 |
 |
 |
 |
 |
 |
 |
 |
 |
 |
 |
 |
 |
 |
 |
 |
 |
 |
 |
 |
 |
|
|
Module 8: Privacy Issue |
|
|
|
 |
|
|
|
|
|
SAQ 8-1 |
|
|
|
2. Think of an act, other than those already discussed in this module, constitutes a violation of privacy in the computing. Explain. |
|
|
1. Explain the following types of privacy. Evaluate them by applying an ethical principle for each. |
|
|
|
|
|
|
a. Database privacy is given to the database where its information is kept in the limitation of what it is intended to be. The consignee entrust by registering over the care to others for a special use or purpose. It is infringement of his privacy in the moral laws when his information in the database is used beyond what the special purpose he intends tobe.
b. E-mail privacy is given to a group of sender and receivers permitted to be aware of the confidential message. Other person not within the group infringed the e-mail privacy that the confidentiality of the message considers and become void. According to the moral laws, moral norm is fidelity in the utilization of information. Once confidential message from the sender spreads beyond the intended group of recipients, the fidelity of the confidential message becomes unreliable.
c. Privacy on the Web refers to Internet user's privacy where the access log ("cookies") is generated from the web client upon request to the web server (owner of the site). The site owner can infringe the privacy of the site client (Moral Laws) with this activity in the sense that the information of the cookies containing where and what type of user requests to the server. |
|
|
|
There are many such as the ATM Machine, the surveillance cameras in the mall and other establishments.
Surveillance cameras for example are product of computing for security reasons. The privacy of individual is infringed when time that the hidden camera took his picture without his consciousness. His activity might not be against the establishment's ethics but the fact that he has the right to keep his private activity violated from the establishment who unintentionally can uncover his privacy. |
|
|
|
|
|
 |
|
 |
|
|
|
|
Animated Design of Razel Gil Patalinghug UP Open University Master in Information System IS201 Computer Ethics |
|
|
|