SlideShare a Scribd company logo
By
Izzati Masturah Madini
• Protects all personal identifiable data
• Apply to discussions about student / student’s
record
• Value by virtue of being kept secret and it
must be capable of being legally protected.
• Privileged information, classified information,
or specific information of a type for which
there is a clear and compelling need to
withhold from disclosure.
Definition
Privacy /
confidential
CONFIDENTIALITY: The assurance that
information about identifiable persons, the
release of which would constitute an
invasion of privacy for any individual, will
not be disclosed without consent except as
allowed by law.
• Less privacy/confidentiality on the internet
• Websites can track your surfing on their site by IP
address and related system information, including
system names and Internet network addresses
that often uniquely identify your computer.
• Search engines generally record:
• - Queries together with your computer
identification, building up a profile of your
interests over time.
Surfing leaves tracks
• Turn your default browser settings
to exclude cookies.
• Use networked or single-point
annonymizers to obscure all
computer's local identifying
information and obtain the
maximum available Internet privacy
Minimize threats
• Posting publically makes you generally give up the rights to
the content and any expectation of privacy or
confidentiality.
• In most countries, anything you post to a public space can
be saved, archived, duplicated, distributed, and published,
even years later, by anyone in the same way as a
photograph taken in a public space like a city park.
• If you have ever posted anything to the newsgroups, you
might find it interesting to search them now for the email
address you used at the time, which is one reason you
should disguise your email address when posting to the
Usenet newsgroups.
Posting is public
Fair Information Practices
Data Release Restrictions
Personnel Agreements
Confidentiality Policies
• Definition of confidential information
• Need-to-know access only
• No redisclosure
• If questions, ask supervisor
• Breach will result in disciplinary action
• Confidentiality must be maintained
indefinitely
Confidentiality Provisions
1. The liability of those who in some sense act
innocently.
2. The circumstances in which the damage may
be awarded for breach.
3. The possibility of awarding damages for injury
to feelings as distinct from economic loss.
4. The effects of dealing that treat the
information as property.
5. The liability of indirect recipient.
Concerns about confidential
information
• Confidentiality or privacy of everyone need to
be protected.
• The bottom line is that you have little privacy
or confidentiality on the Internet, and unless
your communications are encrypted and/or
annonymized, you should assume they can be
read by others. At the same time you need to
make a realistic threat assessment depending
on what you are doing
CONCLUSION
Akshay Maheshwari & Anjali Bhatt. (2014).
Protection of Confidential
Information:The Reality. Retrieved on
3rd October 2017 from
https://www.lawctopus.com/academi
e/rotection-confidential-information
reality/
Reference

More Related Content

What's hot

Cyber safety
Cyber safetyCyber safety
Cyber safety
DeepasreeBiju
 
Information Security and GDPR
Information Security and GDPRInformation Security and GDPR
Information Security and GDPR
London School of Hygiene and Tropical Medicine
 
Privacy in a Digital age
Privacy in a Digital agePrivacy in a Digital age
Privacy in a Digital age
Felix Garcia Lainez
 
Maintaining confidentiality
Maintaining confidentialityMaintaining confidentiality
Maintaining confidentiality
empalmer
 
Hackers Cracker Network Intruder
Hackers Cracker Network IntruderHackers Cracker Network Intruder
Hackers Cracker Network Intruder
Erdo Deshiant Garnaby
 
DPA seminar presentation
DPA seminar presentationDPA seminar presentation
DPA seminar presentation
Rodonoghue72
 
Information privacy and Government Regulations
Information privacy and Government RegulationsInformation privacy and Government Regulations
Information privacy and Government Regulations
May Moftah
 
How to become Hackers .
How to become Hackers .How to become Hackers .
How to become Hackers .
Greater Noida Institute Of Technology
 
Hacktivism: Motivations, Tactics and Threats
Hacktivism: Motivations, Tactics and ThreatsHacktivism: Motivations, Tactics and Threats
Hacktivism: Motivations, Tactics and Threats
Eric Vanderburg
 
Tracking trollers
Tracking trollersTracking trollers
Tracking trollers
Liz Henry
 
Trade Secret Protection: Practical Advice on Protecting and Defending Your Or...
Trade Secret Protection: Practical Advice on Protecting and Defending Your Or...Trade Secret Protection: Practical Advice on Protecting and Defending Your Or...
Trade Secret Protection: Practical Advice on Protecting and Defending Your Or...
Winston & Strawn LLP
 
4 2 essentials Internet Usage Policy
4 2 essentials   Internet Usage Policy4 2 essentials   Internet Usage Policy
4 2 essentials Internet Usage Policy
WirralCT
 
Introduction to hackers
Introduction to hackersIntroduction to hackers
Introduction to hackers
Harsh Sharma
 
Bsides Knoxville - OSINT
Bsides Knoxville - OSINTBsides Knoxville - OSINT
Bsides Knoxville - OSINT
Adam Compton
 
Privacy
PrivacyPrivacy
Privacy in Bigdata Era
Privacy in Bigdata  EraPrivacy in Bigdata  Era
Privacy in Bigdata Era
Srinath Perera
 
Mandatory data breach notification for Australia
Mandatory data breach notification for AustraliaMandatory data breach notification for Australia
Mandatory data breach notification for Australia
Patrick Dwyer
 
Hackers & hacktivism
Hackers & hacktivismHackers & hacktivism
Hackers & hacktivism
Bilal Ali
 
y3dips - Who Own Your Sensitive Information?
y3dips - Who Own Your Sensitive Information?y3dips - Who Own Your Sensitive Information?
y3dips - Who Own Your Sensitive Information?
Ammar WK
 

What's hot (19)

Cyber safety
Cyber safetyCyber safety
Cyber safety
 
Information Security and GDPR
Information Security and GDPRInformation Security and GDPR
Information Security and GDPR
 
Privacy in a Digital age
Privacy in a Digital agePrivacy in a Digital age
Privacy in a Digital age
 
Maintaining confidentiality
Maintaining confidentialityMaintaining confidentiality
Maintaining confidentiality
 
Hackers Cracker Network Intruder
Hackers Cracker Network IntruderHackers Cracker Network Intruder
Hackers Cracker Network Intruder
 
DPA seminar presentation
DPA seminar presentationDPA seminar presentation
DPA seminar presentation
 
Information privacy and Government Regulations
Information privacy and Government RegulationsInformation privacy and Government Regulations
Information privacy and Government Regulations
 
How to become Hackers .
How to become Hackers .How to become Hackers .
How to become Hackers .
 
Hacktivism: Motivations, Tactics and Threats
Hacktivism: Motivations, Tactics and ThreatsHacktivism: Motivations, Tactics and Threats
Hacktivism: Motivations, Tactics and Threats
 
Tracking trollers
Tracking trollersTracking trollers
Tracking trollers
 
Trade Secret Protection: Practical Advice on Protecting and Defending Your Or...
Trade Secret Protection: Practical Advice on Protecting and Defending Your Or...Trade Secret Protection: Practical Advice on Protecting and Defending Your Or...
Trade Secret Protection: Practical Advice on Protecting and Defending Your Or...
 
4 2 essentials Internet Usage Policy
4 2 essentials   Internet Usage Policy4 2 essentials   Internet Usage Policy
4 2 essentials Internet Usage Policy
 
Introduction to hackers
Introduction to hackersIntroduction to hackers
Introduction to hackers
 
Bsides Knoxville - OSINT
Bsides Knoxville - OSINTBsides Knoxville - OSINT
Bsides Knoxville - OSINT
 
Privacy
PrivacyPrivacy
Privacy
 
Privacy in Bigdata Era
Privacy in Bigdata  EraPrivacy in Bigdata  Era
Privacy in Bigdata Era
 
Mandatory data breach notification for Australia
Mandatory data breach notification for AustraliaMandatory data breach notification for Australia
Mandatory data breach notification for Australia
 
Hackers & hacktivism
Hackers & hacktivismHackers & hacktivism
Hackers & hacktivism
 
y3dips - Who Own Your Sensitive Information?
y3dips - Who Own Your Sensitive Information?y3dips - Who Own Your Sensitive Information?
y3dips - Who Own Your Sensitive Information?
 

Similar to Confidentiality

Online privacy; myth or reality?
Online privacy; myth or reality?Online privacy; myth or reality?
Online privacy; myth or reality?
Swaleh Ahmed
 
Chapter 3
Chapter 3Chapter 3
Chapter 3
Jennifer Polack
 
Information security in big data -privacy and data mining
Information security in big data -privacy and data miningInformation security in big data -privacy and data mining
Information security in big data -privacy and data mining
harithavijay94
 
3A – DATA PROTECTION: ADVICE
3A – DATA PROTECTION: ADVICE3A – DATA PROTECTION: ADVICE
3A – DATA PROTECTION: ADVICE
CFG
 
ADET_PrivacyInTheCyberWorld_Napoles.pptx
ADET_PrivacyInTheCyberWorld_Napoles.pptxADET_PrivacyInTheCyberWorld_Napoles.pptx
ADET_PrivacyInTheCyberWorld_Napoles.pptx
LimeJuice5
 
Lecture Data Classification And Data Loss Prevention
Lecture Data Classification And Data Loss PreventionLecture Data Classification And Data Loss Prevention
Lecture Data Classification And Data Loss Prevention
Nicholas Davis
 
Data Classification And Loss Prevention
Data Classification And Loss PreventionData Classification And Loss Prevention
Data Classification And Loss Prevention
Nicholas Davis
 
Lecture data classification_and_data_loss_prevention
Lecture data classification_and_data_loss_preventionLecture data classification_and_data_loss_prevention
Lecture data classification_and_data_loss_prevention
Nicholas Davis
 
Legal Issues In Social Media Oct. 2012
Legal Issues In Social Media Oct. 2012Legal Issues In Social Media Oct. 2012
Legal Issues In Social Media Oct. 2012
curlistl
 
Module 8 security and ethical challenges
Module 8 security and ethical challengesModule 8 security and ethical challenges
Module 8 security and ethical challenges
CRM
 
Topic 5 understanding privacy
Topic 5 understanding privacyTopic 5 understanding privacy
Topic 5 understanding privacy
Hamid Zainudin
 
Online ethics
Online ethicsOnline ethics
Online privacy & security
Online privacy & securityOnline privacy & security
Online privacy & security
Priyab Satoshi
 
Information security
Information securityInformation security
Information security
Vijayananda Mohire
 
A Cybersecurity Planning Guide for CFOs
A Cybersecurity Planning Guide for CFOsA Cybersecurity Planning Guide for CFOs
A Cybersecurity Planning Guide for CFOs
gppcpa
 
Recommending information security measures
Recommending information security measuresRecommending information security measures
Recommending information security measures
Manish Singh
 
Data Privacy
Data PrivacyData Privacy
Data Privacy
Abdah Munirah
 
Information Security Awareness Training Open
Information Security Awareness Training OpenInformation Security Awareness Training Open
Information Security Awareness Training Open
Fred Beck MBA, CPA
 
it-security.ppt
it-security.pptit-security.ppt
it-security.ppt
AmanSoni665879
 
Lect 08 computer security and privacy 2 4 q
Lect 08 computer security and privacy 2 4 qLect 08 computer security and privacy 2 4 q
Lect 08 computer security and privacy 2 4 q
Ramy Eltarras
 

Similar to Confidentiality (20)

Online privacy; myth or reality?
Online privacy; myth or reality?Online privacy; myth or reality?
Online privacy; myth or reality?
 
Chapter 3
Chapter 3Chapter 3
Chapter 3
 
Information security in big data -privacy and data mining
Information security in big data -privacy and data miningInformation security in big data -privacy and data mining
Information security in big data -privacy and data mining
 
3A – DATA PROTECTION: ADVICE
3A – DATA PROTECTION: ADVICE3A – DATA PROTECTION: ADVICE
3A – DATA PROTECTION: ADVICE
 
ADET_PrivacyInTheCyberWorld_Napoles.pptx
ADET_PrivacyInTheCyberWorld_Napoles.pptxADET_PrivacyInTheCyberWorld_Napoles.pptx
ADET_PrivacyInTheCyberWorld_Napoles.pptx
 
Lecture Data Classification And Data Loss Prevention
Lecture Data Classification And Data Loss PreventionLecture Data Classification And Data Loss Prevention
Lecture Data Classification And Data Loss Prevention
 
Data Classification And Loss Prevention
Data Classification And Loss PreventionData Classification And Loss Prevention
Data Classification And Loss Prevention
 
Lecture data classification_and_data_loss_prevention
Lecture data classification_and_data_loss_preventionLecture data classification_and_data_loss_prevention
Lecture data classification_and_data_loss_prevention
 
Legal Issues In Social Media Oct. 2012
Legal Issues In Social Media Oct. 2012Legal Issues In Social Media Oct. 2012
Legal Issues In Social Media Oct. 2012
 
Module 8 security and ethical challenges
Module 8 security and ethical challengesModule 8 security and ethical challenges
Module 8 security and ethical challenges
 
Topic 5 understanding privacy
Topic 5 understanding privacyTopic 5 understanding privacy
Topic 5 understanding privacy
 
Online ethics
Online ethicsOnline ethics
Online ethics
 
Online privacy & security
Online privacy & securityOnline privacy & security
Online privacy & security
 
Information security
Information securityInformation security
Information security
 
A Cybersecurity Planning Guide for CFOs
A Cybersecurity Planning Guide for CFOsA Cybersecurity Planning Guide for CFOs
A Cybersecurity Planning Guide for CFOs
 
Recommending information security measures
Recommending information security measuresRecommending information security measures
Recommending information security measures
 
Data Privacy
Data PrivacyData Privacy
Data Privacy
 
Information Security Awareness Training Open
Information Security Awareness Training OpenInformation Security Awareness Training Open
Information Security Awareness Training Open
 
it-security.ppt
it-security.pptit-security.ppt
it-security.ppt
 
Lect 08 computer security and privacy 2 4 q
Lect 08 computer security and privacy 2 4 qLect 08 computer security and privacy 2 4 q
Lect 08 computer security and privacy 2 4 q
 

Recently uploaded

一比一原版(monash毕业证书)莫纳什大学毕业证如何办理
一比一原版(monash毕业证书)莫纳什大学毕业证如何办理一比一原版(monash毕业证书)莫纳什大学毕业证如何办理
一比一原版(monash毕业证书)莫纳什大学毕业证如何办理
bzofm
 
一比一原版(liverpool毕业证书)利物浦大学毕业证如何办理
一比一原版(liverpool毕业证书)利物浦大学毕业证如何办理一比一原版(liverpool毕业证书)利物浦大学毕业证如何办理
一比一原版(liverpool毕业证书)利物浦大学毕业证如何办理
aypxuyw
 
一比一原版新加坡南洋理工大学毕业证(本硕)ntu学位证书如何办理
一比一原版新加坡南洋理工大学毕业证(本硕)ntu学位证书如何办理一比一原版新加坡南洋理工大学毕业证(本硕)ntu学位证书如何办理
一比一原版新加坡南洋理工大学毕业证(本硕)ntu学位证书如何办理
hedonxu
 
一比一原版牛津布鲁克斯大学毕业证(牛布毕业证)如何办理
一比一原版牛津布鲁克斯大学毕业证(牛布毕业证)如何办理一比一原版牛津布鲁克斯大学毕业证(牛布毕业证)如何办理
一比一原版牛津布鲁克斯大学毕业证(牛布毕业证)如何办理
meboh
 
PoliticalScience_SrSec_2023-24.pdfffffff
PoliticalScience_SrSec_2023-24.pdfffffffPoliticalScience_SrSec_2023-24.pdfffffff
PoliticalScience_SrSec_2023-24.pdfffffff
RajatVerma652178
 
一比一原版(uwgb毕业证书)美国威斯康星大学绿湾分校毕业证如何办理
一比一原版(uwgb毕业证书)美国威斯康星大学绿湾分校毕业证如何办理一比一原版(uwgb毕业证书)美国威斯康星大学绿湾分校毕业证如何办理
一比一原版(uwgb毕业证书)美国威斯康星大学绿湾分校毕业证如何办理
pdeehy
 
一比一原版(ua毕业证书)加拿大阿尔伯塔大学毕业证如何办理
一比一原版(ua毕业证书)加拿大阿尔伯塔大学毕业证如何办理一比一原版(ua毕业证书)加拿大阿尔伯塔大学毕业证如何办理
一比一原版(ua毕业证书)加拿大阿尔伯塔大学毕业证如何办理
ubype
 
一比一原版林肯大学毕业证(lincoln毕业证)如何办理
一比一原版林肯大学毕业证(lincoln毕业证)如何办理一比一原版林肯大学毕业证(lincoln毕业证)如何办理
一比一原版林肯大学毕业证(lincoln毕业证)如何办理
fexbqa
 
一比一原版朴次茅斯大学毕业证(uop毕业证)如何办理
一比一原版朴次茅斯大学毕业证(uop毕业证)如何办理一比一原版朴次茅斯大学毕业证(uop毕业证)如何办理
一比一原版朴次茅斯大学毕业证(uop毕业证)如何办理
onduyv
 
Should AI hold Intellectual Property Rights?
Should AI hold Intellectual Property Rights?Should AI hold Intellectual Property Rights?
Should AI hold Intellectual Property Rights?
RoseZubler1
 
一比一原版加拿大多伦多大学毕业证(uoft毕业证书)如何办理
一比一原版加拿大多伦多大学毕业证(uoft毕业证书)如何办理一比一原版加拿大多伦多大学毕业证(uoft毕业证书)如何办理
一比一原版加拿大多伦多大学毕业证(uoft毕业证书)如何办理
onduyv
 
一比一原版加拿大达尔豪斯大学毕业证(dalhousie毕业证书)如何办理
一比一原版加拿大达尔豪斯大学毕业证(dalhousie毕业证书)如何办理一比一原版加拿大达尔豪斯大学毕业证(dalhousie毕业证书)如何办理
一比一原版加拿大达尔豪斯大学毕业证(dalhousie毕业证书)如何办理
cadyzeo
 
BNS PRESENTATION for basic information.pdf
BNS PRESENTATION for basic information.pdfBNS PRESENTATION for basic information.pdf
BNS PRESENTATION for basic information.pdf
surbhiaeron21
 
A Critical Study of ICC Prosecutor's Move on GAZA War
A Critical Study of ICC Prosecutor's Move on GAZA WarA Critical Study of ICC Prosecutor's Move on GAZA War
A Critical Study of ICC Prosecutor's Move on GAZA War
Nilendra Kumar
 
一比一原版多伦多都会大学毕业证(TMU毕业证书)学历如何办理
一比一原版多伦多都会大学毕业证(TMU毕业证书)学历如何办理一比一原版多伦多都会大学毕业证(TMU毕业证书)学历如何办理
一比一原版多伦多都会大学毕业证(TMU毕业证书)学历如何办理
woywevt
 
Indonesian Manpower Regulation on Severance Pay for Retiring Private Sector E...
Indonesian Manpower Regulation on Severance Pay for Retiring Private Sector E...Indonesian Manpower Regulation on Severance Pay for Retiring Private Sector E...
Indonesian Manpower Regulation on Severance Pay for Retiring Private Sector E...
AHRP Law Firm
 
原版定做(sheffield学位证书)英国谢菲尔德大学毕业证文凭证书原版一模一样
原版定做(sheffield学位证书)英国谢菲尔德大学毕业证文凭证书原版一模一样原版定做(sheffield学位证书)英国谢菲尔德大学毕业证文凭证书原版一模一样
原版定做(sheffield学位证书)英国谢菲尔德大学毕业证文凭证书原版一模一样
abondo3
 
一比一原版(ual毕业证书)伦敦艺术大学毕业证如何办理
一比一原版(ual毕业证书)伦敦艺术大学毕业证如何办理一比一原版(ual毕业证书)伦敦艺术大学毕业证如何办理
一比一原版(ual毕业证书)伦敦艺术大学毕业证如何办理
ayvace
 
THE CONCEPT OF RIGHT TO DEFAULT BAIL.pptx
THE CONCEPT OF RIGHT TO DEFAULT BAIL.pptxTHE CONCEPT OF RIGHT TO DEFAULT BAIL.pptx
THE CONCEPT OF RIGHT TO DEFAULT BAIL.pptx
Namrata Chakraborty
 
17-03 2022 -full agreement full version .pdf
17-03 2022 -full agreement full version .pdf17-03 2022 -full agreement full version .pdf
17-03 2022 -full agreement full version .pdf
ssuser0dfed9
 

Recently uploaded (20)

一比一原版(monash毕业证书)莫纳什大学毕业证如何办理
一比一原版(monash毕业证书)莫纳什大学毕业证如何办理一比一原版(monash毕业证书)莫纳什大学毕业证如何办理
一比一原版(monash毕业证书)莫纳什大学毕业证如何办理
 
一比一原版(liverpool毕业证书)利物浦大学毕业证如何办理
一比一原版(liverpool毕业证书)利物浦大学毕业证如何办理一比一原版(liverpool毕业证书)利物浦大学毕业证如何办理
一比一原版(liverpool毕业证书)利物浦大学毕业证如何办理
 
一比一原版新加坡南洋理工大学毕业证(本硕)ntu学位证书如何办理
一比一原版新加坡南洋理工大学毕业证(本硕)ntu学位证书如何办理一比一原版新加坡南洋理工大学毕业证(本硕)ntu学位证书如何办理
一比一原版新加坡南洋理工大学毕业证(本硕)ntu学位证书如何办理
 
一比一原版牛津布鲁克斯大学毕业证(牛布毕业证)如何办理
一比一原版牛津布鲁克斯大学毕业证(牛布毕业证)如何办理一比一原版牛津布鲁克斯大学毕业证(牛布毕业证)如何办理
一比一原版牛津布鲁克斯大学毕业证(牛布毕业证)如何办理
 
PoliticalScience_SrSec_2023-24.pdfffffff
PoliticalScience_SrSec_2023-24.pdfffffffPoliticalScience_SrSec_2023-24.pdfffffff
PoliticalScience_SrSec_2023-24.pdfffffff
 
一比一原版(uwgb毕业证书)美国威斯康星大学绿湾分校毕业证如何办理
一比一原版(uwgb毕业证书)美国威斯康星大学绿湾分校毕业证如何办理一比一原版(uwgb毕业证书)美国威斯康星大学绿湾分校毕业证如何办理
一比一原版(uwgb毕业证书)美国威斯康星大学绿湾分校毕业证如何办理
 
一比一原版(ua毕业证书)加拿大阿尔伯塔大学毕业证如何办理
一比一原版(ua毕业证书)加拿大阿尔伯塔大学毕业证如何办理一比一原版(ua毕业证书)加拿大阿尔伯塔大学毕业证如何办理
一比一原版(ua毕业证书)加拿大阿尔伯塔大学毕业证如何办理
 
一比一原版林肯大学毕业证(lincoln毕业证)如何办理
一比一原版林肯大学毕业证(lincoln毕业证)如何办理一比一原版林肯大学毕业证(lincoln毕业证)如何办理
一比一原版林肯大学毕业证(lincoln毕业证)如何办理
 
一比一原版朴次茅斯大学毕业证(uop毕业证)如何办理
一比一原版朴次茅斯大学毕业证(uop毕业证)如何办理一比一原版朴次茅斯大学毕业证(uop毕业证)如何办理
一比一原版朴次茅斯大学毕业证(uop毕业证)如何办理
 
Should AI hold Intellectual Property Rights?
Should AI hold Intellectual Property Rights?Should AI hold Intellectual Property Rights?
Should AI hold Intellectual Property Rights?
 
一比一原版加拿大多伦多大学毕业证(uoft毕业证书)如何办理
一比一原版加拿大多伦多大学毕业证(uoft毕业证书)如何办理一比一原版加拿大多伦多大学毕业证(uoft毕业证书)如何办理
一比一原版加拿大多伦多大学毕业证(uoft毕业证书)如何办理
 
一比一原版加拿大达尔豪斯大学毕业证(dalhousie毕业证书)如何办理
一比一原版加拿大达尔豪斯大学毕业证(dalhousie毕业证书)如何办理一比一原版加拿大达尔豪斯大学毕业证(dalhousie毕业证书)如何办理
一比一原版加拿大达尔豪斯大学毕业证(dalhousie毕业证书)如何办理
 
BNS PRESENTATION for basic information.pdf
BNS PRESENTATION for basic information.pdfBNS PRESENTATION for basic information.pdf
BNS PRESENTATION for basic information.pdf
 
A Critical Study of ICC Prosecutor's Move on GAZA War
A Critical Study of ICC Prosecutor's Move on GAZA WarA Critical Study of ICC Prosecutor's Move on GAZA War
A Critical Study of ICC Prosecutor's Move on GAZA War
 
一比一原版多伦多都会大学毕业证(TMU毕业证书)学历如何办理
一比一原版多伦多都会大学毕业证(TMU毕业证书)学历如何办理一比一原版多伦多都会大学毕业证(TMU毕业证书)学历如何办理
一比一原版多伦多都会大学毕业证(TMU毕业证书)学历如何办理
 
Indonesian Manpower Regulation on Severance Pay for Retiring Private Sector E...
Indonesian Manpower Regulation on Severance Pay for Retiring Private Sector E...Indonesian Manpower Regulation on Severance Pay for Retiring Private Sector E...
Indonesian Manpower Regulation on Severance Pay for Retiring Private Sector E...
 
原版定做(sheffield学位证书)英国谢菲尔德大学毕业证文凭证书原版一模一样
原版定做(sheffield学位证书)英国谢菲尔德大学毕业证文凭证书原版一模一样原版定做(sheffield学位证书)英国谢菲尔德大学毕业证文凭证书原版一模一样
原版定做(sheffield学位证书)英国谢菲尔德大学毕业证文凭证书原版一模一样
 
一比一原版(ual毕业证书)伦敦艺术大学毕业证如何办理
一比一原版(ual毕业证书)伦敦艺术大学毕业证如何办理一比一原版(ual毕业证书)伦敦艺术大学毕业证如何办理
一比一原版(ual毕业证书)伦敦艺术大学毕业证如何办理
 
THE CONCEPT OF RIGHT TO DEFAULT BAIL.pptx
THE CONCEPT OF RIGHT TO DEFAULT BAIL.pptxTHE CONCEPT OF RIGHT TO DEFAULT BAIL.pptx
THE CONCEPT OF RIGHT TO DEFAULT BAIL.pptx
 
17-03 2022 -full agreement full version .pdf
17-03 2022 -full agreement full version .pdf17-03 2022 -full agreement full version .pdf
17-03 2022 -full agreement full version .pdf
 

Confidentiality

  • 2. • Protects all personal identifiable data • Apply to discussions about student / student’s record • Value by virtue of being kept secret and it must be capable of being legally protected. • Privileged information, classified information, or specific information of a type for which there is a clear and compelling need to withhold from disclosure. Definition
  • 4. CONFIDENTIALITY: The assurance that information about identifiable persons, the release of which would constitute an invasion of privacy for any individual, will not be disclosed without consent except as allowed by law.
  • 5. • Less privacy/confidentiality on the internet • Websites can track your surfing on their site by IP address and related system information, including system names and Internet network addresses that often uniquely identify your computer. • Search engines generally record: • - Queries together with your computer identification, building up a profile of your interests over time. Surfing leaves tracks
  • 6. • Turn your default browser settings to exclude cookies. • Use networked or single-point annonymizers to obscure all computer's local identifying information and obtain the maximum available Internet privacy Minimize threats
  • 7. • Posting publically makes you generally give up the rights to the content and any expectation of privacy or confidentiality. • In most countries, anything you post to a public space can be saved, archived, duplicated, distributed, and published, even years later, by anyone in the same way as a photograph taken in a public space like a city park. • If you have ever posted anything to the newsgroups, you might find it interesting to search them now for the email address you used at the time, which is one reason you should disguise your email address when posting to the Usenet newsgroups. Posting is public
  • 8. Fair Information Practices Data Release Restrictions Personnel Agreements Confidentiality Policies
  • 9. • Definition of confidential information • Need-to-know access only • No redisclosure • If questions, ask supervisor • Breach will result in disciplinary action • Confidentiality must be maintained indefinitely Confidentiality Provisions
  • 10. 1. The liability of those who in some sense act innocently. 2. The circumstances in which the damage may be awarded for breach. 3. The possibility of awarding damages for injury to feelings as distinct from economic loss. 4. The effects of dealing that treat the information as property. 5. The liability of indirect recipient. Concerns about confidential information
  • 11. • Confidentiality or privacy of everyone need to be protected. • The bottom line is that you have little privacy or confidentiality on the Internet, and unless your communications are encrypted and/or annonymized, you should assume they can be read by others. At the same time you need to make a realistic threat assessment depending on what you are doing CONCLUSION
  • 12. Akshay Maheshwari & Anjali Bhatt. (2014). Protection of Confidential Information:The Reality. Retrieved on 3rd October 2017 from https://www.lawctopus.com/academi e/rotection-confidential-information reality/ Reference