CS Unit 5
CS Unit 5
Data Privacy:
Data privacy, also known as information privacy, is a part of data protection that
focuses on ensuring the proper handling of data in accordance with data
protection regulations. This includes how data is collected, stored, managed, and
shared with third parties.
- Data Privacy:
- Focuses on individuals' rights and preferences regarding their personal data,
including how it is collected, processed, shared, and archived.
- Governs how organizations handle personal data in line with legal and ethical
standards.
- Data Security:
- Involves measures to protect data from unauthorized access, alteration,
deletion, or disclosure.
- Aims to prevent data breaches or cyber-attacks by implementing safeguards
such as access control, encryption, and network security.
In summary, data privacy emphasizes individuals' control over their personal data
and compliance with laws, while data security focuses on protecting data from
malicious attacks and unauthorized access. Both are essential for responsible data
management.
Data Breach:
A data breach occurs when there is a security violation where sensitive, protected,
or con dential data is accessed, copied, transmitted, viewed, or used by an
unauthorized individual.
These types of attacks can have serious implications for data privacy, leading to
theft or loss of sensitive information and potentially causing signi cant harm to
individuals and organizations.
Data Linkage:
Data linking is the process of combining datasets to maximize the use of the
information they contain. By linking di erent sets of data, we can create a more
comprehensive and useful dataset.
Data pro ling techniques are grouped into three major categories:
1. Structure Discovery:
fi
fi
fi
ffi
ffi
fi
ff
fl
fi
- Also known as structure analysis, this process validates that the data is
consistent and formatted correctly.
2. Content Discovery:
- This involves closely examining individual elements of the database to assess
data quality. It helps identify areas with null values or incorrect and ambiguous
values.
3. Relationship Discovery:
- This method seeks to understand the connections between datasets and
identify how data is being used.
Data pro ling tools help improve data quality through four main methods:
Privacy Policy:
A privacy policy is a legal document that explains how a party collects, uses,
discloses, and manages a customer or client's data. This policy is essential for
ensuring the privacy and protection of customer information and is often required
by law.
1. Accessibility:
- The policy should be clear and easy to access for customers and clients.
3. Purpose of Collection:
- The policy should explain the purpose of collecting and using the information.
4. Disclosure of Information:
- The policy should outline how information, including sensitive personal data, is
shared.
5. Security Practices:
- The policy should detail the reasonable security measures and procedures the
organization adopts to protect the data.
fi
fi
Elements of a Privacy Policy:
1. Consent:
- Consent is a crucial component of a privacy policy. The policy should specify
how consent for data collection and processing is obtained from customers.
3. Disclosure of Information:
- It should state how and with whom the data may be shared, if applicable.
4. Security Practices:
- The policy should detail the security measures the organization uses to
safeguard customer data, such as encryption and access controls.
Privacy policy languages play a signi cant role in managing privacy policies across
di erent stages, including writing, reviewing, testing, approving, issuing,
combining, analyzing, modifying, withdrawing, retrieving, and enforcing policy.
These languages were created to express the privacy controls that both
organizations and users want to convey. They were designed for speci c purposes
and have unique features and characteristics. Most of the e orts to develop these
languages have taken place in the last decade.
- In 1997, the World Wide Web Consortium (W3C) started developing the Platform
for Privacy Preferences (P3P) to express website privacy policies in a machine-
readable format.
ff
fi
ff
fi
- Along with P3P, W3C also created the P3P Preference Exchange Language
(APPEL) in 1997. APPEL is used to express an individual's privacy preferences,
query P3P data, and make decisions accordingly.
- Later, the industry recognized the need for languages that could express internal
privacy policies for organizations. In response, IBM developed the Enterprise
Privacy Authorization Language (EPAL) in 2003.
- Other initiatives like DPAL and XPref emerged in 2003 and 2004. Technological
advancements and the rapid adoption of pervasive computing further emphasized
the need for e ective privacy policy languages.
Joint Commissioner of Police (Crime) Rakesh Maria reported that access to the
website, www.maharashtra.gov.in, was temporarily blocked due to the hack, which
included Arabic content posted by the attacker. The IT department lodged an FIR,
and authorities are working to identify the hacker. It's suspected that an
international hacker group is responsible for all four attacks.
The website was compromised late on Monday night by a person or group using
the alias "coolhacker," who left an imprint of a hand on the website. The state's IT
department discovered the hacking on Tuesday morning and immediately
restricted access to the site.
Despite the attack, state o cials con rmed that no data was lost, and the website
did not su er signi cant damage. The site is updated daily with information on
government regulations and decisions and links to various government
departments. The hacker only managed to damage the homepage, and restoration
work is underway.
Government’s Observations:
- The government noted that some betting and gambling platforms were using
outdoor media like hoardings, posters, and auto-rickshaw branding to promote
their services.
- Such advertisements were found to be misleading and not in strict adherence to
the Consumer Protection Act 2019.
- Betting and gambling are illegal in most parts of the country, posing nancial and
social risks to consumers, especially the youth and children.
- The government has objected to promoting a speci c betting platform that
appeared to violate the Copyright Act by encouraging people to watch a sports
league on its website.
Way Forward:
Online gambling poses challenges that require regulatory and policy solutions to
ensure fair and responsible gambling. Given the complex legal landscape in India,
individuals should be aware of their state's laws and participate only in licensed
online gambling activities.
ffi
fi
fi
fi