1 / 8

Outline 4/27/10

Outline 4/27/10. Lessons from TJX Security Breach Ethics issues from use of IT Privacy issues from use of IT. TJX: The Worst Data Breach Ever?. Information Technology & Ethics. IT use and ethical issues Data collection and storage How much How long Where Networked systems

Download Presentation

Outline 4/27/10

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Outline 4/27/10 • Lessons from TJX Security Breach • Ethics issues from use of IT • Privacy issues from use of IT

  2. TJX: The Worst Data Breach Ever?

  3. Information Technology & Ethics • IT use and ethical issues • Data collection and storage • How much • How long • Where • Networked systems • Distributed data & responsibilities • IT use for all business activities

  4. Ethics • Basic tenets • Responsibility – you accept consequences of your decisions and actions • Accountability – determination of who is responsible for actions that were taken • Liability – legal concept; individuals have the right to recover the damages done to them by other individuals, organizations, or systems. • Issues related to ethics • Privacy, Accuracy, Property, Accessibility

  5. Privacy – Likely threats • Information privacy and rights • Right to privacy not absolute • Public’s right to know supersedes individual’s privacy rights • Digital profiling • The customer-service call? • Data aggregators/warehouses • LexisNexis, Acxiom, Westlaw • Experian, Exquifax, TransUnion

  6. Privacy Threats • Electronic monitoring • Pros and cons • Personal information in Databases • Credit reporting agencies • Banks and financial institutions • Universities, hospitals, utilities • Information online • Volunteered • Collected by information aggregators

  7. Online Privacy Issues • Google’s email storage, social networking, and other privacy practices • Facebook and privacy issues • Default privacy settings • Use of profile to sell advertisements • UNCC privacy policies

  8. Responses from Businesses? • Protecting customers’ privacy • Policies on data collection and storage (most firms have policies) • Securing collected data • Opt-out Vs Opt-in • Data accuracy • Data confidentiality • Information ownership • Information access

More Related