An Ethical Approach to Data Privacy Protection
Resumen:
Privacy, trust and security are closely intertwined, as are law and ethics. Privacy preservation and security provisions rely on trust (e.g., one will allow only those whom one trusts to enter one’s zone of inaccessibility; one will not feel secure unless one trusts the security provider). Violation of privacy constitutes a risk, thus, a threat to security. Law provides a resolution when ethics cannot (e.g., ethics knows that stealing is wrong; the law punishes thieves); ethics can provide context to law (e.g., law allows trading for the purpose of making a profit, but ethics provides input into ensuring trade is conducted fairly). Privacy breaches disturb trust and run the risk of diluting or losing security; it is a show of disrespect to the law and a violation of ethical principles. Data privacy (or information privacy or data protection) is about access, use and collection of data, and the data subject’s legal right to the data. This refers to: • Freedom from unauthorized access to private data • Inappropriate use of data• Accuracy and completeness when collecting data about a person or persons (corporations included) by technology • Availability of data content, and the data subject’s legal right to access; ownership • The rights to inspect, update or correct these data Data privacy is also concerned with the costs if data privacy is breached, and such costs include the socalled hard costs (e.g., financial penalties imposed by regulators, compensation payments in lawsuits such as noncompliance with contractual principles) and the soft costs (e.g., reputational damage, loss of client trust). Though different cultures put different values on privacy or make it impossible to define a stable, universal value, there is broad consensus that privacy does have an intrinsic, core and social value. Hence, a privacy approach that embraces the law, ethical principles, and societal and environmental concerns is possible despite the complexity of and difficulty in upholding data privacy.
2016 | |
Privacy Personal data protection Collection Processing Ciencias Sociales Ciencias de la Educación Datos Privacidad Ética Tecnología |
|
Inglés | |
Fundación Ceibal | |
Ceibal en REDI | |
https://hdl.handle.net/20.500.12381/441 | |
Acceso abierto | |
Reconocimiento-NoComercial-SinObraDerivada 4.0 Internacional. (CC BY-NC-ND) |
_version_ | 1808165428803928064 |
---|---|
author | Lee, Wanbil W. |
author2 | Zankl, Wolfgang Chang, Henry |
author2_role | author author |
author_facet | Lee, Wanbil W. Zankl, Wolfgang Chang, Henry |
author_role | author |
bitstream.checksum.fl_str_mv | 04900bda284772ac092f06dccc513e67 4ccf650116cc92bf2fdb7eb8b0a53432 |
bitstream.checksumAlgorithm.fl_str_mv | MD5 MD5 |
bitstream.url.fl_str_mv | https://redi.anii.org.uy/jspui/bitstream/20.500.12381/441/2/license.txt https://redi.anii.org.uy/jspui/bitstream/20.500.12381/441/1/An-Ethical-Approach-to-Data-Privacy-Protection_joa_Eng_1216.pdf |
collection | Ceibal en REDI |
dc.creator.none.fl_str_mv | Lee, Wanbil W. Zankl, Wolfgang Chang, Henry |
dc.date.accessioned.none.fl_str_mv | 2018-11-23T18:48:48Z 2020-10-28T19:25:43Z 2021-09-07T19:10:46Z |
dc.date.available.none.fl_str_mv | 2018-11-23T18:48:48Z 2020-10-28T19:25:43Z 2021-09-07T19:10:46Z |
dc.date.issued.none.fl_str_mv | 2016 |
dc.description.abstract.none.fl_txt_mv | Privacy, trust and security are closely intertwined, as are law and ethics. Privacy preservation and security provisions rely on trust (e.g., one will allow only those whom one trusts to enter one’s zone of inaccessibility; one will not feel secure unless one trusts the security provider). Violation of privacy constitutes a risk, thus, a threat to security. Law provides a resolution when ethics cannot (e.g., ethics knows that stealing is wrong; the law punishes thieves); ethics can provide context to law (e.g., law allows trading for the purpose of making a profit, but ethics provides input into ensuring trade is conducted fairly). Privacy breaches disturb trust and run the risk of diluting or losing security; it is a show of disrespect to the law and a violation of ethical principles. Data privacy (or information privacy or data protection) is about access, use and collection of data, and the data subject’s legal right to the data. This refers to: • Freedom from unauthorized access to private data • Inappropriate use of data• Accuracy and completeness when collecting data about a person or persons (corporations included) by technology • Availability of data content, and the data subject’s legal right to access; ownership • The rights to inspect, update or correct these data Data privacy is also concerned with the costs if data privacy is breached, and such costs include the socalled hard costs (e.g., financial penalties imposed by regulators, compensation payments in lawsuits such as noncompliance with contractual principles) and the soft costs (e.g., reputational damage, loss of client trust). Though different cultures put different values on privacy or make it impossible to define a stable, universal value, there is broad consensus that privacy does have an intrinsic, core and social value. Hence, a privacy approach that embraces the law, ethical principles, and societal and environmental concerns is possible despite the complexity of and difficulty in upholding data privacy. |
dc.format.extent.es.fl_str_mv | 9 p. |
dc.identifier.citation.es.fl_str_mv | Lee, W. W., Zankl, W., Chang, H. "An Ethical Approach to Data Privacy Protection", Isaca Journal Volume 6, 2016. |
dc.identifier.uri.none.fl_str_mv | https://hdl.handle.net/20.500.12381/441 |
dc.language.iso.none.fl_str_mv | eng |
dc.publisher.es.fl_str_mv | ISACA |
dc.rights.es.fl_str_mv | Acceso abierto |
dc.rights.license.none.fl_str_mv | Reconocimiento-NoComercial-SinObraDerivada 4.0 Internacional. (CC BY-NC-ND) |
dc.rights.none.fl_str_mv | info:eu-repo/semantics/openAccess |
dc.source.es.fl_str_mv | Isaca Journal 6 2016 |
dc.source.none.fl_str_mv | reponame:Ceibal en REDI instname:Fundación Ceibal instacron:Fundación Ceibal |
dc.subject.anii.none.fl_str_mv | Ciencias Sociales Ciencias de la Educación |
dc.subject.ceibal.es.fl_str_mv | Datos Privacidad Ética Tecnología |
dc.subject.es.fl_str_mv | Privacy Personal data protection Collection Processing |
dc.title.none.fl_str_mv | An Ethical Approach to Data Privacy Protection |
dc.type.es.fl_str_mv | Artículo |
dc.type.none.fl_str_mv | info:eu-repo/semantics/article |
dc.type.version.es.fl_str_mv | Publicado |
dc.type.version.none.fl_str_mv | info:eu-repo/semantics/publishedVersion |
description | Privacy, trust and security are closely intertwined, as are law and ethics. Privacy preservation and security provisions rely on trust (e.g., one will allow only those whom one trusts to enter one’s zone of inaccessibility; one will not feel secure unless one trusts the security provider). Violation of privacy constitutes a risk, thus, a threat to security. Law provides a resolution when ethics cannot (e.g., ethics knows that stealing is wrong; the law punishes thieves); ethics can provide context to law (e.g., law allows trading for the purpose of making a profit, but ethics provides input into ensuring trade is conducted fairly). Privacy breaches disturb trust and run the risk of diluting or losing security; it is a show of disrespect to the law and a violation of ethical principles. Data privacy (or information privacy or data protection) is about access, use and collection of data, and the data subject’s legal right to the data. This refers to: • Freedom from unauthorized access to private data • Inappropriate use of data• Accuracy and completeness when collecting data about a person or persons (corporations included) by technology • Availability of data content, and the data subject’s legal right to access; ownership • The rights to inspect, update or correct these data Data privacy is also concerned with the costs if data privacy is breached, and such costs include the socalled hard costs (e.g., financial penalties imposed by regulators, compensation payments in lawsuits such as noncompliance with contractual principles) and the soft costs (e.g., reputational damage, loss of client trust). Though different cultures put different values on privacy or make it impossible to define a stable, universal value, there is broad consensus that privacy does have an intrinsic, core and social value. Hence, a privacy approach that embraces the law, ethical principles, and societal and environmental concerns is possible despite the complexity of and difficulty in upholding data privacy. |
eu_rights_str_mv | openAccess |
format | article |
id | CEIBAL_9eb91dae5ddcb356e98bf7d28ac44b02 |
identifier_str_mv | Lee, W. W., Zankl, W., Chang, H. "An Ethical Approach to Data Privacy Protection", Isaca Journal Volume 6, 2016. |
instacron_str | Fundación Ceibal |
institution | Fundación Ceibal |
instname_str | Fundación Ceibal |
language | eng |
network_acronym_str | CEIBAL |
network_name_str | Ceibal en REDI |
oai_identifier_str | oai:redi.anii.org.uy:20.500.12381/441 |
publishDate | 2016 |
reponame_str | Ceibal en REDI |
repository.mail.fl_str_mv | mamunoz@fundacionceibal.edu.uy |
repository.name.fl_str_mv | Ceibal en REDI - Fundación Ceibal |
repository_id_str | 9421_1 |
rights_invalid_str_mv | Reconocimiento-NoComercial-SinObraDerivada 4.0 Internacional. (CC BY-NC-ND) Acceso abierto |
spelling | Reconocimiento-NoComercial-SinObraDerivada 4.0 Internacional. (CC BY-NC-ND)Acceso abiertoinfo:eu-repo/semantics/openAccess2018-11-23T18:48:48Z2020-10-28T19:25:43Z2021-09-07T19:10:46Z2018-11-23T18:48:48Z2020-10-28T19:25:43Z2021-09-07T19:10:46Z2016Lee, W. W., Zankl, W., Chang, H. "An Ethical Approach to Data Privacy Protection", Isaca Journal Volume 6, 2016.https://hdl.handle.net/20.500.12381/441Privacy, trust and security are closely intertwined, as are law and ethics. Privacy preservation and security provisions rely on trust (e.g., one will allow only those whom one trusts to enter one’s zone of inaccessibility; one will not feel secure unless one trusts the security provider). Violation of privacy constitutes a risk, thus, a threat to security. Law provides a resolution when ethics cannot (e.g., ethics knows that stealing is wrong; the law punishes thieves); ethics can provide context to law (e.g., law allows trading for the purpose of making a profit, but ethics provides input into ensuring trade is conducted fairly). Privacy breaches disturb trust and run the risk of diluting or losing security; it is a show of disrespect to the law and a violation of ethical principles. Data privacy (or information privacy or data protection) is about access, use and collection of data, and the data subject’s legal right to the data. This refers to: • Freedom from unauthorized access to private data • Inappropriate use of data• Accuracy and completeness when collecting data about a person or persons (corporations included) by technology • Availability of data content, and the data subject’s legal right to access; ownership • The rights to inspect, update or correct these data Data privacy is also concerned with the costs if data privacy is breached, and such costs include the socalled hard costs (e.g., financial penalties imposed by regulators, compensation payments in lawsuits such as noncompliance with contractual principles) and the soft costs (e.g., reputational damage, loss of client trust). Though different cultures put different values on privacy or make it impossible to define a stable, universal value, there is broad consensus that privacy does have an intrinsic, core and social value. Hence, a privacy approach that embraces the law, ethical principles, and societal and environmental concerns is possible despite the complexity of and difficulty in upholding data privacy.9 p.engISACAIsaca Journal62016reponame:Ceibal en REDIinstname:Fundación Ceibalinstacron:Fundación CeibalPrivacyPersonal data protectionCollectionProcessingCiencias SocialesCiencias de la EducaciónDatosPrivacidadÉticaTecnologíaAn Ethical Approach to Data Privacy ProtectionArtículoPublicadoinfo:eu-repo/semantics/publishedVersioninfo:eu-repo/semantics/articleUsos sociales de las TIC y cultura digitalOtroLee, Wanbil W.Zankl, WolfgangChang, HenryLICENSElicense.txttext/plain4611https://redi.anii.org.uy/jspui/bitstream/20.500.12381/441/2/license.txt04900bda284772ac092f06dccc513e67MD52ORIGINALAn-Ethical-Approach-to-Data-Privacy-Protection_joa_Eng_1216.pdfapplication/pdf621746https://redi.anii.org.uy/jspui/bitstream/20.500.12381/441/1/An-Ethical-Approach-to-Data-Privacy-Protection_joa_Eng_1216.pdf4ccf650116cc92bf2fdb7eb8b0a53432MD5120.500.12381/4412024-04-15 11:59:57.522oai:redi.anii.org.uy:20.500.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://fundacionceibal.edu.uy/https://redi.anii.org.uy/oai/requestmamunoz@fundacionceibal.edu.uyUruguayopendoar:9421_12024-04-15T14:59:57Ceibal en REDI - Fundación Ceibalfalse |
spellingShingle | An Ethical Approach to Data Privacy Protection Lee, Wanbil W. Privacy Personal data protection Collection Processing Ciencias Sociales Ciencias de la Educación Datos Privacidad Ética Tecnología |
status_str | publishedVersion |
title | An Ethical Approach to Data Privacy Protection |
title_full | An Ethical Approach to Data Privacy Protection |
title_fullStr | An Ethical Approach to Data Privacy Protection |
title_full_unstemmed | An Ethical Approach to Data Privacy Protection |
title_short | An Ethical Approach to Data Privacy Protection |
title_sort | An Ethical Approach to Data Privacy Protection |
topic | Privacy Personal data protection Collection Processing Ciencias Sociales Ciencias de la Educación Datos Privacidad Ética Tecnología |
url | https://hdl.handle.net/20.500.12381/441 |