A number of high profile organisations have been subjected to great reputational damage resulting from a proliferation of personal information breaches (Protecting Personal Information, 2010). Organisations have made substantial use of their customer's personal information without doing much to protect the information. Organisation's collecting personal information have had little impetus to consider the best privacy protection solutions and people have not done anything drastic to initiate such action (Loss of privacy is price one pays to live in online world, 2011). It may take strong government regulation to propel organisations in this direction (Loss of privacy is price one pays to live in online world, 2011) leading to the pending implementation …show more content…
The reason why both Governance and Management disciplines are covered is because data management and governance disciplines have been neglected issues by most organisations, but the POPI Act is about to change this (Davies, 2011). Therefore, in preparation for the POPI Bill, both Governance and Management will be covered.
The purpose of this research is to develop a framework that will address the effective and efficient Governance and Management of Information Privacy in a holistic manner. According to the Business Dictionary (2011), a "framework is a broad overview, outline, or skeleton of interlinked items, which supports a particular approach to a specific objective, and serves as a guide that can be modified as required by adding or deleting items".
It is important to provide a distinction between the terms, framework and conceptual framework. A conceptual framework according to educational researcher Smyth (2004), is a tool to uncover research to enable a researcher to make logic of subsequent findings. He further adds that a conceptual framework is a point of departure about the research and its context. The framework is a tool to assist the researcher to develop an awareness of the particular situation under study and to communicate this (Smyth,
Dagar, Anil. “Internet, Economy and Privacy.” Fung Institute for Engineering Leadership. 16 April 2013. Web.
The issue of privacy breaching relates to the legal environment of business because every company and business holds information about its employees, customers, suppliers and other stakeholders. On top of all the information they store on other people, most companies have all their own business information kept on computers and files as well. If there were to be a breach in a company then all of the information they had stored in their systems could be stolen and sold to others. There would be major identity theft, social security fraud and even financial losses. Security breaches have become a significant risk for most businesses today. Security breaches can disrupt business operations, damage brand reputation and customer relationships, and attract government investigations and class action lawsuits.
When we mention the word ‘privacy’, we mean that there is something very personal about ourselves. Something that we think others are not supposed to know, or, we do not want them to. Nevertheless, why is it so? Why are people so reluctant to let others know about them entirely? This is because either they are afraid of people doing them harm or they are scared that people may treat them differently after their secrets are known. Without privacy, the democratic system that we know would not exist. Privacy is one of the fundamental values on which our country was established. Moreover, with the internet gaining such popularity, privacy has become a thing of the past. People have come to accept that strangers can view personal information about them on social networking sites such as Facebook, and companies and the government are constantly viewing a person’s activity online for a variety of reasons. From sending email, applying for a job, or even using the telephone, Americans right to privacy is in danger. Personal and professional information is being stored, link, transferred, shared, and even sold. Various websites, the government and its agencies, and hospitals are infringing our privacy without our permission or knowledge.
In Lecture 26 of INFO 3200’s Spring 2014 offering, the instructor talks about the concept of privacy in new media and society. This is a popular topic of conversation in the public sphere. In a world in which the easiest way to keep track of someone is to do so online, it is essential that we know and control what information others get access to.
It has become a sad and upsetting fact that in today’s society the truth is that the right to one’s privacy in the I.T (information technological) world has become, simply a joke. In an electronic media article “No place to hide”, written by James Norman, two interesting and debatable questions were raised: ‘Are we witnessing the erosion of the demarcation of public and private spaces brought on by the networked economy and new technology?’ Also, ‘What roles do government, industry and citizens have in regard to censorship and privacy?’ These statements ultimately end with the fact that it is impossible for Net users to expect privacy online, because online privacy doesn’t exist. However, one must ask, ‘What will be done about the problem?’ while keeping in mind that yes, the thin line between public and private spaces has been severed as a result of new technology. It is vital that everyone as users of the internet, be it government, Internet Service Providers (ISP’s), or individuals, need take the issue of internet privacy very seriously, while basing all actions towards the issue with the moral statement of, ‘Rights aren’t free, they’re earned’.
Making ethical decisions is a challenging task for managers. Managers are responsible for making ethical decisions as it helps a firm safeguard its reputation (Wadell, Jones and George, 2013; 135). In its simplest sense, the issue of ethics arises when one group of stakeholders benefits at the expense of others (Robertson, Blevins and Duffy, 2013; 85). Agalgatti and Krishna (2007,327) further states that it is a process of evaluating what is right or wrong in relation to a society’s moral standards. The main issue in the case study is the issue of privacy, which is the amount of personal information that is accessible to others (Moor, 1997). Society views invasion of privacy as unethical. In the digital world people has become so reliant on technology. There is no privacy in the digital world. Everything that goes online can be accessed by others, and this makes it difficult for managers to identify matters and practices they should be concerned with, including consumer’s privacy (Ccnmtl.columbia.edu, 2014). Failing to protect consumer’s privacy could lead to hacking and intrusion of an individual’s personal information (Khosrow-Pour, 2002; 2). For example, social applications such as WhatsApp and Viber are becoming increasingly popular. The instant message Viber has failed to protect the user’s privacy. It has been hacked recently by the Syrian Electronic Army (“Viber free download” 2014) despite the technical measures used to protect user’s data.
We are living in world that is growing in technology. Technology is evolving so rapidly, especially in ways that allow us to store personal information. For example, we can look up a purchase with no receipt at a retail store with a swipe of a credit card. Another example, we could go to the doctor and the nurse can print out a copy of all our health records that are stored in the computer by just typing in our full name. Although this may be a way to make things easier for us, it is also a way for people to take our information without permission and do what they please with it. People can hack into the database of retail stores and steal account numbers and people can just say your name and get your health history if the nurse does not ask for a form of identification. Information privacy is a growing concern for Internet and data users. In a report Protecting Privacy in an Information Age: The Problem of Privacy in Public, researched by Helen Nissenbaum of Princeton University, she states:
Constitution, the founding fathers recognized that citizens in a democracy need privacy for their ‘persons, houses, papers, and effects.’ That remains as true as ever, but our privacy laws have not kept up as technology has changed the way we hold information.”
Solove, Daniel J. “5 Myths about Privacy” Washington Post: B3. Jun 16 2013. SIRS. Web. 10
The world erupted in outrage following revelations by Edward Snowden regarding the extent of surveillance perform by the National Security Agency. Privacy becomes one of the hottest topic of 2013 and was chosen by the world’s most popular online dictionary, Dictionary.com, as the Word of the Year. However, the government is not the only one that conduct data gathering and surveillance. Employers often monitor their employees, and businesses collect data on theirs customer. The morality of these practices is a topic that generates heated debate.
Until PIPEDA, the organisations we speak with have largely applied their own protocols in terms of how they collect, store, and share personal information with both external and internal stakeholders. Although data is recognised as “the new oil”, organisations need to understand the nuances behind what is allowable and what is illegal.
...e same time, the time has come to raise consciousness, support research and standard-setting, and prepare model codes for those systems that do employ privacy-enhancing technologies. The opportunities for individuals to customize privacy preferences, research should be conducted to evaluate alternative arrangements should be generated. On top of that, the digital applications should provide transparent criteria, including ease of understanding, adequacy of notification, compliance with standards, contractual fairness and enforceability, appropriate choice of defaults, efficiency relative to the potential benefits, and integration with other means of privacy protection. Particular attention should be paid to uniformity of protocols across different industries and applications, so that consumers are not overwhelmed by a pointless diversity of interfaces and contracts.
As society has progressed, there have been many new innovative and unbelievable developments in almost all aspects of life that have ultimately created an impact. More specifically, advancements in technology have rather had a much larger and intense impact on society as it continues to grow. Technology has allowed for many great and useful applications that has made life much easier and convenient. However, many aspects of technology have given a rise to a number of social and ethical issues, causing numerous debates and concerns. One of the more prominent concerns deals with the issue of privacy rights.
The finding of this report are based on four different factors for different factor for analysis of personal data protection and personal data privacy. The first is current regulations, which ……
Privacy is the condition where someone personal information can not be documented and be used by others (Parent, 1983). Privacy has been and continues to be a significant issue of concern for both current and prospective electronic commerce customers. The foll...