Computer Science

Data Privacy

Data privacy refers to the protection of personal information and the right to control how data is collected, used, and shared. In the digital realm, it involves safeguarding sensitive data from unauthorized access, ensuring compliance with privacy regulations, and implementing security measures to prevent data breaches. Maintaining data privacy is essential for building trust and maintaining ethical standards in the handling of personal information.

Written by Perlego with AI-assistance

7 Key excerpts on "Data Privacy"

Index pages curate the most relevant extracts from our library of academic textbooks. They’ve been created using an in-house natural language model (NLM), each adding context and meaning to key research topics.
  • The SAGE Guide to Key Issues in Mass Media Ethics and Law

    ...This is the arm of the right of privacy that promises to get the most scrutiny, attention, enthusiasm, and concern as time goes forward. Data Privacy is often understood to cover the desire of consumers to limit or control personal information that is recorded on mailing lists, credit reports, and business data banks. Another aspect of Data Privacy involves so-called data-breach laws that require notification of consumers when personal data stored in databases are lost. Data in the Internet Age In the Internet age, data has become an important business asset. It has become useful to businesses in the course of product development, marketing, and sales. Indeed, it is not just that data can help companies develop, promote, and sell new products and services. For many companies, data itself has become a saleable product. Some have characterized data as “the new oil” or “the new soil” of the Internet age. Data Privacy seems to be a popular issue, as illustrated by the broad interest in an influential Wall Street Journal series about data privacy, which began running in 2010 under the ominous series title, “What They Know.” The Journal series dramatized behavioral advertising, making both consumers and policymakers better aware of what had until then been something of an insider debate. A Journal animated graphic, “A Short Guide to Cookies,” for example, portrayed cookies as little animated Lego animals that carry information back and forth between a user’s computer and the Internet, and explained that third-party ad networks conduct tracking on hundreds of thousands of sites. Even more importantly, the Journal series described research concerning flaws in the tracking system. For example, while users can, in theory, delete (or refuse to accept) normal cookies if they do not want to be tracked, in many cases, Flash cookies (a different technology, often associated with online videos) were often dropped on to user computers, even if the user had attempted to refuse cookies...

  • User Research
    eBook - ePub

    User Research

    Improve Product and Service Design and Enhance Your UX Research

    • Stephanie Marsh(Author)
    • 2022(Publication Date)
    • Kogan Page
      (Publisher)

    ...04 Getting the legal and ethical stuff right Do not skip this section! Since the first edition of this book was published in March 2018, new data protection laws have come into effect in many parts of the world, such as the General Data Protection Regulation (GDPR) that protects citizens of the EU and UK, and the California Consumer Protection Act (CCPA). You may be in a part of the world that doesn’t have the same kind of data protection legislation, but I would recommend taking on data protection practices as they are also part of ethical practices in research and practical habits such as making sure data is findable in case you ever need to delete it. Some international organizations have adopted such laws as GDPR as a global standard; this has been done where I currently work (in 2021), Springer Nature. Let’s start with a few definitions. What is data protection? Data protection is the fair and proper use of information about people. It’s part of the fundamental right to privacy. Good practices in data protection are vital to ensure public trust in data use in both the public and private sectors (Information Commissioner’s Office, 2020). GDPR, for example, isn’t a set of strict prescriptive rules, but it’s about using principles to assess data protection risks (Information Commissioner’s Office, 2020). In essence, personal data should be kept: accurate and up to date; secured; transparent about how it’s going to be used; restricted to the minimum needed to do the job (Buckbee, 2020). It is inevitable that you will collect (and create) personal data in the course of doing user research. You’ll collect, for example, by capturing details about the participant in order to understand if they are suitable to take part in the research. And you’ll create personal data by recording the participant during a research session and in order to store that personal data you will then need their informed consent. What is personal data? Anything that identifies a person...

  • Quality Management Systems
    eBook - ePub

    Quality Management Systems

    A Practical Guide to Standards Implementation

    • Ray Tricker(Author)
    • 2019(Publication Date)
    • Routledge
      (Publisher)

    ...methods to use for collecting and retaining personal data The detail of the security surrounding the personal data The means used to transfer the personal data from one organisation to another The means used to retrieve personal data about certain individuals The method for ensuring a retention schedule is adhered to The means used to delete or dispose of the data 8.5.3 Analysing what data is held and how it is used Personal data includes any information relating to an individual who could be identified, directly or indirectly by that data such as by reference to a person by name, identification number, online user, location and other factors specific to the physical, physiological, genetic, mental, economic, cultural or social identity of that person. The data collected by an organisation can range from the simplest (such as names, email addresses or telephone numbers) to the more complicated specialist categories of information (such as medical and/or financial information). 8.5.4 Drawing up a GDPR compliance data map A simple data map diagram is a high-level mechanism to look at the systems the organisation uses to process personal information. It should also capture whom the organisation shares information with and who is responsible for it. (See Figure 8.4) Figure 8.4 Checklist for GDPR compliance 8.5.5 Privacy notices Author’s Hint Data Privacy is the branch of information security dealing with the proper handling of data concerning consent, notice, sensitivity and regulatory concerns. The term ‘ privacy notice ’ is used to describe the way an organisation looks after an individual’s privacy...

  • Information Technology and Traditional Legal Concepts
    • Richard Jones, Roksana Moore, Richard Jones, Roksana Moore(Authors)
    • 2013(Publication Date)
    • Routledge
      (Publisher)

    ...Protecting ‘privacy’ through control of ‘personal’ data processing: A flawed approach Karen McCullagh Salford Law School, University of Salford, UK The development of a frontier-free internal market and of the so-called ‘information society’ have resulted in an increase in the flow of personal data between EU member states. To remove potential obstacles to such transfers, data protection legislation was introduced. One of the underpinning principles of Directive 95/46/EC is the protection of privacy. Yet, the legislation does not provide a conclusive understanding of the terms ‘privacy’ or ‘private’ data. Rather, privacy protection is to be achieved through the regulation of the conditions under which personal data may be processed. An assessment of whether, 10 years after the enactment of the Data Protection Act 1998 (DPA 1998), a coherent understanding of the concept of personal data exists, necessitated an analysis of the decisions in Durant v. FSA ([2003] EWCA Civ 1746) and CSA v. SIC ([2008] 1 WLR 1550, [2008] UKHL 47). Furthermore, in order to examine the effectiveness of the legislation, this article examines whether the term ‘personal’ is synonymous with the term ‘private’ data and whether control over processing of personal information protects privacy. By drawing on interviews with privacy and data protection experts, and from the findings of a survey of bloggers, it will be shown that a review of the assumptions and concepts underpinning the legislation is necessary. Introduction As IT usage and processing capabilities evolve, regulators, privacy practitioners and citizens are increasingly questioning the suitability and adequacy of data protection legislation to allow the effective processing of personal data while simultaneously safeguarding the privacy of individuals. Indeed, the Office of the UK’s Information Commissioner (ICO) commissioned research into how the EU Directive 95/46/EC should be updated, because We want to generate new thinking...

  • Human Rights in the Digital Age
    • Mathias Klang, Andrew Murray, Mathias Klang, Andrew Murray(Authors)
    • 2016(Publication Date)

    ...A person’s privacy is diminished exactly to the degree that others possess this kind of knowledge about him. 24 Parent also develops the idea of personal information as ‘facts which most persons in a given society choose not to reveal about themselves … or … facts about which a particular individual is acutely sensitive and which he therefore does not choose to reveal about himself’. 25 The restriction or control of personal information has been partially achieved through the data protection legislation, which restrains organisations from collecting or processing personal information without the individual’s consent, and this is particularly the case with special categories of information. 26 The term ‘partially’ is used because there are a number of exemptions from consent that are covered under the Data Protection Directive 95/46/EC and national legislation implementing the Data Protection Directive (DPD). Reiman, however, found that the control-based definition of privacy was inadequate: Privacy must be a condition independent of the issue of control … the right to privacy is not my right to control access to me – it is my right that others be deprived of that access … having this right will protect my ability to control access to me. 27 The control-based definition, however, does not take into consideration instances where personal information may be obtained without the knowledge of the individual through surreptitious means, data mining techniques and online profiling. 28 This would leave the individual with no control over their information and the only means of redress would be through the protection of. legislation such as data protection legislation...

  • Big Data, Big Analytics
    eBook - ePub

    Big Data, Big Analytics

    Emerging Business Intelligence and Analytic Trends for Today's Businesses

    • Michael Minelli, Michele Chambers, Ambiga Dhiraj(Authors)
    • 2012(Publication Date)
    • Wiley
      (Publisher)

    ...Data Privacy than the United States. In 1998, the United Kingdom established the Data Protection Act, which very specifically addresses issues of personal and sensitive data and which is overseen and enforced by a Data Protection Commissioner. This was the United Kingdom’s response to the EU’s 1995 Data Protection Directive. As suggested by Andrew Reiskind in the previous section, companies that operate globally have a lot of unexpected implications to consider, including and especially cultural ones. We might not consider how factors of daily human exchange play into such differences, such as lower-income environments in which entire families share a cell phone (not unlike the way people shared a single household landline). Their sense of privacy and where they draw boundaries is entirely different to situations where each family member has one or more personal mobile device. These are contextual factors—factors that affect perceptions of privacy. Whether global or local our contexts are constantly changing. Individuals inherently adopt different postures of trust and willingness to share depending on those contexts. What we share in one context we might clearly object to being shared in another. The more recent issues with Google’s collapsing of privacy policies are heavily influenced by concerns over contextual relevance: What’s relevant in one context is not relevant in another. Academics from Dublin, Ireland, to Pittsburgh, Pennsylvania (note the implied global breadth), have shown the significance of context by referencing the concept of contextual integrity (CI). The CI concept was developed as an alternate benchmark for evaluating privacy breaches. Contexts model societal structure, reflecting the core concept that society has distinctive settings. For example, society distinguishes between the social contexts of a hospital and a university. CI allows individuals to describe their privacy expectations by associating norms of behavior with contexts...

  • Writing Successful Undergraduate Dissertations in Social Sciences
    • Francis Jegede, Charlotte Hargreaves, Karen Smith, Philip Hodgson, Malcolm Todd, Julia Waldman(Authors)
    • 2020(Publication Date)
    • Routledge
      (Publisher)

    ...Interview files and other confidential material should be disposed of carefully when no longer required. Compliance with GDPR and other legal requirements Your approach to processing personal data collected for your dissertation should be guided by seven principles set out by the GDPR (European Union (2016): Regulation (EU) 2016/679). These are outlined under Article 5 as summarised as below. Lawful, fair and transparent processing of personal data. Purpose limitation – collection of data must be for specified, explicit and legitimate purposes. Data minimisation – data collection must be limited to what is necessary for your purpose. Accurate – personal data held or processed for your dissertation should be correct. If personal data in your possession is inaccurate, you must erase or rectify the data where necessary and without delay. Storage limitation – you must not keep or retain data for no longer than is necessary. Integrity and confidentiality – you must process data in a way which safeguards the personal data. Accountability – if you are the data controller, you are responsible for ensuring compliance with the GDPR principles. Note the distinction between the data controller and data processor and their respective responsibilities under GDPR (Figure 8.1). Figure  8.1 Roles and responsibilities of data controller and data processor under the GDPR and DPA (2018) On the basis of individual roles and responsibility for compliance with GDPR and DPA, it is important to note two categories of people relating to handling and processing personal data. A ‘controller’ determines the purposes and means of processing personal data. In the context of research, the study initiator or sponsor who determines what data is collected as part of a research study is the data controller. This can be an individual, a group of people or institutions acting alone or jointly...