0% found this document useful (0 votes)
16 views37 pages

Group 3 Report Privacy

hiji

Uploaded by

harvey.pedrosa
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
16 views37 pages

Group 3 Report Privacy

hiji

Uploaded by

harvey.pedrosa
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 37

PRIVACY

• Bob Louise Acuin

 • Lourdes Pritze Mae Aguirre

Members

• Michael Angelo Ochenco

• Renz Ivan Monteza


FR

What is Privacy?
• "The right of the people to be secure in their persons,
houses, papers, and effects, against unreasonable
searches and seizures, shall not be violated, and no
Warrants shall issue, but upon probable cause, supported
by Oath or affirmation, and particularly describing the
place to be searched, and the persons or things to be
seized" (This passage from the Fourth Amendment of the
US Constitution ensures the protection of individual
privacy by preventing unwarranted government intrusion
into personal spaces and belongings.)

4
FR

What is Privacy?
• In the digital age, individuals face challenges beyond
government intrusion; many are also concerned about
how businesses handle personal data. Although there are
few comprehensive laws that protect individuals from
corporate data collection, many assume they have more
privacy rights than the law actually provides. The
increasing integration of various technologies further
erodes privacy and fuels skepticism among the public.

5
Information
Privacy

6
FR

Information Privacy
• Information Privacy concerns the rights of
individuals to control their personal data—how
it is collected, stored, and shared. It
encompasses two important subcategories:

• Data Privacy: Refers to the protection of personal data, ensuring that


individuals have control over who has access to their data and how it is
used.
• Communications Privacy: Relates to the protection of private
communications, ensuring that personal correspondence (email, phone
calls, etc.) is not accessed or monitored by third parties without consent.

7
FR

Modern Privacy Concerns


• Data Collection: Companies and governments often collect vast amounts
of personal data for decision-making, marketing, or security purposes. This
raises concerns about how much information is being collected and how it
is used.

• Unauthorized Use: In many cases, personal data is shared or sold without


the user’s explicit consent, leading to concerns about identity theft,
targeted advertising, and surveillance.

8
Privacy
Laws,
Applications
, and Court
Rulings

9
Financial Data

• Fair Credit Reporting Act (1970): Ensures fairness and accuracy in credit reporting and privacy in
handling credit information.
• Right to Financial Privacy Act (1978): Protects consumer financial records from unauthorized
government access.

• Gramm-Leach-Bliley Act (1999): Requires financial institutions to explain their data sharing practices and
give consumers opt-out options.
• Fair and Accurate Credit Transactions Act (2003): Provides free access to credit reports and adds identity
theft protections.

10
Health Information

• Health Insurance Portability and Accountability Act (1996): Protects the confidentiality of
personal health information and sets national standards for secure healthcare data exchange.

• American Recovery and Reinvestment Act (2009): Enhances privacy protections for electronic
health records (EHR) and supports secure healthcare technologies.

11
Children’s Personal Data

• Family Educational Rights and Privacy Act (1974): Grants parents control over their children’s
educational records and transfers these rights to students when they turn 18.
• Children’s Online Privacy Protection Act (1998): Requires websites directed at children under
13 to obtain parental consent before collecting personal information.

12
Electronic Surveillance

• Title III of the Omnibus Crime Control and Safe Streets Act (1968): Regulates wiretapping for
law enforcement.
• Foreign Intelligence Surveillance Act (FISA) (1978): Authorizes electronic surveillance for
national security purposes.
• USA PATRIOT Act (2001): Expands government powers for surveillance in response to
terrorism.

• USA Freedom Act (2015): Limits the bulk collection of telephone metadata by the
government.

13
Fair Information Practices

• Organisation for Economic Co-operation and Development Guidelines (1980): Establishes


international data privacy principles.

• European Union Data Protection Directive (1995): Regulates data protection within the EU.

• General Data Protection Regulation (2018): Strengthens EU data privacy laws, especially
regarding user consent and cross-border data transfers.

14
Access to Government Records

• Freedom of Information Act (1966): Provides public access to federal government records,
with exemptions for sensitive information.
• Privacy Act (1974): Governs the collection, maintenance, and use of personal data by federal
agencies and gives individuals the right to access their records.

15
KEY PRIVACY AND
ANONIMITY ISSUES
Consumer Profiling

Consumer profiling is a practice where organizations collect


and analyze detailed information
about individuals to create personalized marketing
strategies, tailor products, and enhance
customer service. This profiling involves understanding
consumers' behaviors, preferences,
and purchasing patterns through various data collection
methods.
Data Collection Methods:

• Online Tracking: Companies often use cookies, which are small text files stored on
users' devices, to track browsing habits and preferences. This information is
invaluable for targeted advertising.

• Surveys and Forms: Many organizations gather personal information when users
fill out online forms or participate in surveys, asking for demographic details,
interests, and preferences.

• Social Media: Data harvested from social media interactions allows companies to
build detailed consumer profiles based on likes, shares, and engagement levels.
Ethical Concerns:

• Informed Consent: Many consumers are unaware of how much data is being
collected and for what purposes. The lack of transparency around data practices
raises ethical questions regarding informed consent.

• Data Privacy Violations: Profiling can lead to discriminatory practices if sensitive


data is misused or if the algorithms used reflect biases. For example, certain
demographics may be unfairly targeted for marketing based on profiling data.

• Surveillance Culture: The normalization of data profiling contributes to a broader


surveillance culture, leading individuals to feel monitored in their daily activities,
which can stifle personal expression and freedom.
20
E-discovery refers to the legal process
of identifying, collecting, and
reviewing electronically stored
information (ESI) for use as evidence
in legal proceedings. This process has
grown increasingly important with the
shift to digital communication in both
personal and professional contexts.

21
Importance:

With the rise of digital communication tools, e-discovery is


now a fundamental aspect of legal practice. It involves not
only emails and documents but also social media
interactions, instant messages, and even metadata.

22
Challenges:

• Data Volume: The sheer volume of digital information generated daily can make the e-discovery
process daunting and costly for organizations. Law firms may need to sift through terabytes of data
to locate relevant information.

• Data Preservation: Maintaining data integrity during the e-discovery process is crucial. Any
alterations to the data could lead to legal disputes regarding its admissibility in court..

• Costs: E-discovery can be expensive, with costs arising from the need for specialized software, legal
expertise, and storage solutions to manage large data sets.

23
Legal and Ethical Considerations:

Organizations must navigate complex legal frameworks


surrounding e-discovery while also respecting employee
privacy rights. Clear policies on data management and
retention are essential to balance legal compliance with
privacy concerns.

24
Workplace
Monitoring
Workplace Monitoring

Workplace monitoring refers to the practice of


employers tracking employee activities and
communications during work hours to enhance
productivity, ensure compliance with company
policies, and protect organizational assets.
Monitoring methods can vary widely depending on
the industry and organization
Technologies Used:

o Email and Internet Monitoring: Organizations often review employee email


communications and track web browsing habits to identify compliance with
company policies and improve overall productivity.

o CCTV Cameras: Surveillance cameras are commonly used in workplaces to enhance


security and monitor employee behavior, particularly in sensitive areas or where cash is
handled.

o Location Tracking: GPS technology is employed to monitor the whereabouts of employees,


especially for those in field positions or remote work environments.
Ethical Considerations:

o Privacy vs. Security: While employers have valid reasons for monitoring, such as
ensuring safety and compliance, they must balance these needs with respecting
employee privacy rights. Excessive monitoring can lead to a lack of trust and a toxic
work environment.

o Employee Awareness: Transparency is crucial. Employers should inform employees


about the extent of monitoring practices and provide options for consent where
applicable. This openness fosters trust and accountability.

o Impact on Trust: A culture of excessive surveillance can erode trust between employees
and management. It may lead to decreased job satisfaction and increased turnover
rates if employees feel they are constantly being watched.
Advanced
Surveillance
Technology
Advanced Surveillance Technology

Advanced surveillance technology encompasses


various tools and techniques used to monitor
individuals and activities in both public and private
settings. While these technologies can
enhance security and provide valuable data, they
also raise significant privacy concerns and
ethical questions about surveillance overreach.
Technologies Used:

o Camera Surveillance: The widespread use of surveillance cameras has become a


common practice in urban areas and workplaces. Cameras serve as deterrents against
crime and enhance safety; however, they also lead to concerns about constant
monitoring and potential misuse of recorded footage. Individuals may feel their privacy
is compromised when they are aware that they are being recorded at all times.

o Vehicle Event Data Recorders (EDRs): These devices are installed in vehicles to record
crucial data related to their operation, including speed, braking patterns, and location.
While EDRs can provide essential information during accidents for legal proceedings,
concerns about data ownership and privacy arise when the information is used without
the driver’s knowledge.
Technologies Used:

o Stalking Apps: These applications can be discreetly installed on smartphones, enabling


the user to track another person’s location and monitor their communications without
consent. The ease of access to such apps poses significant risks, particularly in cases
of domestic abuse or harassment, as they can facilitate stalking behavior.
Ethical and Legal
Considerations:

o Invasion of Privacy: The use of surveillance technology can lead to violations of


individuals’ privacy rights, creating a culture of constant monitoring.

o Lack of Transparency: Many individuals may not be aware of the extent to which they
are being monitored, leading to a lack of informed consent.

o Potential for Abuse: Surveillance tools can be misused by authorities or individuals,


leading to harassment or discrimination based on collected data.

o Data Security Risks: Collected data may be vulnerable to breaches, exposing sensitive
information that could be exploited.
Ethical and Legal
Considerations:

o Regulatory Challenges: Existing laws may not adequately address the rapid
advancement of surveillance technologies, leaving gaps in protections for individuals.

o Public Trust: Widespread surveillance can erode trust in institutions, particularly if


individuals feel they are being watched without justification.
Large Image slide
Reflection Question:
Large Image slide

How do you think


technology will affect our
privacy in the future, and
what can we do now to
protect our personal
information?
THANK
YOU

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy