An Ethical Approachto Data Privacy Protection
An Ethical Approachto Data Privacy Protection
An Ethical Approachto Data Privacy Protection
net/publication/338331380
CITATIONS READS
15 1,965
3 authors, including:
Wanbil Lee
The Computer Ethics Society
17 PUBLICATIONS 150 CITATIONS
SEE PROFILE
Some of the authors of this publication are also working on these related projects:
All content following this page was uploaded by Wanbil Lee on 22 January 2020.
Wanbil W. Lee, DBA, FBCS, FHKCS, FHKIE, FIMA Data Privacy Protection
Is principal director of Wanbil & Associates, founder and president of
The Computer Ethics Society, and cofounder and Life Fellow of the Indeed, protecting data privacy is urgent and
Hong Kong Computer Society. He serves on committees of several complex. This protection is necessary because
professional bodies, editorial boards and government advisory of the ubiquity of the technology-driven and
committees. He has held professorial and adjunct appointments in a
information-intensive environment. Technology-
number of universities. His expertise is in information systems, and he
has a strong interest in information security management, information driven and information-intensive business operations
systems audit and ethical computing. are typical in contemporary corporations. The
benefits of this trend are that, among other things,
Wolfgang Zankl, Ph.D. the marketplace is more transparent, consumers
Is a professor of private and comparative law at the University of Vienna are better informed and trade practices are more
(Austria) and associate lecturer for social media law at the Quadriga fair. The downsides include socio-techno risk, which
University (Berlin, Germany). He founded and runs the European Center originates with technology and human users (e.g.,
for E-commerce and Internet Law (e-center.eu) and is a board member of identity theft, information warfare, phishing scams,
The Computer Ethics Society. cyberterrorism, extortion), and the creation of more
opportunities for organized and sophisticated
Henry Chang, CISM, CIPT, CISSP, DBA, FBCS cybercriminals to exploit. This risk results in
Is an adjunct associate professor at the Law and Technology Centre, the
University of Hong Kong. Chang is an appointed expert to the Identity information protection being propelled to the top of
Management and Privacy Technologies Working Group (SC27 WG5) of the corporate management agenda.
the International Organization for Standardization (ISO). His research
interests are in technological impact on privacy, accountability and Asia The need for data privacy protection is also urgent
privacy laws. due to multidirectional demand. Information
6. Openness Principle
8. Accountability Principle
• DPP1 explains that the collection of personal • DPP4 states that organizations should implement
data must be fair and that personal data collected reasonable security protection on the collected
should not be excessive. Whether the collection personal data to prevent data leakage. While
is fair and excessive will have to be assessed leaving aside the decision on how many resources
under the circumstance. Given that fairness and and how much effort an organization should use
excessiveness for one person may not be the to protect the personal data collected, DPP4 asks
same for another person, there is, inevitably, organizations to balance the resources and effort
a judgment involved in the assessment. That against the likely harm to individuals.