Preview

Tutorial06 Privacy

Good Essays
Open Document
Open Document
1605 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Tutorial06 Privacy
HONG KONG INSTITUTE OF VOCATIONAL EDUCATION
Tutorial 6: Data Protection and Privacy
Module Intended Learning Outcome (#2):
On completion of the module, students are expected to be able to: exercise appropriate judgments as IT practitioners according to the codes of conduct of leading professional bodies of related disciplines in various ethical and legal aspects related to IT professions
Lesson Intended Learning Outcome:
On completion of this tutorial, students are expected to be able to understand:
Data protection and privacy issues TASK: Multiple Choice Questions (1% each)
(1) Which is not the three levels of violation of data privacy?
(a) Data – crunching
(b) Data – gathering
(c) Data – exchange
(d) Data – mining

(2) Which is not a Do-not-call registers operated by OFCA?
(a) Fax Register
(b) Email Register
(c) Short Messages Register
(d) Telephone Register

(3) Suppose you want to do an on-line survey about secondary students’ online computer game playing habit. You should not ask for the name of the school from which the student is studying, or it may violate a principle under the Personal Data (Privacy) Ordinance. Which Principle below will it violate?
(a) Principle 1: Information collected should be adequate but not excessive.
(b) Principle 2: Information should be kept for a reasonable period of time.
(c) Principle 3: Information collected should be used for the purpose it is intended.
(d) Principle 4: Information should be safely kept.
(e) None of (a), (b), (c) or (d).

(4) Suppose you want to do an on-line survey about the Internet viewer’s fast food eating habit. Which item of information below you should NOT ask the user to provide because it would violate the Personal Data (Privacy) Ordinance?
(a) Viewer’s age range (e.g. 20-25 years old).
(b) Viewer’s sex. (e.g. Male or female.)
(c) Viewer’s HKID number.
(d) All of (a), (b) and (c).
(e) None of (a), (b) or (c).

(5) A company puts up an advertisement of job vacancies on a Web site. Since it does

You May Also Find These Documents Helpful

  • Good Essays

    Companies pay to have their jobs listed on the sites. Information about vacancies may reproduce an advertisement so that the site is simply and additional form of communication. Alternatively, some vacancies are only found online. Links may be provided to the organization's website.…

    • 449 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    Unit 4222 - 307

    • 395 Words
    • 2 Pages

    2. Personal data shall be obtained only for one or more specified and lawful purposes, and shall not be further processed in any manner incompatible with that purpose or those purposes.…

    • 395 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Have due regard for the clients privacy rights in explaining the purpose of the survey…

    • 362 Words
    • 2 Pages
    Good Essays
  • Good Essays

    3. Respect and Privacy- invasion of privacy is taking away one’s freedom. Disrespecting an individual is degrading one’s rights. Privacy is very important thing owned by an individual, it is like a treasure that should be kept carefully and must be respected by the others. Others should respect others’ privacy as they respect their own because having each own privacy is having a smuch secured freedom.…

    • 559 Words
    • 3 Pages
    Good Essays
  • Good Essays

    The following assignment is part of the requirements for IT Organizational Behavior (CMGT/530). This Statement of personal ethics is part of the required coursework needed to complete the program for a Master’s degree in Information Systems at University of Phoenix.…

    • 1018 Words
    • 5 Pages
    Good Essays
  • Better Essays

    Hsc Unit038

    • 1181 Words
    • 5 Pages

    • Personal data shall be obtained only for one or more specified and lawful purposes…

    • 1181 Words
    • 5 Pages
    Better Essays
  • Satisfactory Essays

    When it comes to protecting and saving lives of the American people, private invasion used in order to locate and capture potential terrorist should be unlimited. The 911 attack has provided active proof to the American peoples of the damage that terrorist groups can impose on our society. Therefore, invading the privacy of individuals may prevent future terrorist attacks.…

    • 432 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Informed Consent Paper

    • 608 Words
    • 3 Pages

    The researcher will not use your personal information for any purposes beyond this research project. Also, the researcher will not include anything that could identify your name or anything else that could identify you in the study reports. Data will be kept secure by not using the actual names of the individuals participating in the study or the names of their organizations.…

    • 608 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Sample Irb

    • 355 Words
    • 2 Pages

    Participants will sign consent forms which will be stored in a secure location separate from the questionnaires. All data will be accessible only to the researcher, and the questionnaires will not have any personal information on them.…

    • 355 Words
    • 2 Pages
    Good Essays
  • Powerful Essays

    Unfairness In Sentencing

    • 1798 Words
    • 8 Pages

    Marshall (1996) point out to the need of every study abiding with the research ethics. The study will ensure such ethical issues of participation at will, informed consent, security ensured from where the participant is completing the survey from, confidentiality is maintained, and ensure anonymity for those who want their names to remain undisclosed. The participants will participate at will and be free to withdrawal from the study at any stage of the survey if they wish. The research will abide by the 1998 Act of data protection that states that collected information must only be used for the intended purpose of the study and not transferable to other intentions whosever. The gathered information will be obtained for this study and questions will only cover the objectives of this study. The research will go through the examination and approval of Human and ethics Committees to ensure transparency and…

    • 1798 Words
    • 8 Pages
    Powerful Essays
  • Good Essays

    Particularly the data that could be collected and possibly be shared with third parties. Ted Koppel gives some examples of what different services can do; tracking the location of people or cars. And the habits people make like the products we buy. I think this article is good and makes strong validations toward people’s privacy.…

    • 631 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Private is to be closed, hidden, and to portray to be someone different or not themselves. However, even when people think that they are being private they really are not. Nothing is private in this day in time. On the contrary, In the book It’s Complicated, Danah Boyd presents one possible definition of privacy as being, “the claim of individuals, groups, or institutions to determine for themselves when, how, and to what extent information about them is communicated to others” as suggested by Alan Westin (59). For instance, a person has the right to determine what kind of information is taken about them, and the purpose of that information. By having the right to privacy the government completely controls the people’s lives, and requires the…

    • 1207 Words
    • 5 Pages
    Good Essays
  • Satisfactory Essays

    GBDA 303 Chapter 7

    • 366 Words
    • 4 Pages

    • There are several privacy issues related to the use of online / computer resources.…

    • 366 Words
    • 4 Pages
    Satisfactory Essays
  • Best Essays

    * Data Protection Act (1998) has eight principles used to protect an individual’s personal information and rights to that information (Legislation: 2003)…

    • 1521 Words
    • 7 Pages
    Best Essays
  • Powerful Essays

    Security and Privacy

    • 1517 Words
    • 7 Pages

    References: American Health Management Association, [AHIMA]. “Online, On Message, On Duty: Privacy Experts Share Their Challenges.” April 2008. Available online in the FORE Library: HIM Body of Knowledge at www.ahima.org.…

    • 1517 Words
    • 7 Pages
    Powerful Essays