Ethics(Quiz_3) Flashcards
is defined by Oxford as, the state or condition of being free from being observed or disturbed by other people, or the state of being free from public attention.
Privacy
Merriam-Webster defines it as the quality or state of being apart from company or observation and freedom from unauthorized intrusion.
Privacy
is a fundamental human right recognized in the UN Declaration of Human Rights, the International Covenant on Civil and Political Rights and in many other international and regional treaties.
Privacy
underpins human dignity and other key values such as freedom of association and freedom of speech. It has become one of the most important human rights issues of the modern age.
Privacy
[T/F] Nearly every country in the world recognizes a right of privacy explicitly in their Constitution.
True
Major reasons for the movement towards comprehensive privacy and data protection laws include:
- to remedy past injustices
- to promote electronic commerce
there are a number of important trends that contribute to privacy invasion :
Globalization - removes geographical limitations to the flow of data. The development of the Internet is perhaps the best known example of a global technology.
Convergence - is leading to the elimination of technological barriers between systems. Modern information systems are increasingly interoperable with other systems, and can mutually exchange and process different forms of data.
Multimedia - fuses many forms of transmission and expression of data and images so that information gathered in a certain form can be easily translated into other forms.
trends that contribute to privacy invasion | removes geographical limitations to the flow of data. The development of the Internet is perhaps the best known example of a global technology.
Globalization
trends that contribute to privacy invasion | is leading to the elimination of technological barriers between systems. Modern information systems are increasingly interoperable with other systems, and can mutually exchange and process different forms of data.
Convergence
trends that contribute to privacy invasion | fuses many forms of transmission and expression of data and images so that information gathered in a certain form can be easily translated into other forms.
Multimedia
Involves the establishment of rules governing the collection and handling of personal data such as credit information and medical records;
Information Privacy
Concerns the protection of people’s physical selves against invasive procedures such as drug testing and cavity searches
Bodily privacy
Covers the security and privacy of mail, telephones, email and other forms of communication
Privacy of communications
Concerns the setting of limits on intrusion into the domestic and other environments such as the workplace or public space.
Territorial privacy
_____ is frequently seen as a way of drawing the line at how far society can intrude into a person’s affairs. It can be divided into the following facets :
Information Privacy
Bodily privacy
Privacy of communications
Territorial privacy
privacy protection
privacy protection can be divided into the following facets :
Information Privacy
Bodily privacy
Privacy of communications
Territorial privacy
[T/F] The lack of a single definition of privacy/privacy protection should not imply that the issue lacks importance.
True
The Technologies of Privacy Invasion
Identity Systems
- Identity Cards - linked to national registration systems
- Biometrics - process of collecting, processing and storing details of a personís physical characteristics for the purpose of identification and authentication
Surveillance of Communications -
- Internet and email interception
- National Security
Video Surveillance - prevalence of the use of CCTV
Workplace Surveillance - tracking employees movement
Privacy and Anonimity Issues
- Data Breaches
- Electronic Discovery
- Consumer Profiling
- Consumer Profiling
- Advanced Surveillance Technology
- Camera Surveillance
- Vehicle Event Data Recorders
- Stalking Apps
An alarming number of identity theft incidents can be traced back to this, involving large databases of personal information. ____ are sometimes caused by hackers breaking into a database, but more often than one might suspect, they are caused by carelessness or failure to follow proper security procedures.
Data Breaches