module 4 Flashcards
deepfake
fake videos or audio recordings that look and sound like real thing
acceptable use policy
set of rules specifying legal and ethical use of a system and consequences of noncompliance
accountability
issues involving both the users and the orgs responsibilities and liabilities
nonrepudiation
method for binding all the parties to a contract
guidelines to minimize invasion of privacy
- use websites with privacy policies that are easy to find, read and understand
- limit access to personal info
- ensure datas reliability and take precautions to prevent misuse of the data
- ensure data collection has a stated purpose
- must consent to use info for other reasons
- must verify data accuracy and only collect what is needed
record keeping systems should not be secret
must be able to prevent unauthorized access and misuse of data
federal data protections
health insurance portability and accountability act (HIPAA)
fair and accurate credit transaction act (FACTA)
childrens online privacy protection act (COPPA)
laws that protection EU citizens data
genetic data
racial/ethnic origin
religious beliefs
key components of general data protection regulation
user consent
anonymized data
data breach notifications within 72 hrs
safe transfer or data across borders
appointment of a GDPR compliance officier
GDPR business benefits
improved cx confidence
better data security
reduced maintenance by retiring legacy applications
better alignment with evolving technology
better decision making from effective use of cx info
cookies
small text files with unique ID tags that are embedded in a web browser and saved on the users hard drive
-used for welcoming new and returning cxs
-used to rmbr info for ordering
-helps websites customize pages for users
- a cookie manager can disable cookies if needed
log files
a record of a users actions on a web site
-generated by web server software
-can help determine cases of identity misrepresentation on web sites
-data is not always accurate as users can misrepresent themselves
social media networking ethics
open and fair access to all users
- authenticity: trustworthy and sincere
- transparency: members are honest and open with no hidden agenda
- communication: members are open to knowing other members and communicate properly
- business network ethics: open and fair access to all users
utilitarian networking
true utility, truthful and is not wasting users time
emotional networking
able to empathize with being ethical in all situations, emotion has no role
virtuous networking
all parties will act in good faith