privacy Archives - Web Updates Daily Get All The Latest Updates Of Technology & Business Wed, 08 Nov 2023 07:54:18 +0000 en-US hourly 1 https://wordpress.org/?v=6.1.4 https://www.webupdatesdaily.com/wp-content/uploads/2019/12/WebUpdatesdaily-150x150.png privacy Archives - Web Updates Daily 32 32 What Is Digital Ethics And Technological Privacy https://www.webupdatesdaily.com/digital-ethics-and-technological-privacy/ https://www.webupdatesdaily.com/digital-ethics-and-technological-privacy/#respond Tue, 04 Aug 2020 05:00:08 +0000 https://www.webupdatesdaily.com/?p=2585 The development and implementation of information and communication technologies (ICT) in society have brought with

The post What Is Digital Ethics And Technological Privacy appeared first on Web Updates Daily.

]]>
The development and implementation of information and communication technologies (ICT) in society have brought with them new ways of communicating and relating; immediate access to information and the transfer of our privacy is now part of our day today. This digital transformation also supposes, and as we can see from time to time, new dangers, opportunities, and dilemmas that society will have to face together so that technological advances are a benefit for all. For this, a new digital ethic is necessary with which we can establish the bases for coexistence and that also ensures the rights of digital citizens.

What Is Digital Ethics

We could say that digital ethics is the necessary social code to solve the problems that Internet use is causing; We understand these problems as intellectual property rights, cyberattacks on security, limits on freedom of expression, regulation of large corporations, digital disconnection, conduct on social networks and the privacy of our data.

Once 40 business leaders signed a Digital Declaration establishing a series of principles on which to build digital ethics, a concept that, like ICTs, is destined to grow and develop at the same time as these, to offer an answer to the problems that arise from them. These principles include:

  • Participation: The development of digital skills is an integral part of the education of every citizen anywhere in the world.
  • Dynamic Digital Society: Digital products and services must continue to develop and bring benefits to society.
  • Data And Privacy: Respect for the privacy of citizens must be ensured through responsible, safe, and transparent handling of their data.
  • Cybersecurity: You must cooperate to reduce cyber threats and strengthen the security of people in the digital environment.
  • Dialogue Cooperation: Stakeholders from any place and sector must dialogue and collaborate to further develop the digital future.

In short, digital ethics has several actors, on the one hand, user ethics, on the other the corporate ethics, and the ethics of applied technology. But, also, it is important to understand that ethics does not depend on software, but on the people behind it; If the programmer of an algorithm already does so with some bias the algorithm will be biased.

Digital Ethics And Privacy On The Internet

With the development of the Internet of Things (IoT), Artificial Intelligence (AI), social networks or Big Data, privacy on the Internet has become one of the most important issues, both for governments and official institutions and for private corporations and citizens themselves in their role as users. The latter are increasingly concerned about the privacy of their data; who collects them, for what and if they are protected.

The General Data Protection Regulation (RGPD) is one of those measures taken by the institutions, in this case, those of the European Union, to create a legal framework in which citizens are better informed about what happens to their data when giving their consent so that they can be processed by a third party, in addition to giving them a series of rights that they can exercise over them, known as ARCO rights (access, rectification, cancellation, opposition, to which limitation and portability were added).

But currently, when it comes to digital ethics and privacy, there is still a long way to go, especially for corporations and the business world, which are the ones who are exploiting new technologies to achieve more benefits, as is the case with the use of Big Data in decision making.

Thus, Big Data has been used to know the profiles of consumers and predict their behavior, violating the privacy of users, whose data could, until recently, be generated, transferred and analyzed without their knowledge or approval. The risk increases when we think about data related to health, preferences, decisions or contacts, monitoring of social networks for security-related purposes, etc. All of this can lead to unethical practices, such as profiling, monitoring, discrimination, exclusion, government oversight, and loss of control.

This from companies, but there are also ethical risks in the digital behavior of citizens regarding privacy, such as when a private video is shared in a WhatsApp group that may violate the privacy of one or more people.

Does Technological Ethics Influence Business Management

Ethics and technology or what is right and what is not when we talk about the uses of technology ? is a topic that has been debated for a time at the business level, the consulting firm Gartner placed digital ethics and privacy as one of the 10 trends technology in 2020. Corporations have begun to become aware of the importance of establishing a series of ethical principles when using technological advances.

Companies are aware of the ethical challenges that future development of AI and the use of data will or will pose in different disciplines, for example, those related to health. The president of Samsung, Young Sohn, already expressed in an interview with Bussines Insider the possibility that in the future (not too far away) DNA information could be collected, analyzed and classified for the sake of scientific research, acknowledging his concern regarding the ethical implications that the use of this type of tools could have, underlining the need that they should be guided by principles and be used with clear purposes and not with the sole objective of profiting.

Conclusions

In conclusion, digital ethics and technological privacy are fields to which different actors must contribute, from institutions, through corporations, to citizens themselves and trying to ensure that the development of ethical principles for the digital world succeeds in putting themselves at the par than technological development, especially when laws lag so far behind (let’s think that Google started rolling in 1998, collecting our data for decades without any control, until the arrival of data protection laws and, especially the GDPR in 2018, 20 years later than the creation of the computer giant).

The post What Is Digital Ethics And Technological Privacy appeared first on Web Updates Daily.

]]>
https://www.webupdatesdaily.com/digital-ethics-and-technological-privacy/feed/ 0
Data Protection Plan Requirements And Guideline https://www.webupdatesdaily.com/data-protection-plan-requirements-and-guideline/ https://www.webupdatesdaily.com/data-protection-plan-requirements-and-guideline/#respond Wed, 24 Jun 2020 07:41:18 +0000 https://www.webupdatesdaily.com/?p=2311 What is a data protection plan? The data protection plan describes the basic information that

The post Data Protection Plan Requirements And Guideline appeared first on Web Updates Daily.

]]>
What is a data protection plan? The data protection plan describes the basic information that should be included in all data protection plans, the type of protection expected, and the disclosure rules for the presentation and publication of the data. The privacy plan should describe the following elements of the work and computer environment.

Protection expected types

Your data protection plan should clearly describe how your work environment will protect data for each of these features.

  1. Standalone, non-network computer, or enabled data clave.
  2. The data may only be used by persons with a contractual license to use the data
  3. The use of the data must be in the office environment described in the security plan and not in the home or any other field environment location.
  4. The data cannot be used on laptop computers.
  5. Password-protected access to all computers that store data.
  6. Encrypt all files with password protection.
  7. Automatic activation of password protection on a computer after five minutes of inactivity on the computer.
  8. It destroys detailed lists and printouts that are no longer needed.
  9. All removable storage devices (such as CDs, floppy disks, zip drives,etc.) by encryption and storage in a locked compartment or room when not in use.
  10. Store detailed prints from data analysis in a closed compartment or room if not in its use.
  11. We undertake to destroy or return files containing limited data at the end of the project.
  12. Prepare and maintain a log of all acquired data files. Record the dates of the data and paperwork received, returned, or destroyed.
  13. Data is not automatically backed up.
  14. Inform all research staff who have access to the limited data in the data protection plan, proper use of data, and sanctions for improper use.

The limited data checker should regularly monitor the use of data throughout all project employees and co-workers. Clear rules for limited data use should be published in an easily accessible place visible to staff. At the end of the research project, all limited media must be available destroyed or returned to the PSID, and all data files and unpublished prints must be destroyed.

Also Read: What Benefits Does Big Data Bring To Marketing Departments?

Declaration of rules

The privacy plan should carefully describe how it is avoided by researchers and employees – unintentional disclosure of the geographical location or identity of the respondents in all working documents, publications, and presentations.

Minimum all staff and researchers should agree to keep out from any type of presentation and publication to the following information.

  1. List, describe or identify a tract or tracts by number, name, or descriptor info.
  2. List of individual cases
  3. Description of the individual case.
  4. Tabulations or summary statistics that have cell size under eleven observations.

Also Read: Best 5 Databases for the company’s

Description of a data protection plan

  1. List and report all the locations where the original and copies of data stored, also provide the building name, street address, and exact room numbers.
  2. List the names with the CV of all researchers and individuals who have data access.
  3. Report the computing environment in which data will be used, including all computing platforms like mainframe, work station, and personal computers. The total number of computers on which data will be analyzed or stored.
  4. An environmental and physical address in which computer and data are kept like in a room with public access, in-room locked when it’s not in used by any research officer.
  5. A report and list of all devices in which data will be stored like mainframe storage device, Computer and hard drives, removable storage devices like zip drive, floppy drive, and CD.
  6. Instructions in data protection policies that will be handed to students or each staff member before they getting access to data as well as recurrent instruction that should be conducted every year.

Also Read: Are Smart TVs a Door To The Insecurity of Our Data?

The post Data Protection Plan Requirements And Guideline appeared first on Web Updates Daily.

]]>
https://www.webupdatesdaily.com/data-protection-plan-requirements-and-guideline/feed/ 0