1 The Engineer as a Professional Privacy. 2 After reading the articles please answer the following questions. 1) Is privacy a concern that engineers have.

Slides:



Advertisements
Similar presentations
1. As a Florida KidCare community partner families entrust you to not only help them navigate the Florida KidCare system but to keep the information they.
Advertisements

Health Insurance Portability and Accountability Act HIPAA Education for Volunteers and Students.
HIPAA. What Why Who How When What Is HIPAA? Health Insurance Portability & Accountability Act of 1996.
Increasing public concern about loss of privacy Broad availability of information stored and exchanged in electronic format Concerns about genetic information.
1 HIPAA Education CCAC Professional Development Training September 2006 CCAC Professional Development Training September 2006.
Today’s Schools face:  Numerous State and Federal Regulations  Reduced Technology Funding  More Stringent Guidelines for Technology Use.
Silicon Valley Apps for Kids Meetup Laura D. Berger October 22, 2012 The views expressed herein are those of the speaker, and do not represent the views.
Ethical and Social...J.M.Kizza 1 Module 5: Anonymity, Security, Privacy and Civil Liberties IntroductionAnonymitySecurityPrivacy Ethical and Social Issues.
C YBER S ECURITY FOR E DUCATIONAL L EADERS : A G UIDE TO U NDERSTANDING AND I MPLEMENTING T ECHNOLOGY P OLICIES Chapter 10 Privacy Policy © Routledge Richard.
Presented by: Dan Landsberg August 12, Agenda  What is Social Media?  Social Media’s Professional Side  Benefits of Social Media  Regulatory.
Queensland University of Technology CRICOS No J Ethical Use of Confidential Student Information Student Success Program Training.
980 9 th Street, Suite 2300 Sacramento, California Telephone: Facsimile: Montgomery Street, Suite 788 San Francisco,
Insights on the Legal Landscape for Data Privacy in Higher Education Rodney Petersen, J.D. Government Relations Officer and Security Task Force Coordinator.
Business Plug-In B7 Ethics.
Chapter 9 Information Systems Controls for System Reliability— Part 2: Confidentiality and Privacy Copyright © 2012 Pearson Education, Inc. publishing.
Spring 2010 Marco Valtorta CSCE 390 Professional Issues in Computer Science and Engineering Privacy Concerns (Chapters [B]) Spring.
SMART GRID: Privacy Awareness and Training – A Starting Point for Utilities October 2011 SGIP-CSWG Privacy Group 1.
INTERNET and CODE OF CONDUCT
4/3/20011 Ethics in Special Education Assessment and Testing and Maintenance of Student Information.
Property of Common Sense Privacy - all rights reserved THE DATA PROTECTION ACT 1998 A QUESTION OF PRINCIPLES Sheelagh F M.
DATA PROTECTION AND PATIENT CONFIDENTIALITY IN RESEARCH Nic Drew Data Protection Manager University Hospital of Wales   
Data Protection Overview
“Internet” and “Operator” (COPPA Statute) InternetOperator Collectively the myriad of computer and telecommunications facilities, including equipment.
Ethics and Social Responsibility
C4- Social, Legal, and Ethical Issues in the Digital Firm
Electronic Use Policies.   Social Media  Internet.
Confidentiality, Consents and Disclosure Recent Legal Changes and Current Issues Presented by Pam Beach, Attorney at Law.
Chapter 9 Organizational Use of Information Systems The McGraw-Hill Companies, Inc All rights reserved. Irwin/McGraw-Hill.
ISYS205 Strategic Uses of Information Systems Fall, 2001 Ethical Issues in Information Systems Greg Fulton Anuja Desai Tom Schaeffer.
ETHICAL ISSUES SURROUND ELECTRONIC COMMUNICATIONS Unit 3.
IBT - Electronic Commerce Privacy Concerns Victor H. Bouganim WCL, American University.
Medical Law and Ethics, Third Edition Bonnie F. Fremgen Copyright ©2009 by Pearson Education, Inc. Upper Saddle River, New Jersey All rights reserved.
The right item, right place, right time. DLA Privacy Act Code of Fair Information Principles.
1 Ethical Issues in Computer Science CSCI 328, Fall 2013 Session 15 Privacy as a Value.
Regulation of Personal Information Sally Brierley & Emma Harvey.
HIPAA THE PRIVACY RULE. 2 HISTORY In 2000, many patients that were newly diagnosed with depression received free samples of anti- depressant medications.
Privacy and Free Speech: It's Good for Business Nicole A. Ozer, Esq. Technology and Civil Liberties Policy Director ACLU of Northern California Online.
A Road Map to Research at Jefferson: HIPAA Privacy and Security Rules for Researchers Presented By: Privacy Officer/Office of Legal Counsel October 2015.
Ethical and Legal Issues Information Systems 337 Prof. Harry Plantinga.
Human Rights Act, Privacy in the context of auditing Phil Huggins Chief Technologist, IRM PLC
DATA ACCURACY- one of the issues of computer ethics. Providing inaccurate data input results in erroneous information & decision making. Information on.
28/01/20161 The Future of Online Privacy: Online advertising and behavioral targeting Kristina Irion Third Internet Governance Forum Thursday, 5/12/2008.
A REVIEW OF THE NPSD’S ACCEPTABLE USE POLICIES AND ADMINISTRATIVE REGULATIONS JUNE 17 TH & 20 TH TEACHER IN-SERVICE The Acceptable Use of Technology 1.
An NZFFBS Training Module.  Objective 1  State the purpose and principles of the Privacy Act and the Code of Ethics.  Objective 2  Apply the principles.
A REVIEW OF THE NPSD’S ACCEPTABLE USE POLICIES AND ADMINISTRATIVE REGULATIONS JUNE 17 TH & 20 TH TEACHER IN-SERVICE The Acceptable Use of Technology 1.
Copyright © 2005 Thomson Business & Professional Publishing. All rights reserved.16–1 Learning Objectives  Define employment-at-will and discuss how wrongful.
DON Code of Privacy Act Fair Information Principles DON has devised a list of principles to be applied when handling Protected Personal Information (PPI).
Internet Privacy Define PRIVACY? How important is internet privacy to you? What privacy settings do you utilize for your social media sites?
1 HIPAA’s Impact on Depository Financial Institutions 2 nd National Medical Banking Institute Rick Morrison, CEO Remettra, Inc.
Visibook is instant, simple, and dynamic appointment booking We're headquartered in San Francisco, California "Visibook is awesome. My entire studio was.
Somerset ISD Online Acceptable Use Policy. Somerset Independent School District Electronic Resources Acceptable Use Policy The purpose of this training.
Jim Loter Director of Information Technology
Privacy and the Law.
When to share and not to share information
Privacy principles Individual written policies
Obligations of Educational Agencies: Parents’ Bill of Rights
PERSONAL DATA PROTECTION ACT 2010
Confidentiality October 14, 2005.
Move this to online module slides 11-56
Internet Safety and Acceptable Use Policies.
Current Privacy Issues That May Affect Your Credit Union
Computer Programming I
The Issues with Technology in education
PRIVACY PRESENTATION TO THE SPRING 2013 CONFERENCE BY HANK MOORLAG
Good Spirit School Division
Student Data Privacy: National Trends and Wyoming’s Role
Privacy Principles Melinda Clarke.
The Health Insurance Portability and Accountability Act
Presentation transcript:

1 The Engineer as a Professional Privacy

2 After reading the articles please answer the following questions. 1) Is privacy a concern that engineers have to consider? 2) In what way do companies such as Google have a responsibility to the public? 3) What dilemmas might Google engineers face if pressurised by shareholders to increase profits?

3 Privacy …… is the ability of an individual to control the flow of information about themselves and thereby reveal themselves selectively.

4 Civil Liberties Common civil liberties include freedom of association, freedom of assembly, freedom of religion, and freedom of speech, and additionally, the right to due process, to fair trial, and to privacy.

5 Loss of Data in Britain "I do not need address, bank or parent details in download - are these removable to make the file smaller?" asked an NAO official in an . An internal Revenue and Customs e- mail, relating to the request, read: "I must stress we must make use of data we hold and not overburden the business by asking them to run additional data scans/filters that may incur a cost to the department."

6 Social Networking Analysts have long said that the value of social networks lies in their ability to mine user-generated data to deliver targeted advertising. In October, Microsoft Corp. shelled out $240-million (U.S.) for a 1.6-per-cent stake in Facebook. (Values it at $15 billion)

7 Facebook "We may use information about you that we collect from other sources, including but not limited to newspapers and Internet sources such as blogs, instant messaging services and other users of Facebook, to supplement your profile.“ "We may share your information with third parties, including responsible companies with which we have a relationship."

8 Privacy Yahoo! settled out of court with the families of two Chinese dissidents who were jailed after the firm identified them to Chinese authorities. Both were sentenced to ten years' imprisonment, and are still in jail. The Economist November 17 th 2007

9 Association for Computing Machinery, Code of Ethics 1.7 Respect the privacy of others. Computing and communication technology enables the collection and exchange of personal information on a scale unprecedented in the history of civilization. Thus there is increased potential for violating the privacy of individuals and groups. It is the responsibility of professionals to maintain the privacy and integrity of data describing individuals. This includes taking precautions to ensure the accuracy of data, as well as protecting it from unauthorized access or accidental disclosure to inappropriate individuals. Furthermore, procedures must be established to allow individuals to review their records and correct inaccuracies.

10 Association for Computing Machinery, Code of Ethics This imperative implies that only the necessary amount of personal information be collected in a system, that retention and disposal periods for that information be clearly defined and enforced, and that personal information gathered for a specific purpose not be used for other purposes without consent of the individual(s). These principles apply to electronic communications, including electronic mail, and prohibit procedures that capture or monitor electronic user data, including messages,without the permission of users or bona fide authorization related to system operation and maintenance. User data observed during the normal duties of system operation and maintenance must be treated with strictest confidentiality, except in cases where it is evidence for the violation of law, organizational regulations, or this Code. In these cases, the nature or contents of that information must be disclosed only to proper authorities.