logo

Ethics and Professional Practice Reflective Journal

This chapter discusses the right of privacy, laws protecting personal data privacy, ethical issues related to consumer profiling, workplace monitoring, and advanced surveillance technologies.

5 Pages873 Words142 Views
   

Added on  2023-06-09

About This Document

This reflective journal discusses the ethics in information technology, privacy rights, legislations enacted by the Australian government to protect personal privacy, and relevant concepts and theories. It also talks about the future application of the knowledge gained.

Ethics and Professional Practice Reflective Journal

This chapter discusses the right of privacy, laws protecting personal data privacy, ethical issues related to consumer profiling, workplace monitoring, and advanced surveillance technologies.

   Added on 2023-06-09

ShareRelated Documents
Ethics Reflective Journal 1
ETHICS AND PROFESSIONAL PRACTICE REFLECTIVE JOURNAL
By (Student’s Name)
Class/ Course Name
Professor (Tutor)
University Name
Date
Ethics and Professional Practice Reflective Journal_1
Ethics Reflective Journal 2
In the previous weeks, I have learnt about ethics in Information technology, which is a
broad topic covering various attributes which include privacy rights, various ways in which
privacy of individual persons and privacy of personal data is breached by various actors, the
various technologies that have emerged and the role that they play in either protecting or
violating personal data privacy rights. In most cases, these technologies are causing more harm
than good to personal data (Bygrave 2014).
I also learned about the various legislations that have been enacted by the Australian
government to protect personal privacy, which according to Australian Government (2018)
include; privacy and personal information protection act of 1998, surveillance devices act of
2007, health records information protection act of 2002 which states that in case of unauthorized
access to personal data, every individual whose data has been exposed should be notified within
sixty days, freedom of information act of 1998, and workplace surveillance act of 2005 which
has little restrictions on how the employers monitor their employees.
RELEVANT CONCEPTS AND THEORIES:
The most important concepts of the topic are the key privacy and anonymity issues which
are;
Data breaches: this refers to the unauthorized access to data, it may be as a result of
eavesdropping which is date leakage as a result of unsecure channel, or hacking which is
penetration into a database (Takabi, Joshi, and Ahn 2010). When a data breach occurs it exposes
private and confidential data such as bank details, business secrets, among others.
Electronic discovery: it is a technology which is used to access/ retrieve information
which is stored electronically in response to a request for production in a lawsuit (Chen and Zhao
Ethics and Professional Practice Reflective Journal_2

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Information Technology Ethics - Violation of Privacy, Intellectual Property Rights and Whistleblowing
|9
|1935
|378

Reflective Journals on IT Class Lessons
|4
|759
|178

Personal Privacy and Security: Threats, Solutions, and Ethical Conduct in IT Security Profession
|20
|1848
|225

The Security and Confidentiality of Health Records
|4
|553
|22

ASSIGNMENT ON PROFESSIONAL AND ETHICAL PRACTICE
|4
|739
|25

Contemporary issue of Surveillance
|8
|1602
|341