SlideShare a Scribd company logo
1 of 8
Download to read offline
Understanding the ’Computer and Privacy’ Issue-2
Dr. Varun Kumar
Dr. Varun Kumar (IIIT Surat) Lecture-15 1 / 8
Outlines
1 Global Perspective
2 Proposal for better Protection
3 Effects of IT on recording keeping
Dr. Varun Kumar (IIIT Surat) Lecture-15 2 / 8
Global Perspective
⇒ IT has major impact on individuals, organization and communities.
Legislators
Theologians
Scientists
Academics and business people
⇒ Its impact will be further expanded in other areas also.
⇒ Privacy safeguard will be enhanced and strict in upcoming future.
Increased education in the proper use of the Internet
Providing more options for technological control.
Guidelines implementation based on user discretion.
⇒ The alternative outcomes for privacy safeguard
Strict tracking of every user
Various legislative bodies share their own views on what information
should be available.
Dr. Varun Kumar (IIIT Surat) Lecture-15 3 / 8
Continued–
⇒ The challenge ahead of information revolution
Ensure the benefits of the Internet.
It may have real and serious threats.
The Internet expansion has potential for misusing of information.
The information is flowing across borders more readily and frequently.
⇒ Solution:
⇒ Irrespective of the individual nation’s policies, there is still a need for a
global policy.
⇒ European Union has a policy that is enforced amongst its members.
Austria, Belgium, Bulgaria, Croatia, Cyprus, Czech Republic, Denmark,
Estonia, Finland, France, Germany, Greece, Hungary, Ireland, Italy,
Latvia, Lithuania, Luxembourg, Malta, Netherlands, Poland, Portugal,
Romania, Slovakia, Slovenia, Spain, Sweden
Dr. Varun Kumar (IIIT Surat) Lecture-15 4 / 8
Continued–
⇒ Each member states must make sure that personal data must be:
Processed fairly and lawfully.
Collected for specific and legitimate purposes.
Not processed further (except for statistical, scientific or historical
reasons and then with prior permission).
Adequate but not excessive for purpose required.
Kept up to date.
Accurate for purpose collected.
Kept no longer than required.
Dr. Varun Kumar (IIIT Surat) Lecture-15 5 / 8
Proposal for Better Protection
⇒ There have also been many proposals for better protection with broad
conceptual changes and legislative initiatives:
Appreciate and action the principle that privacy is a social good.
Need for a comprehensive approach. It should be integrated for a
global exchange of data?
Sweden introduces the Data Inspection Board:
Licenses all automated personal information systems in both public and
private sectors.
Controls collection of personal data.
Can investigate completes.
Designs rules for personal data collection.
Dr. Varun Kumar (IIIT Surat) Lecture-15 6 / 8
Continued–
⇒ Discuss the pros and cons of a system such as that of Swedens Data
Inspection Board is.
Q Do you think that each country should go this route?
⇒ The ACMs code of conduct considers privacy and seeks to:
Minimize data collected.
Only allow authorized access to data.
Provide proper security.
Determine required retention period.
Ensure proper disposal of the data.
Dr. Varun Kumar (IIIT Surat) Lecture-15 7 / 8
Effects of IT on recording keeping
Information keeping and handling is not new but information technology
has changed record keeping in the following ways:
⇒ Scale of information keeping.
⇒ New kinds of information kept
⇒ New scale of information distribution and exchange
⇒ Effect of erroneous data magnified
⇒ Information can endure for much longer
Dr. Varun Kumar (IIIT Surat) Lecture-15 8 / 8

More Related Content

Similar to Understanding the computer and privacy issues-2

A Dynamic Intelligent Policies Analysis Mechanism for Personal Data Processin...
A Dynamic Intelligent Policies Analysis Mechanism for Personal Data Processin...A Dynamic Intelligent Policies Analysis Mechanism for Personal Data Processin...
A Dynamic Intelligent Policies Analysis Mechanism for Personal Data Processin...
Konstantinos Demertzis
 
The Indonesia Public Information Disclosure Act (UU-KIP): Its Challenges and ...
The Indonesia Public Information Disclosure Act (UU-KIP): Its Challenges and ...The Indonesia Public Information Disclosure Act (UU-KIP): Its Challenges and ...
The Indonesia Public Information Disclosure Act (UU-KIP): Its Challenges and ...
IJECEIAES
 
Data Privacy, Ethics and Protection
Data Privacy, Ethics and ProtectionData Privacy, Ethics and Protection
Data Privacy, Ethics and Protection
Dr Lendy Spires
 

Similar to Understanding the computer and privacy issues-2 (20)

New Possibility in Computing
New Possibility in ComputingNew Possibility in Computing
New Possibility in Computing
 
Censorship and Controversy
Censorship and ControversyCensorship and Controversy
Censorship and Controversy
 
iSPIRT’s Response- White Paper on Data Protection Framework for India
iSPIRT’s Response- White Paper on Data Protection Framework for IndiaiSPIRT’s Response- White Paper on Data Protection Framework for India
iSPIRT’s Response- White Paper on Data Protection Framework for India
 
Introduction to Censorship
Introduction to Censorship Introduction to Censorship
Introduction to Censorship
 
Communications data retention in an evolving Internet
Communications data retention in an evolving InternetCommunications data retention in an evolving Internet
Communications data retention in an evolving Internet
 
iSPIRT's Response on Digital Information Security in Healthcare Act (DISHA)
iSPIRT's Response on Digital Information Security in Healthcare Act (DISHA)iSPIRT's Response on Digital Information Security in Healthcare Act (DISHA)
iSPIRT's Response on Digital Information Security in Healthcare Act (DISHA)
 
A Dynamic Intelligent Policies Analysis Mechanism for Personal Data Processin...
A Dynamic Intelligent Policies Analysis Mechanism for Personal Data Processin...A Dynamic Intelligent Policies Analysis Mechanism for Personal Data Processin...
A Dynamic Intelligent Policies Analysis Mechanism for Personal Data Processin...
 
Introduction to computer ethics
Introduction to computer ethics Introduction to computer ethics
Introduction to computer ethics
 
Machine Learning: A Pioneer for Modern Industry
Machine Learning: A Pioneer for Modern IndustryMachine Learning: A Pioneer for Modern Industry
Machine Learning: A Pioneer for Modern Industry
 
Brussels Privacy Hub: SATORI and iTRACK
Brussels Privacy Hub: SATORI and iTRACKBrussels Privacy Hub: SATORI and iTRACK
Brussels Privacy Hub: SATORI and iTRACK
 
lesson333.ppt
lesson333.pptlesson333.ppt
lesson333.ppt
 
Matching Uses and Protections for Government Data Releases: Presentation at t...
Matching Uses and Protections for Government Data Releases: Presentation at t...Matching Uses and Protections for Government Data Releases: Presentation at t...
Matching Uses and Protections for Government Data Releases: Presentation at t...
 
Assessing Risk: How Organizations Can Proactively Manage Privacy Risk
Assessing Risk: How Organizations Can Proactively Manage Privacy RiskAssessing Risk: How Organizations Can Proactively Manage Privacy Risk
Assessing Risk: How Organizations Can Proactively Manage Privacy Risk
 
Investigating Data Trials
Investigating Data TrialsInvestigating Data Trials
Investigating Data Trials
 
chapter 6 Ethics and Professionalism of ET.pptx
chapter 6   Ethics and Professionalism of ET.pptxchapter 6   Ethics and Professionalism of ET.pptx
chapter 6 Ethics and Professionalism of ET.pptx
 
The Rise of Data Ethics and Security - AIDI Webinar
The Rise of Data Ethics and Security - AIDI WebinarThe Rise of Data Ethics and Security - AIDI Webinar
The Rise of Data Ethics and Security - AIDI Webinar
 
The Indonesia Public Information Disclosure Act (UU-KIP): Its Challenges and ...
The Indonesia Public Information Disclosure Act (UU-KIP): Its Challenges and ...The Indonesia Public Information Disclosure Act (UU-KIP): Its Challenges and ...
The Indonesia Public Information Disclosure Act (UU-KIP): Its Challenges and ...
 
Journal #1
Journal #1 Journal #1
Journal #1
 
Members evening - data protection
Members evening - data protectionMembers evening - data protection
Members evening - data protection
 
Data Privacy, Ethics and Protection
Data Privacy, Ethics and ProtectionData Privacy, Ethics and Protection
Data Privacy, Ethics and Protection
 

More from VARUN KUMAR

More from VARUN KUMAR (20)

Distributed rc Model
Distributed rc ModelDistributed rc Model
Distributed rc Model
 
Electrical Wire Model
Electrical Wire ModelElectrical Wire Model
Electrical Wire Model
 
Interconnect Parameter in Digital VLSI Design
Interconnect Parameter in Digital VLSI DesignInterconnect Parameter in Digital VLSI Design
Interconnect Parameter in Digital VLSI Design
 
Introduction to Digital VLSI Design
Introduction to Digital VLSI DesignIntroduction to Digital VLSI Design
Introduction to Digital VLSI Design
 
Challenges of Massive MIMO System
Challenges of Massive MIMO SystemChallenges of Massive MIMO System
Challenges of Massive MIMO System
 
E-democracy or Digital Democracy
E-democracy or Digital DemocracyE-democracy or Digital Democracy
E-democracy or Digital Democracy
 
Ethics of Parasitic Computing
Ethics of Parasitic ComputingEthics of Parasitic Computing
Ethics of Parasitic Computing
 
Action Lines of Geneva Plan of Action
Action Lines of Geneva Plan of ActionAction Lines of Geneva Plan of Action
Action Lines of Geneva Plan of Action
 
Geneva Plan of Action
Geneva Plan of ActionGeneva Plan of Action
Geneva Plan of Action
 
Fair Use in the Electronic Age
Fair Use in the Electronic AgeFair Use in the Electronic Age
Fair Use in the Electronic Age
 
Software as a Property
Software as a PropertySoftware as a Property
Software as a Property
 
Orthogonal Polynomial
Orthogonal PolynomialOrthogonal Polynomial
Orthogonal Polynomial
 
Patent Protection
Patent ProtectionPatent Protection
Patent Protection
 
Copyright Vs Patent and Trade Secrecy Law
Copyright Vs Patent and Trade Secrecy LawCopyright Vs Patent and Trade Secrecy Law
Copyright Vs Patent and Trade Secrecy Law
 
Property Right and Software
Property Right and SoftwareProperty Right and Software
Property Right and Software
 
Gaussian Numerical Integration
Gaussian Numerical IntegrationGaussian Numerical Integration
Gaussian Numerical Integration
 
Romberg's Integration
Romberg's IntegrationRomberg's Integration
Romberg's Integration
 
Protect your online privacy-2
Protect your online privacy-2Protect your online privacy-2
Protect your online privacy-2
 
Simpson's rule of integration
Simpson's rule of integrationSimpson's rule of integration
Simpson's rule of integration
 
Numerical Integration: Trapezoidal Rule
Numerical Integration: Trapezoidal RuleNumerical Integration: Trapezoidal Rule
Numerical Integration: Trapezoidal Rule
 

Recently uploaded

scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...
scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...
scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...
HenryBriggs2
 
Digital Communication Essentials: DPCM, DM, and ADM .pptx
Digital Communication Essentials: DPCM, DM, and ADM .pptxDigital Communication Essentials: DPCM, DM, and ADM .pptx
Digital Communication Essentials: DPCM, DM, and ADM .pptx
pritamlangde
 
Introduction to Robotics in Mechanical Engineering.pptx
Introduction to Robotics in Mechanical Engineering.pptxIntroduction to Robotics in Mechanical Engineering.pptx
Introduction to Robotics in Mechanical Engineering.pptx
hublikarsn
 
Cybercrimes in the Darknet and Their Detections: A Comprehensive Analysis and...
Cybercrimes in the Darknet and Their Detections: A Comprehensive Analysis and...Cybercrimes in the Darknet and Their Detections: A Comprehensive Analysis and...
Cybercrimes in the Darknet and Their Detections: A Comprehensive Analysis and...
dannyijwest
 
Hospital management system project report.pdf
Hospital management system project report.pdfHospital management system project report.pdf
Hospital management system project report.pdf
Kamal Acharya
 

Recently uploaded (20)

Convergence of Robotics and Gen AI offers excellent opportunities for Entrepr...
Convergence of Robotics and Gen AI offers excellent opportunities for Entrepr...Convergence of Robotics and Gen AI offers excellent opportunities for Entrepr...
Convergence of Robotics and Gen AI offers excellent opportunities for Entrepr...
 
Danikor Product Catalog- Screw Feeder.pdf
Danikor Product Catalog- Screw Feeder.pdfDanikor Product Catalog- Screw Feeder.pdf
Danikor Product Catalog- Screw Feeder.pdf
 
scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...
scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...
scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...
 
Digital Communication Essentials: DPCM, DM, and ADM .pptx
Digital Communication Essentials: DPCM, DM, and ADM .pptxDigital Communication Essentials: DPCM, DM, and ADM .pptx
Digital Communication Essentials: DPCM, DM, and ADM .pptx
 
Introduction to Geographic Information Systems
Introduction to Geographic Information SystemsIntroduction to Geographic Information Systems
Introduction to Geographic Information Systems
 
Introduction to Robotics in Mechanical Engineering.pptx
Introduction to Robotics in Mechanical Engineering.pptxIntroduction to Robotics in Mechanical Engineering.pptx
Introduction to Robotics in Mechanical Engineering.pptx
 
Unsatisfied Bhabhi ℂall Girls Ahmedabad Book Esha 6378878445 Top Class ℂall G...
Unsatisfied Bhabhi ℂall Girls Ahmedabad Book Esha 6378878445 Top Class ℂall G...Unsatisfied Bhabhi ℂall Girls Ahmedabad Book Esha 6378878445 Top Class ℂall G...
Unsatisfied Bhabhi ℂall Girls Ahmedabad Book Esha 6378878445 Top Class ℂall G...
 
Signal Processing and Linear System Analysis
Signal Processing and Linear System AnalysisSignal Processing and Linear System Analysis
Signal Processing and Linear System Analysis
 
Cybercrimes in the Darknet and Their Detections: A Comprehensive Analysis and...
Cybercrimes in the Darknet and Their Detections: A Comprehensive Analysis and...Cybercrimes in the Darknet and Their Detections: A Comprehensive Analysis and...
Cybercrimes in the Darknet and Their Detections: A Comprehensive Analysis and...
 
8th International Conference on Soft Computing, Mathematics and Control (SMC ...
8th International Conference on Soft Computing, Mathematics and Control (SMC ...8th International Conference on Soft Computing, Mathematics and Control (SMC ...
8th International Conference on Soft Computing, Mathematics and Control (SMC ...
 
Passive Air Cooling System and Solar Water Heater.ppt
Passive Air Cooling System and Solar Water Heater.pptPassive Air Cooling System and Solar Water Heater.ppt
Passive Air Cooling System and Solar Water Heater.ppt
 
Fundamentals of Internet of Things (IoT) Part-2
Fundamentals of Internet of Things (IoT) Part-2Fundamentals of Internet of Things (IoT) Part-2
Fundamentals of Internet of Things (IoT) Part-2
 
Adsorption (mass transfer operations 2) ppt
Adsorption (mass transfer operations 2) pptAdsorption (mass transfer operations 2) ppt
Adsorption (mass transfer operations 2) ppt
 
Design For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the startDesign For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the start
 
Hospital management system project report.pdf
Hospital management system project report.pdfHospital management system project report.pdf
Hospital management system project report.pdf
 
Augmented Reality (AR) with Augin Software.pptx
Augmented Reality (AR) with Augin Software.pptxAugmented Reality (AR) with Augin Software.pptx
Augmented Reality (AR) with Augin Software.pptx
 
Basic Electronics for diploma students as per technical education Kerala Syll...
Basic Electronics for diploma students as per technical education Kerala Syll...Basic Electronics for diploma students as per technical education Kerala Syll...
Basic Electronics for diploma students as per technical education Kerala Syll...
 
litvinenko_Henry_Intrusion_Hong-Kong_2024.pdf
litvinenko_Henry_Intrusion_Hong-Kong_2024.pdflitvinenko_Henry_Intrusion_Hong-Kong_2024.pdf
litvinenko_Henry_Intrusion_Hong-Kong_2024.pdf
 
Hostel management system project report..pdf
Hostel management system project report..pdfHostel management system project report..pdf
Hostel management system project report..pdf
 
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptx
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptxS1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptx
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptx
 

Understanding the computer and privacy issues-2

  • 1. Understanding the ’Computer and Privacy’ Issue-2 Dr. Varun Kumar Dr. Varun Kumar (IIIT Surat) Lecture-15 1 / 8
  • 2. Outlines 1 Global Perspective 2 Proposal for better Protection 3 Effects of IT on recording keeping Dr. Varun Kumar (IIIT Surat) Lecture-15 2 / 8
  • 3. Global Perspective ⇒ IT has major impact on individuals, organization and communities. Legislators Theologians Scientists Academics and business people ⇒ Its impact will be further expanded in other areas also. ⇒ Privacy safeguard will be enhanced and strict in upcoming future. Increased education in the proper use of the Internet Providing more options for technological control. Guidelines implementation based on user discretion. ⇒ The alternative outcomes for privacy safeguard Strict tracking of every user Various legislative bodies share their own views on what information should be available. Dr. Varun Kumar (IIIT Surat) Lecture-15 3 / 8
  • 4. Continued– ⇒ The challenge ahead of information revolution Ensure the benefits of the Internet. It may have real and serious threats. The Internet expansion has potential for misusing of information. The information is flowing across borders more readily and frequently. ⇒ Solution: ⇒ Irrespective of the individual nation’s policies, there is still a need for a global policy. ⇒ European Union has a policy that is enforced amongst its members. Austria, Belgium, Bulgaria, Croatia, Cyprus, Czech Republic, Denmark, Estonia, Finland, France, Germany, Greece, Hungary, Ireland, Italy, Latvia, Lithuania, Luxembourg, Malta, Netherlands, Poland, Portugal, Romania, Slovakia, Slovenia, Spain, Sweden Dr. Varun Kumar (IIIT Surat) Lecture-15 4 / 8
  • 5. Continued– ⇒ Each member states must make sure that personal data must be: Processed fairly and lawfully. Collected for specific and legitimate purposes. Not processed further (except for statistical, scientific or historical reasons and then with prior permission). Adequate but not excessive for purpose required. Kept up to date. Accurate for purpose collected. Kept no longer than required. Dr. Varun Kumar (IIIT Surat) Lecture-15 5 / 8
  • 6. Proposal for Better Protection ⇒ There have also been many proposals for better protection with broad conceptual changes and legislative initiatives: Appreciate and action the principle that privacy is a social good. Need for a comprehensive approach. It should be integrated for a global exchange of data? Sweden introduces the Data Inspection Board: Licenses all automated personal information systems in both public and private sectors. Controls collection of personal data. Can investigate completes. Designs rules for personal data collection. Dr. Varun Kumar (IIIT Surat) Lecture-15 6 / 8
  • 7. Continued– ⇒ Discuss the pros and cons of a system such as that of Swedens Data Inspection Board is. Q Do you think that each country should go this route? ⇒ The ACMs code of conduct considers privacy and seeks to: Minimize data collected. Only allow authorized access to data. Provide proper security. Determine required retention period. Ensure proper disposal of the data. Dr. Varun Kumar (IIIT Surat) Lecture-15 7 / 8
  • 8. Effects of IT on recording keeping Information keeping and handling is not new but information technology has changed record keeping in the following ways: ⇒ Scale of information keeping. ⇒ New kinds of information kept ⇒ New scale of information distribution and exchange ⇒ Effect of erroneous data magnified ⇒ Information can endure for much longer Dr. Varun Kumar (IIIT Surat) Lecture-15 8 / 8