Facebook's Data Privacy Practices: An Ethical Analysis

Verified

Added on  2025/05/03

|7
|1168
|370
AI Summary
Desklib provides solved assignments and past papers to help students succeed.
Document Page
Exposure of Facebook’s practice of data-sharing
1
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
Table of Contents
Introduction......................................................................................................................................3
Privacy- An ethical issue.................................................................................................................4
Ethical theories................................................................................................................................4
Recommendations and Conclusion..................................................................................................6
Reference.........................................................................................................................................7
2
Document Page
Introduction
Data security has become one of the critical concerns in the technological world due to the
increased ways of data stealing. The report will focus on the analysis of the Facebook case where
the company fails to maintain the data privacy and protection of the users. The report will
highlight the fundamental ethical issue identified in the case along with the application of the
ethical theories. Also, the report will develop solutions to the ethical problem identified in the
Facebook case.
3
Document Page
Privacy- An ethical issue
Data privacy refers to the practice of handling of data appropriately involving the notice,
regulatory obligations and consent. Personal data deals with higher risk levels as compared to
other types of data. Data utilization in an illegal or invalid manner has become one of the
challenges dealing with by the companies. The scope of data privacy comprises how data
collection and storage is done using a legal way as well as data sharing is undertaken with the
third parties. Also, it involves the regulatory restrictions of data privacy. Data privacy is crucial
for the data provider and data owner (Chen, & Zhao, 2012). Data privacy indicates an
individual’s right involving the absence of uninvited or invalid surveillance. Data privacy is also
an essential concern for the companies since data occupies a significant place in the company
assets. It is vital for the data owners or companies to understand that the data privacy and
security are different terms and both are used together.
In the case, Facebook failed to provide adequate data protection and privacy to the users and
shared with third parties. The main aim of Facebook behind such a drastic step was proper data
handling of users. However, Facebook would understand that the security of private data is also
significant. Facebook sold the users’ information to a third party without the user consent, and
this can consider as misuse of user’s private data. Failing to provide data privacy and security to
the private information of users may result in severe consequences in the form of penalties or
other punishments (Bbc, 2018). It can be seen that website developers do not obtain user consent
since they do not consider it a significant concern. However, their aim implies the examination
of different environments for numerous applications, but it also comes with privacy issues.
Ethical theories
The utilitarian theory deals with the consequences or outcomes of a specific action. This theory
states that an action is considered as ethically appropriate when it provides benefit to a large
number of people. This theory is best applicable when there is a need for decision-making as
what would be beneficial for the majority of the people. It targets an individual’s ability to
predict what would be the outcomes of a particular action (Ferrell et al., 2013). The Facebook
4
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
case is unethical as per the utilitarian theory since it adversely affected the majority of the users
by selling their private information to the third party.
The deontological theory refers to an individual’s implication for using the duties or obligations
while indulging in decision-making act. As per this theory, an action considers ethically correct
when an individual adheres to his duties or responsibilities. It is assumed in the theory that an
individual would undertake a consistent decision when he applies his set of responsibilities. The
Facebook case involved the non-adherence of duties and obligations towards the users. It is
because the primary duty of Facebook transforms into the proper data handling of the users.
Virtue, also known as character-based theory, involves an individual’s judgment based on the
virtue or character. As per this theory, an action is ethically correct when an individual behaves
ethically considering his morals, motivation, values and reputation. This theory focuses on an
individual’s behaviour while engaging in an action. It implies that ethical behaviour including
the values and morals would result in ethical actions (Safarzyńska, 2013). In the Facebook case,
it can be said that the company failed to protect the private information of the users which is
unethical. But, the virtue and character of the person sharing the data to the third party are
ethical. Therefore, ethical behaviour cannot defend the action as ethical since it harmed the
privacy of numerous users who trustfully provided their personal information to the social
network.
The contract-based ethical theory was formed based on an individual’s rights. This theory states
that an individual is provided with specific rights by the society which should be given the
highest priority while considering action to ethical or unethical. A right becomes ethical in this
theory when a large number of social individuals endorses it. Applying the theory to the
Facebook case, it can be said that the action is ethical since the social network has the right for
data collection and utilization in his way (Dörr, & Hollnbuchner, 2017).
5
Document Page
Recommendations and Conclusion
Maintaining transparency between the data providers and data owners is significant for the
companies. It is highly recommended to Facebook to obtain the user consent before using their
private information for any purpose. It would assist in maintaining transparency and gaining the
confidence of the users. Facebook is the owner of a large pool of data which makes it vital for
the company to protect the user's private data. The company can use the real-time monitoring of
the data and its security (Newgenapps, 2018). With the utilization of threat intelligence,
unauthorized access can be prohibited that can enhance data security. This technique helps in
monitoring access to data in real-time.
It can be concluded that data privacy and security must be of great concern for the giant
companies owning a vast informational pool of the users. Utilization of private information by
the website developers is not an issue, but Facebook must consider the significance of obtaining
user consent before the utilization of their private information. This case is unethical from the
perspective of the ethical theories Deontology, Utilitarianism, Virtue and Contract-based theory.
The company can monitor the data usage and sharing by using threat intelligence technique and
others such as encryption, monitoring the cloud providers and formulation of access control
policy.
6
Document Page
Reference
Bbc, (2018). Facebook's data-sharing deals exposed. Retrieved from:
https://www.bbc.com/news/technology-46618582
Chen, D., & Zhao, H. (2012). Data security and privacy protection issues in cloud
computing. In 2012 International Conference on Computer Science and Electronics
Engineering (Vol. 1, pp. 647-651). IEEE.
Dörr, K. N., & Hollnbuchner, K. (2017). Ethical challenges of algorithmic
journalism. Digital journalism, 5(4), 404-419.
Ferrell, O. C., Crittenden, V. L., Ferrell, L., & Crittenden, W. F. (2013). Theoretical
development in ethical marketing decision making. AMS review, 3(2), 51-60.
Newgenapps, (2018). Top 5 Solutions to Big Data Security Challenges. Retrieved from:
https://www.newgenapps.com/blog/big-data-security-challenges-solutions-problems-
security
Safarzyńska, K. (2013). Evolutionary-economic policies for sustainable
consumption. Ecological Economics, 90, 187-195.
7
chevron_up_icon
1 out of 7
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]