Module 3 - 2 MIS - Ethical Issues and Privacy
Module 3 - 2 MIS - Ethical Issues and Privacy
Module 3 - 2 MIS - Ethical Issues and Privacy
Information technology
- > Collects, stores, integrates and retrieves
data and information
Computer Monitoring
Computer Matching
PRIMARY ACCURACY :Relates to the responsibility of those who collect the data is correct
3.SPREADING INACCURATE
INFORMATION
How our Personal
Information Gets
Revealed?
When surfing the
internet, avoid “free”
offers and protect your
information!
Chatting – guard
Beware of phishing, which your information unless
are fake e-mails Sent to try
to gain You are 100%
your personal and
Sure who you are
financial information.
chatting with.
Protect your
privacy
on the Web
Cookies aren’t just for
Don’t even eating, they may be
open Spam, download sending your
a spam buster! personal information
to others.
Many people believe that, while using the web, little can be done to invade their
privacy. This is called the illusion of anonymity
Firewalls
Encryption tools
Developed by the World Wide Web
Consortium (W3C)
2. Plagiarism
• Gives content creators the right to control the
use and distribution of their work.
Example of materials :
• Paintings , books , music, films , video games.