Вы находитесь на странице: 1из 17

PRIVACY

Ayush Chaurasia
Heena Mishra
Mridula Devrani
Ridhima Gupta
What is Privacy?

•“Privacy is the claim of individuals,


groups or institutions to determine for
themselves when, how, and to what
extent information about them is
communicated to others”
• When something is private to a person, it usually means
that something is inherently special or sensitive to them.
• Privacy is the ability of an individual or group to seclude
themselves, or information about themselves, and
thereby express themselves selectively. The boundaries
and content of what is considered private differ among
cultures and individuals.
EMPLOYEES PRIVACY ISSUES

• Employees are often concerned about maintaining personal privacy.


• Some workplace practices, such as computer monitoring, telephone monitoring, and video
surveillance, may hinder employee privacy, present some of the most common workplace
conflicts.
• Additionally, employers may also monitor email messages and Internet usage.
• Telephone monitoring is another issue of employee privacy.
• Employers may install surveillance video cameras to maintain safety, prevent theft, and to
monitor employee activities.
• Private employers may generally conduct on-premises searches of employer-owned vehicles,
equipment, desks, lockers, briefcases and other items.
• Some employers take additional measures to detect how employees spend time on the
Internet by tracking websites visited and blocking access to certain domains.
• Employers may feel such monitoring is necessary to ensure productivity, while employees may
view it as violation of their privacy.
BIG DATA ANALYTICS
• “WHAT IS BIG DATA”?
 ‘Big Data’ is similar to ‘small data’ but bigger in size.
 But having Data bigger requires different approaches:
-Techniques, Tools & Architecture
 Big Data generates value from the storage & processing of
very large quantities of digital information that cannot be
analysed with traditional computing techniques.
 Three Characteristics of Big Data (3V’S):
 Volume
 Velocity
 Variety
HOW BIG IS BIG DATA?
WHAT IS BIG DATA ANALYTICS?

• Big Data Analytics refers to a process that merges large sets of


consumer and other data with information technology in an effort to
make predictions, especially about human behavior.
• Big Data Analytics Process:
• Data Collection (Structured, Unstructured, Semi-structured)
• Data Processing
• Data Cleansing
• Analyzing
• Operationalize
• Application areas Of Data Analytics includes Travel, Healthcare,
E-Commerce & Retail, Manufacturing etc.
Ethical Issues Involved With Big Data

• Lack Of Awareness
• Difficulty of Protection
• Loss Of Protection
• Lack Of Skilled IT Staff
• Cost Of Technology
• Privacy Issues
THE PERSONAL DATA PROTECTION
BILL,2018
• The data protection grew out of public concern about personal privacy in
the face of rapidly developing computer technology.
• It works in two ways :
i. Gives certain rights to individual.
ii. Obligate those who record and use personal information, to be open
about that use.
• Issues Involved under this Bill are as follows:
• Government is exempted to use personal data without consent for
“Functions of State”.
• Surveillance Concerns & Threat to Open Internet.
• Data Localization
CONSUMERS PRIVACY OVER INTERNET

 Consumer privacy involves the handling and


protection of sensitive personal information
that individuals provide in the course of
everyday transactions.
 As the internet has evolved into a medium of
commerce, consumer data privacy is a growing
concern.
 Collection and utilization of information on
the internet pose threat to user privacy.
Information collection

Internet service providers, like Google and Yahoo


offer services like e-mail, file storage ,apps,
mapping, blog, videos etc.
Social networking sites like Facebook, Instagram
where user create an individual profile page, displays
personal information of users.
These sites offer free data content and are financed
by the collection of personal information.
These sites record every transaction that you have
ever made and then used to target advertisement.
Criticism of privacy over internet:

The Gmail users e-mail messages were being mined for


data that is used to send and target advertisements.
Privacy settings of Facebook is widely criticized due to
their complexity and lack of transparency.
Information may be used by an unauthorized user
when there is lack of privacy.
These sites and other service providers earn money by
selling advertising space based on information it
collects about it users.
Case study:

ChoicePoint is a Georgia based corporation, involved in the Data


Brokerage Industry that store and sells critical personal information and
fraud prevention data or information.
In Aug 2004, ChoicePoint was the victim of a fraudulent spoofing attack
in which unauthorized individuals posed as legitimate customers and
obtained personal data on more than 145,000 individuals’ details.
In November 2004 that ChoicePoint became aware of the problem. They
noticed some unusual activities on accounts in Los Angeles police
department (LAPD).
The LAPD requested that ChoicePoint not reveal the activity until the
department can conduct its investigation.
Case study:

The crime is an example of a failure of authentication and not a


network break in. The criminals obtained valid business licenses
and appeared as a legitimate business.

Since ChoicePoint did the right thing and contacted the police, it
exposed itself to considerable expenses, a class-action lawsuit
which cost them $75,000 for each of the 145,000 people , a
Senate investigation, and 20% decreased in its share price.
Ethical Debate on Internet Use

• Internet Ethics come up with code of conduct and disclosure


obligation for those who communicate on the internet.
• Approaches on Internet Information gathering:
1. Approach 1- Made by those who worry about “dossier” society, in
which every facet of our lives is available to those with power and
thus want limits on kinds and amounts of data collected and their
availability.
2. Approach 2- Made by those who view personal data as a kind of
property that can be “traded” for certain benefits.
3. Approach 3- Made by those who want to “balance” concern on
privacy with growth of Internet as a consumer market-place.
PROTECTING PRIVACY

1. Notice/Awareness- Disclose who is collecting information, what


information is collected, how it is collected and how it will be
used.
2. Choice/Consent- Provide a simple way for consumers to choose
whether the site may collect their information and use it for
various purposes.
3. Access/Participation- Allow consumers access to information
collected about them and opportunity to contest the accuracy or
completeness of the data.
4. Integrity/Security- Inform users of the steps taken to prevent the
alteration, misappropriations or destruction of data and relative
actions to be taken in the event of breach of security.
PROTECTING PRIVACY

5. Enforcement/Redress-Assure consumers that the company follows


responsible information practices and that there are consequences
for failing to do so.
 Ways of Protecting Privacy:
1. Formal- Strict government regulations and self-regulations by
industry should be designed.
2. Material- Development of various Privacy Enhancing
Technologies(PETs).

Вам также может понравиться