chapter 12 ethics and privacy 1 copyright john wiley & sons canada

27
CHAPTER 12 Ethics and Privacy 1 Copyright John Wiley & Sons Canada

Upload: silvia-wilson

Post on 18-Jan-2018

220 views

Category:

Documents


0 download

DESCRIPTION

3 LEARNING OBJECTIVES 1.Define ethics, list and describe the three fundamental tenets of ethics, and describe the four categories of ethical issues related to information technology. 2.Identify three places that store personal data, and for each one, discuss at least one potential threat to the privacy of the data stored there. Copyright John Wiley & Sons Canada

TRANSCRIPT

Page 1: CHAPTER 12 Ethics and Privacy 1 Copyright John Wiley & Sons Canada

CHAPTER 12Ethics and Privacy

1Copyright John Wiley & Sons Canada

Page 2: CHAPTER 12 Ethics and Privacy 1 Copyright John Wiley & Sons Canada

Copyright John Wiley & Sons Canada 2

12.1 Ethical Issues12.2 Privacy

Chapter 12:ETHICS AND PRIVACY

Page 3: CHAPTER 12 Ethics and Privacy 1 Copyright John Wiley & Sons Canada

3

LEARNING OBJECTIVES

1. Define ethics, list and describe the three fundamental tenets of ethics, and describe the four categories of ethical issues related to information technology.

2. Identify three places that store personal data, and for each one, discuss at least one potential threat to the privacy of the data stored there.

Copyright John Wiley & Sons Canada

Page 4: CHAPTER 12 Ethics and Privacy 1 Copyright John Wiley & Sons Canada

4

OPENING CASE

What to Do About WikiLeaks?The Problem

• Whistleblowers can capture huge amounts of incriminating documents on a laptop, memory stick, or portable hard drive. This information can be sent through personal e-mail accounts or online drop sites, or they can simply submit it directly to WikiLeaks (www.wikileaks.org). WikiLeaks receives approximately 10,000 new documents every day. Since its inception, in December 2006, WikiLeaks has had significant impacts on both businesses and governments; how can future disclosures be prevented?

Copyright John Wiley & Sons Canada

Page 5: CHAPTER 12 Ethics and Privacy 1 Copyright John Wiley & Sons Canada

5

OPENING CASE

The IT Solution– Several cyber security measures from the DLP (data leak

protection) industry have been tried. However, none have been effective. Recently, organizations have turned to network forensics, which is the process of constantly collecting every digital “fingerprint” on an organization’s servers to trace and identify an intruder who has broken into the system. Although this software gathers data and makes them easily available, it does not identify the culprit.

Copyright John Wiley & Sons Canada

Page 6: CHAPTER 12 Ethics and Privacy 1 Copyright John Wiley & Sons Canada

6

OPENING CASE

The Results– How can organizations and governments respond to WikiLeaks?

Lawsuits will not work, because WikiLeaks, is a mere conduit for documents. Moreover, even if a company or a government somehow won a judgment against WikiLeaks, that would not shut down the company, because its assets are spread all over the world. Governments may need to revise their practices to avoid being targeted.

Copyright John Wiley & Sons Canada

Page 7: CHAPTER 12 Ethics and Privacy 1 Copyright John Wiley & Sons Canada

7

OPENING CASE

What we learned from this case?– All organizations, large and small, must be concerned with

ethics. You will encounter numerous ethical and privacy issues in your career, many of which will involve IT requiring solutions that do not violate the privacy of governments, organizations, and individuals.

Copyright John Wiley & Sons Canada

Page 8: CHAPTER 12 Ethics and Privacy 1 Copyright John Wiley & Sons Canada

8

DISCUSSION

1. Define the term “whistleblower” as it relates to IT issues.

2. How can governments, organizations, and even individuals prevent future disclosures from whistleblowers? Is it possible to accomplish this task, given that the sources of WikiLeaks’ information appear to be internal?

Copyright John Wiley & Sons Canada

Page 9: CHAPTER 12 Ethics and Privacy 1 Copyright John Wiley & Sons Canada

9

12.1 ETHICAL ISSUES

• Ethics refers to the principles of right and wrong that individuals use to make choices that guide their behaviour.

Copyright John Wiley & Sons Canada

Page 10: CHAPTER 12 Ethics and Privacy 1 Copyright John Wiley & Sons Canada

10

ETHICAL FRAMEWORKS

• Ethical Frameworks are standards used to develop general frameworks for ethics or ethical decision making:– Utilitarian– Rights– Fairness– Common Good

• For examples of standards used in Canada click here: www.csa.ca

Copyright John Wiley & Sons Canada

Page 11: CHAPTER 12 Ethics and Privacy 1 Copyright John Wiley & Sons Canada

11

TRADITIONAL AND GVV APPROACHES

Traditional GVV

1. Recognize an ethical issue 1. Identify an ethical issue

2. Get the facts 2. Purpose and choice

3. Evaluate alternative actions 3. Stakeholder analysis

4. Make a decision and test it 4. Powerful response

5. Scripting and coaching

Copyright John Wiley & Sons Canada

Page 12: CHAPTER 12 Ethics and Privacy 1 Copyright John Wiley & Sons Canada

12

ETHICS IN THE CORPORATE ENVIRONMENT

• Code of ethics: a collection of principles that are intended to guide decision making by members of an organization.

• Fundamental tenets of ethics include:– Responsibility– Accountability– Liability

Copyright John Wiley & Sons Canada

Page 13: CHAPTER 12 Ethics and Privacy 1 Copyright John Wiley & Sons Canada

13

ETHICS AND IT

• Four general categories of ethical issues in IT applications: – Privacy– Accuracy– Property– Accessibility

Copyright John Wiley & Sons Canada

Page 14: CHAPTER 12 Ethics and Privacy 1 Copyright John Wiley & Sons Canada

14

UNETHICAL VS. ILLEGAL

• What is unethical is not necessarily illegal.– Ethics scenarios

Copyright John Wiley & Sons Canada

Page 15: CHAPTER 12 Ethics and Privacy 1 Copyright John Wiley & Sons Canada

Copyright John Wiley & Sons Canada 15

IT’S ABOUT BUSINESS

12.2 Big Brother Is Watching You– People today live with a degree of surveillance that would have

been unimaginable just a few generations ago. Examples include surveillance cameras, GPS and facial-recognition software. Facebook encourage users to assign names to people in photos, Once you are tagged in a photo, that photo could be used to search for matches across the entire Internet or in private databases, including databases fed by surveillance cameras.

Page 16: CHAPTER 12 Ethics and Privacy 1 Copyright John Wiley & Sons Canada

16

12.2 PRIVACY

• Court decisions have followed two rules for defining privacy:1. The right of privacy is not absolute. Your privacy must be

balanced against the needs of society.2. The public’s right to know supersedes the individual’s right of

privacy.

Copyright John Wiley & Sons Canada

Page 17: CHAPTER 12 Ethics and Privacy 1 Copyright John Wiley & Sons Canada

17

IT TECHNOLOGIES

• Data aggregators, digital dossiers, and profiling• Electronic Surveillance• Personal Information in Databases• Information on Internet Bulletin Boards, Newsgroups,

and Social Networking Sites

Copyright John Wiley & Sons Canada

Page 18: CHAPTER 12 Ethics and Privacy 1 Copyright John Wiley & Sons Canada

18

DATA AGGREGATORS, DIGITAL DOSSIERS, AND PROFILING

• Data Aggregators collect public and non-public data then integrate these data to form digital dossiers on most adults in North America.

• Click on the following links to review examples of data aggregators:– http://www.lexisnexis.ca/en-ca/home.page– www.acxiom.com– http://www.statcan.gc.ca/

Copyright John Wiley & Sons Canada

Page 19: CHAPTER 12 Ethics and Privacy 1 Copyright John Wiley & Sons Canada

19

ELECTRONIC SURVEILLANCE

1. The law supports the right of employers to read their employees’ e-mail and other electronic documents and to monitor their employees’ Internet use.

2. See the Globe & Mail article regarding surveillance in Canada.

Copyright John Wiley & Sons Canada

Page 20: CHAPTER 12 Ethics and Privacy 1 Copyright John Wiley & Sons Canada

20

PERSONAL INFORMATION IN DATABASES

1. Banks and financial institutions2. Utility companies3. Employers4. Government agencies5. Credit reporting agencies6. Hospitals7. Schools and universities8. Retail establishments

© Nicolas Nadjar/Age Fotostock America, Inc.

Copyright John Wiley & Sons Canada

Page 21: CHAPTER 12 Ethics and Privacy 1 Copyright John Wiley & Sons Canada

Copyright John Wiley & Sons Canada 21

INFORMATION ON INTERNET BULLETIN BOARDS, NEWSGROUPS, AND SOCIAL NETWORKING SITES

• Social Networking Sites often include electronic discussions such as chat rooms. These sites appear on the Internet, within corporate intranets, and on blogs.

• A blog (Weblog) is an informal, personal journal that is frequently updated and intended for general public reading.

• Clicking here will take you to the Government of Canada article on the Pros and Cons of Social Networking in business

© Marina Bordjieva/Age Fotostock America, Inc.

Click on the picture to read about the pros and cons of Social Networking in business

Page 22: CHAPTER 12 Ethics and Privacy 1 Copyright John Wiley & Sons Canada

22

PRIVACY CODES AND POLICIES

• Opt-in Model prohibits an organization from collecting any personal information unless the customer specifically authorizes it.

• Opt-out model permits the company to collect personal information until the customer specifically requests that the data not be collected.

Copyright John Wiley & Sons Canada

Page 23: CHAPTER 12 Ethics and Privacy 1 Copyright John Wiley & Sons Canada

23

IT’S ABOUT BUSINESS

12.3 Your Privacy on Facebook– The Office of the Privacy Commissioner of Canada has

engaged in numerous actions against Facebook due to potential privacy concerns. Facebook continues to innovate, providing new products such as Graph Search and software for Android users. Every new product announcement is greeted by privacy concerns, while Facebook’s view is that users still have the ability to tailor their privacy settings while having better services available.

Copyright John Wiley & Sons Canada

Page 24: CHAPTER 12 Ethics and Privacy 1 Copyright John Wiley & Sons Canada

24

INTERNATIONAL ASPECTS OF PRIVACY

• Approximately 50 countries have some form of data-protection laws.

• Many of these laws conflict with those of other countries, or they require specific security measures.

• Some countries have no privacy laws at all• Whose laws have jurisdiction when records are stored

in a different country for reprocessing or retransmission purposes.

Copyright John Wiley & Sons Canada

Page 25: CHAPTER 12 Ethics and Privacy 1 Copyright John Wiley & Sons Canada

25

CHAPTER CLOSING

1. Ethics refers to the principles of right and wrong that individuals use to make choices that guide their behavior including responsibility, accountability, and liability.

2. Major ethical issues related to IT are privacy, accuracy, property and access to information.

Copyright John Wiley & Sons Canada

Page 26: CHAPTER 12 Ethics and Privacy 1 Copyright John Wiley & Sons Canada

26

CHAPTER CLOSING (CONTINUED)

3. Threats to privacy include advances in information technologies, electronic surveillance, personal information in databases, Internet bulletin boards, newsgroups, and social networking sites.

4. One personal threat to the privacy of data stored is that you might post too much personal information that many unknown people can see.

Copyright John Wiley & Sons Canada

Page 27: CHAPTER 12 Ethics and Privacy 1 Copyright John Wiley & Sons Canada

CopyrightCopyright © 2014 John Wiley & Sons Canada, Ltd. All rights reserved. Reproduction or translation of this work beyond that permitted by Access Copyright (the Canadian copyright licensing agency) is unlawful. Requests for further information should be addressed to the Permissions Department, John Wiley & Sons Canada, Ltd. The purchaser may make back-up copies for his or her own use only and not for distribution or resale. The author and the publisher assume no responsibility for errors, omissions, or damages caused by the use of these files or programs or from the use of the information contained herein.

27