Ethics

Cards (26)

  • Impact of Information Technology on Privacy
    • Increase Surveillance
    • Data Collection and Profiling
    • Privacy Risks
    • Challenges to Anonymity
    • Erosion of Privacy Boundaries
    • Legal and Ethical Issue
    • Privacy Enhancing Technology
    • Awareness and Education
  • Increase Surveillance
    Technology allows nations and private entities to spy on people more. Surveillance cameras, GPS tracking, facial recognition technologies, and online tracking tools make tracking people easier.
  • Data Collection and Profiling
    Information technology allows websites, social media, and mobile phones to collect a lot of personal data. With this information, you may create full person profiles with likes, dislikes, and behaviors. These profiles enable targeted marketing, personalized suggestions, and more.
  • Privacy Risks
    When tech companies and others collect and store personal data, people worry about privacy. Hackers that enter into systems or steal personal data can commit identity theft, financial frauds, and other crimes.
  • Challenges to Anonymity
    Digital technologies are becoming more interconnected, making online anonymity tougher. Even if someone uses a phony name or privacy-enhancing techniques, their digital record might reveal who they are.
  • Erosion of Privacy Boundaries

    Privacy lines are slowly being broken down in the digital world because public and private areas are becoming less clear. People are especially encouraged to share private details and experiences on social media sites with a lot of people, often without fully understanding how this might affect their privacy.
  • Legal and Ethical Issue
    Technology has raised many privacy legal and moral issues. Consent, data ownership, retention, and the right to be forgotten are more problematic in the digital era. This has prompted national and international discussions and regulations.
  • Privacy Enhancing Technology
    The good news is that information technology has also created privacy-enhancing technologies (PETs) to defend privacy. Encryption, anonymization, open networks, and privacy-preserving data analysis are examples. They reduce digital technology privacy risks.
  • Awareness and Education
    Information technology has transformed privacy, so more individuals are learning about their rights and how to protect their data. People are becoming more concerned of their digital footprint and protecting their privacy online.
  • Philippine Privacy Law or Data Privacy Act of 2012
    The Data Privacy Act of 2012 balances privacy rights with the need for organizations to collect, process, and use personal data for legitimate purposes to promote responsible data management in the Philippines and build trust in the digital economy.
  • Philippine Privacy Law or Data Privacy Act of 2012

    1. Signed into law on August 15, 2012
    2. Took effect on September 8, 2012
  • Scope of Philippine Privacy Law

    • Regulates the handling of personal information in both the public and private domains
  • Data Privacy Principles
    • Transparency
    • Legitimate purpose
    • Proportionality
  • Data Subject Rights
    • Access
    • Update
    • Object to the processing of their personal data
  • Data Protection Commission
    The National Privacy Commission (NPC) was made to make sure that the Data Privacy Act is followed. The NPC is in charge of making sure that the law is followed, taking complaints, and giving advice on data protection problems.
  • Consent Requirements
    The law says that people whose personal data is being processed must give their permission, unless certain circumstances apply.
  • Security Measures
    Organizations processing personal data must establish suitable security measures to safeguard the confidentiality, integrity, and accessibility of the data.
  • Cross-Border Data Transfer

    The law limits the sending of personal data outside of the Philippines and requires that certain conditions be met to make sure the data is properly protected.
  • Breach Notification
    Organizations must inform the National Privacy Commission (NPC) and the individuals whose data has been compromised in the event of a data breach that is likely to endanger the rights and freedoms of those individuals.
  • Data Breaches
    Unauthorized access or disclosure of sensitive, protected, or confidential data causes data breaches. These breaches can result from cyberattacks, insider threats, human error, or system malfunctions. They can cause financial losses, brand damage, legal issues, and privacy breaches for individuals, businesses, and governments.
  • Examples of Data Breaches
    • Cyberattacks
    • Insider Threats
    • Human Error
    • Physical Theft or Loss
    • Third-party Breaches
    • System Glitches or Bugs
  • Workplace Monitoring
    Employers utilize many methods to observe, track, and analyze employees' activities, behaviors, and performance at work. This method can include surveillance cameras, time-tracking systems, employee monitoring software, keyboard recording, and GPS tracking.
  • Types of Workplace Monitoring
    • Computer Monitoring
    • Surveillance Cameras
    • Time-Tracking Systems
    • GPS Tracking
  • Purpose of Workplace Monitoring
    Workplace monitoring helps employers boost productivity, avoid misconduct and policy violations, protect assets, comply with regulations, and improve efficiency. The scope and means of monitoring should be in line to legitimate corporate interests.
  • Legal and Ethical Considerations for Workplace Monitoring
    Different places have different laws and rules about monitoring people at work. These rules and laws may cover things like notice, consent, data security, and limits on the types of monitoring that are allowed. Employers should know the laws that apply to them and make sure that they are followed. Being up front about monitoring, using data for legitimate objectives, limiting intrusiveness, and protecting employee privacy and confidentiality are ethical considerations.
  • Impact on Employee Morale and Trust
    Employee morale, trust, and job satisfaction might suffer from excessive workplace monitoring. If monitoring violates trust or privacy, employees may feel micromanaged, stressed, or dissatisfied. Employers should explain why monitoring is done, how data will be utilized, and privacy protections. They should also review monitoring rules with staff and address concerns.