your Business: French President – Mr Nicolas Sarkozy
  5. 5. The accepted use of social media by employees for business
  6. 6. Recent Exemplars: Detriment <ul><li>Fabricated Facebook profile – four teenagers create a fake profile </li></ul><ul><li>Editing with ill intent – florist diverts business through internet manipulation </li></ul><ul><li>Corporate defamation – blog used to discredit employer </li></ul><ul><li>Corporate discredit – blog used to deride workplace </li></ul><ul><li>Corporate disrepute – employee uses Bebo to bring Warehouse into disrepute </li></ul>
  7. 7. Recent Exemplars: Detriment continued <ul><li>Email anger </li></ul><ul><li>Breach of employment contract through web </li></ul><ul><li>Restraint order consent – McDonalds obtain restraint order, restraining dissemination of confidential / business information </li></ul><ul><li>Internet as a political tool </li></ul><ul><li>Internet as a retaliatory tool </li></ul><ul><li>CCTV usage – cameras in public toilets panned </li></ul>
  8. 8. Tension: Benefit and Detriment <ul><li>What constitutes a balance between privacy and other public / social interests? </li></ul><ul><li>Has the pendulum swung too far in favour of public? </li></ul><ul><li>Is the current legislation effective in regulating workplace intrusions into the personal? </li></ul>
  9. 9. <ul><li>Electronic Monitoring </li></ul><ul><li>Radio Frequency Identification Devices (RFID) </li></ul><ul><li>Finger Scanning </li></ul><ul><li>CCTV </li></ul><ul><li>Wi-Fi Networks </li></ul><ul><li>DNA Testing </li></ul>Exemplars: Scope for potential intrusion growth
  10. 10. What do Individuals Need to Protect their Personal Information? <ul><li>Freedom from intrusion </li></ul><ul><li>Freedom from unsolicited monitoring </li></ul><ul><li>Control of personal information </li></ul><ul><li>Protection from misuse </li></ul>
  11. 11. <ul><li>Recognise the threat posed by modern technology </li></ul><ul><li>Reform the legislation to align with developments in technology science and human rights </li></ul><ul><li>Amend the legislation to ensure personal information is not misused </li></ul><ul><li>Introduce privacy codes (minimum standards) </li></ul><ul><li>Bring New Zealand laws in line with other countries policies and legislation (globalisation) </li></ul>The Road Ahead…
  12. 12. Harness The Beast: Maximise the benefits, reduce the detriment and harm

×