Privacy, trust, and data security are intertwined according to ethics and laws. Personal information is so important for a person. It cannot be used by anyone without the information to that person. It is an ethical thing to secure personal information to every person. Privacy protection provisions rely on trust. Security providers are provided grantee to their data. Violation of data security is also a crime, as per the security laws (DesJardins, 2014).
This report will explain about the data security issues and ethical issues related to the personal information of citizens. Privacy of personal data is a right of a person. This report will describe about the personal information of one million Australian citizens added to giant marketing database without any information to them. In the later section of this report, it will explain about ethical decision making with the help of moral philosophies. Privacy advocates are disappointed from data breaches. Public sector organizations are authorized to access personal data and they are having control on that data (Bagshaw, 2019).
Australian peoples are provides their data to the electoral board for voting. It is a process of government to collect data of citizens for voting. All the Australians are registered on the electoral roll system for voting at different levels. In addition, more than one million name and addresses of Australians have in electoral roll system. Thereafter, that data is passed to marketing giants without any information to them. That was not ethical as per the laws and regulations (Chen & Zhao, 2012).
According to The Sydney Morning Herald and The Age that illion, Global Data, AXCIOM and Experian are having access of Electoral Roll databases, as they are prescribed authorities in Australia. They all have their secondary businesses in which they used data for data analytics for business with the full compliance with the privacy act. They are highly strict to do not use the electoral commission data for marketing purposes (Crane & Matten, 2016).
Ethics is a having a huge role in philosophy theories that uses to define about how person actions can be judged as right or wrong for a particular critical situation. Anyone may make thier ethical judgments, which are based on our experiences.
Ethics are based on the different theories (De George, 2011). They are divided in four classes, which are Consequentialism, Kantian Deontologism, Natural Law, and Virtue Ethics. These are also described as:
This theory is applied for the social work and it classify about the right and wrong action for particular situation. Utilitarianism is a common form of consequentialism, that everyone can perform his or her best for a situation (Kizza, 2007). It is a based on social works in which human may make their decisions for social motive.
It is depend on that particular critical condition, the right or wrong actions of some acts are independent of the consequences.
It is based on the behavior or nature of a person for a particular situation. Human beings can take their decisions according to their capabilities for a situation ( Lopez, 2013).
Virtue ethics has two different approaches for managing virtue of a person in particular situation. The first approach to virtue ethics is that there are different traits, which are appropriate for a particular role. Second approach is that focuses on their integration for right reasons. These actions can be taken by the depth and breadth of experiences from thier society (Meffert, 2009).
If anyone use personal information without any knowledge then it is a crime as well as it breaks the trust of particular organization. It is not ethical. Thus, laws and regulations are created for preventions of such types of things (Weiss, 2014). In the above scenario, personal information cannot be used by anyone without the prior knowledge for any purpose. Australians citizens are requested to no longer have to register on the electoral roll. Parliament passed a direct enrolment laws in 2012 in which Australians not provide their details to electoral roll. Personal data is required security at private sectors as well as public sector organizations. (Zharova & Alin, 2017).
Australian government is already taken decision about such type of scenario in 2012. According to (Bagshaw, 2019), Electoral data is used for track offenders and suspects through Australian Federal Police, Investments commission, Australian Security and Director of Public Prosecutions. However, Australian Electoral Commission (AEC) website is mention about the penalty up to 1000 penalty units, which is equivalent to $210000. Electoral Commission has put strict limits on access of data, which is allowed to members of Parliament, public health program, political parties, and researchers (Zharova & Alin, 2017).
Utilitarianism theory is applied in this scenario because of social issue. Sharing of public data is a social issue and it should be avoided from authorized persons. There are some communities, which are responsible for the data security. Ethics can stops such types of mistakes by human beings. Hackers are doing this in a unethical way. Thus, they are punishing for these incidents (LEE, et al., 2016).
Decision-making quality can be developed though leadership and other skills. Self-awareness is helping to take such type of decisions. People can secure their data at particular point. In addition, government is already having thier personal data in their databases. Therefore, it is the responsibility of those departments that public data is secured at their level and do not use that for marketing purposes (Ritter, 2006).
Businesses are having different purposes for their growth and they require many data for data analytics but it in good in an ethical way, otherwise it is against the laws (Rossouw & Vuuren, 2017).
Political parties can have access of electoral commission database but they cannot use that data for marketing purposes or others. That data is a public property and no one can use them for personal benefits (Shinde & Chokhandre, 2016).
Australian business can use that data for social help but not for personal benefits. However, these data is not having any banking information. They can take that data for researches, which is beneficial for the public (Trevino & Nelson, 2016).
Cloud computing services are providing data security and cyber security. Thus, public sectors can make an eye on their data from any type of breaches from their databases for personal uses (Yan, et al., 2017).
Conclusion
It is concluded from above sections of this report that, personal data is not shared with anyone from public sector organizations, such as Electoral Commission. This report has discussed about the laws and regulations for personal information of citizens. For an example, Electoral Commission has limited the access of database for different departments and they can take against data breaches as a penalty.
There are different laws and regulations, which are uses for the punishment, but moral philosophies are in favor of data protection. Data security is necessary as well as ethics are also required for preventions of data breaches. There are many businesses, which are requires data of different peoples for marketing that will provide business to particular firm. Therefore, they are taking data from different sources with pay or without pay.
Finally, it is concluded that Electoral commission should strict on the data breaches and no one case use their data for marketing purposes. It is a serious issue in front of Australian government that they face data breaches from the government databases.
References
Lopez, D., 2013. Data security. Data Science Journal, 10 08, 12(1), pp. 69-74.
Bagshaw, E., 2019. Details of 1 million Australians added to giant marketing database without their knowledge. [Online]
Available at: https://www.smh.com.au/politics/federal/details-of-1-million-australians-added-to-giant-marketing-database-without-their-knowledge-20190125-p50tnz.html
[Accessed 26 January 2019].
Chen, D. & Zhao, H., 2012. Data security and privacy protection issues in cloud computing. International Conference on Computer Science and Electronics Engineering, 1(1), pp. 647-651.
Crane, . A. & Matten, D., 2016. Business ethics: Managing corporate citizenship and sustainability in the age of globalization.. London: Oxford University Press.
De George, R. T., 2011. Business ethics.. New Delhi: Pearson Education India..
DesJardins, . J. R., 2014. An introduction to business ethics.. 4 ed. New york: McGraw-Hill/Irwin..
https://www.iibmindialms.com, 2019. Ethical theories Framework. [Online]
Available at: https://www.iibmindialms.com/library/human-resources-management/ethics-in-business/ethical-theories-framework/
[Accessed 26 January 2019].
Kizza, J. M., 2007. Ethical and social issues in the information age. UK: Springer..
LEE, W. W., ZANKL, W. & CHANG, H., 2016. An Ethical Approach to Data Privacy Protection. Isaca Journal.
Meffert, J. J., 2009. Ethics? Morals? Values?. Clinics in dermatology, 27(4), pp. 327-330.
Ritter, B. A., 2006. Can business ethics be trained? A study of the ethical decision-making process in business students.. Journal of Business Ethics, 68(2), pp. 153-164.
Rossouw, D. & Vuuren, L. V., 2017. Business ethics.. London: Oxford University Press..
Shinde, . A. & Chokhandre, . S., 2016. Online Votes and Fund analysis for political parties with Data Security. International Journal of Engineering Research and Applications, 6(1), pp. 161-165.
Trevino, L. K. & Nelson, K. A., 2016. Managing business ethics: Straight talk about how to do it right.. New York: John Wiley & Sons..
Weiss, J. W., 2014. Business ethics: A stakeholder and issues management approach.. London: Berrett-Koehler Publishers.
Yan, Z., Deng, R. H. & Varadharajan, V., 2017. Cryptography and data security in cloud computing. Elsevier, 53(1), p. 3.
Zharova, A. K. & Alin, V. M., 2017. The use of Big Data: A Russian perspective of personal data security. Computer Law & Security Review, 33(4), pp. 482-501.
Essay Writing Service Features
Our Experience
No matter how complex your assignment is, we can find the right professional for your specific task. Contact Essay is an essay writing company that hires only the smartest minds to help you with your projects. Our expertise allows us to provide students with high-quality academic writing, editing & proofreading services.Free Features
Free revision policy
$10Free bibliography & reference
$8Free title page
$8Free formatting
$8How Our Essay Writing Service Works
First, you will need to complete an order form. It's not difficult but, in case there is anything you find not to be clear, you may always call us so that we can guide you through it. On the order form, you will need to include some basic information concerning your order: subject, topic, number of pages, etc. We also encourage our clients to upload any relevant information or sources that will help.
Complete the order formOnce we have all the information and instructions that we need, we select the most suitable writer for your assignment. While everything seems to be clear, the writer, who has complete knowledge of the subject, may need clarification from you. It is at that point that you would receive a call or email from us.
Writer’s assignmentAs soon as the writer has finished, it will be delivered both to the website and to your email address so that you will not miss it. If your deadline is close at hand, we will place a call to you to make sure that you receive the paper on time.
Completing the order and download