jagomart
digital resources
picture1_Technology Ppt 70196 | 04 Privacy


 152x       Filetype PPTX       File size 1.03 MB       Source: dinus.ac.id


File: Technology Ppt 70196 | 04 Privacy
chapter 4 privacy objectives 1 what is right of privacy 2 laws for electronic surveillance 3 forms of data encryption 4 what is identify theft 5 strategies for consumer profiling ...

icon picture PPTX Filetype Power Point PPTX | Posted on 29 Aug 2022 | 3 years ago
Partial capture of text on file.
     Chapter 4 Privacy 
     Objectives
      1.  What is Right of Privacy?
      2.  Laws for electronic surveillance
      3.  Forms of data encryption
      4.  What is identify theft?
      5.  Strategies for consumer profiling
      6.  Treat customer data responsibly
      7.  Why and how work place monitoring
      8.  What is spamming?
      9.  Capabilities & ethical issues of advanced 
          surveillance technologies
                                    Ethics in Information Technology, Second 
                                                  Edition             2
     Privacy Protection and the 
     Law
       Systems collect and store key data from 
        every interaction with customers
       Many object to data collection policies of 
        government and business
       Privacy 
        ◦Key concern of Internet users 
        ◦Top reason why nonusers still avoid the Internet
       Reasonable limits must be set
       Historical perspective on the right to privacy
        ◦Fourth Amendment - reasonable expectation of 
          privacy
                                    Ethics in Information Technology, Second 
                                                  Edition             3
     The Right of Privacy
       Definition
        ◦“The right to be left alone—the most 
          comprehensive of rights, and the right most 
          valued by a free people”
        ◦“The right of individuals to control the collection 
          and use of information about themselves”
       Legal aspects
        ◦Protection from unreasonable intrusion upon one’s 
          isolation
        ◦Protection from appropriation of one’s name or 
          likeness
                                    Ethics in Information Technology, Second 
                                                  Edition             4
     The Right of Privacy (continued)
       Legal aspects
        ◦Protection from unreasonable publicity given to 
          one’s private life
        ◦Protection from publicity that unreasonably places 
          one in a false light before the public
                                    Ethics in Information Technology, Second 
                                                  Edition             5
     Recent History of Privacy 
     Protection
       Legislative acts passed over the past 40 
        years
        ◦Most address invasion of privacy by the 
          government
           Not corporations
        ◦No single, overarching national data privacy 
          policy 
        ◦Communications Act of 1934
        ◦Freedom of Information Act (FOIA)
        ◦Fair Credit Reporting Act of 1970
        ◦Privacy Act of 1974
        ◦Children’s Online Protection Act (COPA)
        ◦European Community Directive 95/46/EC of 1998
        ◦Gramm-Leach-Bliley Act
                                    Ethics in Information Technology, Second 
                                                  Edition             6
The words contained in this file might help you see if this file matches what you are looking for:

...Chapter privacy objectives what is right of laws for electronic surveillance forms data encryption identify theft strategies consumer profiling treat customer responsibly why and how work place monitoring spamming capabilities ethical issues advanced technologies ethics in information technology second edition protection the law systems collect store key from every interaction with customers many object to collection policies government business concern internet users top reason nonusers still avoid reasonable limits must be set historical perspective on fourth amendment expectation definition left alone most comprehensive rights valued by a free people individuals control use about themselves legal aspects unreasonable intrusion upon one s isolation appropriation name or likeness continued publicity given private life that unreasonably places false light before public recent history legislative acts passed over past years address invasion not corporations no single overarching nationa...

no reviews yet
Please Login to review.