Chapter 3: Ethics and Privacy Flashcards
List and explain the 5 Ethical Frameworks/Standards
Utilitarian approach: states that an ethical action is the one that provides the most good or does the least harm (to customers, employees, shareholders, the community, and the physical environment.)
Rights approach: maintains that an ethical action is the one that best protects and respects the moral rights of the affected parties.
- Moral rights can include the rights to make one’s own choices about what kind of life to lead, to be told the truth, to not to be injured, and to enjoy a degree of privacy.
Fairness approach: posits that ethical actions treat all human beings equally, or, if unequally, then fairly, based on some defensible standard.
Common good approach: argues that respect and compassion for all others is the basis for ethical actions. It emphasizes the common conditions that are important to the welfare of everyone.
- Ex. conditions can include a system of laws, effective police and fire departments, health care, a public educational system, and even public recreation areas.
Deontology approach: states that the morality of an action is based on whether that action itself is right or wrong under a series of rules, rather than based on the consequences of that action.
- Ex. the belief that killing someone is wrong, even if it was in self-defense
Define the Code of Ethics
Code of ethics: is a collection of principles intended to guide decision making by members of the organization
Explain the 3 fundamental tenets of ethics
- Accountability refers to determining who is responsible for actions that were taken.
- Responsibility means that you accept the consequences of your decisions and actions.
- Liability is a legal concept that gives individuals the right to recover the damages done to them by other individuals, organizations, or systems.
Information privacy
Information privacy: is the right to determine when, and to what extent, information about you can be gathered or communicated to others
define Profiling and Digital dossier, and how the data is generated?
Profiling: The process of forming a digital dossie
Digital dossier: which is an electronic profile of you and your habits
- data about you are generated in many ways: surveillance cameras located on toll roads, on other roadways, in busy intersections, in public places, and at work; credit card transactions; telephone calls (landline and cellular); banking transactions; queries to search engines; and government records
define Privacy Codes and Policies
Privacy codes and policies: are an organization’s guidelines for protecting the privacy of its customers, clients, and employees
define Opt-out model and Opt-in model
Opt-out model: is informed consent that permits the company to collect personal information until the customer specifically requests that the data not be collected
Opt-in model: prohibits an organization from collecting any personal information unless the customer specifically authorizes it.
* Ex. Canada’s anti-spam legislation, Bill C-28, requires that organizations use the opt-in model for the sending of emails.
define transborder data flows and the problems with it
Transborder data flows: The flow of information among countries
Approximately 50 countries have some form of data protection laws.
- Many of these laws conflict with those of other countries, or they require specific security measures.
- Other countries have no privacy laws at all
Creates issues with trying to protect sensitive domestic economic data, cyberattacks, businesses can be charged for not handling data well in other countries
What is the The General Data Protection Regulation (GDPR)?
also define personal data and senesitive data
The General Data Protection Regulation (GDPR), the world’s strongest data protection laws, went into effect in the European Union
- It changes how businesses and public sector organizations manage the information of their customers. The regulation also increases the rights of individuals and gives them more control over their own information.
Covers both:
- Personal data: includes information that can be used to identify a person, such as a name, address, Internet Protocol address, and many other pieces of information.
- Senesitive data: encompass genetic data, racial information, information about religious and political views, sexual orientation, trade union membership, among others
Why might it be beneificial for a business to have high-quality information privacy?
- To protect the organization’s public image or brand images
- To maintain or enhance trust and promote continued consumer confidence in the organization and promote goodwill