+44 203 318 3300 +61 2 9052 0853

Importance of Ethical and Social factors on Data Protection and Privacy Assignment Sample

Pages Pages: 18

Words Words: 4505

Importance of Ethical and Social factors on Data Protection and Privacy Assignment Sample

Chapter 1: Introduction

Get free samples written by our Top-Notch subject experts for taking assignment help Online services.

Background of the study

This research paper aims to reveal that law and ethics are closely related to issues like privacy, trust and security. Maintaining trust is important to ensure uncompromised privacy and security. Any violation of privacy or security breach exhibits impertinence to the law and ethical principles (Hoel, Griffiths and Chen, 2017). In a research project in the UK, when information regarding research data is collected from human participants, researchers are obligated to maintain the confidentiality of the data and privacy of the participants. These ethical and legal requirements often do not fulfil the funder’s expectations regarding sharing of data. To resolve this issue, several requirements must be precisely documented. These include permission and consent of the participants to use the data in future. It must be noted that participant consent is not further required in case permission is obtained to anonymize the data (Mantelero, 2018). Data containing sensitive or personal information must be retained cautiously to prevent any breach of research data. Also, careful anonymization and controlled access inhibit the loss of meaning of research data.

Aim of the study

The study aims to understand various legal aspects in the UK regarding sharing and collection of data and the participants' lawful right to the data (Vayena, Blasimme and Cohen, 2018). This study also helps to prevent improper use of data and ensure collection of data about individuals by technology is accurate and complete. Also, this study reveals the costs involved in case of breach of data privacy.

Problem Statement

Several stressing issues exist related to data protection and privacy in the UK. The citizens of the UK require convincing regarding the usage of their data for research purposes. The consent of an individual is necessary to gain any access to using their data. The consent is recorded in auditable form and does not display any sign of intimidation. The researchers experience major problems to take prudent actions to process requests for erasure when individuals want to revoke access to process or store their data (Shabani and Borry, 2018). Another major issue is proving the integrity of third party partners to individuals and thus, automated systems are introduced to prevent access of data by third-party control. The consent of employees is also a major issue regarding the usage of their data.

Research Rationale

From this research paper, it can be understood that law and ethics are intertwined with data protection and privacy in the UK. This study is conducted to gain insight into the importance of social and ethical factors that are involved in the process of data protection and privacy. This study reveals many stressing issues such as privacy breaches of data of individuals. Therefore the implementation of strategies to overcome these problems becomes convenient owing to the extensive details provided by the research paper.

Research Objectives

This research paper aims to define several effective objectives that help to protect data through the social and ethical factors of the UK. The research objectives are as follows,

  • To identify the problems that is hindering efficient data protection in the UK.
  • To assess ethical and social factors to protect data.
  • To provide a proper environment for creating strategies to resolve major issues.
  • To propose the best and convenient method to protect data.

Research Questions

The research questions that are developed based on the research objectives are as follows,

  • What are the issues that are obstructing efficient data protection in the UK?
  • What are the social and ethical factors to protect data?
  • What are the appropriate methods to create a proper atmosphere for effective solutions to major issues?
  • What is the best and most used way to protect data easily?

Research significance

This study is conducted to identify the social and ethical factors that play a primary role in data protection and privacy in the UK. This study aims to reveal the existing issues through which it is becoming tough to protect data in the UK. Also, this research helps to provide various strategies and methods for efficient data protection in the UK and prevent any violation of laws and ethics regarding data privacy.

Chapter 2: Literature Review

Importance of Data Protection in business

Data safety is a vital component of running a business successfully because it gives customers the assurance their information is being collected, processed, and transferred securely. Also according to Greenleaf (2018) there are many motives why data protection is vital for organizations. Data safety minimizes the wide variety of records breaches that a business enterprise can go through helps defend customers' privacy. However Bartolini, Calabró and Marchetti(2019)stated that a business needs to maintain its clients' information safe. Data safety helps an organization's code of ethics and offers an advantage over other businesses. With the view of De Guise 2017 there are several challenges related to the data safety program, like its cost, superior technological know. The complexity of configuring and running statistics safety mainly values the storing and managing backup which copies due to speedy growth.

Connection of ethical and social factors in protecting data

Ethics is the personal principle of right and wrong individuals. Ethics and social factors are closely related. Some technological trends have increased the moral pressure on existing laws and social arrangements. Coraggio andZappaterra (2018) revealed that for example, the power of computers doubles every 18 months, increasing the vulnerability of systems and the quality of data. Data storage technology has doubled the number of personal databases maintained by public and private organizations, making breaches of personal privacy cheap and effective. According to Ziegler et al. (2019), advances in data analytics technology have enabled businesses and government agencies to use analytics to determine detailed information about personal habits and tastes and to create archives of detailed information.

Issues of losing data

Data loss is a big inconvenience. Describe the daily functions of any business. Data is the motivation for companies to help them easily manage their daily work. Polkowski (2018) said that data loss is something that means the business runs out of basic fuel. Data loss will occur when accidentally deleting data from the computer. However, with the view of Daly (2020), confidential information is destroyed due to human theft, viruses, malware, or physical damage. Therefore, if there is no more data to support the business, the business will not be able to generate income. If there is no data, it will also hurt the productivity of the company. Employees will not be able to work or provide assistance to the company. As per Tikkinen-Piri et al. (2018), it takes years to make important decisions to gain the trust of customers, but data loss can wipe them all out at once. Because the client will consider it to be commercial negligence, and if it contains client data, the company may not comply with laws and regulations related to data protection. Moreover, when facing penalties, it is not uncommon for companies to go bankrupt or permanently shut down due to major problems which as the data loss incident.

Effects of data protection in business

For a business, data protection is a very important part. Data protection is also known as data privacy or information privacy is a process of securing data and important information from being compromised or corrupted. According to Huth(2017), one of the main benefits of data protection is that it safeguards valuable information, which is crucial for the company. For example, not all information in a company has to be seen by all the employees. Personal details must remain private between the employer and the HR department. Data protection can help in keeping search data from prying eyes. Also Windrich, Speck and Gruschka (2021) stated that protecting the information of the client will increase investor confidence, which is good for the business. Data protection can make it difficult for hackers to access sensitive information. By safeguarding important and sensitive data, any business can be saved from a big loss. However, Hoofnagle et al. (2019) said that for the business that has their websites, a potential cyber breach could cause a major problem. If the data accessed by unauthorized people, it's possible that the website could be forced to close or the business may experience downtime. As data protection requires better management and storage of information, this can from companies to have better business practices.

Approaches of data privacy through ethical and social factors

Protection and maintenance of privacy of the data have been very urgent as well as important. This is required due to the presence of an information-intensive and technology-driven environment. According to Martin and Murphy (2017), it is beneficial as it provides information to the customers about the market and the trade practices. It also has disadvantages like the technical risks along with the human users, thereby making more changes for the criminals exploiting them. Thus, protection of the interests is essential. Privacy in data management is also in demand due to its urgency. Protection of the information has been an important cause in securing data, policies, and migrations that are acceptable by the community, efficient technology, and adjustable to legal matters.

On the other hand, Kudina and Verbeek (2019) state that the process of securing data is complicated as it involves social and ethical, or technical risks. This risk takes place initially from the abuses in the technical fields consisting of the storage of data. For example, at times it often happens in the companies where the employees take information in a USB, which can lead to a deficit of data. If it consists of the marketing and business terms, conditions and policies then there are chances of it getting misplaced or losing the data if the employee loses the pen drive or other removable disk in which the data has been taken.

As stated by Ryan (2020) the inconsistency in the working of technological instruments in terms of the principles of ethics often causes ethical risks which can be of great loss to the company. In the previously discussed example, all the employees working in an organization do not take the company USB to their home. Hamidi (2019) highlights that those staff who carry them to their home need to work on them and they have full confidence in them that the device will stay safe to them and not get misplaced, with the proper way of processing and editing the data contained in it. Thus, it is dependent on their morality and those who ensure a good and brief understanding of the principles of ethics. This will ensure prevention from any kind of issues which he may face in the upcoming times. The issues related to company ethics take place when there's a lack of personal confidentiality as well as corporate differentiability. Those risks are related partially to the technologies of the input devices like USB and also it occurs due to the public consisting of both the victims and the culprit, for which there follows a danger in the hamper in the social and technical factors. Thus, carrying the USB to one's residence is vulnerable which may result in violation of hampering the rules and regulations of the protection and privacy of the data.

Hence, as stated by Williams, Burnap and Sloan (2017), the issue related to the privacy of data has become unsolvable and cannot be prevented in the future. The complexity in the approach in terms of its previous considerations and facts regarding financial and physical conditions and terms along with the non-measurable measures against the loopholes which have been caused due to lagging logically, social desirability as well as violations of ethics. Also, the methods and the processes by which the privacy of the data can be ensured are abiding by various kinds of frameworks for the accomplishment of the company or the organization's motives and objectives. Those frameworks get perceived in their original forms followed by a newly made view enabling the decision-makers in further informative tools.

Principles to protect data by ethical and social factors

According to Hunter et al. (2018), there have been different types of methods that have originated on the framework for developing a new view to the decision-makers of the company. These frameworks are based on some specific instruments:-

International Data Privacy Principles- Privacy of data can be achieved by social and technical solutions. Social awareness, as well as accessibility, can be useful socially. Safe maintenance of data on its accessibility as well as the lost data will ensure solving issues related to technical traits. The very next process is to ensure that all the employees follow the rules and regulations related to the privacy of data. Firstly the concern should be about the slow proceedings of the legal legislations. This will be more effective than the tough laws. Solving the problems related to the attitude of customers towards them like bad reviews on platforms of social media shall be ensured. Secondly, these issues arise due to its inaccessibility in terms of harmonization internationally. This causes some major complications which eventually affect the business. For preventing these, the principles of ethics shall be strictly followed. As stated by Coltart et al (2018) the company must ensure:-

Compiling with the law and the terms or the legal Regulations nationally based on data privacy. For the protection of current data, security standards are needed to be maintained for avoiding processing or erasing of data. Implementation of easier policies and terms for ensuring are able to manage the rules properly for protecting data and storing it. Provide necessary instructions to the employees for compiling those policies to avoid any issues. Usage of any customer information in the system protects the device. When required then data to be stored according to the instructions for the company itself. Excessive or unnecessary data from the customers must to be avoided. Announcements related to braces in case of data have to be ensured. Personal data should not be maintained or kept in the file or the system for a longer period. Preventing the transfer of data to other unknown sources should be followed. Whenever there is a contract between the company and the customer, then they should be informed individually and with the content of the customers their data to be kept without violating the policies. In case there is no contract then, the customer should be informed about the loss of their data and they should ensure that the customers should delete outdated data. Collection of data and principles based on purpose- On one hand Mahr, ?ai? and Odekerken-Schröder (2020) asserted that personal information to be collected by following the laws with proper mentioning of data about the person or the authority from which data has been collected. This should consist of only the required data.

Retention and Accuracy Principle contains the data collected personally must be accurate and should not be held for a longer span, only to be kept till the fulfilment of the purpose. Proper and valid data to be collected which should not exceed. This will meet the needs of the customers and the company, preventing any sled in terms of data. On the other hand, Williams, Burnap and Sloan (2017) stated that the company should ensure the protection of data to avoid miscarriage or erasing of data due to some accidental issues. This has to be done by making data policies. The user of data should enable the information stored to the user and how those data have been put to use. The subjects of the data must be made accessible for making any changes in personal information. According to Mantelero (2018), this framework works on the identification of the main factors based on the users followed by properly securing and supporting the boards of organizers in terms of the corporate policies along with support to the internal structures. These include Human resource management, information, financial matters, legal matters, and technical support. This also determines a specific schedule for identifying the number of elements by measuring each of the factors. This will help in knowing the effectiveness of the steps taken for securing the data.

Application of Theories

According to Moore (2021), privacy, security, law and ethics are closely related to each other. Ethical and social factors have a huge impact on protection and privacy of data. Although technical factors like protecting data from unauthorised access are important, social and ethical factors like spreading awareness among customers about ways and reasons for their data usage is also necessary. Their data usage should be transparent and maintain adequate privacy. Employees should be made loyal towards privacy policies of the organisation. According to Fabiano (2019), proper knowledge about all the activities is essential for preventing any harm to privacy guidelines which makes data protection complicated. Violation of privacy leads to punishments depending on its levels. In the modern world of technology and information driven practises, protecting data and preserving it becomes the most important aspect. Any accident or mistake in data protection might cause small to large extent damage. However Raab (2017) stated that the development of policies, strategies and ways to implement them depends largely on data protection. Data protection practises often face many ethical and social factors too. All these factors are addressed in the theories of James Moor. James Moor classified privacy into natural privacy and right for privacy. This classification of privacy discusses the difference between privacy lost and violation of privacy. According to Lee (2020), many theories framed by James Moor are implemented to make the data protection simpler. Accessibility privacy theory is processed to avoid any government or external influences. It is also defined as non-intrusion theory. The theory is followed to avoid authority from falling into the wrong hands. James Moor’s theory also includes decisional privacy and informational privacy. The decision privacy theory is implemented to allow the responsible body to make decisions and plans regarding data protection without any external hindrance. The decisions made should be independent from any influences. According to Ekstrand, Joshaghani and Feamster (2019), the information policy theory is processed to provide the responsible body with the authority to regulate or control the usage of one’s private information. The flow of that information like exchanging or spreading it can be controlled. Privacy zones are organised to limit access to one’s private information.

With the growth of the data economy, privacy or data protection faced many new challenges. Technologies like Artificial Intelligence (AI) change the way of handling data and its protection. Constant innovations are harming the simplicity of data protection. The barriers that conserve personal and sensitive data are under great danger. Data invasion and accessing confidential data needs to be prevented at any cost. Another theory which is implemented to enhance the data protection process is Helen Nissenabum’s Theory of “contextual Integrity”. With the view of Rule (2019), the theory is processed to restrict the access to sensitive and private information of a person. The safeguard of personal information and the norms of its flow are closely related. The contextual integrity theory is processes to understand the recent operations related to the flow of information. Identification of the bodies or people involved in the process is important. The information flow should be within certain principles like expectations and obligations which should be clear and transparent. Realisation of gaps or drawbacks is important to prevent violation of contextual integrity. According to Shvartzshnaider et al. (2018), external factors like political and moral should be kept in mind and identification of ways in which they can influence in future is essential. Brief evaluation and analysis is important to carry out practises. The operations should be within ethical and moral boundaries. The possible threads need to be figured out in this context to eliminate them. With the view of Apthorpe, Varghese and Feamster(2019), the Contextual Integrity theory is implemented to accurately execute all the processes and practises that involve solving issues regarding understanding the concept of privacy caused by technological improvements.

Gap analysis

In this research paper, it is revealed that there are specific gaps in maintaining data privacy through ethical and social factors.The former research papers are not containing authenticity of information which produced insufficient data in developing technical factors. However, this study is containing major factors of effective practices and manners for the betterment of data privacy act in business organisations.

References

Apthorpe, N., Varghese, S. and Feamster, N., 2019. Evaluating the Contextual Integrity of Privacy Regulation: Parents' IoT Toy Privacy Norms Versus {COPPA}. In 28th {USENIX} Security Symposium ({USENIX} Security 19) (pp. 123-140).

Bartolini, C., Calabró, A. and Marchetti, E., 2019. Enhancing Business Process Modelling with Data Protection Compliance: An Ontology-based Proposal.In ICISSP (pp. 421-428).

Coltart, C.E., Hoppe, A., Parker, M., Dawson, L., Amon, J.J., Simwinga, M., Geller, G., Henderson, G., Laeyendecker, O., Tucker, J.D. and Eba, P., 2018.Ethical considerations in global HIV phylogenetic research.The lancet HIV, 5(11), pp.e656-e666.

Coraggio, G. and Zappaterra, G., 2018. The risk-based approach to privacy: Risk or protection for business?.Journal of Data Protection & Privacy, 1(4), pp.339-344.

Daly, A., 2020. Neo-Liberal Business-As-Usual or Post-Surveillance Capitalism With European Characteristics? The EU’s General Data Protection Regulation in a Multi-Polar Internet. The EU’s General Data Protection Regulation in a Multi-Polar Internet (July 19, 2020).

De Guise, P., 2017. Data protection: Ensuring data availability. Auerbach Publications.

Ekstrand, M.D., Joshaghani, R. and Mehrpouyan, H., 2018, January. Privacy for all: Ensuring fair and equitable privacy protections. In Conference on Fairness, Accountability and Transparency (pp. 35-47).PMLR.

Fabiano, N., 2019, January. Robotics, intelligent systems, ethics and data protection: the new challenge. In Proceedings of the 2nd International Conference on Applications of Intelligent Systems (pp. 1-5).

Greenleaf, G., 2018, February. The Legal and Business Risks of Inconsistencies and Gaps in Coverage in Asian Data Protection Laws. In Session II Materials, Asian Business Law Institute (ABLI) Data Privacy Forum, Singapore (Vol. 7, pp. 18-21).

Hamidi, H., 2019. An approach to develop the smart health using Internet of Things and authentication based on biometric technology. Future generation computer systems, 91, pp.434-449.

Härting, R.C., Kaim, R. and Ruch, D., 2020. Impacts of the Implementation of the General Data Protection Regulations (GDPR) in SME Business. In Agents and Multi-Agent Systems: Technologies and Applications 2020: 14th KES International Conference, KES-AMSTA 2020, June 2020 Proceedings (Vol. 186, p. 295). Springer Nature.

Hoel, T., Griffiths, D. and Chen, W., 2017, March.The influence of data protection and privacy frameworks on the design of learning analytics systems.In Proceedings of the seventh international learning analytics & knowledge conference (pp. 243-252).

Hoofnagle, C.J., van der Sloot, B. and Borgesius, F.Z., 2019. The European Union general data protection regulation: what it is and what it means. Information & Communications Technology Law, 28(1), pp.65-98.

Hunter, R.F., Gough, A., O’Kane, N., McKeown, G., Fitzpatrick, A., Walker, T., McKinley, M., Lee, M. and Kee, F., 2018. Ethical issues in social media research for public health. American journal of public health, 108(3), pp.343-348.

Huth, D., 2017. A Pattern Catalog for GDPR Compliant Data Protection.In PoEM Doctoral Consortium (pp. 34-40).

Kudina, O. and Verbeek, P.P., 2019. Ethics from within: Google Glass, the Collingridge dilemma, and the mediated value of privacy. Science, Technology, & Human Values, 44(2), pp.291-314.

Lee, R.S., 2020. AI Ethics, Security and Privacy.In Artificial Intelligence in Daily Life (pp. 369-384).Springer, Singapore.

Mahr, D., ?ai?, M. and Odekerken-Schröder, G., 2020.An Interdisciplinary View of Marketing Ethics. The SAGE Handbook of Marketing Ethics, p.58.

Mantelero, A., 2018. AI and Big Data: A blueprint for a human rights, social and ethical impact assessment. Computer Law & Security Review, 34(4), pp.754-772.

Mantelero, A., 2018. AI and Big Data: A blueprint for a human rights, social and ethical impact assessment. Computer Law & Security Review, 34(4), pp.754-772.

Martin, K.D. and Murphy, P.E., 2017. The role of data privacy in marketing.Journal of the Academy of Marketing Science, 45(2), pp.135-155.

Moore, A.D., 2021. 3. The Value of Privacy. In Privacy Rights (pp. 33-56).Penn State University Press.

Polkowski, Z., 2018, June. The method of implementing the General Data Protection Regulation in business and administration.In 2018 10th International Conference on Electronics, Computers and Artificial Intelligence (ECAI) (pp. 1-6).IEEE.

Raab, C.D., 2017. Information privacy: Ethics and accountability. Ethik in den Kulturen–Kulturen in der Ethik: Eine Festschrift für Regina Ammicht Quinn, pp.335-347.

Rule, J.B., 2019. Contextual Integrity and its Discontents: A Critique of Helen Nissenbaum's Normative Arguments. Policy & Internet, 11(3), pp.260-279.

Ryan, M., 2020. The future of transportation: ethical, legal, social and economic impacts of self-driving vehicles in the year 2025. Science and engineering ethics, 26(3), pp.1185-1208.

Shabani, M. and Borry, P., 2018.Rules for processing genetic data for research purposes in view of the new EU General Data Protection Regulation.European Journal of Human Genetics, 26(2), pp.149-156.

Shvartzshnaider, Y., Apthorpe, N., Feamster, N. and Nissenbaum, H., 2018. Analyzing privacy policies using contextual integrity annotations.arXiv preprint arXiv:1809.02236.

Tikkinen-Piri, C., Rohunen, A. and Markkula, J., 2018. EU General Data Protection Regulation: Changes and implications for personal data collecting companies. Computer Law & Security Review, 34(1), pp.134-153.

Vayena, E., Blasimme, A. and Cohen, I.G., 2018. Machine learning in medicine: addressing ethical challenges. PLoS medicine, 15(11), p.e1002689.

Williams, M.L., Burnap, P. and Sloan, L., 2017. Towards an ethical framework for publishing Twitter data in social research: Taking into account users’ views, online context and algorithmic estimation. Sociology, 51(6), pp.1149-1168.

Williams, M.L., Burnap, P. and Sloan, L., 2017. Towards an ethical framework for publishing Twitter data in social research: Taking into account users’ views, online context and algorithmic estimation. Sociology, 51(6), pp.1149-1168.

Windrich, M., Speck, A. and Gruschka, N., 2021, June.Representing Data Protection Aspects in Process Models by Coloring.In Annual Privacy Forum (pp. 143-155).Springer, Cham.

Ziegler, S., Evequoz, E. and Huamani, A.M.P., 2019. The impact of the European General Data Protection Regulation (GDPR) on future data business models: Toward a new paradigm and business opportunities. In Digital Business Models (pp. 201-226). Palgrave Macmillan, Cham.

Free Download Full Sample
Recently Download Samples by Customers
Our Exceptional Advantages
Complete your order here
16000+ Project Delivered
Get best price for your work

Ph.D. Writers For Best Assistance

Plagiarism Free

offer valid for limited time only*