Professional Documents
Culture Documents
Cyber-ethics
SIDDHANT PRAKASH PARDESHI
2012A3PS200G
Prepared for Dr. Reena Cheruvalath in fulfillment of partial requirements of the course
HSS F343 Professional Ethics
Communication
Dedicated Channels
Miscellaneous
E-Commerce
Encyclopedias
Online Shopping
Journals
VOIP
Internet Banking
Blogs
Video Calling
Travel Reservation
Collaboration
Database Management
Learning
Social Networking
Cloud Computing
Discussion Forums
Professional Networking
Entertainment
Privacy: Defined
When it comes to privacy and
accountability, people always demand
the former for themselves and the latter
for everyone else.
- David Brin
Data Privacy
Data privacy is that aspect of information
technology (IT) that deals with the control an
organization or individual over what data
in a computer system can be shared with
third parties.
- Margaret Rouse (whatis.com)
Information Confidentiality
Why Not?
Research
Personal Media
Corporate Data
Smart Grid
National Security
Traffic Control
Human Behaviour
UDHR, 1948
Liberty, Freedom
Protection
Law Enforcement
Counter - Terrorism
Approaches
Rights
Justice
Utilitarian
Common Good
Discussion:
When
Launched on November 6,
2007
Why
Commercialized users
private data
Behavioral Targeting of
users
Max Points
Justice
Approach
Rights
Approach
Virtue
Approach
Score
Score
Score
Score
Score
TOTAL
Keep Beacon
10
11
Modify Beacon
10
10
10
34
Cancel Beacon
10
29
There must be no personal data record-keeping systems whose very existence is secret.
2.
There must be a way for a person to find out what information about the person is in a record and how
it is used.
3.
There must be a way for a person to prevent information about the person that was obtained for one
purpose from being used or made available for other purposes without the person's consent.
4.
There must be a way for a person to correct or amend a record of identifiable information about the
person.
5.
Any organization creating, maintaining, using, or disseminating records of identifiable personal data
must assure the reliability of the data for their intended use and must take precautions to prevent
misuses of the data (Harris, 2003).
Dont
1.
1.
Be a cyberbully
2.
Report cyberbullying
2.
Encourage cyberbullies
3.
3.
4.
4.
5.
5.
6.
6.
Lie
Conclusions
The Internet is the most prominent network of computers and has become a
fundamental part of life in the modern world.
Corporates must adhere to Privacy Laws while designing their terms of service and
not violate their customers human right to privacy in any way.
Both Companies as well as users can follow Ethical guidelines in the form of Codes
of Ethics that must be well formulated.
References
http://www.scu.edu/ethics-center/privacy/balance/
http://www.microsoft.com/security/online-privacy/cyberethicspractice.aspx
http://www.wired.com/2012/09/beacon-settlement-approved/
http://en.wikipedia.org/wiki/Facebook_Beacon
http://epic.org/privacy/consumer/code_fair_info.html