Privacy and Protection of Personal Integrity in the Working Place
|
|
- Andra Powell
- 6 years ago
- Views:
Transcription
1 Privacy and Surveillance Technology Interdisciplinary Perspectives ZiF Centre for Interdisciplinary Research University of Bielefeld, Germany February 10-11, 2006 Gordana Dodig-Crnkovic Department of Computer Science and Electronics Mälardalen University Sweden Privacy and Protection of Personal Integrity in the Working Place 1
2 CONTENTS INTRODUCTION PRIVACY DEFINITIONS MONITORING AND SURVEILLANCE SURVEILLANCE TOOLS LEGISLATION WHOSE RESPONSIBILITY? THE UNIVERSAL CORE VALUES FOUND ACROSS CULTURES TRUST AND WORKPLACE PRIVACY INVENTING SOCIALLY DANGEROUS TECHNOLOGY ETHICS OF TRUST LEGITIMACY BY DESIGN AND TRUSTWORTHY COMPUTING CONCLUSIONS 2
3 PRIVACY Privacy is a fundamental human right recognized in all major international agreements regarding human rights such as Article 12 of the Universal Declaration of Human Rights (United Nations, 1948). 3
4 WHAT I LEARNED THUS FAR? Michael: privacy as a social construct Vincent: if humans are not involved, privacy can not be breached Philip: privacy operationalized how to do something Nadia: radical translation? privacy its meaning in post 9/11, balancing or managing priorities Nuala: Identity question at the core of the problem establishing identity Charles Raab: public policy perspective need for more academic research alongside action research privacy as a public good, essential for society at large, not only for an individual 4
5 PRIVACY One of characteristics of private is it is not official. Nevertheless, we expect a certain degree of privacy even in the most official situations. 5
6 INTRODUCTION Disappearance of boundaries between private and professional life: - ubiquitous computing and - ambient intelligence Privacy protection vs. surveillance of employees 6
7 MONITORING AND SURVEILLANCE TOOLS Closed Circuit Television (CCTV) Night vision system Smart cards Telephone taps Computer usage ( monitoring,, Internet monitoring and filtering, instant message monitoring, keystroke logging) Cellular radio/satellite interception Radio Frequency Identification (RFID) Location monitoring... 7
8 COMPUTERS AS TOOLS FOR MONITORING AND SURVEILLANCE Storage Searching, Sorting, Simulation the four basic S s of computing technology makes it unprecedented tools for monitoring and surveillance 8
9 Face Fingerprint / Palm Print Hand and Finger Geometry Handwriting Iris Voice/Speaker Retinal Multimodal 9
10 SPECIFIC METHODS OF WORKER SURVEILLANCE Packet-sniffing software can intercept, analyze, and archive all communications on a network, including employee e-e mail, chat sessions, file sharing, and Internet browsing. Employees who use the workplace network to access personal e accounts not provided by the company are not protected. Their private accounts, as long as they are accessed on workplace network or phone lines, can be monitored. Keystroke loggers can be employed to capture every key pressed on a computer keyboard. These systems will even record information is typed and then deleted. Phone monitoring is pervasive in the American workplace as well. Some companies employ systems automatically monitor call content and breaks between receiving calls. 10
11 SPECIFIC METHODS OF WORKER SURVEILLANCE Video surveillance is also widely deployed. In a number of cases, video surveillance has been used in employee bathrooms, rest areas, and changing areas. Video surveillance, might be acceptable where the camera focuses on publicly-accessible areas. However, installment in areas where employees or customers have a legitimate expectation of privacy, such as inside bathroom stalls, can give the employee a cause of action under tort law. 11
12 SPECIFIC METHODS OF WORKER SURVEILLANCE "Smart" ID cards can track an employee's location while she moves through the workplace. By using location tracking, an employer can even monitor whether employees spend enough time in front of the bathroom sink to wash their hands. New employee ID cards can even determine the direction the worker is facing at any given time. Psychometric or aptitude testing to evaluate potential employees: Such tests purport to assess intelligence, personality traits, religious belief, character, and skills. 12
13 SPECIFIC METHODS OF WORKER SURVEILLANCE Telecommuting Employees who labor remotely from the workplace encounter different privacy challenges. For instance, how can the employer monitor the employee's home without impinging upon non-work work-related related activities? What limits are there to prevent surveillance of the employee during off- hours? What about information collected about non-employee family members who may use work equipment? 13
14 LEGISLATION The Universal Declaration of Human Rights Article 12 No one shall be subjected to arbitrary interference with his privacy, family, home or correspondence, nor to attacks upon his honour and reputation. Everyone has the right to the protection of the law against such interference or attacks. UN s s International Covenant on Civil and Political Rights (ICCPR) 14
15 LEGISLATION The Council of Europe's 1981 Convention for the Protection of Individuals with regard to the Automatic Processing of Personal Data The Organization for Economic Cooperation and Development's Guidelines Governing the Protection of Privacy and Transborder Data Flows of Personal Data 15
16 LEGISLATION PRIVACY AND HUMAN RIGHTS Report Personal Information must be: obtained fairly and lawfully, used only for the original specified purpose, adequate, relevant and not excessive to purpose, accurate and up to date, and destroyed after its purpose is completed 16
17 FAIR INFORMATION PRACTICES APPLIED BY INTERNATIONAL LABOUR ORGANIZATION Employees should have notice of data collection processes. Data should be collected and used lawfully and fairly. Employers should collect the minimum necessary data required for employment. Data should only be collected from the employee, with informed consent. c Data should only be used for reasons directly relevant to employment, ment, and only for the purposes for which the data were originally collected. ed. Data should be held securely. Workers should have access to data. Data should not be transferred to third parties absent consent or to comply with a legal requirement. Workers cannot give up their privacy rights. Medical data is confidential. Certain data, such as sex life and political and religious beliefs, should not be collected. Certain collection techniques, such as polygraph testing, should be prohibited. 17
18 WORKPLACE PRIVACY ISSUES Fair information practices in relation to employee personal data,, especially in relation to: application of OECD Guidelines-conformant principles and processes; care with sensitive data, such as medical information; balanced procedures in relation to evaluative materials; Surveillance of activities using employer-provided provided facilities: at the level of keystroke-rate; rate; at the level of application usage; traffic analysis (e.g. telephone-numbers numbers called and called from, correspondents, web-sites visited) content analysis (e.g. messages and telephone converstions,, content of web-pages visited); Fair dealings by employers (trustworthiness).. A fundamental concern has been that the behaviour of some employers is inconsistent with their policy statements, e.g. some state that they do not monitor, when in fact they do; 18
19 WORKPLACE PRIVACY ISSUES Intrusions into privacy of the person,, such as: substance-abuse abuse testing; polygraph ('lie-detector') testing;... Intrusions into privacy of personal behaviour, such as: audio surveillance; telephone-number number monitoring; telephone conversation monitoring; video surveillance;... 19
20 WHOSE RESPONSIBILITY? AGENCY AND SURROGATE AGENCY The layers of trust, Kainulainen (2001): Individual - machine Individual - individual Individual - (machine) - individual Individual - identifiable small groups (social aspect) Individual - groups/organizations (authority, higher levels of hierarchy and abstraction) Group group Johnson and Powers (2004) study the problem of the responsibility of (autonomous) agents which are used as role or "surrogate" mediators 20
21 WHY VALUE PRIVACY? PRIVACY AND DEMOCRACY In intruding on privacy, which is closely related to freedom and autonomy, surveillance can be considered to have, ultimately, a negative effect on democracy. 21
22 THE UNIVERSAL CORE VALUES FOUND ACROSS CULTURES Caring for children; Trust; Prohibitions against murder. having the following effects: Assuring the continuity of population in terms of number of individuals and ways of behavior; Respecting the commonly accepted set of rules, which provides predictability and stable relationships; Preventing the extinction of the population. (Lawrence M. Hinman,, University San Diego) 22
23 TRUSTWORTHINESS AND WORKPLACE PRIVACY Parallels between Computer Ethics and Medical Ethics: Francis (1993) in the section Ethics of Trust vs. Ethics of Rights discusses autonomy, informed consent and the rights of patients. Basically, the relation between a specialist and a lay- person is of power and subjection and must be grounded on mutual trust. 23
24 THE DESIGN OF COMPUTER SYSTEMS Historically an unconditional trust on the part of the general public in the inherent goodness of technology has been shown to be unwarranted. 24
25 THE DESIGN OF COMPUTER SYSTEMS The design of computer systems has not historically been organized in a democratic way. Designers and users have had little interaction, and users have had little control over the resulting systems, except perhaps through the indirect routes available to them through resistance in the workplace and the refusal to purchase relatively unusable systems for their own use. 25
26 THE DESIGN OF COMPUTER SYSTEMS Yet over the last ten or twenty years, a growing movement, originating in Scandinavia but now increasingly influential in other industrialized countries, is attempting to reform the design of computer systems in a more democratic direction (Bjerknes( Bjerknes, Ehn, and Kyng 1987, Schuler and Namioka 1993). Agre (1994) 26
27 THE DESIGN OF COMPUTER SYSTEMS Technology can go a long way toward protecting the privacy of individuals, but we also need a legal framework to ensure technology isn't outlawed (Bernstein: /.) We can't protect privacy through case law, and self-regulation hasn't worked. Deborah Pierce 27
28 INVENTING SOCIALLY DANGEROUS TECHNOLOGY 1. Build it as safe as you can, and build into it all the safeguards to personal values you can imagine. 2. Tell the world at large you are doing something dangerous. Weiser,,
29 CODES OF ETHICS (Primarily Targeting Designers) ACM (Association for Computing Machinery) BSC (British Computer Society) IEEE (Institute( of Electrical and Electronics Engineers) DataForum CF (Civilingenjörsf rsförbundet) rbundet) 29
30 A PRIVACY CULTURE Whether or not privacy is protected by law or contract, fostering a workplace culture where privacy is valued and respected contributes to healthy human relations, and makes good business sense. 30
31 LEGITIMACY BY DESIGN AND TRUSTWORTHY COMPUTING The first phase of the intentional design for democracy is the explication of the embedded moral significance of ICT while the next is the development of the corresponding technology (Yu( and Cysneiros,, 2002). The existing analyses of the state of the art of privacy issues worldwide (fifty countries in ) bear witness to how much work remains to be done. 31
32 LAYERS OF TRUSTWORTHINESS Trust in the intent of designers Trust in the quality of workmanship Trust in the users 32
33 ETHICS OF TRUST Trust is like the glue holds society together -- without it, we crumble into tiny isolated pieces collide randomly with one another. In a world without trust, individuals cannot depend on one another; as a result, individuals can only be out for themselves. Hinman (2002) 33
34 CONCLUSIONS TRUSTWORTHINESS must be established in the use of ICT, where both users and the technology will be trustworthy. This in the first place presupposes the INFORMED CONSENT of all the parties involved. This trust must be established GLOBALLY because the data contained in networked computers virtually knows no boundaries. 34
35 References Gordana Dodig-Crnkovic Privacy and Protection of Personal Integrity in the Working Place Privacy and Surveillance Technology Interdisciplinary Perspectives - Workshop at ZiF Centre for Interdisciplinary Research, University of Bielefeld, Germany, February 10-11, 2006 Gordana Dodig-Crnkovic, Virginia Horniak Good to Have Someone Watching Us from a Distance? Privacy vs. Security at the Workplace; Ethics of New Information Technology, Proceedings of the Sixth International Conference of Computer Ethics: Philosophical Enquiry, CEPE 2005 July 17-19, 19, 2005, University of Twente, Enschede, The Netherlands ; Brey P,Grodzinsky F and Introna L. Eds. 35
36 The Ethics of Workplace Privacy Sven Ove Hansson og Elin Palm Peter Lang Bruxelles s. Bogomtale fra forlaget. In recent years, new and more intrusive surveillance technology has found its way into workplaces. New medical tests provide detailed information about workers' biology that was previously unthinkable. An increasing number of employees work under camera surveillance. At the same time, computers allow for a detailed monitoring of our interactions with machines, and all this information can be electronically stored in an easily accessible format. What is happening in our workplaces? Has the trend towards more humane workplaces been broken? From an ethical point of view, which types and degrees of surveillance are acceptable, and which are not? From a policy point of view, what methods can be used to regulate the use u of surveillance technology in workplaces? These are some of the questions that have driven the research reported in this book. Written by an interdisciplinary group of researchers in Computer Ethics, Medical Ethics and Moral Philosophy, this book provides a broad overview that covers both empirical and normative aspects of workplace privacy. 36
CDT Annual Dinner. Center for Democracy and Technology, Washington. 10 March 2015
CDT Annual Dinner Center for Democracy and Technology, Washington 10 March 2015 It s a great honour to be with you all for the CDT Annual Dinner, or as it is affectionately known, the Tech Prom. I m afraid
More informationEuropean Charter for Access to Research Infrastructures - DRAFT
13 May 2014 European Charter for Access to Research Infrastructures PREAMBLE - DRAFT Research Infrastructures are at the heart of the knowledge triangle of research, education and innovation and therefore
More informationPersonal Data Protection Competency Framework for School Students. Intended to help Educators
Conférence INTERNATIONAL internationale CONFERENCE des OF PRIVACY commissaires AND DATA à la protection PROTECTION des données COMMISSIONERS et à la vie privée Personal Data Protection Competency Framework
More informationPrivacy and Security in Europe Technology development and increasing pressure on the private sphere
Interview Meeting 2 nd CIPAST Training Workshop 17 21 June 2007 Procida, Italy Support Materials by Åse Kari Haugeto, The Norwegian Board of Technology Privacy and Security in Europe Technology development
More informationCastan Centre for Human Rights Law Faculty of Law, Monash University. Submission to Senate Standing Committee on Economics
Castan Centre for Human Rights Law Faculty of Law, Monash University Submission to Senate Standing Committee on Economics Inquiry into the Census 2016 Melissa Castan and Caroline Henckels Monash University
More informationComputer and Information Ethics
Computer and Information Ethics Instructor: Viola Schiaffonati May,4 th 2015 Ethics (dictionary definition) 2 Moral principles that govern a person's behavior or the conducting of an activity The branch
More informationSurveillance Technologies: efficiency, human rights, ethics Prof. Dr. Tom Sorell, University of Warwick, UK
Surveillance Technologies: efficiency, human rights, ethics Prof. Dr. Tom Sorell, University of Warwick, UK Outline How does one justify the use by police of surveillance technology in a liberal democracy?
More informationThe Information Commissioner s response to the Draft AI Ethics Guidelines of the High-Level Expert Group on Artificial Intelligence
Wycliffe House, Water Lane, Wilmslow, Cheshire, SK9 5AF T. 0303 123 1113 F. 01625 524510 www.ico.org.uk The Information Commissioner s response to the Draft AI Ethics Guidelines of the High-Level Expert
More informationLAB3-R04 A Hard Privacy Impact Assessment. Post conference summary
LAB3-R04 A Hard Privacy Impact Assessment Post conference summary John Elliott Joanne Furtsch @withoutfire @PrivacyGeek Table of Contents THANK YOU... 3 WHAT IS PRIVACY?... 3 The European Perspective...
More informationProfessional Ethics in Software Engineering Curricula
Cross-disciplinarity in Engineering Education 3rd CeTUSS Workshop CEMUS and IEEE Nordic Education Society Chapter Professional Ethics in Software Engineering Curricula Gordana DODIG-CRNKOVIC Ivica CRNKOVIC
More informationISO/TR TECHNICAL REPORT. Intelligent transport systems System architecture Privacy aspects in ITS standards and systems
TECHNICAL REPORT ISO/TR 12859 First edition 2009-06-01 Intelligent transport systems System architecture Privacy aspects in ITS standards and systems Systèmes intelligents de transport Architecture de
More informationCILIP Privacy Briefing 2017
CILIP Privacy Briefing 2017 Tuesday 28 November 2017 #CILIPPrivacy17 Privacy, surveillance and the information profession: challenges, qualifications, and dilemmas? David McMenemy, Lecturer and Course
More informationBiometric Data, Deidentification. E. Kindt Cost1206 Training school 2017
Biometric Data, Deidentification and the GDPR E. Kindt Cost1206 Training school 2017 Overview Introduction 1. Definition of biometric data 2. Biometric data as a new category of sensitive data 3. De-identification
More informationEU Research Integrity Initiative
EU Research Integrity Initiative PROMOTING RESEARCH INTEGRITY IS A WIN-WIN POLICY Adherence to the highest level of integrity is in the interest of all the key actors of the research and innovation system:
More informationWireless Environments & Privacy
Wireless Environments & Privacy Patricia S. Taylor Eastern Illinois University & Robert E. McGrath NCSA, University of Illinois EDRA Vancouver, BC -- May 2005 Introduction Views from a Social Scientist
More informationPrivacy Policy SOP-031
SOP-031 Version: 2.0 Effective Date: 18-Nov-2013 Table of Contents 1. DOCUMENT HISTORY...3 2. APPROVAL STATEMENT...3 3. PURPOSE...4 4. SCOPE...4 5. ABBREVIATIONS...5 6. PROCEDURES...5 6.1 COLLECTION OF
More informationInteroperable systems that are trusted and secure
Government managers have critical needs for models and tools to shape, manage, and evaluate 21st century services. These needs present research opportunties for both information and social scientists,
More informationEthics Guideline for the Intelligent Information Society
Ethics Guideline for the Intelligent Information Society April 2018 Digital Culture Forum CONTENTS 1. Background and Rationale 2. Purpose and Strategies 3. Definition of Terms 4. Common Principles 5. Guidelines
More informationEXIN Privacy and Data Protection Foundation. Preparation Guide. Edition
EXIN Privacy and Data Protection Foundation Preparation Guide Edition 201701 Content 1. Overview 3 2. Exam requirements 5 3. List of Basic Concepts 9 4. Literature 15 2 1. Overview EXIN Privacy and Data
More informationExecutive Summary Industry s Responsibility in Promoting Responsible Development and Use:
Executive Summary Artificial Intelligence (AI) is a suite of technologies capable of learning, reasoning, adapting, and performing tasks in ways inspired by the human mind. With access to data and the
More informationNCRIS Capability 5.7: Population Health and Clinical Data Linkage
NCRIS Capability 5.7: Population Health and Clinical Data Linkage National Collaborative Research Infrastructure Strategy Issues Paper July 2007 Issues Paper Version 1: Population Health and Clinical Data
More informationCCTV Policy. Policy reviewed by Academy Transformation Trust on June This policy links to: T:Drive. Safeguarding Policy Data Protection Policy
CCTV Policy Policy reviewed by Academy Transformation Trust on June 2018 This policy links to: Safeguarding Policy Data Protection Policy Located: T:Drive Review Date May 2019 Our Mission To provide the
More informationOur position. ICDPPC declaration on ethics and data protection in artificial intelligence
ICDPPC declaration on ethics and data protection in artificial intelligence AmCham EU speaks for American companies committed to Europe on trade, investment and competitiveness issues. It aims to ensure
More informationCCTV Policy. Policy reviewed by Academy Transformation Trust on June This policy links to: Safeguarding Policy Data Protection Policy
CCTV Policy Policy reviewed by Academy Transformation Trust on June 2018 This policy links to: Located: Safeguarding Policy Data Protection Policy Review Date May 2019 Our Mission To provide the very best
More informationWhat does the revision of the OECD Privacy Guidelines mean for businesses?
m lex A B E X T R A What does the revision of the OECD Privacy Guidelines mean for businesses? The Organization for Economic Cooperation and Development ( OECD ) has long recognized the importance of privacy
More informationWhatever Happened to the. Fair Information Practices?
Whatever Happened to the Fair Information Practices? Beth Givens Director Privacy Rights Clearinghouse Privacy Symposium August 22, 2007 Cambridge, MA Topics Definition and origins of FIPs Overview of
More informationTowards a Magna Carta for Data
Towards a Magna Carta for Data Expert Opinion Piece: Engineering and Computer Science Committee February 2017 Expert Opinion Piece: Engineering and Computer Science Committee Context Big Data is a frontier
More informationSecurity culture and information technology, SECURIT. Jonas Hallberg
Security culture and information technology, SECURIT Jonas Hallberg www.foi.se/securit Information security Information security includes social as well as technical aspects Information security culture
More informationAbout the Office of the Australian Information Commissioner
Australian Government Office of the Australian Information Commissioner www.oaic.gov.au GPO Box 5218 Sydney NSW 2001 P +61 2 9284 9800 F +61 2 9284 9666 E enquiries@oaic.gov.au Enquiries 1300 363 992 TTY
More informationThe 45 Adopted Recommendations under the WIPO Development Agenda
The 45 Adopted Recommendations under the WIPO Development Agenda * Recommendations with an asterisk were identified by the 2007 General Assembly for immediate implementation Cluster A: Technical Assistance
More informationISO/IEC INTERNATIONAL STANDARD. Information technology Security techniques Privacy framework
INTERNATIONAL STANDARD ISO/IEC 29100 First edition 2011-12-15 Information technology Security techniques Privacy framework Technologies de l'information Techniques de sécurité Cadre privé Reference number
More informationRunning head: ETHICS, TECHNOLOGY, SUSTAINABILITY AND SOCIAL ISSUES 1. Ethics, Technology, Sustainability and Social Issues in Business.
Running head: ETHICS, TECHNOLOGY, SUSTAINABILITY AND SOCIAL ISSUES 1 Ethics, Technology, Sustainability and Social Issues in Business Name Institutional Affiliation ETHICS, TECHNOLOGY, SUSTAINABILITY AND
More informationLecture 7 Ethics, Privacy, and Politics in the Age of Data
Lecture 7 Ethics, Privacy, and Politics in the Age of Data Module Roadmap Representation Technologies Digital workplaces Ethics, Privacy and Politics Digital Workplaces and Capitalist Accumulation tbc
More informationWIPO Development Agenda
WIPO Development Agenda 2 The WIPO Development Agenda aims to ensure that development considerations form an integral part of WIPO s work. As such, it is a cross-cutting issue which touches upon all sectors
More information28 TH INTERNATIONAL CONFERENCE OF DATA PROTECTION
28 TH INTERNATIONAL CONFERENCE OF DATA PROTECTION AND PRIVACY COMMISSIONERS 2 ND & 3 RD NOVEMBER 2006 LONDON, UNITED KINGDOM CLOSING COMMUNIQUÉ The 28 th International Conference of Data Protection and
More informationFUTURE TECHNOLOGIES FUTURE PRIVACY CHALLENGES
FUTURE TECHNOLOGIES FUTURE PRIVACY CHALLENGES Michael Friedewald, Fraunhofer ISI istockphoto.com/marco Volpi Panel on Privacy: Appraising challenges to technologies and ethics @ CPDP 2012 Brussels, 25
More informationThe IEEE Global Initiative for Ethical Considerations in Artificial Intelligence and Autonomous Systems. Overview June, 2017
The IEEE Global Initiative for Ethical Considerations in Artificial Intelligence and Autonomous Systems Overview June, 2017 @johnchavens Ethically Aligned Design A Vision for Prioritizing Human Wellbeing
More informationHeaven and hell: visions for pervasive adaptation
University of Wollongong Research Online Faculty of Informatics - Papers (Archive) Faculty of Engineering and Information Sciences 2011 Heaven and hell: visions for pervasive adaptation Ben Paechter Edinburgh
More informationArtificial intelligence & autonomous decisions. From judgelike Robot to soldier Robot
Artificial intelligence & autonomous decisions From judgelike Robot to soldier Robot Danièle Bourcier Director of research CNRS Paris 2 University CC-ND-NC Issues Up to now, it has been assumed that machines
More informationComputer Challenges to emerge from e-science
Computer Challenges to emerge from e-science Malcolm Atkinson (NeSC), Jon Crowcroft (Cambridge), Carole Goble (Manchester), John Gurd (Manchester), Tom Rodden (Nottingham),Nigel Shadbolt (Southampton),
More informationEthical Framework for Elderly Care-Robots. Prof. Tom Sorell
Ethical Framework for Elderly Care-Robots Prof. Tom Sorell ACCOMPANY- Acceptable robotic COMPanions for AgeiNg Years ACCOMPANY Website http://accompanyproject.eu/ Context Quickly growing and longer surviving
More informationFraunhofer ISI Seite 1
Seite 1 A"NEW"WAY"OF"LOOKING"AT"PRIVACY" Michael"Friedewald,"Fraunhofer"ISI" istockphoto.com/marco Volpi Why"privacy"is" important" "at"least"in"western" countries! Philosophically,! Part of human dignity
More informationChapter 4. L&L 12ed Global Ed ETHICAL AND SOCIAL ISSUES IN INFORMATION SYSTEMS. Information systems and ethics
MANAGING THE DIGITAL FIRM, 12 TH EDITION, GLOBAL EDITION Chapter 4 ETHICAL AND SOCIAL ISSUES IN Learning Objectives What ethical, social, and political issues are raised by information systems? What specific
More informationForeword The Internet of Things Threats and Opportunities of Improved Visibility
Foreword The Internet of Things Threats and Opportunities of Improved Visibility The Internet has changed our business and private lives in the past years and continues to do so. The Web 2.0, social networks
More informationPhotography and Videos at School Policy
Photography and Videos at School Policy Last updated: 25 May 2018 Contents: Statement of intent 1. Legal framework 2. Definitions 3. Roles and responsibilities 4. Parental consent 5. General procedures
More informationStakeholders Acting Together On the ethical impact assessment of Research and Innovation
Stakeholders Acting Together On the ethical impact assessment of Research and Innovation WWW.SATORIPROJECT.EU Stakeholders Acting Together On the ethical impact assessment of Research and Innovation The
More informationManaging Information Systems Seventh Canadian Edition. Laudon, Laudon and Brabston. CHAPTER 4 Social, Ethical, and Legal Issues in the Digital Firm
Managing Information Systems Seventh Canadian Edition Laudon, Laudon and Brabston CHAPTER 4 Social, Ethical, and Legal Issues in the Digital Firm 4-1 Online activity is tracked and ads are displayed depending
More informationVision. The Hague Declaration on Knowledge Discovery in the Digital Age
The Hague Declaration on Knowledge Discovery in the Digital Age Vision New technologies are revolutionising the way humans can learn about the world and about themselves. These technologies are not only
More informationChildren s rights in the digital environment: Challenges, tensions and opportunities
Children s rights in the digital environment: Challenges, tensions and opportunities Presentation to the Conference on the Council of Europe Strategy for the Rights of the Child (2016-2021) Sofia, 6 April
More informationCOMMUNICATION SCIENCE MASTER S PROGRAMME
COMMUNICATION SCIENCE MASTER S PROGRAMME OUR WORLD YOUR POTENTIAL OUR PROGRAMME PROGRAM FOR TODAY 1. 2. 3. 4. 5. THIS IS YOU THIS IS THIS IS OUR COMMUNICATION PROGRAMME SCIENCE THIS IS OUR WORLD CAREER
More informationCODE OF CONDUCT. STATUS : December 1, 2015 DES C R I P T I O N. Internal Document Date : 01/12/2015. Revision : 02
STATUS : December 1, 2015 DES C R I P T I O N Type : Internal Document Date : 01/12/2015 Revision : 02 CODE OF CONDUCT. Page 2/7 MESSAGE FROM THE CHAIRMAN AND THE CEO Dear all, The world is continually
More informationPosition Paper: Ethical, Legal and Socio-economic Issues in Robotics
Position Paper: Ethical, Legal and Socio-economic Issues in Robotics eurobotics topics group on ethical, legal and socioeconomic issues (ELS) http://www.pt-ai.org/tg-els/ 23.03.2017 (vs. 1: 20.03.17) Version
More informationCPE/CSC 580: Intelligent Agents
CPE/CSC 580: Intelligent Agents Franz J. Kurfess Computer Science Department California Polytechnic State University San Luis Obispo, CA, U.S.A. 1 Course Overview Introduction Intelligent Agent, Multi-Agent
More informationThe BGF-G7 Summit Report The AIWS 7-Layer Model to Build Next Generation Democracy
The AIWS 7-Layer Model to Build Next Generation Democracy 6/2018 The Boston Global Forum - G7 Summit 2018 Report Michael Dukakis Nazli Choucri Allan Cytryn Alex Jones Tuan Anh Nguyen Thomas Patterson Derek
More informationMetrology in the Digital Transformation
Metrology in the Digital Transformation This project proposal is about to establish a European metrology data infrastructure, a European Metrology Cloud to support the processes of conformity assessment
More informationPrivacy Policy Framework
Privacy Policy Framework Privacy is fundamental to the University. It plays an important role in upholding human dignity and in sustaining a strong and vibrant society. Respecting privacy is an essential
More informationScience, Values and Trust Building Public Support for Today s Aquaculture
Science, Values and Trust Building Public Support for Today s Aquaculture Charlie Arnot Charlie.Arnot@Foodintegrity.org www.foodintegrity.org Charlie_Arnot Earning and Maintaining the Social License (Sapp/CMA)
More informationEnd-to-End Privacy Accountability
End-to-End Privacy Accountability Denis Butin 1 and Daniel Le Métayer 2 1 TU Darmstadt 2 Inria, Université de Lyon TELERISE, 18 May 2015 1 / 17 Defining Accountability 2 / 17 Is Accountability Needed?
More informationNotes from a seminar on "Tackling Public Sector Fraud" presented jointly by the UK NAO and H M Treasury in London, England in February 1998.
Tackling Public Sector Fraud Notes from a seminar on "Tackling Public Sector Fraud" presented jointly by the UK NAO and H M Treasury in London, England in February 1998. Glenis Bevan audit Manager, Audit
More informationCOMEST CONCEPT NOTE ON ETHICAL IMPLICATIONS OF THE INTERNET OF THINGS (IoT)
SHS/COMEST-10EXT/18/3 Paris, 16 July 2018 Original: English COMEST CONCEPT NOTE ON ETHICAL IMPLICATIONS OF THE INTERNET OF THINGS (IoT) Within the framework of its work programme for 2018-2019, COMEST
More informationDraft proposed by the Secretariat
UNESCO comprehensive study on Internet-related issues: draft concept paper proposed by the Secretariat for consultations Abstract: This draft paper, proposed by UNESCO s Secretariat, outlines the concept
More informationThis policy sets out how Legacy Foresight and its Associates will seek to ensure compliance with the legislation.
Privacy Notice August 2018 Introduction The General Data Protection Regulation (GDPR) is European wide data protection legislation that requires organisations working with individuals based in the European
More informationInformation Societies: Towards a More Useful Concept
IV.3 Information Societies: Towards a More Useful Concept Knud Erik Skouby Information Society Plans Almost every industrialised and industrialising state has, since the mid-1990s produced one or several
More informationScenario Planning edition 2
1 Scenario Planning Managing for the Future 2 nd edition first published in 2006 Gill Ringland Electronic version (c) Gill Ringland: gill.ringland@samiconsulting.co.uk.: this has kept to the original text
More informationManagement Information Systems MANAGING THE DIGITAL FIRM, 12 TH EDITION. Chapter 4 ETHICAL AND SOCIAL ISSUES IN INFORMATION SYSTEMS
MANAGING THE DIGITAL FIRM, 12 TH EDITION Chapter 4 ETHICAL AND SOCIAL ISSUES IN Learning Objectives What ethical, social, and political issues are raised by information systems? What specific principles
More informationDEPARTMENT OF PUBLIC SAFETY DIVISION OF FIRE COLUMBUS, OHIO. SOP Revision Social Media Digital Imagery
DEPARTMENT OF PUBLIC SAFETY DIVISION OF FIRE COLUMBUS, OHIO 17-007 SUBJECT: TITLE: Administration SOP Revision-04-05-07 Social Media 04-05-08 Digital Imagery Implementation Office of the Chief PURPOSE:
More informationMISSISSAUGA LIBRARY COLLECTION POLICY (Revised June 10, 2015, Approved by the Board June 17, 2015)
MISSISSAUGA LIBRARY COLLECTION POLICY (Revised June 10, 2015, Approved by the Board June 17, 2015) PURPOSE To provide library customers and staff with a statement of philosophy and the key objectives respecting
More informationHuman Centered Production in Cyber- Physical Production Systems. Case study Croatia
Human Centered Production in Cyber- Physical Production Systems Case study Croatia Prof. Ivica Veža Faculty of Electrical Engineering, Mechnical Engineering and Naval Architecture FESB, University of Split,
More informationProtection of Privacy Policy
Protection of Privacy Policy Policy No. CIMS 006 Version No. 1.0 City Clerk's Office An Information Management Policy Subject: Protection of Privacy Policy Keywords: Information management, privacy, breach,
More informationMellor Community Primary School Policy for Photographs and Photography
Mellor Community Primary School Policy for Photographs and Photography Introduction Photography in schools is subject to the Data Protection Act 1998 regarding the rights of individuals to have information
More informationThe Social Impact of Pervasive Technologies
The Social Impact of Pervasive Technologies Anne Clarke European Management Services, Leeds, UK clarkeam@compuserve.com Abstract Large scale deployment of communications technologies has produced major
More informationInternet, Human Rights and privacy
PhotoPhoto: SerenityRosePhoto: SerenityRose. CC BY- NC 2.0. Internet, Human Rights and privacy Jeanette Hofmann WZB/HIIG (Berlin) IV Fórum da Internet no Brasil/Pré IGF Brasileiro São Paulo, 25th April
More informationLegal Aspects of Identity Management and Trust Services
Legal Aspects of Identity Management and Trust Services Anna Joubin-Bret Secretary What is Identity Management (IdM)? Fundamental issue for the use of electronic means Answers the basic questions: Who
More informationArtificial Intelligence (AI) and Patents in the European Union
Prüfer & Partner Patent Attorneys Artificial Intelligence (AI) and Patents in the European Union EU-Japan Center, Tokyo, September 28, 2017 Dr. Christian Einsel European Patent Attorney, Patentanwalt Prüfer
More informationThe new deal of data in the data-driven person centric-care
The new deal of data in the data-driven person centric-care Maritta Perälä-Heape, Professor of practice, University of Oulu, Faculty of Medicine, Center for health and technology, Oulu, Finland OuluHealth
More informationRe: Review of Market and Social Research Privacy Code
http://www.privacy.org.au Secretary@privacy.org.au http://www.privacy.org.au/about/contacts.html 31 August 2012 Dr Terry Beed Chair Independent Code Review Panel AMSRO Dear Terry Re: Review of Market and
More informationLumeng Jia. Northeastern University
Philosophy Study, August 2017, Vol. 7, No. 8, 430-436 doi: 10.17265/2159-5313/2017.08.005 D DAVID PUBLISHING Techno-ethics Embedment: A New Trend in Technology Assessment Lumeng Jia Northeastern University
More informationThis research is supported by the TechPlan program funded by the ITS Institute at the University of Minnesota
Frank Douma, Assistant Director,! Sarah Aue, Research Assistant! State and Local Policy Program! Humphrey Institute of Public Affairs! University of Minnesota! This research is supported by the TechPlan
More informationInternational initiatives in data sharing: OECD, CODATA and GICSI. Yukiko Fukasaku Innovmond Padova 21 September 2007
International initiatives in data sharing: OECD, CODATA and GICSI Yukiko Fukasaku Innovmond Padova 21 September 2007 OECD Recommendation with Principles and Guidelines on Access to Research Data from Public
More informationTowards Trusted AI Impact on Language Technologies
Towards Trusted AI Impact on Language Technologies Nozha Boujemaa Director at DATAIA Institute Research Director at Inria Member of The BoD of BDVA nozha.boujemaa@inria.fr November 2018-1 Data & Algorithms
More informationStriving for Excellence. Ark Oval Primary Academy
Striving for Excellence Ark Oval Primary Academy DIGITAL STILLS AND VIDEO IMAGES POLICY 2015 0 Policy for Photographs and Photography Introduction Photography in schools is subject to the Data Protection
More information2/28/2018 POWER CONFERENCE ETHICS SESSION FORMAT OF SESSION LEARNING OBJECTIVES. Part 1: Changes to the Code of Ethics Break
POWER CONFERENCE ETHICS SESSION Amy Kalb, DSW FORMAT OF SESSION Part 1: Changes to the Code of Ethics Break Part 2: Strategies for Addressing Ethical Dilemmas Break Part 3: Practice Session Small group
More informationTechnology and Normativity
van de Poel and Kroes, Technology and Normativity.../1 Technology and Normativity Ibo van de Poel Peter Kroes This collection of papers, presented at the biennual SPT meeting at Delft (2005), is devoted
More informationLangdon Winner: Frankenstein s Problem and Technology as Legislation
Langdon Winner: Frankenstein s Problem and Technology as Legislation Langdon Winner Political theorist at Rensselaer Polytechnic Institute Best-known books: Autonomous Technology: Technics Out-of-Control
More informationSocial Media, information and communication technologies: Part 3
Social Media, information and communication technologies: Part 3 Providing social work services online/remotely This guideline will focus on the ethical considerations for social workers when using technology
More informationA Gift of Fire: Social, Legal, and Ethical Issues for Computing Technology (Fourth edition) by Sara Baase. Term Paper Sample Topics
A Gift of Fire: Social, Legal, and Ethical Issues for Computing Technology (Fourth edition) by Sara Baase Term Paper Sample Topics Your topic does not have to come from this list. These are suggestions.
More informationCountry Paper : Macao SAR, China
Macao China Fifth Management Seminar for the Heads of National Statistical Offices in Asia and the Pacific 18 20 September 2006 Daejeon, Republic of Korea Country Paper : Macao SAR, China Government of
More informationRulemaking Hearing Rules of the Tennessee Department of Health Bureau of Health Licensure and Regulation Division of Emergency Medical Services
Rulemaking Hearing Rules of the Tennessee Department of Health Bureau of Health Licensure and Regulation Division of Emergency Medical Services Chapter 1200-12-01 General Rules Amendments of Rules Subparagraph
More informationsummary Background and scope
Background and scope The Royal Academy is issuing the report Trust in Science 1 in response to a request for advice by the Dutch State Secretary for Education, Culture and Science. The State Secretary
More informationFahad Al Mannai IT 104 C01 7/8/2016. Biometrics Authentication: An Emerging IT Standard
1 Fahad Al Mannai IT 104 C01 7/8/2016 Biometrics Authentication: An Emerging IT Standard "By placing this statement on my webpage, I certify that I have read and understand the GMU Honor Code onhttp://oai.gmu.edu/the-mason-honor-code-2/
More information2018 / Photography & Video Bell Lane Primary School & Children s Centre
2018 / 2019 Photography & Video Use @ Bell Lane Primary School & Children s Centre Bell Lane Primary School & Children s Centre Responsible: Headteacher & Governing Body Last reviewed: Summer 2018 Review
More informationSocial: The Ethics of Pervasive Games
Social: The Ethics of Pervasive Games Mobile and Ubiquitous Games ICS 163 Donald J. Patterson Content adapted from: Pervasive Games: Theory and Design Experiences on the Boundary between Life and Play
More informationMachines can learn, but what will we teach them? Geraldine Magarey
Machines can learn, but what will we teach them? Geraldine Magarey The technology AI is a field of computer science that includes o machine learning, o natural language processing, o speech processing,
More informationOUR WORLD YOUR POTENTIAL OUR PROGRAMME
COMMUNICATION SCIENCE MASTER PROGRAMME OUR WORLD YOUR POTENTIAL OUR PROGRAMME PROGRAM FOR TODAY 1. 2. 3. 4. 5. THIS IS YOU THIS IS THIS IS OUR COMMUNICATION PROGRAMME SCIENCE THIS IS OUR WORLD CAREER PROSPECTS
More informationWhat Makes International Research Ethical (Or Unethical)? Eric M. Meslin, Ph.D Indiana University Center for Bioethics
What Makes International Research Ethical (Or Unethical)? Eric M. Meslin, Ph.D Indiana University Center for Bioethics Why Should We Care? Volume of health research is increasing more researchers, more
More informationclarification to bring legal certainty to these issues have been voiced in various position papers and statements.
ESR Statement on the European Commission s proposal for a Regulation on the protection of individuals with regard to the processing of personal data on the free movement of such data (General Data Protection
More informationGUIDELINES SOCIAL SCIENCES AND HUMANITIES RESEARCH MATTERS. ON HOW TO SUCCESSFULLY DESIGN, AND IMPLEMENT, MISSION-ORIENTED RESEARCH PROGRAMMES
SOCIAL SCIENCES AND HUMANITIES RESEARCH MATTERS. GUIDELINES ON HOW TO SUCCESSFULLY DESIGN, AND IMPLEMENT, MISSION-ORIENTED RESEARCH PROGRAMMES to impact from SSH research 2 INSOCIAL SCIENCES AND HUMANITIES
More informationInterest Balancing Test Assessment on the processing of the copies of data subjects driving licences for the MOL Limo service
1 Legitimate interest of the controller or a third party: General description of the processing environment Users can commence the registration required for using the MOL LIMO service in the Mobile Application
More informationAI AS A FORCE OF GOOD
AI AS A FORCE OF GOOD Mariarosaria Taddeo Digital Ethics Lab - Oxford Internet Institute, University of Oxford Alan Turing Institute, London @RosariaTaddeo AI Definition Outline AI Challenges Ethics for
More informationViolent Intent Modeling System
for the Violent Intent Modeling System April 25, 2008 Contact Point Dr. Jennifer O Connor Science Advisor, Human Factors Division Science and Technology Directorate Department of Homeland Security 202.254.6716
More information