SlideShare a Scribd company logo
PRESENTATION
PRIVACYStudent Name : Saad Mohammad Saeed alshahrani
Teacher Name : Hamdan Ali Al-Shehri
Computing ethics
INTRODUCTION
• THE USE OF INFORMATION TECHNOLOGY IN BUSINESS REQUIRES BALANCING THE NEEDS
OF THOSE WHO USE THE INFORMATION THAT IS COLLECTED AGAINST THE RIGHTS AND
DESIRES OF THE PEOPLE WHOSE INFORMATION IS BEING USED.
• ON THE ONE HAND, INFORMATION ABOUT PEOPLE IS GATHERED, STORED, ANALYZED,
AND REPORTED BECAUSE ORGANIZATIONS CAN USE IT TO MAKE BETTER DECISIONS.
• SOME OF THESE DECISIONS, INCLUDING WHETHER OR NOT TO HIRE A JOB CANDIDATE,
APPROVE A LOAN, OR OFFER A SCHOLARSHIP, CAN PROFOUNDLY AFFECT PEOPLE’S LIVES.
• IN ADDITION, THE GLOBAL MARKETPLACE AND INTENSIFIED COMPETITION HAVE
INCREASED THE IMPORTANCE OF KNOWING CONSUMERS’ PURCHASING HABITS AND
FINANCIAL CONDITION.
• COMPANIES USE THIS INFORMATION TO TARGET MARKETING EFFORTS TO CONSUMERS
WHO ARE MOST LIKELY TO BUY THEIR PRODUCTS AND SERVICES.
• ORGANIZATIONS ALSO NEED BASIC INFORMATION ABOUT CUSTOMERS TO SERVE THEM
BETTER. IT IS HARD TO IMAGINE AN ORGANIZATION HAVING PRODUCTIVE RELATIONSHIPS
WITH ITS CUSTOMERS WITHOUT HAVING DATA ABOUT THEM.
• THUS, ORGANIZATIONS WANT SYSTEMS THAT COLLECT AND STORE KEY DATA FROM
EVERY INTERACTION THEY HAVE WITH A CUSTOMER.
INFORMATION PRIVACY
INFORMATION PRIVACY IS THE COMBINATION OF
• COMMUNICATIONS PRIVACY (THE ABILITY TO
COMMUNICATE WITH OTHERS WITHOUT THOSE
COMMUNICATIONS BEING MONITORED BY OTHER
PERSONS OR ORGANIZATIONS) AND
• DATA PRIVACY (THE ABILITY TO LIMIT ACCESS TO ONE’S
PERSONAL DATA BY OTHER INDIVIDUALS AND
ORGANIZATIONS IN ORDER TO EXERCISE A SUBSTANTIAL
DEGREE OF CONTROL OVER THAT DATA AND ITS USE).
DATA & INFORMATION PRIVACY
GUIDELINES
KEY PRIVACY ISSUES
IDENTITY THEFT
IDENTITY THEFT OCCURS WHEN SOMEONE STEALS KEY PIECES OF PERSONAL INFORMATION
TO IMPERSONATE A PERSON. THIS INFORMATION MAY INCLUDE SUCH DATA AS NAME,
ADDRESS, DATE OF BIRTH, SOCIAL SECURITY NUMBER, PASSPORT NUMBER, DRIVER’S LICENSE
NUMBER, AND MOTHER’S MAIDEN NAME.
FOUR APPROACHES ARE FREQUENTLY USED BY IDENTITY THIEVES TO CAPTURE THE
PERSONAL DATA OF THEIR VICTIMS:
(1) CREATE A DATA BREACH TO STEAL HUNDREDS, THOUSANDS, OR EVEN MILLIONS OF
PERSONAL RECORDS;
(2) PURCHASE PERSONAL DATA FROM CRIMINALS;
(3) USE PHISHING TO ENTICE USERS TO WILLINGLY GIVE UP PERSONAL DATA; AND
(4) INSTALL SPYWARE CAPABLE OF CAPTURING THE KEYSTROKES OF VICTIMS.
CONSUMER PROFILING
• COMPANIES OPENLY COLLECT PERSONAL INFORMATION
ABOUT INTERNET USERS WHEN THEY REGISTER AT WEB
SITES, COMPLETE SURVEYS, FILL OUT FORMS, OR ENTER
CONTESTS ONLINE.
• MANY COMPANIES ALSO OBTAIN INFORMATION ABOUT
WEB SURFERS THROUGH THE USE OF COOKIES, TEXT
FILES THAT A WEB SITE CAN DOWNLOAD TO VISITORS’
HARD DRIVES SO THAT IT CAN IDENTIFY VISITORS ON
SUBSEQUENT VISITS.
• COMPANIES ALSO USE TRACKING SOFTWARE TO ALLOW
THEIR WEB SITES TO ANALYZE BROWSING HABITS AND
TREATING CONSUMER DATA RESPONSIBLY
• WHEN DEALING WITH CONSUMER DATA, STRONG MEASURES ARE
REQUIRED TO AVOID CUSTOMER RELATIONSHIP PROBLEMS.
• THE MOST WIDELY ACCEPTED APPROACH TO TREATING
CONSUMER DATA RESPONSIBLY IS FOR A COMPANY TO ADOPT
THE FAIR INFORMATION PRACTICES AND THE PRIVACY
GUIDELINES.
• UNDER THESE GUIDELINES, AN ORGANIZATION COLLECTS ONLY
PERSONAL INFORMATION THAT IS NECESSARY TO DELIVER ITS
PRODUCT OR SERVICE.
• THE COMPANY ENSURES THAT THE INFORMATION IS CAREFULLY
PROTECTED AND ACCESSIBLE ONLY BY THOSE WITH A NEED TO
KNOW, AND THAT CONSUMERS CAN REVIEW THEIR OWN DATA
AND MAKE CORRECTIONS.
• THE COMPANY INFORMS CUSTOMERS IF IT INTENDS TO USE
WORKPLACE MONITORING
• MANY ORGANIZATIONS HAVE DEVELOPED A POLICY ON THE
USE OF IT IN THE WORKPLACE IN ORDER TO PROTECT AGAINST
EMPLOYEE ABUSES THAT REDUCE WORKER PRODUCTIVITY OR
EXPOSE THE EMPLOYER TO HARASSMENT LAWSUITS.
ADVANCED SURVEILLANCE TECHNOLOGY
• A NUMBER OF ADVANCES IN INFORMATION TECHNOLOGY—
SUCH AS SURVEILLANCE CAMERAS, FACIAL RECOGNITION
SOFTWARE, AND SATELLITE-BASED SYSTEMS THAT CAN
PINPOINT A PERSON’S PHYSICAL LOCATION—PROVIDE
EXCITING NEW DATA-GATHERING CAPABILITIES.
• HOWEVER, THESE ADVANCES CAN ALSO DIMINISH INDIVIDUAL
PRIVACY AND COMPLICATE THE ISSUE OF HOW MUCH
INFORMATION SHOULD BE CAPTURED ABOUT PEOPLE’S
PRIVATE LIVES.
• CAMERA SURVEILLANCE, FACIAL RECOGNITION SYSTEMS AND
GPS CHIPS ARE SOME OF THE LATEST AND ADVANCED
SURVEILLANCE TECHNOLOGIES USED IN THIS RESPECT.
SAFEGUARDING YOUR IDENTITY
DATA
THANKS

More Related Content

Similar to Presentation for ethics

Internet security and privacy issues
Internet security and privacy issuesInternet security and privacy issues
Internet security and privacy issues
JagdeepSingh394
 
Cybersecurity, Privacy and Data Security from a Business Lawyer's Perspective
Cybersecurity, Privacy and Data Security from a Business Lawyer's PerspectiveCybersecurity, Privacy and Data Security from a Business Lawyer's Perspective
Cybersecurity, Privacy and Data Security from a Business Lawyer's Perspective
Data Con LA
 
Personal Data Protection Singapore - Pdpc corporate-brochure
Personal Data Protection Singapore - Pdpc corporate-brochurePersonal Data Protection Singapore - Pdpc corporate-brochure
Personal Data Protection Singapore - Pdpc corporate-brochure
Jean Luc Creppy
 
Ethics in Data Management.pptx
Ethics in Data Management.pptxEthics in Data Management.pptx
Ethics in Data Management.pptx
Ravindra Babu
 
1200 clare sanderon hse ireland
1200 clare sanderon hse ireland1200 clare sanderon hse ireland
1200 clare sanderon hse ireland
investnethealthcare
 
A BRIEF HISTORY OF US PRIVACY REGULATION ATTEMPTS
A BRIEF HISTORY OF US PRIVACY REGULATION ATTEMPTSA BRIEF HISTORY OF US PRIVACY REGULATION ATTEMPTS
A BRIEF HISTORY OF US PRIVACY REGULATION ATTEMPTS
Internet Law Center
 
How to Build and Implement your Company's Information Security Program
How to Build and Implement your Company's Information Security ProgramHow to Build and Implement your Company's Information Security Program
How to Build and Implement your Company's Information Security Program
Financial Poise
 
Employment Newsletter December 2008
Employment Newsletter December 2008Employment Newsletter December 2008
Employment Newsletter December 2008
epearson1
 
Siskinds | Incident Response Plan
Siskinds | Incident Response PlanSiskinds | Incident Response Plan
Siskinds | Incident Response Plan
Next Dimension Inc.
 
Introduction to US Privacy and Data Security: Regulations and Requirements
Introduction to US Privacy and Data Security: Regulations and RequirementsIntroduction to US Privacy and Data Security: Regulations and Requirements
Introduction to US Privacy and Data Security: Regulations and Requirements
Financial Poise
 
HIPAA Violations and Penalties power point
HIPAA Violations and Penalties power pointHIPAA Violations and Penalties power point
HIPAA Violations and Penalties power pointDeena Fetrow
 
DAMA Webinar: The Data Governance of Personal (PII) Data
DAMA Webinar: The Data Governance of  Personal (PII) DataDAMA Webinar: The Data Governance of  Personal (PII) Data
DAMA Webinar: The Data Governance of Personal (PII) Data
DATAVERSITY
 
Mobileprivacyazahir
MobileprivacyazahirMobileprivacyazahir
Mobileprivacyazahir
Azahir Hifzalla
 
Privacy Needs to be Personal
Privacy Needs to be PersonalPrivacy Needs to be Personal
Privacy Needs to be Personal
National University
 
When Past Performance May Be Indicative of Future Results - The Legal Implica...
When Past Performance May Be Indicative of Future Results - The Legal Implica...When Past Performance May Be Indicative of Future Results - The Legal Implica...
When Past Performance May Be Indicative of Future Results - The Legal Implica...
Jason Haislmaier
 
The Most Wonderful Time of the Year for Health-IT...NOT
The Most Wonderful Time of the Year for Health-IT...NOTThe Most Wonderful Time of the Year for Health-IT...NOT
The Most Wonderful Time of the Year for Health-IT...NOT
Compliancy Group
 
Hivos and Responsible Data
Hivos and Responsible DataHivos and Responsible Data
Hivos and Responsible Data
Tom Walker
 
[AIIM18] GDPR: whose job is it now? - Paul Lanois
[AIIM18] GDPR: whose job is it now? - Paul Lanois[AIIM18] GDPR: whose job is it now? - Paul Lanois
[AIIM18] GDPR: whose job is it now? - Paul Lanois
AIIM International
 
GDPR - The road to implementation - Colin Day
GDPR - The road to implementation - Colin DayGDPR - The road to implementation - Colin Day
GDPR - The road to implementation - Colin Day
B2B Marketing Forum
 

Similar to Presentation for ethics (20)

Internet security and privacy issues
Internet security and privacy issuesInternet security and privacy issues
Internet security and privacy issues
 
Cybersecurity, Privacy and Data Security from a Business Lawyer's Perspective
Cybersecurity, Privacy and Data Security from a Business Lawyer's PerspectiveCybersecurity, Privacy and Data Security from a Business Lawyer's Perspective
Cybersecurity, Privacy and Data Security from a Business Lawyer's Perspective
 
Personal Data Protection Singapore - Pdpc corporate-brochure
Personal Data Protection Singapore - Pdpc corporate-brochurePersonal Data Protection Singapore - Pdpc corporate-brochure
Personal Data Protection Singapore - Pdpc corporate-brochure
 
Ethics in Data Management.pptx
Ethics in Data Management.pptxEthics in Data Management.pptx
Ethics in Data Management.pptx
 
1200 clare sanderon hse ireland
1200 clare sanderon hse ireland1200 clare sanderon hse ireland
1200 clare sanderon hse ireland
 
A BRIEF HISTORY OF US PRIVACY REGULATION ATTEMPTS
A BRIEF HISTORY OF US PRIVACY REGULATION ATTEMPTSA BRIEF HISTORY OF US PRIVACY REGULATION ATTEMPTS
A BRIEF HISTORY OF US PRIVACY REGULATION ATTEMPTS
 
How to Build and Implement your Company's Information Security Program
How to Build and Implement your Company's Information Security ProgramHow to Build and Implement your Company's Information Security Program
How to Build and Implement your Company's Information Security Program
 
Employment Newsletter December 2008
Employment Newsletter December 2008Employment Newsletter December 2008
Employment Newsletter December 2008
 
Social networks background checks
Social networks background checksSocial networks background checks
Social networks background checks
 
Siskinds | Incident Response Plan
Siskinds | Incident Response PlanSiskinds | Incident Response Plan
Siskinds | Incident Response Plan
 
Introduction to US Privacy and Data Security: Regulations and Requirements
Introduction to US Privacy and Data Security: Regulations and RequirementsIntroduction to US Privacy and Data Security: Regulations and Requirements
Introduction to US Privacy and Data Security: Regulations and Requirements
 
HIPAA Violations and Penalties power point
HIPAA Violations and Penalties power pointHIPAA Violations and Penalties power point
HIPAA Violations and Penalties power point
 
DAMA Webinar: The Data Governance of Personal (PII) Data
DAMA Webinar: The Data Governance of  Personal (PII) DataDAMA Webinar: The Data Governance of  Personal (PII) Data
DAMA Webinar: The Data Governance of Personal (PII) Data
 
Mobileprivacyazahir
MobileprivacyazahirMobileprivacyazahir
Mobileprivacyazahir
 
Privacy Needs to be Personal
Privacy Needs to be PersonalPrivacy Needs to be Personal
Privacy Needs to be Personal
 
When Past Performance May Be Indicative of Future Results - The Legal Implica...
When Past Performance May Be Indicative of Future Results - The Legal Implica...When Past Performance May Be Indicative of Future Results - The Legal Implica...
When Past Performance May Be Indicative of Future Results - The Legal Implica...
 
The Most Wonderful Time of the Year for Health-IT...NOT
The Most Wonderful Time of the Year for Health-IT...NOTThe Most Wonderful Time of the Year for Health-IT...NOT
The Most Wonderful Time of the Year for Health-IT...NOT
 
Hivos and Responsible Data
Hivos and Responsible DataHivos and Responsible Data
Hivos and Responsible Data
 
[AIIM18] GDPR: whose job is it now? - Paul Lanois
[AIIM18] GDPR: whose job is it now? - Paul Lanois[AIIM18] GDPR: whose job is it now? - Paul Lanois
[AIIM18] GDPR: whose job is it now? - Paul Lanois
 
GDPR - The road to implementation - Colin Day
GDPR - The road to implementation - Colin DayGDPR - The road to implementation - Colin Day
GDPR - The road to implementation - Colin Day
 

Recently uploaded

How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
Jisc
 
1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx
JosvitaDsouza2
 
Multithreading_in_C++ - std::thread, race condition
Multithreading_in_C++ - std::thread, race conditionMultithreading_in_C++ - std::thread, race condition
Multithreading_in_C++ - std::thread, race condition
Mohammed Sikander
 
Chapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptxChapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptx
Mohd Adib Abd Muin, Senior Lecturer at Universiti Utara Malaysia
 
Pride Month Slides 2024 David Douglas School District
Pride Month Slides 2024 David Douglas School DistrictPride Month Slides 2024 David Douglas School District
Pride Month Slides 2024 David Douglas School District
David Douglas School District
 
Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
DeeptiGupta154
 
The Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptxThe Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptx
DhatriParmar
 
The Diamond Necklace by Guy De Maupassant.pptx
The Diamond Necklace by Guy De Maupassant.pptxThe Diamond Necklace by Guy De Maupassant.pptx
The Diamond Necklace by Guy De Maupassant.pptx
DhatriParmar
 
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama UniversityNatural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
Akanksha trivedi rama nursing college kanpur.
 
CACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdfCACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdf
camakaiclarkmusic
 
Supporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptxSupporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptx
Jisc
 
The Diamonds of 2023-2024 in the IGRA collection
The Diamonds of 2023-2024 in the IGRA collectionThe Diamonds of 2023-2024 in the IGRA collection
The Diamonds of 2023-2024 in the IGRA collection
Israel Genealogy Research Association
 
A Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptxA Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptx
thanhdowork
 
How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17
Celine George
 
Azure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHatAzure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHat
Scholarhat
 
STRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBC
STRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBCSTRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBC
STRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBC
kimdan468
 
Executive Directors Chat Leveraging AI for Diversity, Equity, and Inclusion
Executive Directors Chat  Leveraging AI for Diversity, Equity, and InclusionExecutive Directors Chat  Leveraging AI for Diversity, Equity, and Inclusion
Executive Directors Chat Leveraging AI for Diversity, Equity, and Inclusion
TechSoup
 
Best Digital Marketing Institute In NOIDA
Best Digital Marketing Institute In NOIDABest Digital Marketing Institute In NOIDA
Best Digital Marketing Institute In NOIDA
deeptiverma2406
 
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdfUnit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Thiyagu K
 
"Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe..."Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe...
SACHIN R KONDAGURI
 

Recently uploaded (20)

How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
 
1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx
 
Multithreading_in_C++ - std::thread, race condition
Multithreading_in_C++ - std::thread, race conditionMultithreading_in_C++ - std::thread, race condition
Multithreading_in_C++ - std::thread, race condition
 
Chapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptxChapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptx
 
Pride Month Slides 2024 David Douglas School District
Pride Month Slides 2024 David Douglas School DistrictPride Month Slides 2024 David Douglas School District
Pride Month Slides 2024 David Douglas School District
 
Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
 
The Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptxThe Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptx
 
The Diamond Necklace by Guy De Maupassant.pptx
The Diamond Necklace by Guy De Maupassant.pptxThe Diamond Necklace by Guy De Maupassant.pptx
The Diamond Necklace by Guy De Maupassant.pptx
 
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama UniversityNatural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
 
CACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdfCACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdf
 
Supporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptxSupporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptx
 
The Diamonds of 2023-2024 in the IGRA collection
The Diamonds of 2023-2024 in the IGRA collectionThe Diamonds of 2023-2024 in the IGRA collection
The Diamonds of 2023-2024 in the IGRA collection
 
A Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptxA Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptx
 
How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17
 
Azure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHatAzure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHat
 
STRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBC
STRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBCSTRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBC
STRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBC
 
Executive Directors Chat Leveraging AI for Diversity, Equity, and Inclusion
Executive Directors Chat  Leveraging AI for Diversity, Equity, and InclusionExecutive Directors Chat  Leveraging AI for Diversity, Equity, and Inclusion
Executive Directors Chat Leveraging AI for Diversity, Equity, and Inclusion
 
Best Digital Marketing Institute In NOIDA
Best Digital Marketing Institute In NOIDABest Digital Marketing Institute In NOIDA
Best Digital Marketing Institute In NOIDA
 
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdfUnit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdf
 
"Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe..."Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe...
 

Presentation for ethics

  • 1. PRESENTATION PRIVACYStudent Name : Saad Mohammad Saeed alshahrani Teacher Name : Hamdan Ali Al-Shehri Computing ethics
  • 2. INTRODUCTION • THE USE OF INFORMATION TECHNOLOGY IN BUSINESS REQUIRES BALANCING THE NEEDS OF THOSE WHO USE THE INFORMATION THAT IS COLLECTED AGAINST THE RIGHTS AND DESIRES OF THE PEOPLE WHOSE INFORMATION IS BEING USED. • ON THE ONE HAND, INFORMATION ABOUT PEOPLE IS GATHERED, STORED, ANALYZED, AND REPORTED BECAUSE ORGANIZATIONS CAN USE IT TO MAKE BETTER DECISIONS. • SOME OF THESE DECISIONS, INCLUDING WHETHER OR NOT TO HIRE A JOB CANDIDATE, APPROVE A LOAN, OR OFFER A SCHOLARSHIP, CAN PROFOUNDLY AFFECT PEOPLE’S LIVES. • IN ADDITION, THE GLOBAL MARKETPLACE AND INTENSIFIED COMPETITION HAVE INCREASED THE IMPORTANCE OF KNOWING CONSUMERS’ PURCHASING HABITS AND FINANCIAL CONDITION. • COMPANIES USE THIS INFORMATION TO TARGET MARKETING EFFORTS TO CONSUMERS WHO ARE MOST LIKELY TO BUY THEIR PRODUCTS AND SERVICES. • ORGANIZATIONS ALSO NEED BASIC INFORMATION ABOUT CUSTOMERS TO SERVE THEM BETTER. IT IS HARD TO IMAGINE AN ORGANIZATION HAVING PRODUCTIVE RELATIONSHIPS WITH ITS CUSTOMERS WITHOUT HAVING DATA ABOUT THEM. • THUS, ORGANIZATIONS WANT SYSTEMS THAT COLLECT AND STORE KEY DATA FROM EVERY INTERACTION THEY HAVE WITH A CUSTOMER.
  • 3. INFORMATION PRIVACY INFORMATION PRIVACY IS THE COMBINATION OF • COMMUNICATIONS PRIVACY (THE ABILITY TO COMMUNICATE WITH OTHERS WITHOUT THOSE COMMUNICATIONS BEING MONITORED BY OTHER PERSONS OR ORGANIZATIONS) AND • DATA PRIVACY (THE ABILITY TO LIMIT ACCESS TO ONE’S PERSONAL DATA BY OTHER INDIVIDUALS AND ORGANIZATIONS IN ORDER TO EXERCISE A SUBSTANTIAL DEGREE OF CONTROL OVER THAT DATA AND ITS USE).
  • 4. DATA & INFORMATION PRIVACY GUIDELINES
  • 5. KEY PRIVACY ISSUES IDENTITY THEFT IDENTITY THEFT OCCURS WHEN SOMEONE STEALS KEY PIECES OF PERSONAL INFORMATION TO IMPERSONATE A PERSON. THIS INFORMATION MAY INCLUDE SUCH DATA AS NAME, ADDRESS, DATE OF BIRTH, SOCIAL SECURITY NUMBER, PASSPORT NUMBER, DRIVER’S LICENSE NUMBER, AND MOTHER’S MAIDEN NAME. FOUR APPROACHES ARE FREQUENTLY USED BY IDENTITY THIEVES TO CAPTURE THE PERSONAL DATA OF THEIR VICTIMS: (1) CREATE A DATA BREACH TO STEAL HUNDREDS, THOUSANDS, OR EVEN MILLIONS OF PERSONAL RECORDS; (2) PURCHASE PERSONAL DATA FROM CRIMINALS; (3) USE PHISHING TO ENTICE USERS TO WILLINGLY GIVE UP PERSONAL DATA; AND (4) INSTALL SPYWARE CAPABLE OF CAPTURING THE KEYSTROKES OF VICTIMS.
  • 6. CONSUMER PROFILING • COMPANIES OPENLY COLLECT PERSONAL INFORMATION ABOUT INTERNET USERS WHEN THEY REGISTER AT WEB SITES, COMPLETE SURVEYS, FILL OUT FORMS, OR ENTER CONTESTS ONLINE. • MANY COMPANIES ALSO OBTAIN INFORMATION ABOUT WEB SURFERS THROUGH THE USE OF COOKIES, TEXT FILES THAT A WEB SITE CAN DOWNLOAD TO VISITORS’ HARD DRIVES SO THAT IT CAN IDENTIFY VISITORS ON SUBSEQUENT VISITS. • COMPANIES ALSO USE TRACKING SOFTWARE TO ALLOW THEIR WEB SITES TO ANALYZE BROWSING HABITS AND
  • 7. TREATING CONSUMER DATA RESPONSIBLY • WHEN DEALING WITH CONSUMER DATA, STRONG MEASURES ARE REQUIRED TO AVOID CUSTOMER RELATIONSHIP PROBLEMS. • THE MOST WIDELY ACCEPTED APPROACH TO TREATING CONSUMER DATA RESPONSIBLY IS FOR A COMPANY TO ADOPT THE FAIR INFORMATION PRACTICES AND THE PRIVACY GUIDELINES. • UNDER THESE GUIDELINES, AN ORGANIZATION COLLECTS ONLY PERSONAL INFORMATION THAT IS NECESSARY TO DELIVER ITS PRODUCT OR SERVICE. • THE COMPANY ENSURES THAT THE INFORMATION IS CAREFULLY PROTECTED AND ACCESSIBLE ONLY BY THOSE WITH A NEED TO KNOW, AND THAT CONSUMERS CAN REVIEW THEIR OWN DATA AND MAKE CORRECTIONS. • THE COMPANY INFORMS CUSTOMERS IF IT INTENDS TO USE
  • 8. WORKPLACE MONITORING • MANY ORGANIZATIONS HAVE DEVELOPED A POLICY ON THE USE OF IT IN THE WORKPLACE IN ORDER TO PROTECT AGAINST EMPLOYEE ABUSES THAT REDUCE WORKER PRODUCTIVITY OR EXPOSE THE EMPLOYER TO HARASSMENT LAWSUITS.
  • 9. ADVANCED SURVEILLANCE TECHNOLOGY • A NUMBER OF ADVANCES IN INFORMATION TECHNOLOGY— SUCH AS SURVEILLANCE CAMERAS, FACIAL RECOGNITION SOFTWARE, AND SATELLITE-BASED SYSTEMS THAT CAN PINPOINT A PERSON’S PHYSICAL LOCATION—PROVIDE EXCITING NEW DATA-GATHERING CAPABILITIES. • HOWEVER, THESE ADVANCES CAN ALSO DIMINISH INDIVIDUAL PRIVACY AND COMPLICATE THE ISSUE OF HOW MUCH INFORMATION SHOULD BE CAPTURED ABOUT PEOPLE’S PRIVATE LIVES. • CAMERA SURVEILLANCE, FACIAL RECOGNITION SYSTEMS AND GPS CHIPS ARE SOME OF THE LATEST AND ADVANCED SURVEILLANCE TECHNOLOGIES USED IN THIS RESPECT.