Download as pdf or txt
Download as pdf or txt
You are on page 1of 14

College of Informatics and Computing Sciences

Research Project in CS 423


SOCIAL ISSUES AND PROFESSIONAL PRACTICES

NAME: DATE: SCORE: RATING:


___
Batoon, Princess Emmanuelle D. December 3, 2023 %
100
Javier, Rhob Austin
Zamuco, Renz Vismark
COURSE / SECTION: NT-4101 SR CODE:

UNIVERSITY VISION:
A premier national university that develops leaders in the global knowledge economy.
UNIVERSITY MISSION:
A university committed to producing leaders by providing a 21st century learning
environment through innovations in education, multidisciplinary research, and community and
industry partnerships in order to nurture the spirit of nationhood, propel the national economy,
and engage the world for sustainable development.
College of Informatics and Computing Sciences

Navigating Complexities in Personal Data Access: Managing Balance


Between Necessity, Transparency, and Privacy Concerns

A Research Project Presented to Ms. Jasmin O. Pesigan a faculty of the


College of Informatics and Computing Sciences
Batangas State University TNEU JPLPC - Malvar
Malvar, Batangas

BATOON, PRINCESS EMMANUELLE D.


JAVIER, RHOB AUSTIN
ZAMUCO, REMNZ VISMARK

December 2023
College of Informatics and Computing Sciences

INTRODUCTION

In the rapidly evolving landscape of digital information, tapping into personal data
has become a cornerstone of various sectors, including healthcare, business, and technology.
The growing reliance of both individuals and companies on personal data for innovation,
personalization of services, and decision-making has raised ethical questions around data
access. Finding the right balance between the necessity of accessing personal information,
ensuring transparency, and respecting privacy concerns has become a complex challenge.

Access to personal data is frequently required in settings like the medical field, where
prompt access to medical records is essential for providing quality patient care. In a similar
vein, companies might look for access to client information in order to enhance user
experience and customize offerings. But the fundamental right to privacy must be carefully
balanced against this imperative.

Another important component of the ethical considerations surrounding the access to


personal data is transparency. Customers have a right to understand how and why their data is
handled, accessed, and utilized. Transparency helps prevent a breach of confidence and
safeguard the moral basis of data use. Achieving a balance between the requirement for
transparent communication and data access is crucial for responsible and ethical data
operations.

Concerns about privacy are central to the conversation about access to personal data.
People are becoming more conscious of the possible dangers connected to the improper use
or management of their personal data. Adhering to laws that protect people's right to privacy,
putting strong security measures in place, and getting informed consent are all necessary to
ensure that data access is carried out ethically.

In existing literature, the concept of data privacy is frequently characterized as an


individual's inclination to regulate or influence information pertaining to oneself (Ching,
2018). In the context of the Philippines, the National Privacy Commission (NPC) defines data
College of Informatics and Computing Sciences

privacy as an individual's entitlement to withhold their information and lead a life free from
surveillance. This proactive safeguarding of personal information is considered a voluntary
choice and is upheld in democratic societies. Consequently, it becomes imperative for the
government to implement measures that ensure the protection of its citizens' interests in
relation to their personal data. This necessity culminated in the enactment of Republic Act
No. 10173, widely recognized as the Data Privacy Act (DPA) of 2012.

BACKGROUND INFORMATION

Privacy concerns are paramount in the discussion of personal data access. Individuals
are increasingly aware of the potential risks associated with the misuse or mishandling of
their personal information. Ensuring that data access is conducted ethically involves
implementing robust security measures, obtaining informed consent, and respecting legal
frameworks that safeguard individuals' privacy rights.

This research aims to delve into the multifaceted ethical dilemmas surrounding
personal data access. By examining real-world scenarios, assessing current practices, and
evaluating the impact on individuals and society, the study seeks to provide a comprehensive
understanding of the challenges involved. The study will also look at possible frameworks,
best practices, and techniques for maintaining a careful balance between the need to access
personal data, maintaining transparency, and ethically handling privacy concerns. Through
these efforts, the research aims to contribute valuable insights that can guide individuals,
organizations, and policymakers in navigating the ethical complexities of personal data
access.

KEY ISSUES

In navigating the complexities of personal data access and managing the delicate
balance between necessity, transparency, and privacy concerns, a foundational aspect
College of Informatics and Computing Sciences

involves defining and categorizing personal data. This encompasses the establishment of
clear criteria for identifying sensitive information that necessitates special protection. This
includes scrutinizing the criteria and justifications for accessing personal data based on
necessity and assessing the impact of such access on privacy rights.

Transparency in data handling practices is equally paramount, necessitating an


assessment of current communication practices regarding how personal data is managed.
Developing strategies to enhance transparency without overwhelming individuals with
technical details is an ongoing challenge that requires careful consideration. The research
should assess the effectiveness of existing security measures in protecting personal data,
identify potential weaknesses, and suggest improvements to strengthen data protection
mechanisms. Legal and ethical considerations are crucial, necessitating an examination of
how current practices align with privacy laws and ethical standards. In situations where legal
guidelines are unclear or absent, it is essential to propose ethical frameworks.

Establishing and preserving trust in personal data management presents a complex


challenge. An exploration of the factors that contribute to or undermine user trust in the
management of personal information is indispensable. Similarly, proposing strategies to
cultivate trust in data access practices is vital. Public awareness and education initiatives are
integral components of this framework, requiring an evaluation of the effectiveness of
existing campaigns and the development of educational programs to enlighten individuals
about the implications of data sharing and privacy protection.

In conclusion, these key issues provide a comprehensive framework for investigating


the intricacies of personal data access, emphasizing the delicate balance needed between
necessity, transparency, and privacy concerns. Addressing these issues will contribute to a
nuanced understanding of the challenges and potential solutions in managing personal data
responsibly.
College of Informatics and Computing Sciences

CASE STUDIES

This case study delves into the intricate challenge of managing personal data access.
Balancing the necessity for data-driven services with transparency and privacy concerns is a
delicate task faced by organizations today. By exploring real-world examples and challenges,
we aim to unravel the complexities involved in responsibly navigating personal data,
emphasizing the crucial interplay between operational needs, transparent practices, and
safeguarding individual privacy rights.By being transparent and forthcoming, organizations
build trust with their customers and empower them to make informed decisions about their
data sharing preferences. Regularly updating customers on any changes in data handling
practices further reinforces transparency and enhances the overall customer experience.

Social Media Platforms and Personal Information

In this case study, the dynamic interplay between social media platforms, user data,
and targeted advertising, aiming to understand how these platforms navigate the delicate
balance between necessity, transparency, and user privacy. Social media platforms heavily
rely on user data to enhance services and generate revenue through personalized advertising.
The necessity of targeted advertising for financial sustainability is explored, emphasizing
how it contributes to an improved user experience by delivering relevant content. Platforms
like Facbebook, Instagram, Twitter heavily rely on user data—such as preferences and online
behavior—to deliver personalized ads, a crucial aspect for their financial sustainability. To
address concerns, they employ transparency measures like clear privacy policies and user
education. Privacy safeguards, such as customizable ad preferences, empower users to control
their data. Platforms secure user consent for data collection and provide opt-out options.
Public sentiment influences policy changes, exemplified by Snapchat's response to user
feedback. The study aims to identify best practices in this delicate balance, considering the
impact of privacy regulations like GDPR and CCPA. It also explores whether user
College of Informatics and Computing Sciences

empowerment through transparent data practices positively affects the long-term


sustainability and reputation of social media platforms.

BEST PRACTICES

Effectively navigating the complexities of personal data access requires a strategic approach
that harmonizes necessity, transparency, and privacy concerns. In this context, best practices
serve as guiding principles to ensure responsible data management of customers. The
following outlines key best practices derived from industry insights and ethical
considerations. Incorporating these best practices ensures a comprehensive and ethical
approach to managing personal data, fostering a balance between necessity, transparency, and
privacy concerns.

1. Granular Consent Mechanisms:


- Implementing granular consent options empowers users to control the specific
types of data they're comfortable sharing. This ensures transparency and aligns with
privacy expectations.
2. Transparency by Design:
- Build transparency into data practices from the outset. Clearly communicate how
data will be used, stored, and shared, fostering trust and user confidence.
3. Data Minimization:
- Adopt a data minimization approach by collecting only the necessary information
for the intended purpose. This reduces the risk associated with unnecessary data
exposure.
4. Regular Privacy Audits:
- Conduct routine privacy audits to assess data-handling practices. This ongoing
evaluation ensures alignment with evolving privacy standards and identifies areas for
improvement.
College of Informatics and Computing Sciences

5. Clear Data Retention Policies:


- Establish and communicate clear data retention policies. Define how long data will
be retained and the criteria for its disposal, aligning with privacy-conscious practices.
6. User Education Programs:
- Develop educational initiatives to inform users about the implications of data
sharing. Empower them with knowledge about their rights and choices in managing
their personal information.
7. Regular Training for Employees:
- Conduct regular training sessions for employees to keep them informed about the
latest privacy regulations and ethical considerations. Well-informed staff contribute to
a culture of responsible data management.

RECOMMENDATIONS

In personal data access, strive for a healthy balance of necessity, transparency, and
privacy. Encourage Organizations to implement privacy by design, prioritize honest
communication of data practices, and empower individuals with information control.
Policymakers should create comprehensive legislation, encourage ethical data use, and
enforce stringent security requirements. A strong and balanced approach to personal data
access can be achieved by encouraging collaboration, undertaking regular privacy
evaluations, and being adaptable to technological changes.
Recommendations for Individuals
Understand Your Rights. Educate yourself on privacy laws and regulations
applicable in your region. Understand your rights regarding personal data protection and how
organizations are allowed to use your information.
College of Informatics and Computing Sciences

Review Privacy Policies. Before engaging with a service or platform, carefully


review its privacy policy. Look for information on data collection, processing purposes, and
how your data will be shared.
Use Privacy-Focused Tools. Consider using tools and services designed with privacy
in mind. Explore privacy-focused browsers, search engines, and messaging apps that
prioritize user data protection.
Enable Two-Factor Authentication. Strengthen the security of your accounts by
enabling two-factor authentication wherever possible. This adds an extra layer of protection
against unauthorized access.
Secure Your Devices. Implement strong passwords, use biometric authentication
when available, and keep your devices updated with the latest security patches to reduce the
risk of unauthorized access.

Recommendations for Organizations


Employee Training and Awareness. Provide comprehensive training to employees
on data protection policies, privacy laws, and ethical considerations. Foster a culture of
privacy awareness within the organization.
Ethical Data Use. Establish guidelines for ethical data use within your organization.
Emphasize the responsible and fair treatment of personal data, considering the potential
impact on individuals and society.
Security Measures. Implement robust security measures to protect personal data
from unauthorized access, breaches, or cyber threats. Regularly update and audit security
protocols to address emerging risks.
Cross-Functional Collaboration. Facilitate collaboration between different
departments (legal, IT, marketing, etc.) to ensure a comprehensive and cohesive approach to
privacy. Cross-functional collaboration can enhance the effectiveness of privacy initiatives.
College of Informatics and Computing Sciences

Privacy Advocacy. Engage in privacy advocacy within the industry. Support and
contribute to the development of privacy standards and best practices that benefit both
organizations and users.

Recommendations for Policymakers


Adopt Comprehensive Data Protection Legislation. Develop and enact
comprehensive data protection laws that establish clear guidelines on the collection,
processing, and sharing of personal data. Ensure that these laws align with international
privacy standards.
Implement Strict Security Standards. Enforce strict security standards to protect
personal data from unauthorized access, breaches, and cyber threats. Promote regular security
audits and assessments to ensure compliance with established standards.
Facilitate Collaboration Between Stakeholders. Foster collaboration between
government entities, industry stakeholders, and civil society to develop and implement
effective data protection measures. Engage in a multi-stakeholder approach to policy
development.
Promote Privacy by Design and Default. Description: Encourage the integration of
privacy by design and default principles in the development of technologies and services.
Ensure that privacy considerations are embedded in the early stages of product and system
design.
Balance Innovation and Privacy. Description: Strive to strike a balance between
fostering innovation and protecting individual privacy. Create policies that encourage
technological advancements while safeguarding the rights and interests of data subjects.

CONCLUSION
In conclusion, dealing with the difficulties of personal data access while maintaining a
careful balance of necessity, transparency, and privacy concerns necessitates a multifaceted
College of Informatics and Computing Sciences

and collaborative strategy. Striking this balance is critical in order to satisfy legitimate data
use needs while also protecting individual privacy rights. Organizations must prioritize
privacy by design, incorporating ethical considerations into their practices, and guaranteeing
openness in user communication. Individuals must be given control over their personal data
through granular consent procedures and user-friendly interfaces if trust is to be built.
Policymakers have a critical role in developing a strong regulatory framework that
promotes innovation while protecting privacy. This framework includes comprehensive data
protection regulations, stringent security standards, and channels for cross-border data
exchanges. Continuous efforts, such as conducting regular privacy effect assessments and
remaining up to date on technological changes, are critical for adjusting to changing
difficulties. Collaboration among stakeholders, such as government, industry, and civil
society, promotes a comprehensive approach to data protection.
The most important objective in managing these complications is to develop a
privacy-conscious ecosystem that respects individual rights, encourages openness, and
ensures the ethical use of personal data. Stakeholders can contribute to a reasonable and
balanced approach to personal data access in our increasingly digital and interconnected
world by embracing these recommendations.

REFERENCES

Ching, M. R. D., Fabito, B. S., & Celis, N. J. (2018). Data Privacy Act of 2012: A Case
Study approach to Philippine Government Agencies compliance. Advanced Science
Letters, 24(10), 7042–7046. https://doi.org/10.1166/asl.2018.12404

An ethical approach to data privacy protection. (n.d.). ISACA.


https://www.isaca.org/resources/isaca-journal/issues/2016/volume-6/an-ethical-approa
ch-to-data-privacy-protection
College of Informatics and Computing Sciences

Mathis, S. (2023, May 19). Top 10 customer data privacy best practices. Customer
Experience.
https://www.techtarget.com/searchcustomerexperience/tip/Top-customer-data-privacy
-best-practices

Privacy International. "Digital Privacy Recommendations for Individuals." 2022.


[https://privacyinternational.org/guide/privacy-recommendations-individuals]

World Privacy Forum. "Best Practices for Organizations in Personal Data Management."
2023. [https://worldprivacyforum.org/]

Data Protection Authority. "Policymaker's Guide to Balancing Necessity and Privacy in


Personal Data Access." 2021. [http://dataprotectionauthority.gov/report]
College of Informatics and Computing Sciences

CRITERIA SCORE
Research and Understanding:
- Demonstrates a clear understanding of the chosen social issues and
professional practices in the IT field.
- Provides relevant and accurate information about the selected topics.
- Shows evidence of in-depth research through credible sources.
Analysis and Critical Thinking:
- Presents a thoughtful analysis of the social implications and ethical
considerations related to the chosen IT topics.
- Identifies and discusses the potential impact of these issues on
individuals, society, and the IT industry.
- Offers well-reasoned arguments and supports them with evidence.
Presentation and Organization:
- Presents the project in a clear, logical, and organized manner.
- Utilizes appropriate visual aids, such as charts, graphs, or images, to
enhance understanding.
- Uses proper citation and references to acknowledge sources.
Creativity and Innovation:
- Demonstrates originality and creativity in approaching the chosen
topics.
- Offers unique insights or perspectives on the social issues and
professional practices of IT.
- Proposes innovative solutions or recommendations to address the
identified challenges.
Communication and Collaboration:
- Communicates ideas effectively through clear and concise writing.
- Engages the audience through a well-structured presentation or report.
- Demonstrates effective collaboration and teamwork if the project is
done in a group.
Ethical Considerations:
- Considers and discusses the ethical implications of the chosen IT topics.
- Demonstrates an understanding of ethical frameworks and applies them
appropriately.
- Offers thoughtful reflections on the ethical responsibilities of IT
professionals.
College of Informatics and Computing Sciences

Prepared by:

Ms. JASMIN O. PESIGAN


Course Instructor
Date:

Checked and Reviewed by: Approved by:

Mr. JOSEPH RIZALDE GUILLO Mr. JOHNREY N.


MANZANAL
Department Chairperson, CICS OIC- Dean, CICS
Date: Date:

You might also like