Types of Information Ms Bentil1. Types of Information  There are basically five (5) types of information: a) Public Domain Information b)Private Information.

Slides:



Advertisements
Similar presentations
Lecture 2 - Revenue Models
Advertisements

IT Security Policy Framework
Bankruptcy and Claims Investigation By Sandy Williams, Jennifer Seidler, and Tonda Lee SmithAmundsen, LLC.
Part 2. QUEENSLAND INTERNATINOAL BUSINESS ACADAMY.
Privacy Laws & Higher Education. Agenda 1.Five Privacy Laws a.FERPA b.HIPAA c.GLB d.FACTA Disposal Rule e.CAN-SPAM 2.Overview of the Laws a.What does.
HIPAA Privacy Rule Compliance Training for YSU April 9, 2014.
 The Health Insurance Portability and Accountability Act of  Federal Law designed to protect sensitive information.  HIPAA violations are enforced.
Interaction of RFID Technology and Public Policy Presentation at RFID Privacy MIT 15 TH November 2003 By Rakesh Kumar
BrianPeterNeil  Financial Aid is financial assistance to pay education- related expenses at approved colleges.  Financial Aid is given in the form.
Sizewise Code of Ethics, Conflict of Interest and Disclosure HR-CECID.
M. Guymon Pleasant Grove High School Spring 2003 Ethics & Computer Technology Day 18.
Data-Sharing and Governance Consultation ANALYSIS OF RESPONSES.
1.3 Control of Information In this section you must be able to: Describe the legal rights and obligations on holders of personal data to permit access.
2/16/2010 The Family Educational Records and Privacy Act.
Privacy and Security Briefing Protecting our Patient’s Privacy is Everyone’s Business: Be a Privacy Protector!
Chapter 9 Information Systems Controls for System Reliability— Part 2: Confidentiality and Privacy Copyright © 2012 Pearson Education, Inc. publishing.
Entrepreneurship: Ideas in Action 5e © 2011 Cengage Learning. All rights reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible.
Electronic Data Interchange (EDI)
Entrepreneurship: Ideas in Action 5e © 2011 Cengage Learning. All rights reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible.
Copyright, 1996 © Dale Carnegie & Associates, Inc. HOW TO COMPLAIN AND GET RESULTS MINI-LESSON INDIANA DEPARTMENT OF FINANCIAL INSTITUTIONS CONSUMER EDUCATION.
장홍예 Telecommunication Engineer Lab E-COMMERCE: TECHNICAL AND MARKET APPROACH.
Information Privacy Policy in Canada Presented By: Sue Wu.
Privacy and Encryption The threat of privacy due to the sale of sensitive personal information on the internet Definition of anonymity and how it is abused.
1 Raymond Doray Conflicts between the new Canadian Money Laundering Act and the rules of professional conduct and ethics September 13, 2002.
Oz – Foundations of Electronic Commerce © 2002 Prentice Hall E-money.
Chapter Two Ethical & Legal Issues.
What is E-Commerce? Section 8.1. What is E-commerce? E-commerce is the exchange of goods, services, information, or other businesses through electronic.
Information Systems CS-507 Lecture 41
E-commerce. Introduction  Electronic commerce (e-commerce) is going to have profound effect on the Government, the industry and the community on the.
Characteristics of a Market Economy
Ethics & Computer Essentials. R. Stewart Fayetteville High School Ethics A set of principles of right conduct A theory or a system of.
Ethics & Computer Technology. Ethics are…  A set of principles of right conduct.  A theory or a system of moral values.  The rules or standards.
HOME-BASED AGENTS Welcome to Unit 7. Review of unit reading material from textbook: Travel Career Development 8 th ed. Authors: Gagnon,P. & Houser, S.
E-Commerce: A Revolution in the Way We Do Business.
Component 4: Introduction to Information and Computer Science Unit 2: Internet and the World Wide Web 1 Component 4/Unit 2Health IT Workforce Curriculum.
4I. By the time you finish this unit you should be able to: Identify the activities that make up marketing.
PRIVACY AND THE CONSUMER Privacy Issues Forum 30 March 2006 David Russell Chief Executive Consumers’ Institute NZ.
Financial Services Privacy - the interaction of the privacy and financial services regulatory systems Chris Connolly Financial Services Consumer Policy.
Security of the Distributed Electronic Patient Record: A Case-Based Approach James G. Anderson, Ph.D. Purdue University.
10-1 Chapter 10 Direct Marketing.
The Impact Of Information Technology Presented by: Kayla Allen Julie Carter Cristi Strickland.
Why the Data Protection Act was brought in  The 1998 Data Protection Act was passed by Parliament to control the way information is handled and to give.
7 tips to do secure online shopping. Shopping Online? How literate are you with online buying? Do you know to differentiate real and fake stuff? Do you.
ND e-commerce Carl Arrowsmith Session 14 Consumer Protection & Trust.
IT Security Policy Framework ● Policies ● Standards ● Procedures ● Guidelines.
1 Topic# 7 – Auditing with Technology Readings, Chapter 10 A – COMPUTERIZED AUDIT TOOLS –Electronic Spreadsheets –Automated Working Papers –Generalized.
Entrepreneurship: Ideas in Action 5e © 2011 Cengage Learning. All rights reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible.
E-Business Project - Strategy Carl Arrowsmith
R. Stewart Fayetteville High School Ethics & Computer Technology Day 18.
Information Technology & Ethics. Impact The impact of IT on information and communication can be categorized into 4 groups: privacy, accuracy, property,
Copyright © 2015 by Saunders, an imprint of Elsevier Inc. All rights reserved. Chapter 3 Privacy, Confidentiality, and Security.
Intellectual Property. Confidential Information Duty not to disclose confidential information about a business that would cause harm to the business or.
Attorney is another name for a Lawyer. There are more than 1 million lawyers in the United States –More than 70% have their own private practice –10%
1 Law, Ethical Impacts, and Internet Security. 2 Legal Issues vs. Ethical Issues Ethics — the branch of philosophy that deals with what is considered.
 Financial Aid is financial assistance to pay education- related expenses at approved colleges.  Financial Aid is given in the form of:  Grants  Scholarships.
TODAY’S AGENDA 1.Budgeting Project review- they are due electronically tomorrow 2.Budgeting Quiz (DVD) and test questions afterwards 3.Ch. 10 Baking 4.Ch.
Managing False Information NiiBen C. A. Ayivorh AML/CFT Consultant Nii-Int’l L.L.C.
INFORMATION FOR DEVELOPMENT Ms Bentil 1. What is development?  It involves economic growth, modernisation and general improvement in the socio-economic.
1 HIPAA’s Impact on Depository Financial Institutions 2 nd National Medical Banking Institute Rick Morrison, CEO Remettra, Inc.
ELECTRONIC PAYMENT SYSTEM
10-1 Chapter 10 Direct Marketing.
The insurance industry employs over 2.3 million workers
7 Sarbanes-Oxley, Internal Control, and Cash
Chapter 10 Consumer Education.
7 Sarbanes-Oxley, Internal Control, and Cash
Marketing Plan: SnakPak
Tax Subsidy for Employer Provided Insurance Insurance Option Marginal Product of Labor Insurance Provided by Employer Pre-tax Income (20% tax.
Introduction to Health Privacy
H2.9b Maintain Information
Presentation transcript:

Types of Information Ms Bentil1

Types of Information  There are basically five (5) types of information: a) Public Domain Information b)Private Information c) Personal Information d) Academic Information e) Research Information Ms Bentil 2

Public Domain Information(PDI)  Also known as ‘Information Commons’ or ‘Knowledge commons’  Information accessible to the general public within normal requirements of law and commerce. 3 Ms Bentil

Sources of PDI  Books  Websites  Newspapers  Magazines  Radio  Television  Government publications Ms Bentil4

 All information emanating from government bodies is public information in principle.  Examples of PDI include: -Information about human rights, -Threats to the environment - Health Ms Bentil 5

Problems of Access to PDI 1. Economic constraints: For eg. newspapers and books are for sale and not free. 2. Under stocked libraries and information centres. 3. Information that is electronically available has its own problems of accessibility. Ms Bentil 6

4. Access to some online databases or government publications is expensive. 5. Unavailable internet access in rural communities. 6. Unreliable power supply. Ms Bentil 7

Solution  Information centres and libraries, especially public libraries. Ms Bentil 8

Private Information  This is information that is not meant for public consumption.  Information relating to companies, organisations, institutions and groups.  Examples: production information, marketing information and financial information Ms Bentil 9

The need for private information 1. For competitive advantage. 2. To protect the image of an organisation or a product.  Eg Tobacco has been found to be a slow killer yet manufacturers hide it from consumers and advertise it; coca-cola, drugs etc Ms Bentil 10

Governments and private information  Civil and public servants take oaths of secrecy.  It is common to find many files and documents tagged ‘confidential’, ‘secret and confidential’, ‘for your eyes only’, etc. Ms Bentil 11

 Arguments by advocates of open government and human rights: a) Governments are elected by the people. b) Governments need to be transparent. c) Keeping information breeds corruption. Ms Bentil 12

Personal Information  Recorded information about an identifiable individual.  It is universally accepted that some information relating to an individual is personal and therefore should be confidential. Ms Bentil 13

Types of Personal Information Personal Descriptors – Name, Address, Telephone number, weight, height, etc Identification Numbers – Pin numbers, Social Security numbers, Credit Card numbers Health – Health records, blood type, etc Ms Bentil 14

 Age  Financial status – Income, loan records, transactions, purchases and spending habits  Social Status Ms Bentil 15

Privacy of Public Office Holders  While some believe they have the right to privacy, others claim they should have a transparent life for others to emulate. Ms Bentil 16

Can personal information be absolute?  Circumstances make it necessary for personal information to become known to other people.  For example, health information becomes known to medical personnel, insurance companies and employers. Ms Bentil 17

Ethics of disclosing “PI”  Personal information cannot be made public by those who are privileged to have access to them.  Doctors, lawyers, bankers, etc are bound by ethical codes from disclosing information about clients, customers, patients, Ms Bentil 18

Academic and Research Information  Academic information is information that is meant for teaching and learning purposes.  It is also information generated through scholarly activities.  Egs. textbooks, research publications, etc. Ms Bentil 19

 Research information is information generated out of investigation into an issue using systematic procedures.  Information can be academic and at the same time research.  For eg. textbooks and journals are written using systematic procedures.  Academic and research information is used by academics and researchers. Ms Bentil 20

 Academics and researchers usually work in institutions of high level such as universities.  Academic institutions such as universities usually engage in both academic and research work. Eg. ISSER of UG.  There are however some institutions that are set up purely for research. Eg. CSIR, IEA Ms Bentil 21

 Academic and research information are two sides of the same coin. They feed on each other.  Academic activities generate research information and research information in turn facilitates academic activities.  In summary, the types of information are not mutually exclusive. Ms Bentil 22