Desktop Research

Improved Essays
Keeping the personal records and fingerprint make sense as it will help to control alcohol related violence inside the pubs and clubs. On the other hand it raises privacy issue as there are chances for personal information leaking. Customers should be informed about the information they are keeping as well as the purpose of that. No information should be stored without letting the customers know about the content and purpose.
The main purpose of this paper is to analyze the impact on privacy and security issue of the use of fingerprint scanner with facial recognition with identity information in the pubs and clubs from ethical point of view. Desktop research method has been used for this research. Relevant journal articles, news, academic research paper and ethical documents have been reviewed to develop this research paper.
Considering the deontological theory, this feature is ethical as it is the duty of the particular venue to keep record who visits them in order to maintain the security (Bentham, 1983). On the contrary, same feature may create privacy issue for the visitors of that venue as they provide their personal information
…show more content…
Besides, cultivating the philosophical ethics and treating others as we want to be treated (golden rule) can aid to minimize the complexity of this issue (Wattles, 1997). For example, if we consider ourselves in the situation of a customer, would we like our information to be leaked out and our privacy interrupted? The architecture of the database and the law can solve this issue to some extent (Tavani, 1999). However, if the company is still misusing customer personal information, any of the staff can blow the whistle to outside world obviously after giving them an warning about the use of the data in wrong purposes (Near & Miceli,

Related Documents

  • Improved Essays

    Information privacy is the major issue in the current generation. People are more concerned about their convenience along with security. For example if the car breaks downs, one can push a button and the On-star operator will provide help by tracking the location of the car. This situation explains how conveniently one get the service immediately. On the other hand, we are not sure who is tracking our car location and is there any harm caused by that person.…

    • 347 Words
    • 2 Pages
    Improved Essays
  • Decent Essays

    Nt1330 Unit 1 Assignment

    • 448 Words
    • 2 Pages

    SIGN IN: CONTEXT SELECTION +*Description +* As a Box Office Manager, I want to select the database context, so that I would not have to type in the context ID when signing in to the application. +*Rationale + *…

    • 448 Words
    • 2 Pages
    Decent Essays
  • Superior Essays

    The first being the security of personally identifiable information. Now in this instance the company itself is not fully responsible for this release but they are indirectly responsible. The hackers are directly responsible for the dissemination of the users personal data but the company could have avoided this incident by shutting down but chose not to which directly constitutes a breach of privacy and security proposed by the company to protect the users information. The next issue is the release of users information that paid the company the fee of $19 to delete their information. The company decided not to delete the users information for some reason from their servers.…

    • 1516 Words
    • 7 Pages
    Superior Essays
  • Decent Essays

    Random people should not be able to track nor scan other peoples license plates. In the articles "Who Has the right to track you" by David Sirota and "Private License Plate Scanners Amassing Vast Databases Open to Highest Bidders” claims that when it comes to personal privacy, companies need personal records. In both articles "privacy advocates say the datapoints gleaned by the scanners pose a highly intrusive risk to the public."…

    • 249 Words
    • 1 Pages
    Decent Essays
  • Improved Essays

    Hrm/531 Week 2

    • 636 Words
    • 3 Pages

    Every business is required by law to have some form of security policy in place that will protect their customer’s information. How robust these policies are, may, and do, differ from company to company and can depend on many different factors unique to each individual business. Information security is very important and at my widget company it would be my responsibility and ethical duty to do everything in my power to find out how my system was breached and exactly what customers information was compromised as well as who is responsible for taking this information. I would also be ethically responsible for finding out which employees have not been adhering to the company's security policy and accessing customer information when it was not part of their duties, and under what circumstances this happened. Where these employees instructed to do this or did the do it of their own accord and if so reprimand these individuals up to and including termination of their employment with my company.…

    • 636 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Loo1 Unit 2 Research Paper

    • 1344 Words
    • 6 Pages

    Blackboard Name: Sanya Murgai PSID: 1264832 LO1: Discuss information privacy and methods for improving the privacy of information. LO2: Explain the effects on information privacy of e-mail, data collection, and censorship. In today’s day and age, privacies definition can be manipulated to personal preferences. Once we put something on the internet, it will be accessible forever even if we delete it.…

    • 1344 Words
    • 6 Pages
    Improved Essays
  • Decent Essays

    Unlike many other biometrics, face recognition is a Passive process that doesn't need the user's cooperation; this characteristic makes the face recognition very valuable for the surveillance and crimes solution purposes. But there are some drawbacks with face first: the face features are not permanent, it changes over age. Second: It is not accurate for Identical twins.…

    • 294 Words
    • 2 Pages
    Decent Essays
  • Improved Essays

    IT security threats and cryptography 7/A. P1: Explain the different security threats that can affect the IT systems of originations. 7/A.M1: Assess the impact that IT security threats can have on organization's IT systems and business whilst taking account of the principles of information security and legal requirements In today's society data is a very valuable thing companies have to take in to account how to protect that data from the threats, Threats is a way in which the data is vulnerable and therefore rules and regulations have been put in place to stop these potential threats for example all will have adhere to the principles of information security this is a way in which data is protected, I have been working for a start-up company…

    • 1332 Words
    • 6 Pages
    Improved Essays
  • Improved Essays

    In this paper the topics about ethics and privacy are going to be the main topics of discussion. Two businesses are going to be used in order to give examples about ethics and privacy. The bank Wells Fargo is going to be used to explained bad ethics and bad privacy. Wells Fargo has failed the code of ethics, and also violated their costumer’s privacy, because they used information that should have been used without the customer’s consent. The company Nike is going to be used to represent good ethics and good privacy, and what they do in order to be the amazing company they are today.…

    • 1272 Words
    • 6 Pages
    Improved Essays
  • Great Essays

    Why Collect HR Data

    • 1110 Words
    • 5 Pages

    Data Protection Act This act applies to all organisations that process data relating to their staff and customers. It is the main legal framework in UK that protects personal data. The act contains 8 data protection principles which are: Personal data should be processed fairly and lawfully, this can be achieved by asking the employees to use their information, on the employment contract.…

    • 1110 Words
    • 5 Pages
    Great Essays
  • Improved Essays

    There has been an increased interest and knowledge in relation to privacy rights and issues. The reason for this is that they are a fundamental right which ensures the personhood of individuals by allowing them to control who has access to personal information about them. Privacy issues are also of importance because it helps individuals avoid unwanted intrusions in their personal dealings. Consequently, for the reason that privacy is such a complex concept, there have been ongoing concerns and discussions in relation to the legal concept of privacy rights. Various theorists have provided their interpretation of privacy which includes an understanding of how privacy rights should be defined as well as what they should protect.…

    • 1075 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    2.1.4.2 Matrices of Variance of Hygiene Rules by Country of Interest Abiding by data and privacy laws across international borders is one of the most difficult aspects of operating as an international business today. There is a plethora of challenges that a company faces when managing data because privacy laws are a dynamic miasma that change from border to border, and year to year. The main data source that is under the most scrutiny of privacy laws and regulations are what is known as personally identifiable information (PII). PII is data that can be traced to an individual person like address, ID number, name, etc. Most data experts agree that the European Union has the most rigorous data protections laws, where all PII use is governed…

    • 1172 Words
    • 5 Pages
    Improved Essays
  • Improved Essays

    The CIA Triad

    • 611 Words
    • 3 Pages

    The first is confidentiality. Confidentiality at its most basic means that information is known only by those for whom it’s intended. When a company neglects confidentiality, a violation of trust ensues. Take for instance, the many companies (from Target to Home Depot) who have disclosed that customer information was stolen from their databases. While that customer…

    • 611 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Back-Sourcing: The term “Back-Sourcing” is defined as the process of bringing IT operations and services back in-house after they have been outsourced once the outsourcing contract expires or terminated for any specific reason. Of course, this may have a positive or negative influence on how such a strategic movement change will affect the innovation and the future of the organization. There is also an evidence to mention, that the organization whom implementing such a change in strategy are doing it due to low expectations of the level of innovation delivered through the existing bid with the IT services vendors. Such a dissatisfaction in this engagement is due to many reasons such as poor structure contract, negative and disagreement relationship…

    • 1224 Words
    • 5 Pages
    Improved Essays
  • Improved Essays

    In this paper the writer will consider the moral and ethical implications of reverse engineering, competitive intelligence, and corporate espionage. This is a moral issue because it involves many facets and perspectives in which morality may be derived, justified, or altogether ill applied. Especially with respect to military projects in which corporate secretes may become important, and perhaps from a national security point of view, vital. This issue is relevant, especially in the in the modern age, because of the ease of access in which sensitive material may be gained. It must be noted that corporate espionage and reverse engineering knows no borders.…

    • 1663 Words
    • 7 Pages
    Improved Essays

Related Topics