SlideShare a Scribd company logo
1
The first legal issue we would like to talk about is censorship. Censorship is the policy or practice
of examining publications, television programs, or other forms of communication with a view to
suppressing or altering those that are considered unacceptable or offensive. Alternatively,
censorship may refer to the suppression of speech or deletion of communicative material which
may be considered objectionable harmful or sensitive. Censorship comprises many methods of
preventing the publication or dissemination of speech, printed matter, art, theater, music,
electronic media, or other forms of expression.
There are basically three common issues that undergoes censorship. This includes: religion,
politics, and sex. The basic idea behind censorship is the protection of the most basic civil
institutions of the family, the church, and the state. The topic of censorship is more evident in a
totalitarian or socialist states rather than a democratic state. This topic first popped up as
Socrates refused to allow his published materials or his teachings to undergo censorship.
The idea or principle of intellectual freedom formed Socrates’ drive to resist his teachings from
undergoing censorship. Intellectual freedom is the concept that postulate that individuals are
free to say and write whatever they like without any restriction or interference whatsoever. The
concept of intellectual freedom is directly opposite with the idea of censorship.
Censorship may take placein two basicways,thus, before or after the publication of the material.
Materials considered to be unacceptable by the society may be assessed critically and that part
that seems to be a threat to the moral codes of the society immediately is removed before it get
diffused into the public domain. Again, the materials that have been already diffused into the
public domain gets censored after it has been assimilated by the people and a claimmade to that
effect to be morally unacceptable or capable of bringing division among members of the society.
Politically inspired materials that poses a threat to the unity of the members of the society
undergoes censorship and that part gets removed or may even result in the total ban of the
material. Some religious literature also goes through the same process to ensure that another
religion is not defamed or ill-spoken of. The ban or destruction of an unapproved published
material may not necessary involve the physical burning of the material itself but to discourage
the individuals from reading it.
The most current issue associated with censorship has to do with internet censorship. The
internet is a global connection of networks that allows remote computers to share or exchange
information. The internet is characteristic of its global access and usage without any restrictions
or regulations. Individuals are free to share their opinions or views on the internet. Some of these
communications may contain certain things that are inconsistentto the norms, values or customs
of the society.
As a result, certain measures have been put in place to restrict access to some materials or
publications to a targeted group of people. For instance, the University of Ghana Computing
2
System department restricts students from having access to certain sites on the internet
considered to be inconsistent to the goals and vision of the institution. An example is the
restriction of access to pornographic sites while using the student Wi-Fi. Another form also
requires the individual’s permission to continue to have access to those sites as it may be
considered inappropriate to all persons.
The next legal issue we would like to discuss is Privacy. Privacy is a legalinformation concept that
strictly and protectively allows authorized users to have access to their personal information and
denies others from having access to those information. This concept prevents a third party from
accessing the information of another. Information which may benefit from the Data Protection
Act may include: health information, security information, legal information, economic
information and social information.
There are several institutions that may require an individual to disclose his or her personal
information such as health, finance, marital status, among several other sensitive private
information. Professionals in institutions such as the hospitals and banks are expected to display
a higher level of professionalism in the discharge of their duties in order to safeguard the
information of their clients. The elements of integrity and confidentiality may make this aim
achievable.
Individuals health status and records must stay between the individual and the medical
practitioner unless when permitted by the individual for that information to be reached by a third
party. When the private information of an individual gets to the public domain without prior
knowledge of the individual, it constitutes a criminal offense and the information carrier may be
prosecuted for such act or incident.
Most countries have laws that protects the information of individuals or organizations. The data
protection is concerned with data security, thus this involves confidentiality, integrity,
authenticity and privacy of data that has to be processed. The data protection act largely has to
do with privacy; the need to protect one’s personal information.
The Ghana Data Protection Act, 2012 {Act 843}, protects the privacy of the individual by
regulating the processing of personal information. The Ghana Data Protection Commission
(GDPC) provides for the process to obtain, hold, use or disclose personal information and for
other issues bordering on the protection of personal information.
The issue of data privacy is so crucial and sensitive because, when the personal information of a
person is encroached or accessed by another it may go a long way to affect the individual
emotionally, psychologically and even sometimes physical. For instance, when the personal
information of a person gets corrupted or damaged by an unauthorized user or even by the
information carrier, the individual may be refused employment, could be misrepresented
(defamation), or could be wrongly accused of a crime, etc.
3
Some ethical issues relatedto privacy includes autonomy, beneficence, and non-maleficence. For
the purpose of this work, we would like to elaborate more on beneficence. Beneficence is an act
or deed which benefits someone rather one’s own interest. In such adispensation likeours where
data have really become very vital resource, information carriers or professionals may have to
put the interest of their clients above their personal interest.
Some information professionals over the years have been caught for leaking or more specifically
selling and swapping the personal information of their clients to satisfy their personal interest at
the expense of their client’s security. An example is the case of George Clooney, a United State
citizen who sustained a severe injury from a deadly accident. Medical staffers were caught
peeking at George Clooney’s confidential medical information and were later arrested and
prosecuted.
Beneficence appeals to an individual or more specificallytheinformation professional to do what
is right and look out for the interest of their clients by protecting their personal information from
the reach of unauthorized users.
Censorship may hinder and at the same time shape the management of information. Censorship
may contribute to the removal of certain content of the data considered to be harmful during
the processing of that data and promote sanity and order in the society. Also, it may hinder the
dissemination of information especially when considered to be harmful or unaccepted by the
society.
Privacy shapes the management of information as individual’s personal information is protected
against attackers. It actually encourages information professionals to be more circumspect when
dealing with the management of one’s information.
Beneficence as an ethical issue enable an individual to seek the interest of others at the expense
of his personal interest.
REFERENCES
Laursen, John Christian. “Censorship”, New Dictionary of the History of Ideas. Ed. Maryanne
Cline Horowittz. Vol. 1. Detroit: Charles Scribner’s Sons, 2005. 290-295. Gale Virtual Reference
Library. Gale. Alabama School of Fine Arts (AVL). 7 Dec. 2009.
http://go.galegroup.com/ps/start.do?p=GVRL&u=avl_fine.
Patricia Dovi Sampson, Director Research, Statistics & Information Management Ministry of
Communications, Ghana.
4
GROUP 21
INFS 213
NAMEOF LECTURER: Mrs. F. O. Entsua-Mensah
QUESTION: Apart fromcopyright, discuss in detail any two legal and one ethical
issuethat may shape the management of information.
NAMES OF GROUP MEMBER ID NUMBER
1. DANIEL OFORI YAW APPIAH (GP) 10614968
2. DAVID ASANTE JNR 10623825
3. BENJAMIN TETTEH 10622336
4. STEVEN OSAM-TAWIAH 10608288
5. JOSEPH ANTWI ONYAME 10619236
6. DANIEL-ADOOSEY JEFFREY 10616633
7. OKWAN ERIC FESTUS 10612546
8. GRACE ANTWIWAAH ADOFO 10605076
9. FREMPONG AFRAKOMAH LINDA 10628912
10. MAVIS ANKWA-DEI 10606204
11. AFIA WIREDU ASARE 10605532

More Related Content

Similar to Censorship and Privacy

Media Ethics and Privacy
Media Ethics and PrivacyMedia Ethics and Privacy
Media Ethics and Privacy
Muhammad Rawaha Saleem
 
Systems of Justice over the Internet.
Systems of Justice over the Internet.Systems of Justice over the Internet.
Systems of Justice over the Internet.
Paolo Cirio
 
Data and software privacy
Data and software privacyData and software privacy
Data and software privacy
Integral university, India
 
Legal issues associated with information management
Legal issues associated with information managementLegal issues associated with information management
Legal issues associated with information management
Daniel Appiah
 
Media ethics, issues and controversies
Media ethics, issues and controversiesMedia ethics, issues and controversies
Media ethics, issues and controversies
awainaarbee
 
Information-Control-and-Privacy.powerpoint
Information-Control-and-Privacy.powerpointInformation-Control-and-Privacy.powerpoint
Information-Control-and-Privacy.powerpoint
kathymolina568
 
Information-Control-and-Privacy.Powerpoint
Information-Control-and-Privacy.PowerpointInformation-Control-and-Privacy.Powerpoint
Information-Control-and-Privacy.Powerpoint
kathymolina568
 
Links Associated with Privacy Death of privacy ‘Your ce.docx
Links Associated with Privacy Death of privacy ‘Your ce.docxLinks Associated with Privacy Death of privacy ‘Your ce.docx
Links Associated with Privacy Death of privacy ‘Your ce.docx
smile790243
 
Marden - Privacy in the 21st Century Why It Matters Now More Than Ever
Marden - Privacy in the 21st Century Why It Matters Now More Than EverMarden - Privacy in the 21st Century Why It Matters Now More Than Ever
Marden - Privacy in the 21st Century Why It Matters Now More Than Ever
National Information Standards Organization (NISO)
 
Hipa Health Insurance Portability And Accountability Act
Hipa Health Insurance Portability And Accountability ActHipa Health Insurance Portability And Accountability Act
Hipa Health Insurance Portability And Accountability Act
Amy Williams
 
Privacy Transparency Secrecy - The PRactice April 2017 issue
Privacy Transparency Secrecy - The PRactice April 2017 issuePrivacy Transparency Secrecy - The PRactice April 2017 issue
Privacy Transparency Secrecy - The PRactice April 2017 issue
The PRactice
 
1. INTRODUCTIONWe are currently living in the so-called informatio.pdf
1. INTRODUCTIONWe are currently living in the so-called informatio.pdf1. INTRODUCTIONWe are currently living in the so-called informatio.pdf
1. INTRODUCTIONWe are currently living in the so-called informatio.pdf
anurag1231
 
2000-WORDS-LAW-ASSIGNMENT (4).docx
2000-WORDS-LAW-ASSIGNMENT (4).docx2000-WORDS-LAW-ASSIGNMENT (4).docx
2000-WORDS-LAW-ASSIGNMENT (4).docx
RosannoDavid
 
Defining Privacy in Employee Health ScreeningCases Ethical .docx
Defining Privacy in Employee Health ScreeningCases Ethical .docxDefining Privacy in Employee Health ScreeningCases Ethical .docx
Defining Privacy in Employee Health ScreeningCases Ethical .docx
randyburney60861
 
Confidentiality
ConfidentialityConfidentiality
Confidentiality
blutoothe
 
LEGAL PROTECTION OF WOMEN AS VICTIM OF THE CRIME OF PORNOGRAPHY (REVENGE PORN)
LEGAL PROTECTION OF WOMEN AS VICTIM OF THE CRIME OF PORNOGRAPHY (REVENGE PORN)LEGAL PROTECTION OF WOMEN AS VICTIM OF THE CRIME OF PORNOGRAPHY (REVENGE PORN)
LEGAL PROTECTION OF WOMEN AS VICTIM OF THE CRIME OF PORNOGRAPHY (REVENGE PORN)
AJHSSR Journal
 

Similar to Censorship and Privacy (16)

Media Ethics and Privacy
Media Ethics and PrivacyMedia Ethics and Privacy
Media Ethics and Privacy
 
Systems of Justice over the Internet.
Systems of Justice over the Internet.Systems of Justice over the Internet.
Systems of Justice over the Internet.
 
Data and software privacy
Data and software privacyData and software privacy
Data and software privacy
 
Legal issues associated with information management
Legal issues associated with information managementLegal issues associated with information management
Legal issues associated with information management
 
Media ethics, issues and controversies
Media ethics, issues and controversiesMedia ethics, issues and controversies
Media ethics, issues and controversies
 
Information-Control-and-Privacy.powerpoint
Information-Control-and-Privacy.powerpointInformation-Control-and-Privacy.powerpoint
Information-Control-and-Privacy.powerpoint
 
Information-Control-and-Privacy.Powerpoint
Information-Control-and-Privacy.PowerpointInformation-Control-and-Privacy.Powerpoint
Information-Control-and-Privacy.Powerpoint
 
Links Associated with Privacy Death of privacy ‘Your ce.docx
Links Associated with Privacy Death of privacy ‘Your ce.docxLinks Associated with Privacy Death of privacy ‘Your ce.docx
Links Associated with Privacy Death of privacy ‘Your ce.docx
 
Marden - Privacy in the 21st Century Why It Matters Now More Than Ever
Marden - Privacy in the 21st Century Why It Matters Now More Than EverMarden - Privacy in the 21st Century Why It Matters Now More Than Ever
Marden - Privacy in the 21st Century Why It Matters Now More Than Ever
 
Hipa Health Insurance Portability And Accountability Act
Hipa Health Insurance Portability And Accountability ActHipa Health Insurance Portability And Accountability Act
Hipa Health Insurance Portability And Accountability Act
 
Privacy Transparency Secrecy - The PRactice April 2017 issue
Privacy Transparency Secrecy - The PRactice April 2017 issuePrivacy Transparency Secrecy - The PRactice April 2017 issue
Privacy Transparency Secrecy - The PRactice April 2017 issue
 
1. INTRODUCTIONWe are currently living in the so-called informatio.pdf
1. INTRODUCTIONWe are currently living in the so-called informatio.pdf1. INTRODUCTIONWe are currently living in the so-called informatio.pdf
1. INTRODUCTIONWe are currently living in the so-called informatio.pdf
 
2000-WORDS-LAW-ASSIGNMENT (4).docx
2000-WORDS-LAW-ASSIGNMENT (4).docx2000-WORDS-LAW-ASSIGNMENT (4).docx
2000-WORDS-LAW-ASSIGNMENT (4).docx
 
Defining Privacy in Employee Health ScreeningCases Ethical .docx
Defining Privacy in Employee Health ScreeningCases Ethical .docxDefining Privacy in Employee Health ScreeningCases Ethical .docx
Defining Privacy in Employee Health ScreeningCases Ethical .docx
 
Confidentiality
ConfidentialityConfidentiality
Confidentiality
 
LEGAL PROTECTION OF WOMEN AS VICTIM OF THE CRIME OF PORNOGRAPHY (REVENGE PORN)
LEGAL PROTECTION OF WOMEN AS VICTIM OF THE CRIME OF PORNOGRAPHY (REVENGE PORN)LEGAL PROTECTION OF WOMEN AS VICTIM OF THE CRIME OF PORNOGRAPHY (REVENGE PORN)
LEGAL PROTECTION OF WOMEN AS VICTIM OF THE CRIME OF PORNOGRAPHY (REVENGE PORN)
 

Recently uploaded

How to Predict Vendor Bill Product in Odoo 17
How to Predict Vendor Bill Product in Odoo 17How to Predict Vendor Bill Product in Odoo 17
How to Predict Vendor Bill Product in Odoo 17
Celine George
 
Standardized tool for Intelligence test.
Standardized tool for Intelligence test.Standardized tool for Intelligence test.
Standardized tool for Intelligence test.
deepaannamalai16
 
Présentationvvvvvvvvvvvvvvvvvvvvvvvvvvvv2.pptx
Présentationvvvvvvvvvvvvvvvvvvvvvvvvvvvv2.pptxPrésentationvvvvvvvvvvvvvvvvvvvvvvvvvvvv2.pptx
Présentationvvvvvvvvvvvvvvvvvvvvvvvvvvvv2.pptx
siemaillard
 
REASIGNACION 2024 UGEL CHUPACA 2024 UGEL CHUPACA.pdf
REASIGNACION 2024 UGEL CHUPACA 2024 UGEL CHUPACA.pdfREASIGNACION 2024 UGEL CHUPACA 2024 UGEL CHUPACA.pdf
REASIGNACION 2024 UGEL CHUPACA 2024 UGEL CHUPACA.pdf
giancarloi8888
 
NEWSPAPERS - QUESTION 1 - REVISION POWERPOINT.pptx
NEWSPAPERS - QUESTION 1 - REVISION POWERPOINT.pptxNEWSPAPERS - QUESTION 1 - REVISION POWERPOINT.pptx
NEWSPAPERS - QUESTION 1 - REVISION POWERPOINT.pptx
iammrhaywood
 
The basics of sentences session 7pptx.pptx
The basics of sentences session 7pptx.pptxThe basics of sentences session 7pptx.pptx
The basics of sentences session 7pptx.pptx
heathfieldcps1
 
A Free 200-Page eBook ~ Brain and Mind Exercise.pptx
A Free 200-Page eBook ~ Brain and Mind Exercise.pptxA Free 200-Page eBook ~ Brain and Mind Exercise.pptx
A Free 200-Page eBook ~ Brain and Mind Exercise.pptx
OH TEIK BIN
 
Skimbleshanks-The-Railway-Cat by T S Eliot
Skimbleshanks-The-Railway-Cat by T S EliotSkimbleshanks-The-Railway-Cat by T S Eliot
Skimbleshanks-The-Railway-Cat by T S Eliot
nitinpv4ai
 
Haunted Houses by H W Longfellow for class 10
Haunted Houses by H W Longfellow for class 10Haunted Houses by H W Longfellow for class 10
Haunted Houses by H W Longfellow for class 10
nitinpv4ai
 
THE SACRIFICE HOW PRO-PALESTINE PROTESTS STUDENTS ARE SACRIFICING TO CHANGE T...
THE SACRIFICE HOW PRO-PALESTINE PROTESTS STUDENTS ARE SACRIFICING TO CHANGE T...THE SACRIFICE HOW PRO-PALESTINE PROTESTS STUDENTS ARE SACRIFICING TO CHANGE T...
THE SACRIFICE HOW PRO-PALESTINE PROTESTS STUDENTS ARE SACRIFICING TO CHANGE T...
indexPub
 
RESULTS OF THE EVALUATION QUESTIONNAIRE.pptx
RESULTS OF THE EVALUATION QUESTIONNAIRE.pptxRESULTS OF THE EVALUATION QUESTIONNAIRE.pptx
RESULTS OF THE EVALUATION QUESTIONNAIRE.pptx
zuzanka
 
skeleton System.pdf (skeleton system wow)
skeleton System.pdf (skeleton system wow)skeleton System.pdf (skeleton system wow)
skeleton System.pdf (skeleton system wow)
Mohammad Al-Dhahabi
 
Pharmaceutics Pharmaceuticals best of brub
Pharmaceutics Pharmaceuticals best of brubPharmaceutics Pharmaceuticals best of brub
Pharmaceutics Pharmaceuticals best of brub
danielkiash986
 
Accounting for Restricted Grants When and How To Record Properly
Accounting for Restricted Grants  When and How To Record ProperlyAccounting for Restricted Grants  When and How To Record Properly
Accounting for Restricted Grants When and How To Record Properly
TechSoup
 
Bossa N’ Roll Records by Ismael Vazquez.
Bossa N’ Roll Records by Ismael Vazquez.Bossa N’ Roll Records by Ismael Vazquez.
Bossa N’ Roll Records by Ismael Vazquez.
IsmaelVazquez38
 
RHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem students
RHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem studentsRHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem students
RHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem students
Himanshu Rai
 
BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 8 - CẢ NĂM - FRIENDS PLUS - NĂM HỌC 2023-2024 (B...
BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 8 - CẢ NĂM - FRIENDS PLUS - NĂM HỌC 2023-2024 (B...BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 8 - CẢ NĂM - FRIENDS PLUS - NĂM HỌC 2023-2024 (B...
BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 8 - CẢ NĂM - FRIENDS PLUS - NĂM HỌC 2023-2024 (B...
Nguyen Thanh Tu Collection
 
Juneteenth Freedom Day 2024 David Douglas School District
Juneteenth Freedom Day 2024 David Douglas School DistrictJuneteenth Freedom Day 2024 David Douglas School District
Juneteenth Freedom Day 2024 David Douglas School District
David Douglas School District
 
Jemison, MacLaughlin, and Majumder "Broadening Pathways for Editors and Authors"
Jemison, MacLaughlin, and Majumder "Broadening Pathways for Editors and Authors"Jemison, MacLaughlin, and Majumder "Broadening Pathways for Editors and Authors"
Jemison, MacLaughlin, and Majumder "Broadening Pathways for Editors and Authors"
National Information Standards Organization (NISO)
 
Leveraging Generative AI to Drive Nonprofit Innovation
Leveraging Generative AI to Drive Nonprofit InnovationLeveraging Generative AI to Drive Nonprofit Innovation
Leveraging Generative AI to Drive Nonprofit Innovation
TechSoup
 

Recently uploaded (20)

How to Predict Vendor Bill Product in Odoo 17
How to Predict Vendor Bill Product in Odoo 17How to Predict Vendor Bill Product in Odoo 17
How to Predict Vendor Bill Product in Odoo 17
 
Standardized tool for Intelligence test.
Standardized tool for Intelligence test.Standardized tool for Intelligence test.
Standardized tool for Intelligence test.
 
Présentationvvvvvvvvvvvvvvvvvvvvvvvvvvvv2.pptx
Présentationvvvvvvvvvvvvvvvvvvvvvvvvvvvv2.pptxPrésentationvvvvvvvvvvvvvvvvvvvvvvvvvvvv2.pptx
Présentationvvvvvvvvvvvvvvvvvvvvvvvvvvvv2.pptx
 
REASIGNACION 2024 UGEL CHUPACA 2024 UGEL CHUPACA.pdf
REASIGNACION 2024 UGEL CHUPACA 2024 UGEL CHUPACA.pdfREASIGNACION 2024 UGEL CHUPACA 2024 UGEL CHUPACA.pdf
REASIGNACION 2024 UGEL CHUPACA 2024 UGEL CHUPACA.pdf
 
NEWSPAPERS - QUESTION 1 - REVISION POWERPOINT.pptx
NEWSPAPERS - QUESTION 1 - REVISION POWERPOINT.pptxNEWSPAPERS - QUESTION 1 - REVISION POWERPOINT.pptx
NEWSPAPERS - QUESTION 1 - REVISION POWERPOINT.pptx
 
The basics of sentences session 7pptx.pptx
The basics of sentences session 7pptx.pptxThe basics of sentences session 7pptx.pptx
The basics of sentences session 7pptx.pptx
 
A Free 200-Page eBook ~ Brain and Mind Exercise.pptx
A Free 200-Page eBook ~ Brain and Mind Exercise.pptxA Free 200-Page eBook ~ Brain and Mind Exercise.pptx
A Free 200-Page eBook ~ Brain and Mind Exercise.pptx
 
Skimbleshanks-The-Railway-Cat by T S Eliot
Skimbleshanks-The-Railway-Cat by T S EliotSkimbleshanks-The-Railway-Cat by T S Eliot
Skimbleshanks-The-Railway-Cat by T S Eliot
 
Haunted Houses by H W Longfellow for class 10
Haunted Houses by H W Longfellow for class 10Haunted Houses by H W Longfellow for class 10
Haunted Houses by H W Longfellow for class 10
 
THE SACRIFICE HOW PRO-PALESTINE PROTESTS STUDENTS ARE SACRIFICING TO CHANGE T...
THE SACRIFICE HOW PRO-PALESTINE PROTESTS STUDENTS ARE SACRIFICING TO CHANGE T...THE SACRIFICE HOW PRO-PALESTINE PROTESTS STUDENTS ARE SACRIFICING TO CHANGE T...
THE SACRIFICE HOW PRO-PALESTINE PROTESTS STUDENTS ARE SACRIFICING TO CHANGE T...
 
RESULTS OF THE EVALUATION QUESTIONNAIRE.pptx
RESULTS OF THE EVALUATION QUESTIONNAIRE.pptxRESULTS OF THE EVALUATION QUESTIONNAIRE.pptx
RESULTS OF THE EVALUATION QUESTIONNAIRE.pptx
 
skeleton System.pdf (skeleton system wow)
skeleton System.pdf (skeleton system wow)skeleton System.pdf (skeleton system wow)
skeleton System.pdf (skeleton system wow)
 
Pharmaceutics Pharmaceuticals best of brub
Pharmaceutics Pharmaceuticals best of brubPharmaceutics Pharmaceuticals best of brub
Pharmaceutics Pharmaceuticals best of brub
 
Accounting for Restricted Grants When and How To Record Properly
Accounting for Restricted Grants  When and How To Record ProperlyAccounting for Restricted Grants  When and How To Record Properly
Accounting for Restricted Grants When and How To Record Properly
 
Bossa N’ Roll Records by Ismael Vazquez.
Bossa N’ Roll Records by Ismael Vazquez.Bossa N’ Roll Records by Ismael Vazquez.
Bossa N’ Roll Records by Ismael Vazquez.
 
RHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem students
RHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem studentsRHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem students
RHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem students
 
BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 8 - CẢ NĂM - FRIENDS PLUS - NĂM HỌC 2023-2024 (B...
BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 8 - CẢ NĂM - FRIENDS PLUS - NĂM HỌC 2023-2024 (B...BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 8 - CẢ NĂM - FRIENDS PLUS - NĂM HỌC 2023-2024 (B...
BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 8 - CẢ NĂM - FRIENDS PLUS - NĂM HỌC 2023-2024 (B...
 
Juneteenth Freedom Day 2024 David Douglas School District
Juneteenth Freedom Day 2024 David Douglas School DistrictJuneteenth Freedom Day 2024 David Douglas School District
Juneteenth Freedom Day 2024 David Douglas School District
 
Jemison, MacLaughlin, and Majumder "Broadening Pathways for Editors and Authors"
Jemison, MacLaughlin, and Majumder "Broadening Pathways for Editors and Authors"Jemison, MacLaughlin, and Majumder "Broadening Pathways for Editors and Authors"
Jemison, MacLaughlin, and Majumder "Broadening Pathways for Editors and Authors"
 
Leveraging Generative AI to Drive Nonprofit Innovation
Leveraging Generative AI to Drive Nonprofit InnovationLeveraging Generative AI to Drive Nonprofit Innovation
Leveraging Generative AI to Drive Nonprofit Innovation
 

Censorship and Privacy

  • 1. 1 The first legal issue we would like to talk about is censorship. Censorship is the policy or practice of examining publications, television programs, or other forms of communication with a view to suppressing or altering those that are considered unacceptable or offensive. Alternatively, censorship may refer to the suppression of speech or deletion of communicative material which may be considered objectionable harmful or sensitive. Censorship comprises many methods of preventing the publication or dissemination of speech, printed matter, art, theater, music, electronic media, or other forms of expression. There are basically three common issues that undergoes censorship. This includes: religion, politics, and sex. The basic idea behind censorship is the protection of the most basic civil institutions of the family, the church, and the state. The topic of censorship is more evident in a totalitarian or socialist states rather than a democratic state. This topic first popped up as Socrates refused to allow his published materials or his teachings to undergo censorship. The idea or principle of intellectual freedom formed Socrates’ drive to resist his teachings from undergoing censorship. Intellectual freedom is the concept that postulate that individuals are free to say and write whatever they like without any restriction or interference whatsoever. The concept of intellectual freedom is directly opposite with the idea of censorship. Censorship may take placein two basicways,thus, before or after the publication of the material. Materials considered to be unacceptable by the society may be assessed critically and that part that seems to be a threat to the moral codes of the society immediately is removed before it get diffused into the public domain. Again, the materials that have been already diffused into the public domain gets censored after it has been assimilated by the people and a claimmade to that effect to be morally unacceptable or capable of bringing division among members of the society. Politically inspired materials that poses a threat to the unity of the members of the society undergoes censorship and that part gets removed or may even result in the total ban of the material. Some religious literature also goes through the same process to ensure that another religion is not defamed or ill-spoken of. The ban or destruction of an unapproved published material may not necessary involve the physical burning of the material itself but to discourage the individuals from reading it. The most current issue associated with censorship has to do with internet censorship. The internet is a global connection of networks that allows remote computers to share or exchange information. The internet is characteristic of its global access and usage without any restrictions or regulations. Individuals are free to share their opinions or views on the internet. Some of these communications may contain certain things that are inconsistentto the norms, values or customs of the society. As a result, certain measures have been put in place to restrict access to some materials or publications to a targeted group of people. For instance, the University of Ghana Computing
  • 2. 2 System department restricts students from having access to certain sites on the internet considered to be inconsistent to the goals and vision of the institution. An example is the restriction of access to pornographic sites while using the student Wi-Fi. Another form also requires the individual’s permission to continue to have access to those sites as it may be considered inappropriate to all persons. The next legal issue we would like to discuss is Privacy. Privacy is a legalinformation concept that strictly and protectively allows authorized users to have access to their personal information and denies others from having access to those information. This concept prevents a third party from accessing the information of another. Information which may benefit from the Data Protection Act may include: health information, security information, legal information, economic information and social information. There are several institutions that may require an individual to disclose his or her personal information such as health, finance, marital status, among several other sensitive private information. Professionals in institutions such as the hospitals and banks are expected to display a higher level of professionalism in the discharge of their duties in order to safeguard the information of their clients. The elements of integrity and confidentiality may make this aim achievable. Individuals health status and records must stay between the individual and the medical practitioner unless when permitted by the individual for that information to be reached by a third party. When the private information of an individual gets to the public domain without prior knowledge of the individual, it constitutes a criminal offense and the information carrier may be prosecuted for such act or incident. Most countries have laws that protects the information of individuals or organizations. The data protection is concerned with data security, thus this involves confidentiality, integrity, authenticity and privacy of data that has to be processed. The data protection act largely has to do with privacy; the need to protect one’s personal information. The Ghana Data Protection Act, 2012 {Act 843}, protects the privacy of the individual by regulating the processing of personal information. The Ghana Data Protection Commission (GDPC) provides for the process to obtain, hold, use or disclose personal information and for other issues bordering on the protection of personal information. The issue of data privacy is so crucial and sensitive because, when the personal information of a person is encroached or accessed by another it may go a long way to affect the individual emotionally, psychologically and even sometimes physical. For instance, when the personal information of a person gets corrupted or damaged by an unauthorized user or even by the information carrier, the individual may be refused employment, could be misrepresented (defamation), or could be wrongly accused of a crime, etc.
  • 3. 3 Some ethical issues relatedto privacy includes autonomy, beneficence, and non-maleficence. For the purpose of this work, we would like to elaborate more on beneficence. Beneficence is an act or deed which benefits someone rather one’s own interest. In such adispensation likeours where data have really become very vital resource, information carriers or professionals may have to put the interest of their clients above their personal interest. Some information professionals over the years have been caught for leaking or more specifically selling and swapping the personal information of their clients to satisfy their personal interest at the expense of their client’s security. An example is the case of George Clooney, a United State citizen who sustained a severe injury from a deadly accident. Medical staffers were caught peeking at George Clooney’s confidential medical information and were later arrested and prosecuted. Beneficence appeals to an individual or more specificallytheinformation professional to do what is right and look out for the interest of their clients by protecting their personal information from the reach of unauthorized users. Censorship may hinder and at the same time shape the management of information. Censorship may contribute to the removal of certain content of the data considered to be harmful during the processing of that data and promote sanity and order in the society. Also, it may hinder the dissemination of information especially when considered to be harmful or unaccepted by the society. Privacy shapes the management of information as individual’s personal information is protected against attackers. It actually encourages information professionals to be more circumspect when dealing with the management of one’s information. Beneficence as an ethical issue enable an individual to seek the interest of others at the expense of his personal interest. REFERENCES Laursen, John Christian. “Censorship”, New Dictionary of the History of Ideas. Ed. Maryanne Cline Horowittz. Vol. 1. Detroit: Charles Scribner’s Sons, 2005. 290-295. Gale Virtual Reference Library. Gale. Alabama School of Fine Arts (AVL). 7 Dec. 2009. http://go.galegroup.com/ps/start.do?p=GVRL&u=avl_fine. Patricia Dovi Sampson, Director Research, Statistics & Information Management Ministry of Communications, Ghana.
  • 4. 4 GROUP 21 INFS 213 NAMEOF LECTURER: Mrs. F. O. Entsua-Mensah QUESTION: Apart fromcopyright, discuss in detail any two legal and one ethical issuethat may shape the management of information. NAMES OF GROUP MEMBER ID NUMBER 1. DANIEL OFORI YAW APPIAH (GP) 10614968 2. DAVID ASANTE JNR 10623825 3. BENJAMIN TETTEH 10622336 4. STEVEN OSAM-TAWIAH 10608288 5. JOSEPH ANTWI ONYAME 10619236 6. DANIEL-ADOOSEY JEFFREY 10616633 7. OKWAN ERIC FESTUS 10612546 8. GRACE ANTWIWAAH ADOFO 10605076 9. FREMPONG AFRAKOMAH LINDA 10628912 10. MAVIS ANKWA-DEI 10606204 11. AFIA WIREDU ASARE 10605532