MSc-IT Study Material
June 2010 Edition

Computer Science Department, University of Cape Town
| MIT Notes Home | Edition Home |

Chapter 5. Privacy

Table of Contents

Scenarios
Scenario 1: Fund Raising and Potential Donors
Scenario 2: Taking work home
Scenario 3: Workplace Monitoring
Scenario 4: Data Mining
Is there anything new here?
Max’s case
Access to data
Understanding the ‘Computer and Privacy’ Issue
Personal Privacy
Individual – Organisational Relationships
Global Perspective
Proposal for better Protection
Effects of IT on recording keeping
Privacy Issues in the workplace
Arguments for of Computer Monitoring in the Workplace
Arguments against Computer Monitoring in the Workplace
Interception Act versus Privacy Act (South Africa)
The Interception Act
The Privacy Act
Protect Your Online Privacy
Do not reveal personal information inadvertently
Turn on cookie notices in your Web browser, and/or use cookie management software
Keep a "clean" e-mail address
Don't reveal personal details to strangers or just met "friends"
Beware sites that offer some sort of reward or prize in exchange for your contact or other information
Do not reply to spammers, for any reason
Be conscious of Web security
Be conscious of home computer security
Examine privacy policies and seals
Remember that YOU decide what information about yourself to reveal, when, why, and to whom
Use encryption
More on Encryption
PGP (Pretty Good Privacy)
How It Works
Where Can You Use PGP

Scenarios

Scenario 1: Fund Raising and Potential Donors

Jan studies computer science at university but does not major in it. She wishes to be involved in public service and so accepts a fund-raising job for a big university. She is asked to get information on Frank – a potential donor. Frank has been recommended by another donor who said that Frank is keen on providing some funds to the university but has not previously donated to this university.

Jan was asked to find out about all the information on Frank, with special focus on his wealth and the likely area where Frank will be most keen. Using the Internet and databases, Jan was able to find out the following:

  • Via a public database, his board memberships

  • Via databases of associated organisations, contributions he has made to others and his support for any religious organisations

  • Newspaper archives – information written about Frank

  • Governmental records – if he has had any encounter with the law

  • Credit card agencies – his credit history

Other routes that Jan tried to get information include:

  • Contacting Amazon.com about the types of books he read

  • Wonders if his ISP will tell her about his online activities

  • From the university records she finds that he was treated at the university hospital.

  • She finds that she can access his medical records and discovers that he was treated successfully for a kidney complaint

She then proceeds to recommends that he be approached for a donation for kidney research.

Activity 1

Discuss whether or not you think she has done anything wrong?

Scenario 2: Taking work home

Max works for a government department working against alcoholism and drug abuse. The department maintains a database of people with these problems. Max’s job is to track the success or failure of treatment programs. He has to prepare a report indicating:

  • Number of clients seen per month in each program

  • Length of client treatment

  • Criminal history of clients

  • Distribution addresses

He gets this information from various databases located in different locations. To do this, he downloads information to his computer in his office, then copies the data to a portable hard drive and takes that home to finish his report there. However, he also leaves a copy of the information and the report on his machine at home.

Activity 2

Is he wrong to move the data to his house and is he wrong to leave the data there when he is done with the report. What policy should Max’s agency have concerning taking work home? Discuss.

Scenario 3: Workplace Monitoring

Estelle works for Medical Insurance Company. She supervises the claims department and her brief is to improve efficiency there – each unit must process a minimum number of claims per day. In order to achieve this goal, she installs a software system which monitors:

  • The number of claims processed by each clerk

  • Number of keystrokes done by each clerk

  • Log information on when each clerk is on or off his/her post

The system allows her to watch all the above information in real-time on her screen. She can also see all e-mails sent by each clerk regardless of whether the e-mail is business-related or not.

Activity 3

Should she use this system and if so should each of the clerk be informed? Do you think any limitations should be placed on companies employing such systems? Discuss.

Scenario 4: Data Mining

Ravi works for a credit card company, developing new products. He read about data mining and convinces his supervisor to buy this tool. With this tool Ravi can get information on customers’ buying habits, as well as finds out postal codes correlation to loan defaults. Based on this new information a new policy can be formulated resulting in his company refusing credits to clients in ‘bad’ postal code areas. Doing this could reduce his company’s exposure to bad loans.

Ravi also discovers that Zoroastrians who donate to charity charges a substantial amount to their credit cards. He promptly recommends a new policy of soliciting more Zoroastrians for credit card in hope of increasing his company’s profit.

Activity 4

Are either of these two recommendations wrong? What about the way Ravi use these information? Is the company wrong by implement these policies? Discuss.