Privacy breach |
Through the use of Google search,more than 15,775 Telstra customers had
their information made public between February 2012 and May 2013. Telstra had
breached the privacy of its customers through the internet. Data was made
accessible to anyone that had used the Google search engine. Data that was exposed
and made accessible for public viewing was customers names, telephone numbers
and in some cases even their home and business address. Consequently by failing
to take the proper measures and destroying personal information,Telstra had breached three National
Privacy Principles .Furthermore due to the privacy laws that had been broken Telstra
was fined $10,200. To ensure that this was not going to happen again Telstra
agreed to replace the existing software platform ,on which it had occurred and to
review contracts of the third parties that were managing the personal
information.
So what can you do about privacy? It is good
practice to -Tell people who and what information you disclose to others and to
ask permission before collecting information online. Many websites have opt-out
check boxes when collecting information – it would be better to have opt-in
check boxes, but of course that presents a marketing dilemma.
It may be helpful to think of Security as
Authentication and Privacy as Authorisation. This approach may seem to
simplistic, BUT, this is a very useful concept in the development of a privacy
policy. You may know the password (authentication) to your sister, brother’s or
partner’s email account but are you authorised to use it????
Question 2
What AmI technologies are identified in the case?
There is a huge amount of Data collected through systems, these systems gather data through sources such as location implants, surveillance systems, sensor networks in homes and mobile phone tracking. Accordingly these systems endeavor to compare data and forecasting data about individuals. Once the data has been gathered and compiled then it is resold back to its original company. Some example of these companies may be mobile phone companies and insurance companies.
What drives DMC’s officers to take the actions they took?
DMC could have had possible financial losses if there was no actions taken. There was a need for them to protect their business, due to having information thieved. They had no alternative but to try and cover up the breach. Consequently this could have ruined the business and given them a bad reputation and would have lost considerable amounts of profit.
DMC is the clear market leader in
the aggregation of AmI data. Are there any comparisons you can make
to technology companies today?What AmI technologies are identified in the case?
There is a huge amount of Data collected through systems, these systems gather data through sources such as location implants, surveillance systems, sensor networks in homes and mobile phone tracking. Accordingly these systems endeavor to compare data and forecasting data about individuals. Once the data has been gathered and compiled then it is resold back to its original company. Some example of these companies may be mobile phone companies and insurance companies.
What drives DMC’s officers to take the actions they took?
DMC could have had possible financial losses if there was no actions taken. There was a need for them to protect their business, due to having information thieved. They had no alternative but to try and cover up the breach. Consequently this could have ruined the business and given them a bad reputation and would have lost considerable amounts of profit.
Department of Human Services, Vic Roads, Centerlink and many other government bodies are all collecting data and information of individuals. Government corporations use this data for evidence or for predicting future of revenue and unemployment rates.
How realistic is the description of governments using the technology and prohibiting immigration from states with no AmI data aggregation information?
Governments using technology and prohibiting immigration can be considered as realistic. With the use of Ami data when traveling in or out of a country there is a need for information on the individual. If Immigrating or travelling to another country there is a requirement for authorities to know as much as possible on the individual. Countries do not allow for you to immigrate unless they know about you.
What would be the impact of this digital divide?
Digital divide impacts enormously on individual and organizations that may be technologically, sociologically, or economically disadvantaged, they may not have access or lack knowledge in these areas. Therefore this is creating a gap between them and others that may have access. Countries that are heavily invested in technology will be advantaged and those that are poor will become poorer as they do not have the revenue and will be left behind in technologically.
List some of the ‘unintended consequences’ described in the case.
Data was stolen and individuals/public were unaware that there had been access to their private information. The system was ineffective and had flaws , they were able to track information on the public but unable to find the employees involved. Subsequently with the company being sued by consumer activist groups, this may have forced the President of the company to resign.
Source:
Retrieved from http://www.security-faqs.com/wp-content/uploads/2009/11/How-Do-I-Backup-My-Computer-Data-Online.jpg
Riggins, F.,
& Dewan, S. (2005). The digital divide: Current and future research
directions. Journal of the Association for information systems,
6(12), 13.
content/uploads/2011/04/telstra_logo.jpg
No comments:
Post a Comment