Answer Ethics
Answer Ethics
COMPUTING
Assignment (25%)
With the explosion of digital technologies, companies are sweeping up vast quantities of data
about consumers’ activities, both online and off. Feeding this trend are new smart, connected
products—from fitness trackers to home systems—that gather and transmit detailed information.
Though some companies are open about their data practices, most prefer to keep consumers in the
dark, choose control over sharing, and ask for forgiveness rather than permission. It’s also not
unusual for companies to quietly collect personal data they have no immediate use for, reasoning
that it might be valuable someday.
As current and former executives at frog, a firm that helps clients create products and services that
leverage users’ personal data, we believe this shrouded approach to data gathering is shortsighted.
Having free use of customer data may confer near-term advantages. But our research shows that
consumers are aware that they’re under surveillance—even though they may be poorly informed
about the specific types of data collected about them—and are deeply anxious about how their
personal information may be used.
Fair Information Practice Principles
(1) The Collection Limitation Principle. There should be limits to the collection of personal data
and any such data should be obtained by lawful and fair means and, where appropriate, with the
knowledge or consent of the data subject.
(2) The Data Quality Principle. Personal data should be relevant to the purposes for which they
are to be used and, to the extent necessary for those purposes, should be accurate, complete and
kept up-to-date.
(3) The Purpose Specification Principle. The purposes for which personal data are collected
should be specified not later than at the time of data collection and the subsequent use limited to
the fulfillment of those purposes or such others as are not incompatible with those purposes and
as are specified on each occasion of change of purpose.
(4) The Use Limitation Principle. Personal data should not be disclosed, made available or
otherwise used for purposes other than those specified, except a) with the consent of the data
subject, or b) by the authority of law.
(5) The Security Safeguards Principle. Personal data should be protected by reasonable security
safeguards against such risks as loss or unauthorized access, destruction, use, modification or
disclosure of data.
(6) The Openness Principle. There should be a general policy of openness about developments,
practices and policies with respect to personal data. Means should be readily available of
establishing the existence and nature of personal data and the main purposes of their use, as well
as the identity and usual residence of the data controller.
(7) The Individual Participation Principle. An individual should have the right:
a) to obtain from a data controller, or otherwise, confirmation of whether or not the data
controller has data relating to him;
b) to have data relating to him communicated to him, within a reasonable time, at a charge, if
any, that is not excessive; in a reasonable manner, and in a form that is readily intelligible to him;
c) to be given reasons if a request made under subparagraphs (a) and (b) is denied and to be able
to challenge such denial; and
d) to challenge data relating to him and, if the challenge is successful, to have the data erased,
rectified, completed or amended;
(8) The Accountability Principle. A data controller should be accountable for complying with
measures which give effect to the principles stated above.
# Companies absolutely shouldn't be able to sell to third parties and profit from a specific
customer's data! To do so is a violation of privacy rights and unconstitutional. However, there
are two ways in which companies might appropriately and legally profit from the use of
individual customer data
5. The major issues concerning privacy in the information age is the conflict between personal
privacy and the state, society, or related organizations, which involves online privacy,
employee monitoring, tradeoffs between security and privacy and good business results versus
privacy, etc.
The things that should be done if any threat on the privacy are
First of all, there are a number of ways to keep our personal information safe in this
digital age as computer science students to recommend, these are: -
* Using a VPN. ...
* Encrypting our email. ...
* Being careful with links and attachments in emails. ...
* Looking for privacy indicators on websites. ...
* Using anti-malware and anti-virus protection. ...
* Using strong passwords and change them often. ...
* Automating software updates
There is state of laws related to digital privacy: -
The Privacy Act of 1974 (5 U.S.C. § 552a) protects personal information held by the federal
government by preventing unauthorized disclosures of such information. Individuals also have
the right to review such information, request corrections, and be informed of any disclosures
The US instead has vertically focused data federal privacy laws for finance (GLBA), healthcare
(GLBA), children's data (COPPA), as well as a new wave of state privacy laws with California
Consumer Privacy Act (CCPA) being the most significant. April 2,2021
In the case our country Ethiopia there is the constitution Disclosure to any other
person can only be made with the written consent of the person to whom the information relates,
and other organs authorized by law
The Constitution