SlideShare a Scribd company logo
ICT Ethics



First Bigger Task


Anssi Mustonen
Case
●   Toysmart.com, an Internet-based retailer
    company
●   Customers provided personal information
    as they registered to the website
●   Privacy policy stated that information would
    be protected and not spread outside the
    company
Case
●   Company went bankrupt and decided to
    sell its assets to the highest bidder –
    including its customer database
●   Buyers believed that the privacy policy was
    now void, and that the customer
    information could be used freely
Key ethical issues
●   Is it ethical to sell customer data to new
    owners? Should it even be legal?
●   Were customers misled? Were the new
    owners misled?
●   Should the original privacy policy be
    respected by the new owners?
Stakeholders
●   Customers – Were they misled?
●   Original owners – Has their responsibility ended?
●   New owners – What should they do with the data?

●   Government?
        –   Is selling customer information legal?
        –   Should the original privacy policy always be
             respected?
Description and analysis
●   The case is mainly a privacy issue
       –   If new owners can do whatever they like, it
              has potential to expand
       –   The customers' privacy has clearly been
            violated
●   Should the new owners be allowed to do
    whatever they like with the information?
       –   Were they misled to believe that they are?
       –   Is it the same company anymore?
Motives and interests
●   Customers
       –   Expect not to hear anything in connection
            to the given information
●   Original owners
       –   Only see the information as part of their
            business and want to get rid of it
●   New owners
       –   Depends on the owners
Ethical theories
●   Case doesn't clearly state if information
    has been sold yet → we suppose it has
●   Applied theories
        –   Act utilitarianism
        –   Act deontology
Act utilitarianism
●   Utilitarianism: what is best for everyone
●   An act is moral if it produces the greatest
    amount of good for the greatest number of
    persons (stakeholders)
●   Weigh the positive and negative sides of
    each possible action
Act utilitarianism
●   Action: Delete customer data
        –   Customers are happy, new owners might
             not be
●   Action: Use data by your own rules
        –   Customer response depends on what is
             done, new owners are happy
●   Action: Keep original privacy policy
        –   Customers are happy, new owners might
             benefit from data somehow
Act utilitarianism
●   Customers are clearly the largest group of
    stakeholders
         → It is ethical to keep them happy.
●   New owners might benefit from the data
    somehow even if they adhere to the privacy
    policy
●   Original owners probably don't care
Act deontology
●   Duty-based approach
         → It's ethically correct to follow your
          obligations to others
●   Consider each situation separately and
    decide what is the right thing to do
Act deontology
●   Action: Delete customer data
        –   Right to the customers, not right to the new
             owners
●   Action: Use data by your own rules
        –   Not right to the customers, right to the new
             owners
●   Action: Keep original privacy policy
        –   Probably ok to most customers, new
             owners might benefit from data somehow
Conclusion
●   It is not ethical to use the customer data in
    a way that goes against the privacy policy
●   Most stakeholders are probably happy if
    the privacy policy is respected
●   A situation like this can be avoided by
    setting up a law

More Related Content

Similar to ICT Ethics Fbt

Polina Zvyagina - Airbnb - Privacy & GDPR Compliance - Stanford Engineering -...
Polina Zvyagina - Airbnb - Privacy & GDPR Compliance - Stanford Engineering -...Polina Zvyagina - Airbnb - Privacy & GDPR Compliance - Stanford Engineering -...
Polina Zvyagina - Airbnb - Privacy & GDPR Compliance - Stanford Engineering -...Burton Lee
 
Everything B2B Tech Marketers Need to Know About Privacy + Consent
Everything B2B Tech Marketers Need to Know About Privacy + ConsentEverything B2B Tech Marketers Need to Know About Privacy + Consent
Everything B2B Tech Marketers Need to Know About Privacy + ConsentKiwi Creative
 
Putting the Consumer First
Putting the Consumer FirstPutting the Consumer First
Putting the Consumer FirstVivastream
 
Putting The Consumer First
Putting The Consumer FirstPutting The Consumer First
Putting The Consumer FirstVivastream
 
Privacy and Big Data Overload!
Privacy and Big Data Overload!Privacy and Big Data Overload!
Privacy and Big Data Overload!SparkPost
 
The General Data Protection Regulation (GDPR) in Ireland-What You Should Know
The General Data Protection Regulation (GDPR) in Ireland-What You Should KnowThe General Data Protection Regulation (GDPR) in Ireland-What You Should Know
The General Data Protection Regulation (GDPR) in Ireland-What You Should KnowTerry Gorry
 
GDPR, WordPress and You.
GDPR, WordPress and You.GDPR, WordPress and You.
GDPR, WordPress and You.WordCamp Sydney
 
Ethics in Data Management.pptx
Ethics in Data Management.pptxEthics in Data Management.pptx
Ethics in Data Management.pptxRavindra Babu
 
EU Privacy Laws and Start-Ups
EU Privacy Laws and Start-UpsEU Privacy Laws and Start-Ups
EU Privacy Laws and Start-UpsExove
 
GDPR Is Around the Corner - Don't Panic
GDPR Is Around the Corner - Don't PanicGDPR Is Around the Corner - Don't Panic
GDPR Is Around the Corner - Don't PaniceZ Systems
 
Data privacy presentation
Data privacy presentationData privacy presentation
Data privacy presentationTravers Morgan
 
Data Compliance Updates in the US and EU
Data Compliance Updates in the US and EUData Compliance Updates in the US and EU
Data Compliance Updates in the US and EUVbout.com
 
GDPR Practicalities - The Data Shed
GDPR Practicalities - The Data ShedGDPR Practicalities - The Data Shed
GDPR Practicalities - The Data ShedStewart Norriss
 
Internet security and privacy issues
Internet security and privacy issuesInternet security and privacy issues
Internet security and privacy issuesJagdeepSingh394
 
Ensuring GDPR Compliance - A Zymplify Guide
Ensuring GDPR Compliance - A Zymplify GuideEnsuring GDPR Compliance - A Zymplify Guide
Ensuring GDPR Compliance - A Zymplify GuideZymplify
 
mHealth Israel_EU General Data Protection Regulation_Simon Marks
mHealth Israel_EU General Data Protection Regulation_Simon MarksmHealth Israel_EU General Data Protection Regulation_Simon Marks
mHealth Israel_EU General Data Protection Regulation_Simon MarksLevi Shapiro
 
What You Should Know About Data Privacy- Knobbe Martens Webinar Series for St...
What You Should Know About Data Privacy- Knobbe Martens Webinar Series for St...What You Should Know About Data Privacy- Knobbe Martens Webinar Series for St...
What You Should Know About Data Privacy- Knobbe Martens Webinar Series for St...Knobbe Martens - Intellectual Property Law
 

Similar to ICT Ethics Fbt (20)

Polina Zvyagina - Airbnb - Privacy & GDPR Compliance - Stanford Engineering -...
Polina Zvyagina - Airbnb - Privacy & GDPR Compliance - Stanford Engineering -...Polina Zvyagina - Airbnb - Privacy & GDPR Compliance - Stanford Engineering -...
Polina Zvyagina - Airbnb - Privacy & GDPR Compliance - Stanford Engineering -...
 
Everything B2B Tech Marketers Need to Know About Privacy + Consent
Everything B2B Tech Marketers Need to Know About Privacy + ConsentEverything B2B Tech Marketers Need to Know About Privacy + Consent
Everything B2B Tech Marketers Need to Know About Privacy + Consent
 
Putting the Consumer First
Putting the Consumer FirstPutting the Consumer First
Putting the Consumer First
 
GDPRforum London
GDPRforum LondonGDPRforum London
GDPRforum London
 
Putting The Consumer First
Putting The Consumer FirstPutting The Consumer First
Putting The Consumer First
 
GDPR - Sink or Swim
GDPR - Sink or SwimGDPR - Sink or Swim
GDPR - Sink or Swim
 
Privacy and Big Data Overload!
Privacy and Big Data Overload!Privacy and Big Data Overload!
Privacy and Big Data Overload!
 
The General Data Protection Regulation (GDPR) in Ireland-What You Should Know
The General Data Protection Regulation (GDPR) in Ireland-What You Should KnowThe General Data Protection Regulation (GDPR) in Ireland-What You Should Know
The General Data Protection Regulation (GDPR) in Ireland-What You Should Know
 
GDPR, WordPress and You.
GDPR, WordPress and You.GDPR, WordPress and You.
GDPR, WordPress and You.
 
Ethics in Data Management.pptx
Ethics in Data Management.pptxEthics in Data Management.pptx
Ethics in Data Management.pptx
 
EU Privacy Laws and Start-Ups
EU Privacy Laws and Start-UpsEU Privacy Laws and Start-Ups
EU Privacy Laws and Start-Ups
 
GDPR Is Around the Corner - Don't Panic
GDPR Is Around the Corner - Don't PanicGDPR Is Around the Corner - Don't Panic
GDPR Is Around the Corner - Don't Panic
 
Data privacy presentation
Data privacy presentationData privacy presentation
Data privacy presentation
 
Data Compliance Updates in the US and EU
Data Compliance Updates in the US and EUData Compliance Updates in the US and EU
Data Compliance Updates in the US and EU
 
GDPR Practicalities - The Data Shed
GDPR Practicalities - The Data ShedGDPR Practicalities - The Data Shed
GDPR Practicalities - The Data Shed
 
Internet security and privacy issues
Internet security and privacy issuesInternet security and privacy issues
Internet security and privacy issues
 
Ensuring GDPR Compliance - A Zymplify Guide
Ensuring GDPR Compliance - A Zymplify GuideEnsuring GDPR Compliance - A Zymplify Guide
Ensuring GDPR Compliance - A Zymplify Guide
 
GDPR: What does it mean for your business?
GDPR: What does it mean for your business?GDPR: What does it mean for your business?
GDPR: What does it mean for your business?
 
mHealth Israel_EU General Data Protection Regulation_Simon Marks
mHealth Israel_EU General Data Protection Regulation_Simon MarksmHealth Israel_EU General Data Protection Regulation_Simon Marks
mHealth Israel_EU General Data Protection Regulation_Simon Marks
 
What You Should Know About Data Privacy- Knobbe Martens Webinar Series for St...
What You Should Know About Data Privacy- Knobbe Martens Webinar Series for St...What You Should Know About Data Privacy- Knobbe Martens Webinar Series for St...
What You Should Know About Data Privacy- Knobbe Martens Webinar Series for St...
 

Recently uploaded

Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsDorra BARTAGUIZ
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Alison B. Lowndes
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Thierry Lestable
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Ramesh Iyer
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...UiPathCommunity
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesThousandEyes
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersSafe Software
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGuy Korland
 
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptxIOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptxAbida Shariff
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...Product School
 
"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor TurskyiFwdays
 
ODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User GroupODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User GroupCatarinaPereira64715
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Product School
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Frank van Harmelen
 
Search and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical FuturesSearch and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical FuturesBhaskar Mitra
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsPaul Groth
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewPrayukth K V
 
Quantum Computing: Current Landscape and the Future Role of APIs
Quantum Computing: Current Landscape and the Future Role of APIsQuantum Computing: Current Landscape and the Future Role of APIs
Quantum Computing: Current Landscape and the Future Role of APIsVlad Stirbu
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesLaura Byrne
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingThijs Feryn
 

Recently uploaded (20)

Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptxIOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
 
"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi
 
ODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User GroupODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User Group
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
 
Search and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical FuturesSearch and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical Futures
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
Quantum Computing: Current Landscape and the Future Role of APIs
Quantum Computing: Current Landscape and the Future Role of APIsQuantum Computing: Current Landscape and the Future Role of APIs
Quantum Computing: Current Landscape and the Future Role of APIs
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
 

ICT Ethics Fbt

  • 1. ICT Ethics First Bigger Task Anssi Mustonen
  • 2. Case ● Toysmart.com, an Internet-based retailer company ● Customers provided personal information as they registered to the website ● Privacy policy stated that information would be protected and not spread outside the company
  • 3. Case ● Company went bankrupt and decided to sell its assets to the highest bidder – including its customer database ● Buyers believed that the privacy policy was now void, and that the customer information could be used freely
  • 4. Key ethical issues ● Is it ethical to sell customer data to new owners? Should it even be legal? ● Were customers misled? Were the new owners misled? ● Should the original privacy policy be respected by the new owners?
  • 5. Stakeholders ● Customers – Were they misled? ● Original owners – Has their responsibility ended? ● New owners – What should they do with the data? ● Government? – Is selling customer information legal? – Should the original privacy policy always be respected?
  • 6. Description and analysis ● The case is mainly a privacy issue – If new owners can do whatever they like, it has potential to expand – The customers' privacy has clearly been violated ● Should the new owners be allowed to do whatever they like with the information? – Were they misled to believe that they are? – Is it the same company anymore?
  • 7. Motives and interests ● Customers – Expect not to hear anything in connection to the given information ● Original owners – Only see the information as part of their business and want to get rid of it ● New owners – Depends on the owners
  • 8. Ethical theories ● Case doesn't clearly state if information has been sold yet → we suppose it has ● Applied theories – Act utilitarianism – Act deontology
  • 9. Act utilitarianism ● Utilitarianism: what is best for everyone ● An act is moral if it produces the greatest amount of good for the greatest number of persons (stakeholders) ● Weigh the positive and negative sides of each possible action
  • 10. Act utilitarianism ● Action: Delete customer data – Customers are happy, new owners might not be ● Action: Use data by your own rules – Customer response depends on what is done, new owners are happy ● Action: Keep original privacy policy – Customers are happy, new owners might benefit from data somehow
  • 11. Act utilitarianism ● Customers are clearly the largest group of stakeholders → It is ethical to keep them happy. ● New owners might benefit from the data somehow even if they adhere to the privacy policy ● Original owners probably don't care
  • 12. Act deontology ● Duty-based approach → It's ethically correct to follow your obligations to others ● Consider each situation separately and decide what is the right thing to do
  • 13. Act deontology ● Action: Delete customer data – Right to the customers, not right to the new owners ● Action: Use data by your own rules – Not right to the customers, right to the new owners ● Action: Keep original privacy policy – Probably ok to most customers, new owners might benefit from data somehow
  • 14. Conclusion ● It is not ethical to use the customer data in a way that goes against the privacy policy ● Most stakeholders are probably happy if the privacy policy is respected ● A situation like this can be avoided by setting up a law