SlideShare a Scribd company logo
Personal Privacy &
Computer Technologies
Chapter #6
Submitted by: Raeesa
Sidra
Ayesha
Slides prepared by Cyndi Chie and Sarah
Frye
Content
 What is privacy
 Valuing Privacy
 Privacy and Computer Technology
 Privacy legislation
 Data Protection
 Data Protection Act 1998.
What is Privacy?
 Privacy is the protection of an individual’s personal
information.
 Privacy is the rights & obligations of individuals and
organizations with respect to collection, use, retention,
disclosure and disposal of personal information.
Valuing Privacy
 Privacy prevent others from obtaining personal, sensitive
information that could be used to acquire power over us.
 The first is that privacy helps individuals maintain their
autonomy and individuality. 
Valuing Privacy(cont.)
 Privacy also matters because our economy depends on it.
Imagine going to a bank for a loan, to a lawyer to draw
up a will, to a financial planner, to a property
management company to rent an apartment, or to the
internet to purchase a book online without any
guarantees that the information you provided would be
respected and kept confidential.
Privacy and Computer
Technology
Key Aspects of Privacy:
 Freedom from intrusion (being left alone)
 Control of information about oneself
 Freedom from surveillance (being tracked, followed,
watched)
Privacy and Computer
Technology (cont.)
New Technology, New Risks:
 Government and private databases
 Sophisticated tools for surveillance and data analysis
 Vulnerability of data
Privacy and Computer
Technology (cont.)
Terminology:
 Invisible information gathering - collection of personal
information about someone without the person’s
knowledge
 Secondary use - use of personal information for a
purpose other than the one it was provided for
Privacy and Computer
Technology (cont.)
Terminology (cont.):
 Data mining - searching and analyzing masses of data to
find patterns and develop new information or knowledge
 Computer matching - combining and comparing
information from different databases (using social
security number, for example, to match records)
Privacy and Computer
Technology (cont.)
Terminology (cont.):
 Computer profiling - analyzing data in computer files to
determine characteristics of people most likely to engage
in certain behavior
Privacy and Computer
Technology (cont.)
Principles for Data Collection and Use:
 Informed consent
 Opt-in and opt-out policies
 Fair Information Principles (or Practices)
 Data retention
Privacy legislation
 Privacy legislation explains:
 1. how organization and public bodies are allowed to use
collect and disclose the information about a person
 How you can request to access and update it
 To whom you can expose it etc.
The eight Data Protection
Principles
 Data protection principles designed to protect personal
data stored on computers or in an organized paper filing
system. 
 The Data Protection Act sets out eight principles
governing the use of personal information which we
must comply with, unless an exemption applies.
Data protection Act
principles
 First Principle Personal data shall be processed fairly
and lawfully and, in particular, shall not be processed
unless:
 at least one of the conditions in Schedule 2 is met, and
 in the case of sensitive personal data, at least one of the
conditions in Schedule 3 is also met.
Data Protection Act
Principle (cont.)
 Second Principle personal data shall be obtained only for
one or more specified and lawful purposes, and shall not
be further processed in any manner incompatible with
that purpose or those purposes.
 Third Principle Personal data shall be adequate, relevant
and not excessive in relation to the purpose or purposes
for which they are processed.
Data Protection Act
Principle (cont.)
 ForthPrinciple Personal data shall be accurate and,
where necessary, kept up to date.
 Fiftht Principle Personal data processed for any purpose
or purposes shall not be kept for longer than is necessary
for that purpose or those purposes.
 Sixth Principle About the rights of individuals e.g.[
 personal data shall be processed in accordance with the
rights of data subjects (individuals).
Data Protection Act
Principle (cont.)
 Seventh Principle Appropriate technical and
organizational measures shall be taken against
unauthorized or unlawful processing of personal data
and against accidental loss or destruction of, or damage
to, personal data.
 Eighth Principle Personal data shall not be transferred to
a country or territory outside the European economic
Area unless that country or territory ensures an adequate
level of protection for the rights and freedoms of data
subjects in relation to the processing of personal data.
Thank You

More Related Content

What's hot

Privacy in simple
Privacy in simplePrivacy in simple
Privacy in simple
Aurora Computer Studies
 
Introduction to Cyber Security
Introduction to Cyber SecurityIntroduction to Cyber Security
Introduction to Cyber SecurityStephen Lahanas
 
Fundamentals of Information Systems Security Chapter 1
Fundamentals of Information Systems Security Chapter 1Fundamentals of Information Systems Security Chapter 1
Fundamentals of Information Systems Security Chapter 1
Dr. Ahmed Al Zaidy
 
Unit 6 Privacy and Data Protection 8 hr
Unit 6  Privacy and Data Protection 8 hrUnit 6  Privacy and Data Protection 8 hr
Unit 6 Privacy and Data Protection 8 hr
Tushar Rajput
 
Unit 6 Privacy technological impacts.ppt
Unit 6 Privacy technological impacts.pptUnit 6 Privacy technological impacts.ppt
Unit 6 Privacy technological impacts.ppt
Yäsh Chaudhary
 
Data Privacy & Security
Data Privacy & SecurityData Privacy & Security
Data Privacy & Security
Eryk Budi Pratama
 
Data Protection Act
Data Protection ActData Protection Act
Data Protection Act
mrmwood
 
Data Protection and Privacy
Data Protection and PrivacyData Protection and Privacy
Data Protection and Privacy
Vertex Holdings
 
Introduction to security
Introduction to securityIntroduction to security
Introduction to security
Mukesh Chinta
 
Network security
Network security Network security
Network security
Madhumithah Ilango
 
Data Processing - data privacy and sensitive data
Data Processing - data privacy and sensitive dataData Processing - data privacy and sensitive data
Data Processing - data privacy and sensitive data
OpenAIRE
 
Legal, Ethical and professional issues in Information Security
Legal, Ethical and professional issues in Information SecurityLegal, Ethical and professional issues in Information Security
Legal, Ethical and professional issues in Information Security
Gamentortc
 
Ethics,security and privacy control
Ethics,security and privacy controlEthics,security and privacy control
Ethics,security and privacy control
Sifat Hossain
 
Cyber Security Awareness
Cyber Security AwarenessCyber Security Awareness
Cyber Security Awareness
Ramiro Cid
 
Information security in todays world
Information security in todays worldInformation security in todays world
Information security in todays world
Sibghatullah Khattak
 
Data Privacy: What you need to know about privacy, from compliance to ethics
Data Privacy: What you need to know about privacy, from compliance to ethicsData Privacy: What you need to know about privacy, from compliance to ethics
Data Privacy: What you need to know about privacy, from compliance to ethics
AT Internet
 
Cybersecurity
CybersecurityCybersecurity
Cybersecurity
A. Shamel
 
computer misuse n criminal law
computer misuse n criminal lawcomputer misuse n criminal law
computer misuse n criminal law
Hamza Cheema
 

What's hot (20)

Privacy in simple
Privacy in simplePrivacy in simple
Privacy in simple
 
Introduction to Cyber Security
Introduction to Cyber SecurityIntroduction to Cyber Security
Introduction to Cyber Security
 
Fundamentals of Information Systems Security Chapter 1
Fundamentals of Information Systems Security Chapter 1Fundamentals of Information Systems Security Chapter 1
Fundamentals of Information Systems Security Chapter 1
 
Unit 6 Privacy and Data Protection 8 hr
Unit 6  Privacy and Data Protection 8 hrUnit 6  Privacy and Data Protection 8 hr
Unit 6 Privacy and Data Protection 8 hr
 
Unit 6 Privacy technological impacts.ppt
Unit 6 Privacy technological impacts.pptUnit 6 Privacy technological impacts.ppt
Unit 6 Privacy technological impacts.ppt
 
Data protection
Data protectionData protection
Data protection
 
Data Privacy & Security
Data Privacy & SecurityData Privacy & Security
Data Privacy & Security
 
Data Protection Act
Data Protection ActData Protection Act
Data Protection Act
 
Data Protection and Privacy
Data Protection and PrivacyData Protection and Privacy
Data Protection and Privacy
 
Introduction to security
Introduction to securityIntroduction to security
Introduction to security
 
Network security
Network security Network security
Network security
 
Data Processing - data privacy and sensitive data
Data Processing - data privacy and sensitive dataData Processing - data privacy and sensitive data
Data Processing - data privacy and sensitive data
 
Legal, Ethical and professional issues in Information Security
Legal, Ethical and professional issues in Information SecurityLegal, Ethical and professional issues in Information Security
Legal, Ethical and professional issues in Information Security
 
Overview of Information Security & Privacy
Overview of Information Security & PrivacyOverview of Information Security & Privacy
Overview of Information Security & Privacy
 
Ethics,security and privacy control
Ethics,security and privacy controlEthics,security and privacy control
Ethics,security and privacy control
 
Cyber Security Awareness
Cyber Security AwarenessCyber Security Awareness
Cyber Security Awareness
 
Information security in todays world
Information security in todays worldInformation security in todays world
Information security in todays world
 
Data Privacy: What you need to know about privacy, from compliance to ethics
Data Privacy: What you need to know about privacy, from compliance to ethicsData Privacy: What you need to know about privacy, from compliance to ethics
Data Privacy: What you need to know about privacy, from compliance to ethics
 
Cybersecurity
CybersecurityCybersecurity
Cybersecurity
 
computer misuse n criminal law
computer misuse n criminal lawcomputer misuse n criminal law
computer misuse n criminal law
 

Similar to Personal privacy and computer technologies

Data protection act
Data protection act Data protection act
Data protection act Iqbal Bocus
 
Chapter 2PrivacyBased on slides prepared by Cyndi C.docx
Chapter 2PrivacyBased on slides prepared by Cyndi C.docxChapter 2PrivacyBased on slides prepared by Cyndi C.docx
Chapter 2PrivacyBased on slides prepared by Cyndi C.docx
walterl4
 
Data protection act new 13 12-11
Data protection act new 13 12-11Data protection act new 13 12-11
Data protection act new 13 12-11mrmwood
 
Data protection in_india
Data protection in_indiaData protection in_india
Data protection in_indiaAltacit Global
 
Managing Data Protection guide powerpoint presentation
Managing Data Protection guide powerpoint presentationManaging Data Protection guide powerpoint presentation
Managing Data Protection guide powerpoint presentation
silvereyez11
 
Chapter2
Chapter2Chapter2
Chapter2Pibi Lu
 
VIAF GDPR
VIAF GDPRVIAF GDPR
Data privacy Legislation in India
Data privacy Legislation in IndiaData privacy Legislation in India
Data privacy Legislation in India
LATHA H C
 
Lesson4-Privacy and Data Protection.pptx
Lesson4-Privacy and Data Protection.pptxLesson4-Privacy and Data Protection.pptx
Lesson4-Privacy and Data Protection.pptx
adnis1
 
PERSONAL-DATA-PROTECTION-BILL-2018.pptx
PERSONAL-DATA-PROTECTION-BILL-2018.pptxPERSONAL-DATA-PROTECTION-BILL-2018.pptx
PERSONAL-DATA-PROTECTION-BILL-2018.pptx
ssuser36d167
 
My presentation- Ala about privacy and GDPR
My presentation- Ala about privacy and GDPRMy presentation- Ala about privacy and GDPR
My presentation- Ala about privacy and GDPR
zayadeen2003
 
Baase_Henry_GoF5e_Ch2.pptx Gift of Fire Computer Ethics
Baase_Henry_GoF5e_Ch2.pptx Gift of Fire Computer EthicsBaase_Henry_GoF5e_Ch2.pptx Gift of Fire Computer Ethics
Baase_Henry_GoF5e_Ch2.pptx Gift of Fire Computer Ethics
dordunureubenmawukok
 
Data protection regulation
Data protection regulationData protection regulation
Data protection regulation
Greg Ezeilo
 
Part 3 - Data Protection Principles.pdf
Part 3 - Data Protection Principles.pdfPart 3 - Data Protection Principles.pdf
Part 3 - Data Protection Principles.pdf
kiruthigajawahar6
 
Safety And Security Of Data 4
Safety And Security Of Data 4Safety And Security Of Data 4
Safety And Security Of Data 4
Wynthorpe
 
Right to privacy on internet and Data Protection
Right to privacy on internet and Data ProtectionRight to privacy on internet and Data Protection
Right to privacy on internet and Data Protection
atuljaybhaye
 
Data Protection in India
Data Protection in IndiaData Protection in India
Data Protection in India
Home
 
Cie 2 cyber law
Cie 2  cyber lawCie 2  cyber law
Cie 2 cyber law
Mahua Narayan
 
iSPIRT’s Response- White Paper on Data Protection Framework for India
iSPIRT’s Response- White Paper on Data Protection Framework for IndiaiSPIRT’s Response- White Paper on Data Protection Framework for India
iSPIRT’s Response- White Paper on Data Protection Framework for India
ProductNation/iSPIRT
 
Privacy in India: Legal issues
Privacy in India: Legal issuesPrivacy in India: Legal issues
Privacy in India: Legal issuesSagar Rahurkar
 

Similar to Personal privacy and computer technologies (20)

Data protection act
Data protection act Data protection act
Data protection act
 
Chapter 2PrivacyBased on slides prepared by Cyndi C.docx
Chapter 2PrivacyBased on slides prepared by Cyndi C.docxChapter 2PrivacyBased on slides prepared by Cyndi C.docx
Chapter 2PrivacyBased on slides prepared by Cyndi C.docx
 
Data protection act new 13 12-11
Data protection act new 13 12-11Data protection act new 13 12-11
Data protection act new 13 12-11
 
Data protection in_india
Data protection in_indiaData protection in_india
Data protection in_india
 
Managing Data Protection guide powerpoint presentation
Managing Data Protection guide powerpoint presentationManaging Data Protection guide powerpoint presentation
Managing Data Protection guide powerpoint presentation
 
Chapter2
Chapter2Chapter2
Chapter2
 
VIAF GDPR
VIAF GDPRVIAF GDPR
VIAF GDPR
 
Data privacy Legislation in India
Data privacy Legislation in IndiaData privacy Legislation in India
Data privacy Legislation in India
 
Lesson4-Privacy and Data Protection.pptx
Lesson4-Privacy and Data Protection.pptxLesson4-Privacy and Data Protection.pptx
Lesson4-Privacy and Data Protection.pptx
 
PERSONAL-DATA-PROTECTION-BILL-2018.pptx
PERSONAL-DATA-PROTECTION-BILL-2018.pptxPERSONAL-DATA-PROTECTION-BILL-2018.pptx
PERSONAL-DATA-PROTECTION-BILL-2018.pptx
 
My presentation- Ala about privacy and GDPR
My presentation- Ala about privacy and GDPRMy presentation- Ala about privacy and GDPR
My presentation- Ala about privacy and GDPR
 
Baase_Henry_GoF5e_Ch2.pptx Gift of Fire Computer Ethics
Baase_Henry_GoF5e_Ch2.pptx Gift of Fire Computer EthicsBaase_Henry_GoF5e_Ch2.pptx Gift of Fire Computer Ethics
Baase_Henry_GoF5e_Ch2.pptx Gift of Fire Computer Ethics
 
Data protection regulation
Data protection regulationData protection regulation
Data protection regulation
 
Part 3 - Data Protection Principles.pdf
Part 3 - Data Protection Principles.pdfPart 3 - Data Protection Principles.pdf
Part 3 - Data Protection Principles.pdf
 
Safety And Security Of Data 4
Safety And Security Of Data 4Safety And Security Of Data 4
Safety And Security Of Data 4
 
Right to privacy on internet and Data Protection
Right to privacy on internet and Data ProtectionRight to privacy on internet and Data Protection
Right to privacy on internet and Data Protection
 
Data Protection in India
Data Protection in IndiaData Protection in India
Data Protection in India
 
Cie 2 cyber law
Cie 2  cyber lawCie 2  cyber law
Cie 2 cyber law
 
iSPIRT’s Response- White Paper on Data Protection Framework for India
iSPIRT’s Response- White Paper on Data Protection Framework for IndiaiSPIRT’s Response- White Paper on Data Protection Framework for India
iSPIRT’s Response- White Paper on Data Protection Framework for India
 
Privacy in India: Legal issues
Privacy in India: Legal issuesPrivacy in India: Legal issues
Privacy in India: Legal issues
 

Recently uploaded

The Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official PublicationThe Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official Publication
Delapenabediema
 
Guidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th SemesterGuidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th Semester
Atul Kumar Singh
 
Best Digital Marketing Institute In NOIDA
Best Digital Marketing Institute In NOIDABest Digital Marketing Institute In NOIDA
Best Digital Marketing Institute In NOIDA
deeptiverma2406
 
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdfUnit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Thiyagu K
 
The Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptxThe Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptx
DhatriParmar
 
Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
Thiyagu K
 
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
MysoreMuleSoftMeetup
 
The approach at University of Liverpool.pptx
The approach at University of Liverpool.pptxThe approach at University of Liverpool.pptx
The approach at University of Liverpool.pptx
Jisc
 
A Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptxA Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptx
thanhdowork
 
The basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptxThe basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptx
heathfieldcps1
 
Normal Labour/ Stages of Labour/ Mechanism of Labour
Normal Labour/ Stages of Labour/ Mechanism of LabourNormal Labour/ Stages of Labour/ Mechanism of Labour
Normal Labour/ Stages of Labour/ Mechanism of Labour
Wasim Ak
 
Acetabularia Information For Class 9 .docx
Acetabularia Information For Class 9  .docxAcetabularia Information For Class 9  .docx
Acetabularia Information For Class 9 .docx
vaibhavrinwa19
 
A Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in EducationA Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in Education
Peter Windle
 
Model Attribute Check Company Auto Property
Model Attribute  Check Company Auto PropertyModel Attribute  Check Company Auto Property
Model Attribute Check Company Auto Property
Celine George
 
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama UniversityNatural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
Akanksha trivedi rama nursing college kanpur.
 
The Diamond Necklace by Guy De Maupassant.pptx
The Diamond Necklace by Guy De Maupassant.pptxThe Diamond Necklace by Guy De Maupassant.pptx
The Diamond Necklace by Guy De Maupassant.pptx
DhatriParmar
 
Marketing internship report file for MBA
Marketing internship report file for MBAMarketing internship report file for MBA
Marketing internship report file for MBA
gb193092
 
2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...
Sandy Millin
 
Digital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and ResearchDigital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and Research
Vikramjit Singh
 
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
Levi Shapiro
 

Recently uploaded (20)

The Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official PublicationThe Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official Publication
 
Guidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th SemesterGuidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th Semester
 
Best Digital Marketing Institute In NOIDA
Best Digital Marketing Institute In NOIDABest Digital Marketing Institute In NOIDA
Best Digital Marketing Institute In NOIDA
 
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdfUnit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdf
 
The Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptxThe Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptx
 
Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
 
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
 
The approach at University of Liverpool.pptx
The approach at University of Liverpool.pptxThe approach at University of Liverpool.pptx
The approach at University of Liverpool.pptx
 
A Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptxA Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptx
 
The basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptxThe basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptx
 
Normal Labour/ Stages of Labour/ Mechanism of Labour
Normal Labour/ Stages of Labour/ Mechanism of LabourNormal Labour/ Stages of Labour/ Mechanism of Labour
Normal Labour/ Stages of Labour/ Mechanism of Labour
 
Acetabularia Information For Class 9 .docx
Acetabularia Information For Class 9  .docxAcetabularia Information For Class 9  .docx
Acetabularia Information For Class 9 .docx
 
A Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in EducationA Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in Education
 
Model Attribute Check Company Auto Property
Model Attribute  Check Company Auto PropertyModel Attribute  Check Company Auto Property
Model Attribute Check Company Auto Property
 
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama UniversityNatural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
 
The Diamond Necklace by Guy De Maupassant.pptx
The Diamond Necklace by Guy De Maupassant.pptxThe Diamond Necklace by Guy De Maupassant.pptx
The Diamond Necklace by Guy De Maupassant.pptx
 
Marketing internship report file for MBA
Marketing internship report file for MBAMarketing internship report file for MBA
Marketing internship report file for MBA
 
2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...
 
Digital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and ResearchDigital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and Research
 
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
 

Personal privacy and computer technologies

  • 1. Personal Privacy & Computer Technologies Chapter #6 Submitted by: Raeesa Sidra Ayesha Slides prepared by Cyndi Chie and Sarah Frye
  • 2. Content  What is privacy  Valuing Privacy  Privacy and Computer Technology  Privacy legislation  Data Protection  Data Protection Act 1998.
  • 3. What is Privacy?  Privacy is the protection of an individual’s personal information.  Privacy is the rights & obligations of individuals and organizations with respect to collection, use, retention, disclosure and disposal of personal information.
  • 4. Valuing Privacy  Privacy prevent others from obtaining personal, sensitive information that could be used to acquire power over us.  The first is that privacy helps individuals maintain their autonomy and individuality. 
  • 5. Valuing Privacy(cont.)  Privacy also matters because our economy depends on it. Imagine going to a bank for a loan, to a lawyer to draw up a will, to a financial planner, to a property management company to rent an apartment, or to the internet to purchase a book online without any guarantees that the information you provided would be respected and kept confidential.
  • 6. Privacy and Computer Technology Key Aspects of Privacy:  Freedom from intrusion (being left alone)  Control of information about oneself  Freedom from surveillance (being tracked, followed, watched)
  • 7. Privacy and Computer Technology (cont.) New Technology, New Risks:  Government and private databases  Sophisticated tools for surveillance and data analysis  Vulnerability of data
  • 8. Privacy and Computer Technology (cont.) Terminology:  Invisible information gathering - collection of personal information about someone without the person’s knowledge  Secondary use - use of personal information for a purpose other than the one it was provided for
  • 9. Privacy and Computer Technology (cont.) Terminology (cont.):  Data mining - searching and analyzing masses of data to find patterns and develop new information or knowledge  Computer matching - combining and comparing information from different databases (using social security number, for example, to match records)
  • 10. Privacy and Computer Technology (cont.) Terminology (cont.):  Computer profiling - analyzing data in computer files to determine characteristics of people most likely to engage in certain behavior
  • 11. Privacy and Computer Technology (cont.) Principles for Data Collection and Use:  Informed consent  Opt-in and opt-out policies  Fair Information Principles (or Practices)  Data retention
  • 12. Privacy legislation  Privacy legislation explains:  1. how organization and public bodies are allowed to use collect and disclose the information about a person  How you can request to access and update it  To whom you can expose it etc.
  • 13. The eight Data Protection Principles  Data protection principles designed to protect personal data stored on computers or in an organized paper filing system.   The Data Protection Act sets out eight principles governing the use of personal information which we must comply with, unless an exemption applies.
  • 14. Data protection Act principles  First Principle Personal data shall be processed fairly and lawfully and, in particular, shall not be processed unless:  at least one of the conditions in Schedule 2 is met, and  in the case of sensitive personal data, at least one of the conditions in Schedule 3 is also met.
  • 15. Data Protection Act Principle (cont.)  Second Principle personal data shall be obtained only for one or more specified and lawful purposes, and shall not be further processed in any manner incompatible with that purpose or those purposes.  Third Principle Personal data shall be adequate, relevant and not excessive in relation to the purpose or purposes for which they are processed.
  • 16. Data Protection Act Principle (cont.)  ForthPrinciple Personal data shall be accurate and, where necessary, kept up to date.  Fiftht Principle Personal data processed for any purpose or purposes shall not be kept for longer than is necessary for that purpose or those purposes.  Sixth Principle About the rights of individuals e.g.[  personal data shall be processed in accordance with the rights of data subjects (individuals).
  • 17. Data Protection Act Principle (cont.)  Seventh Principle Appropriate technical and organizational measures shall be taken against unauthorized or unlawful processing of personal data and against accidental loss or destruction of, or damage to, personal data.  Eighth Principle Personal data shall not be transferred to a country or territory outside the European economic Area unless that country or territory ensures an adequate level of protection for the rights and freedoms of data subjects in relation to the processing of personal data.