Emerging

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 4

2.

the general ethical principles that must be applied in all technology


They are many general ethics in technology some of these are:
I) Access Rights: Access to empowering technology as a right or freedom.
 Access Rights are the permissions an individual user or a computer application
holds to read, write, modify, delete or otherwise access a computer file; change
configurations or settings, or add or remove applications.
 The permissions that are granted to a user, or to an application, to read, write and
erase files in the computer. Access rights can be tied to a particular client or
server, to folders within that machine or to specific programs and data files. See
access control list and privilege.
EXAMPLES
 Most networks will have been set up with 'access rights'. This means the
administrator has set up each person who can log on, with the right to access
certain files and folders. For instance, you may have a personal folder in which
you have the right to open, read, write, create and delete files.
II) Accountability
 The principle that an individual is entrusted to safeguard and control equipment,
keying material, and information and is answerable to proper authority for the loss
or misuse of that equipment or information.
III) Digital Rights: projection of intellectual property right , privacy and personality
right.
 Digital rights, closely linked to freedom of expression and privacy, are those that
allow people to access, use, create and publish digital media, as well as access and
use computers, other electronic devices and communications networks. Digital
rights are an extension of human rights for the Internet age.
 Digital rights are basically human rights in the internet era. The rights to online
privacy and freedom of expression, for example, are really extensions of the equal
and inalienable rights laid out in the United Nation’s Universal Declaration of
Human Rights.
IV) Environment:
 Environmental technology is the scientific study or application of engineering
principles to understand and handle problems that influence our surroundings,
with the goal of improvement of the environment (Speight, 2005; Orszulik, 2008).
 Environmental Technology is also known as 'green' or 'clean' technology and
refers to the development of new technologies which aim to conserve, monitor or
reduce the negative impact of technology on the environment and the consumption
of resources
V) Safety Technology:
encompasses all the new technologies now being applied to workplace safety: mobile
apps, wearables, machine sensors, cloud-based software, predictive analytics, 3D
printing, robotics, real-time employee monitoring and tracking, PPE tracking with
embedded sensors, etc.
3. Digital privacy

Digital privacy, also known as internet privacy, is the concept of passing information,
data, messages, and files over the internet without leaking to undesired individuals. It is
the control of information about yourself or your business. This concept is achieved
through a set of strategies and technologies to protect private information and
communication from leaking to the public.

Digital privacy is basically the protection of information on the internet. It is the practice
of using the internet privately without leaking or compromising information. It applies in
various contexts, from data to messages and private communications.

With the digital privacy definition, it’s necessary to explore the categories of digital
privacy, its importance, and how individuals and organizations can keep their information
private.

Digital privacy centers on the fact that using digital mediums to conduct affairs, whether
personal or professional, can leave digital footprints. For example, many Internet users
don't realize that information about them and their Internet usage habits are constantly
being logged and stored.

3.1. Important of digital privacy

Digital privacy is essential for various reasons. No one wants to share details of their
personal life with strangers. Data gathered and shared without consent can be detrimental
when used maliciously or against you.

It’s vital to safeguard critical information such as personal data, address, medical records,
tax information, etc from being used in the wrong way. This information can be used to
perform identity theft or other malicious activities.

Without taking the right precautions towards your digital information, you may suffer all
sorts of frauds and online attacks. Cybercriminals roam freely on the internet, looking for
vulnerable information that they can easily steal. To avoid leaking valuable information,
it’s essential to ensure maximum digital privacy at all times.

Digital privacy is important because it gives you control over your identity and personal information.
Without that control, anyone with the intention and means can manipulate your identity to serve their
goals, whether it is selling you a more expensive vacation or stealing your savings.

What is Digital Privacy? Definition and Best Practices

Digital Privacy March 3, 2021

4. Information privacy

Information privacy is the practice of sharing information without leaking to unwanted


individuals. It is the relationship between how data is collected and disseminated between
entities.

Information privacy intends to protect data shared online from malicious access.
However, the rise of computing and networking has changed how information is
exchanged online. This information could be business files, downloads, customer data,
and much more.

5. Communication Privacy

This is the concept that individuals ought to communicate digitally with their
communications secure and private. Messages and communications are only accessible to
the intended recipient.

In some instances, the communications can be intercepted without the sender’s


knowledge, leading to a privacy breach. Also, the communications can be delivered to the
wrong recipient without the sender’s knowledge. Therefore, communications privacy is
about protecting communications from messages and calls to online meetings.

6. Individual privacy

Individual privacy is all about ensuring individual information remains private. This may
include health, financial, or even location information. Internet users can proactively use
tools such as VPN and routing to remain anonymous.

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy