3. 3
The Internet boom has provided many benefits for society, allowing
the creation of new tools and new ways for people to interact.
It has created new concerns about privacy, and it has been
hampered by spam and viruses.
4. 4
Big data
Algorithmic decision-making
Artificial intelligence
Internet of Things
• Efficient decision making
• On demand delivery
5. 5
Common ethical rules that must be applied in all technologies
• Contribute to society and to human well-being
• Avoid harm
• Be honest and trustworthy
• Be fair and take action not to discriminate
• Respect the work required to produce new ideas, inventions, creative works
and computing artifacts
• Respect privacy
• Honor confidentiality
7. 7
Digital Privacy is the protection of personally identifiable
information that is collected from respondents through information
collection activities or from other sources.
Digital privacy is the protection of personal information on the
Internet.
8. 8
It is a collective definition that encompasses three sub-related
categories;
• Information privacy,
• Communication privacy, and
• Individual privacy
9. 9
Information privacy is the notion that individuals should have the
freedom or right to determine how their digital information is
collected and used.
Every country has various laws that dictate how information may be
collected and used by companies.
Some of those laws are written to give agency to the preferences of
individuals/consumers in how their data is used.
10. 10
Ethiopia has been enacting various pieces of legislation, since
recently, to regulate some aspects of the digital environment.
The Cybercrime Proclamation of 2016 (Computer Crime
Proclamation No.958/2016) is the most recent addition to the
legal regime that criminalizes a range of cybercrimes.
11. 11
Communication privacy is the notion that individuals should have
the freedom or right to communicate information digitally with
the expectation that their communications are secure; meaning
that messages and communications will only be accessible to the
sender's original and intended recipient.
12. 12
Communication attack types:
Denial-of-service (DoS) and distributed denial-of-
service (DDoS) attacks
Eavesdropping and Man-in-the-middle (MitM) attack
Phishing and spear phishing attacks
Password attack
SQL injection attack
Malware attack and Trojan Horse
15. 15
Individual privacy is the notion that individuals have a right to
exist freely on the internet, in that they can choose what types of
information they are exposed to, and more importantly that
unwanted information should not interrupt them.
Example: an internet user receiving unwanted ads and
emails/spam, or a computer virus that forces the user to take
actions they otherwise wouldn't.
16. 16
Data Minimization: collect the minimal amount of information
necessary from individuals and businesses
Transparency: Notice covering the purpose of the collection and
use of identifiable information will be provided in a clear manner.
• Information collected will not be used for any other purpose
unless authorized or mandated by law.
17. 17
Accuracy: Information collected will be maintained accurately
and timely.
Security: implement physical and IT security measures to ensure
that the collection, use, and maintenance of identifiable
information are properly safeguarded.
18. 18
“Privacy – like eating and breathing – is one of life’s basic requirements”
Katherine Neville