SlideShare una empresa de Scribd logo
1 de 2
Descargar para leer sin conexión
Greater respect for privacy deters leaks of personal information
http://m.koreatimes.co.kr/phone/news/view.jsp?req_newsidx=152538
The Korea Times
March 3, 2014
By Matthew Daniels
The cause of recent massive personal information leakage involving card companies in Korea is not
only in a poor risk management system. Korea needs to look at the deeper source of this long-
standing problem of information leakage which continues to resurface.
A business culture that demands excessive amounts of personal information
from those who apply for bank accounts or credit cards represents a violation of
the privacy rights of consumers.
As the most widely respected human rights document in history, the Universal
Declaration of Human Rights (Article 12) states that no one shall be subjected
to arbitrary interference with his privacy, family, home or correspondence. It
says everyone has the right to the protection of the law against such
interference or attacks.
The right of privacy originates in the view that ordinary human beings are endowed with dignity that
demands the recognition and protection of certain fundamental rights such as privacy. Those rights
are not a privilege given by the government or the business community. They are important to
empower ordinary people to protect themselves and their affairs from those in authority.
In the digital age, the right to privacy is being eroded because of large, powerful institutional actors
that can build and manipulate massive databases. Some governments and corporations are defining
the operative legal standards in this area in a way that serves their interests and often deprives
consumers and the public of their right to privacy.
Human rights that are critical to democratic society are being redefined in our digital culture with law
and legal standards struggling to catch up with technology. The norms and standards for privacy are
being set by those with the power to collect, store and manipulate consumer data but with little or no
reference to important human rights norms. So the law and business culture in Korea must catch up
with technology if human rights are to be protected to minimize future incidents of privacy breach.
Human rights exist to protect the weak against the strong, the poor against the powerful, and in the
information age, the technologically vulnerable from those with the power to store vast amounts of
data such as the government and corporations.
Matthew Daniels is the
founder of non-profit
organization, Good of
All.
We can assume that the profit motive of businesses will always lead them to maximize the degree to
which they capture and store consumer data. So laws and society must set norms that limit
corporations to collecting only data that is necessary for them to provide a specific product or service
that the consumer seeks to purchase. Even worse, the principle that “whatever is stored can be
stolen” is an axiom of the digital age. So the storage of large amounts of private data by corporations
guarantees that some of the data will be stolen in the future.
Privacy is a human right and must be treated as such. This is the only foundation for meaningful,
long-term reform of a problem that continues to plague Korea and other technologically advanced
societies. Among the highly developed free nations, Korea is the poster child for corporate abuse of
privacy rights in the same way that the U.S. has become the poster child for government abuse of
privacy rights. As the most digitally wired nation in the world, Korea is and will be a global trend setter
in the critical area of rights of privacy online. So policies and practices in Korea will influence online
privacy trends worldwide.
The government should ban and impose financial penalties upon companies that require consumers
to provide excessive amounts of personal information. Some companies will continue to pressure
consumers until they are faced with an economic incentive to do otherwise.
At the same time, consumers should call attention to companies that treat the public poorly in this
way; and companies that respect the privacy of consumers need to be rewarded with more business
— in the same way that "green" companies are rewarded because they don’t pollute the environment
that consumers and their families live in.
Korea is the “canary in the coal mine” for privacy rights.Miners often carried canaries with them to
warn againsttoxic gas in the air when going into coal mines.As a digital leader, how Korea handles
privacy issues will set a standard for other countries around the world with respect to privacy rights in
the Digital Age.
Matthew Daniels is the founder of non-profit organization Good of All, a global movement to educate
the public on human rights in digital age. Good of All exist to promote the most fundamental freedoms
enshrined in the Universal Declaration of Human Rights (United Nations 1948).

Más contenido relacionado

La actualidad más candente

ethical,social and poltical issues in E-commerce
ethical,social and poltical issues in E-commerceethical,social and poltical issues in E-commerce
ethical,social and poltical issues in E-commerceraviteja reddy
 
Public policy legal issues to privacy
Public policy legal issues to privacyPublic policy legal issues to privacy
Public policy legal issues to privacyMuneeb Ahmed
 
Regulating code
Regulating codeRegulating code
Regulating codeblogzilla
 
Legal instrumentation in e commerce
Legal instrumentation in e commerceLegal instrumentation in e commerce
Legal instrumentation in e commerceUjjwal Joshi
 
Presentation master facebook
Presentation master   facebookPresentation master   facebook
Presentation master facebookZalidanish
 
Legal issues in technology
Legal issues in technologyLegal issues in technology
Legal issues in technologyWillislwhite12
 
Cyber law and introduction for undergrad
Cyber law and introduction for undergradCyber law and introduction for undergrad
Cyber law and introduction for undergradAzmawati Lazim
 
Legal social ethical
Legal social ethicalLegal social ethical
Legal social ethicalSheetal Verma
 
Cyber crime:The Transformation Of Crime In The Information Age.
Cyber crime:The Transformation Of Crime In The Information Age.Cyber crime:The Transformation Of Crime In The Information Age.
Cyber crime:The Transformation Of Crime In The Information Age.Omkar Walavalkar
 
Carlos Moreira Cyber Security Round-table Moderation in NY 2014 M&A Advisory ...
Carlos Moreira Cyber Security Round-table Moderation in NY 2014 M&A Advisory ...Carlos Moreira Cyber Security Round-table Moderation in NY 2014 M&A Advisory ...
Carlos Moreira Cyber Security Round-table Moderation in NY 2014 M&A Advisory ...Creus Moreira Carlos
 
The regulatory environment of electronic commerce
The regulatory environment of electronic commerceThe regulatory environment of electronic commerce
The regulatory environment of electronic commerceWisnu Dewobroto
 
social, legal and ethical issues of e-commerce..
social, legal and ethical issues of e-commerce..social, legal and ethical issues of e-commerce..
social, legal and ethical issues of e-commerce..home based
 
E – COMMERCE AND CONSUMER RIGHTS
E – COMMERCE AND CONSUMER RIGHTSE – COMMERCE AND CONSUMER RIGHTS
E – COMMERCE AND CONSUMER RIGHTSKenneth Muhangi Esq.
 

La actualidad más candente (20)

ethical,social and poltical issues in E-commerce
ethical,social and poltical issues in E-commerceethical,social and poltical issues in E-commerce
ethical,social and poltical issues in E-commerce
 
Lawek mui
Lawek muiLawek mui
Lawek mui
 
E Marketing Ch5 Ethical Legal
E Marketing Ch5 Ethical LegalE Marketing Ch5 Ethical Legal
E Marketing Ch5 Ethical Legal
 
Cyber law
Cyber lawCyber law
Cyber law
 
Public policy legal issues to privacy
Public policy legal issues to privacyPublic policy legal issues to privacy
Public policy legal issues to privacy
 
Regulating code
Regulating codeRegulating code
Regulating code
 
Legal instrumentation in e commerce
Legal instrumentation in e commerceLegal instrumentation in e commerce
Legal instrumentation in e commerce
 
Presentation master facebook
Presentation master   facebookPresentation master   facebook
Presentation master facebook
 
Legal issues in technology
Legal issues in technologyLegal issues in technology
Legal issues in technology
 
Cyber law and introduction for undergrad
Cyber law and introduction for undergradCyber law and introduction for undergrad
Cyber law and introduction for undergrad
 
Legal social ethical
Legal social ethicalLegal social ethical
Legal social ethical
 
Com 300 dl
Com 300 dlCom 300 dl
Com 300 dl
 
Cyber crime:The Transformation Of Crime In The Information Age.
Cyber crime:The Transformation Of Crime In The Information Age.Cyber crime:The Transformation Of Crime In The Information Age.
Cyber crime:The Transformation Of Crime In The Information Age.
 
Legal challenges in E-commerce
Legal challenges in E-commerce Legal challenges in E-commerce
Legal challenges in E-commerce
 
L3 presentation14
L3 presentation14L3 presentation14
L3 presentation14
 
Carlos Moreira Cyber Security Round-table Moderation in NY 2014 M&A Advisory ...
Carlos Moreira Cyber Security Round-table Moderation in NY 2014 M&A Advisory ...Carlos Moreira Cyber Security Round-table Moderation in NY 2014 M&A Advisory ...
Carlos Moreira Cyber Security Round-table Moderation in NY 2014 M&A Advisory ...
 
E commerce
E commerceE commerce
E commerce
 
The regulatory environment of electronic commerce
The regulatory environment of electronic commerceThe regulatory environment of electronic commerce
The regulatory environment of electronic commerce
 
social, legal and ethical issues of e-commerce..
social, legal and ethical issues of e-commerce..social, legal and ethical issues of e-commerce..
social, legal and ethical issues of e-commerce..
 
E – COMMERCE AND CONSUMER RIGHTS
E – COMMERCE AND CONSUMER RIGHTSE – COMMERCE AND CONSUMER RIGHTS
E – COMMERCE AND CONSUMER RIGHTS
 

Destacado

IYOR Celebration Luncheon Part 2
IYOR Celebration Luncheon Part 2IYOR Celebration Luncheon Part 2
IYOR Celebration Luncheon Part 2changingtides
 
Business Analysis Training in Kochi, Ernakulam
Business Analysis Training in Kochi, ErnakulamBusiness Analysis Training in Kochi, Ernakulam
Business Analysis Training in Kochi, ErnakulamRadiant Business Solutions
 
Ute.diversidad.en.el.aula.vz (2)
Ute.diversidad.en.el.aula.vz (2)Ute.diversidad.en.el.aula.vz (2)
Ute.diversidad.en.el.aula.vz (2)Veronica Zabala
 
NP Propuestas Pleno
NP Propuestas PlenoNP Propuestas Pleno
NP Propuestas PlenoUPyD Getafe
 
Evolucion de los_recursos_en_la_tecnologia_educativa
Evolucion de los_recursos_en_la_tecnologia_educativaEvolucion de los_recursos_en_la_tecnologia_educativa
Evolucion de los_recursos_en_la_tecnologia_educativaNARVISITA
 
Understanding the Enterprise
Understanding the EnterpriseUnderstanding the Enterprise
Understanding the Enterpriseevancmiller
 
Quiet On The Set
Quiet On The SetQuiet On The Set
Quiet On The SetTheBradZ
 
Monitoring plans within white certificate scheme
Monitoring plans within white certificate schemeMonitoring plans within white certificate scheme
Monitoring plans within white certificate schemeDario Di Santo
 
UTE PROBLEMAS FRECUENTES DEL DESARROLLO:
UTE PROBLEMAS FRECUENTES DEL DESARROLLO:UTE PROBLEMAS FRECUENTES DEL DESARROLLO:
UTE PROBLEMAS FRECUENTES DEL DESARROLLO:Valeria Chauca Almeida
 
Trabajos con writer
Trabajos con writerTrabajos con writer
Trabajos con writermanueljuanra
 
Curso adm 515 programacion nerolinguistica aplicada a la atención de usuarios
Curso adm 515   programacion nerolinguistica aplicada a la atención de usuariosCurso adm 515   programacion nerolinguistica aplicada a la atención de usuarios
Curso adm 515 programacion nerolinguistica aplicada a la atención de usuariosProcasecapacita
 
Proyecto Navidad "Christmas Camp"
Proyecto Navidad "Christmas Camp"Proyecto Navidad "Christmas Camp"
Proyecto Navidad "Christmas Camp"miesdevega
 
Trabajo tecnologia 2012 pda
Trabajo tecnologia 2012 pdaTrabajo tecnologia 2012 pda
Trabajo tecnologia 2012 pdagaredo
 

Destacado (20)

Wink 3
Wink 3Wink 3
Wink 3
 
IYOR Celebration Luncheon Part 2
IYOR Celebration Luncheon Part 2IYOR Celebration Luncheon Part 2
IYOR Celebration Luncheon Part 2
 
Business Analysis Training in Kochi, Ernakulam
Business Analysis Training in Kochi, ErnakulamBusiness Analysis Training in Kochi, Ernakulam
Business Analysis Training in Kochi, Ernakulam
 
Ute.diversidad.en.el.aula.vz (2)
Ute.diversidad.en.el.aula.vz (2)Ute.diversidad.en.el.aula.vz (2)
Ute.diversidad.en.el.aula.vz (2)
 
NP Propuestas Pleno
NP Propuestas PlenoNP Propuestas Pleno
NP Propuestas Pleno
 
Utec napster
Utec napsterUtec napster
Utec napster
 
Utah-Saudi Trade and Investment Trends
Utah-Saudi Trade and Investment TrendsUtah-Saudi Trade and Investment Trends
Utah-Saudi Trade and Investment Trends
 
Utgångspunkt röbäck
Utgångspunkt röbäckUtgångspunkt röbäck
Utgångspunkt röbäck
 
Evolucion de los_recursos_en_la_tecnologia_educativa
Evolucion de los_recursos_en_la_tecnologia_educativaEvolucion de los_recursos_en_la_tecnologia_educativa
Evolucion de los_recursos_en_la_tecnologia_educativa
 
Buscadores2
Buscadores2Buscadores2
Buscadores2
 
Understanding the Enterprise
Understanding the EnterpriseUnderstanding the Enterprise
Understanding the Enterprise
 
Quinton Q-tel Telemetry PPT
Quinton Q-tel Telemetry PPTQuinton Q-tel Telemetry PPT
Quinton Q-tel Telemetry PPT
 
Quiet On The Set
Quiet On The SetQuiet On The Set
Quiet On The Set
 
Monitoring plans within white certificate scheme
Monitoring plans within white certificate schemeMonitoring plans within white certificate scheme
Monitoring plans within white certificate scheme
 
UTE PROBLEMAS FRECUENTES DEL DESARROLLO:
UTE PROBLEMAS FRECUENTES DEL DESARROLLO:UTE PROBLEMAS FRECUENTES DEL DESARROLLO:
UTE PROBLEMAS FRECUENTES DEL DESARROLLO:
 
Trabajos con writer
Trabajos con writerTrabajos con writer
Trabajos con writer
 
Curso adm 515 programacion nerolinguistica aplicada a la atención de usuarios
Curso adm 515   programacion nerolinguistica aplicada a la atención de usuariosCurso adm 515   programacion nerolinguistica aplicada a la atención de usuarios
Curso adm 515 programacion nerolinguistica aplicada a la atención de usuarios
 
Proyecto Navidad "Christmas Camp"
Proyecto Navidad "Christmas Camp"Proyecto Navidad "Christmas Camp"
Proyecto Navidad "Christmas Camp"
 
Domestic Violence Homicide Report
Domestic Violence Homicide ReportDomestic Violence Homicide Report
Domestic Violence Homicide Report
 
Trabajo tecnologia 2012 pda
Trabajo tecnologia 2012 pdaTrabajo tecnologia 2012 pda
Trabajo tecnologia 2012 pda
 

Similar a Korea times 3 3-14

PRIVACY RIGHTS ARE HUMAN RIGHTS (2).pdf
PRIVACY RIGHTS ARE HUMAN RIGHTS (2).pdfPRIVACY RIGHTS ARE HUMAN RIGHTS (2).pdf
PRIVACY RIGHTS ARE HUMAN RIGHTS (2).pdflinda gichohi
 
CS4001 Final Ethics Paper
CS4001 Final Ethics PaperCS4001 Final Ethics Paper
CS4001 Final Ethics PaperGino McCarty
 
Invasion Of Privacy In Canadian Media
Invasion Of Privacy In Canadian MediaInvasion Of Privacy In Canadian Media
Invasion Of Privacy In Canadian MediaKelly Ratkovic
 
National Consumers League's 2015 Cybersecurity Policy Agenda
National Consumers League's 2015 Cybersecurity Policy AgendaNational Consumers League's 2015 Cybersecurity Policy Agenda
National Consumers League's 2015 Cybersecurity Policy Agendanationalconsumersleague
 
Ethical issues and social issues related to systems upload
Ethical issues and social issues related to systems uploadEthical issues and social issues related to systems upload
Ethical issues and social issues related to systems uploadwaiforchi Wagiteerhh
 
Age Friendly Economy - Legislation and Ethics of Data Use
Age Friendly Economy - Legislation and Ethics of Data UseAge Friendly Economy - Legislation and Ethics of Data Use
Age Friendly Economy - Legislation and Ethics of Data UseAgeFriendlyEconomy
 
httpsdigitalguardian.comblogsocial-engineering-attacks-common.docx
httpsdigitalguardian.comblogsocial-engineering-attacks-common.docxhttpsdigitalguardian.comblogsocial-engineering-attacks-common.docx
httpsdigitalguardian.comblogsocial-engineering-attacks-common.docxadampcarr67227
 
Ericsson ConsumerLab: Personal Information Economy
   Ericsson ConsumerLab: Personal Information Economy   Ericsson ConsumerLab: Personal Information Economy
Ericsson ConsumerLab: Personal Information EconomyEricsson
 
RIGHT PRACTICES IN DATA MANAGEMENT AND GOVERNANCE
RIGHT PRACTICES IN DATA MANAGEMENT AND GOVERNANCERIGHT PRACTICES IN DATA MANAGEMENT AND GOVERNANCE
RIGHT PRACTICES IN DATA MANAGEMENT AND GOVERNANCEVARUN KESAVAN
 
data privacy.pdf data privacy data privacy
data privacy.pdf data privacy data privacydata privacy.pdf data privacy data privacy
data privacy.pdf data privacy data privacyJohnFelix45
 

Similar a Korea times 3 3-14 (12)

PRIVACY RIGHTS ARE HUMAN RIGHTS (2).pdf
PRIVACY RIGHTS ARE HUMAN RIGHTS (2).pdfPRIVACY RIGHTS ARE HUMAN RIGHTS (2).pdf
PRIVACY RIGHTS ARE HUMAN RIGHTS (2).pdf
 
Internet Privacy Essay
Internet Privacy EssayInternet Privacy Essay
Internet Privacy Essay
 
CS4001 Final Ethics Paper
CS4001 Final Ethics PaperCS4001 Final Ethics Paper
CS4001 Final Ethics Paper
 
Invasion Of Privacy In Canadian Media
Invasion Of Privacy In Canadian MediaInvasion Of Privacy In Canadian Media
Invasion Of Privacy In Canadian Media
 
National Consumers League's 2015 Cybersecurity Policy Agenda
National Consumers League's 2015 Cybersecurity Policy AgendaNational Consumers League's 2015 Cybersecurity Policy Agenda
National Consumers League's 2015 Cybersecurity Policy Agenda
 
Ethical issues and social issues related to systems upload
Ethical issues and social issues related to systems uploadEthical issues and social issues related to systems upload
Ethical issues and social issues related to systems upload
 
Age Friendly Economy - Legislation and Ethics of Data Use
Age Friendly Economy - Legislation and Ethics of Data UseAge Friendly Economy - Legislation and Ethics of Data Use
Age Friendly Economy - Legislation and Ethics of Data Use
 
httpsdigitalguardian.comblogsocial-engineering-attacks-common.docx
httpsdigitalguardian.comblogsocial-engineering-attacks-common.docxhttpsdigitalguardian.comblogsocial-engineering-attacks-common.docx
httpsdigitalguardian.comblogsocial-engineering-attacks-common.docx
 
Ericsson ConsumerLab: Personal Information Economy
   Ericsson ConsumerLab: Personal Information Economy   Ericsson ConsumerLab: Personal Information Economy
Ericsson ConsumerLab: Personal Information Economy
 
RIGHT PRACTICES IN DATA MANAGEMENT AND GOVERNANCE
RIGHT PRACTICES IN DATA MANAGEMENT AND GOVERNANCERIGHT PRACTICES IN DATA MANAGEMENT AND GOVERNANCE
RIGHT PRACTICES IN DATA MANAGEMENT AND GOVERNANCE
 
data privacy.pdf data privacy data privacy
data privacy.pdf data privacy data privacydata privacy.pdf data privacy data privacy
data privacy.pdf data privacy data privacy
 
Digital citizenship
Digital citizenshipDigital citizenship
Digital citizenship
 

Korea times 3 3-14

  • 1. Greater respect for privacy deters leaks of personal information http://m.koreatimes.co.kr/phone/news/view.jsp?req_newsidx=152538 The Korea Times March 3, 2014 By Matthew Daniels The cause of recent massive personal information leakage involving card companies in Korea is not only in a poor risk management system. Korea needs to look at the deeper source of this long- standing problem of information leakage which continues to resurface. A business culture that demands excessive amounts of personal information from those who apply for bank accounts or credit cards represents a violation of the privacy rights of consumers. As the most widely respected human rights document in history, the Universal Declaration of Human Rights (Article 12) states that no one shall be subjected to arbitrary interference with his privacy, family, home or correspondence. It says everyone has the right to the protection of the law against such interference or attacks. The right of privacy originates in the view that ordinary human beings are endowed with dignity that demands the recognition and protection of certain fundamental rights such as privacy. Those rights are not a privilege given by the government or the business community. They are important to empower ordinary people to protect themselves and their affairs from those in authority. In the digital age, the right to privacy is being eroded because of large, powerful institutional actors that can build and manipulate massive databases. Some governments and corporations are defining the operative legal standards in this area in a way that serves their interests and often deprives consumers and the public of their right to privacy. Human rights that are critical to democratic society are being redefined in our digital culture with law and legal standards struggling to catch up with technology. The norms and standards for privacy are being set by those with the power to collect, store and manipulate consumer data but with little or no reference to important human rights norms. So the law and business culture in Korea must catch up with technology if human rights are to be protected to minimize future incidents of privacy breach. Human rights exist to protect the weak against the strong, the poor against the powerful, and in the information age, the technologically vulnerable from those with the power to store vast amounts of data such as the government and corporations. Matthew Daniels is the founder of non-profit organization, Good of All.
  • 2. We can assume that the profit motive of businesses will always lead them to maximize the degree to which they capture and store consumer data. So laws and society must set norms that limit corporations to collecting only data that is necessary for them to provide a specific product or service that the consumer seeks to purchase. Even worse, the principle that “whatever is stored can be stolen” is an axiom of the digital age. So the storage of large amounts of private data by corporations guarantees that some of the data will be stolen in the future. Privacy is a human right and must be treated as such. This is the only foundation for meaningful, long-term reform of a problem that continues to plague Korea and other technologically advanced societies. Among the highly developed free nations, Korea is the poster child for corporate abuse of privacy rights in the same way that the U.S. has become the poster child for government abuse of privacy rights. As the most digitally wired nation in the world, Korea is and will be a global trend setter in the critical area of rights of privacy online. So policies and practices in Korea will influence online privacy trends worldwide. The government should ban and impose financial penalties upon companies that require consumers to provide excessive amounts of personal information. Some companies will continue to pressure consumers until they are faced with an economic incentive to do otherwise. At the same time, consumers should call attention to companies that treat the public poorly in this way; and companies that respect the privacy of consumers need to be rewarded with more business — in the same way that "green" companies are rewarded because they don’t pollute the environment that consumers and their families live in. Korea is the “canary in the coal mine” for privacy rights.Miners often carried canaries with them to warn againsttoxic gas in the air when going into coal mines.As a digital leader, how Korea handles privacy issues will set a standard for other countries around the world with respect to privacy rights in the Digital Age. Matthew Daniels is the founder of non-profit organization Good of All, a global movement to educate the public on human rights in digital age. Good of All exist to promote the most fundamental freedoms enshrined in the Universal Declaration of Human Rights (United Nations 1948).