SlideShare a Scribd company logo
1 of 21
Impact of ICT on Privacy and Personal
Data Protection in Two Malaysian
Academic Libraries
NURUL AZURAH MOHD RONI
Hamdan Tahir Library
Universiti Sains Malaysia
azurah@kk.usm.my
MOHD KAMAL MOHD NAPIAH
Hamzah Sendut Library
Universiti Sains Malaysia
mohdkamal@usm.my
BASRI HASSAN
Kulliyyah of ICT
International Islamic University Malaysia
basrihassan@iiu.edu.my
We lead
• To investigate policies, preparedness & awareness of
two Malaysian Academic Libraries; International
Islamic University Malaysia (IIUM) & Universiti Putra
Malaysia (UPM) on the issues of privacy and data
protection
• To discover library users’ perceptions with regard to
the collection and use of their personal data
• To examine the policies and practices adopted by
libraries in relation to users’ privacy
Objectives of the Study
We lead
Overview
• The digital form of information resources &
services in the library keep growing
• Library keep data in digital form: easy to
retrieve & organize
• The advent of digital technology has posed
some threats especially
in term of personal data
privacy
• What is the THREAT?
We lead
Overview
“Great deal of information is already being
gathered about each of us, by private
companies as well as government agencies,
and we often have no idea how it is used or
whether it is accurate”
Bill Gates , 1996
We lead
Buying and
selling personal
data is
widespread
worldwide
We lead
Familiar with this?
We lead
Selling millions email addresses for RM20
We lead
• Gazetted on 10th
June 2010
• Personal Data is a data relates directly or
indirectly to data subject
• Data User is a person who either alone or
jointly or in common with other person
processes or authorizes the processing of any
personal data or has control over personal
data
Malaysian Personal Data Protection Act
We lead
Exemptions of the act
1. Federal & States Government
2. Non-commercial transactions
3. Personal, family & household affairs
4. Credit Reference Agencies
5. Data processed outside Malaysia
6. Partial exemptions: prevention or detection of
crime/for preparing statistics or research/ for
journalistic, literary or artistic purpose/ for physical
or mental health of data subject/apprehension or
prosecution of offenders
We lead
Data Protection Principles
1. Data cannot be processed without consent of data
subject
2. Data user shall inform the data subject that his data
is being processed, while data subject has the right
to request access
3. Data cannot be disclosed to others without consent
of data subject
4. Data cannot be kept longer than it is necessary for
the fulfillment of the purpose
We lead
Data Protection Principles
5. Data user shall take reasonable steps to ensure that
the data is accurate, not misleading & kept up-to-
date
6. Data subject shall be given access & be able to
correct the personal data
7. Data user shall take practical steps to protect the
data from any loss, misuse, modification,
unauthorized or accidental access or disclosure,
alteration or destruction
We lead
Library Scenario
Disclosure
Selling Data
Misuse
Alteration
Unauthorized Access
Transfer Data
without Protection
We lead
Do your library has a guideline?
• It is important to have a privacy
policy/professional code of ethics and
conducts as a guideline
Code of Ethics, ALA (1995):
“ We protect each library user’s right to
privacy and confidentiality with respect to
information sought or received and resources
consulted, borrowed, acquired, or
transmitted”.
Library
We lead
The Study
• Methods of the study: interview & questionnaires
• The total number of the sample was 170
respondents. Out of this, 160 respondents were
surveyed through questionnaires, and 10
respondents (library personnel) were interviewed.
They were from the Department of Technical Application
Services and Collection Development Division in the IIUM
library, and the System and Information Technology Division
and Circulation and Promotion Division in the UPM library.
Findings
Library personnel aware and observe
the privacy & data protection policies in
the library even though there were no
official written statements
Findings
Library personnel realized that privacy
& data protection policies still pending
in term of implementation at their
parent organization (university) as well
as in the libraries
Findings
Library users were aware
about their privacy &
personal data protection
Library users realized that their
privacy & data protection were
threatened
We lead
What’s next
• Study the implementation of data protection
guideline/policy among Malaysian Libraries
• Bigger respondents for more data
• More libraries for comparison
• For those having such policy, sharing is caring?
• Malaysian Libraries Personal Data Privacy
Policy? PERPUN?PPM?PNM?
We lead
• Data Protection is all about respect & common
sense
• It is about striking a balance between the need
of organization to process data and the
privacy of the individual
Prof Abu Bakar Munir, University of Malaya
We lead

More Related Content

What's hot

GDPR Presentation slides
GDPR Presentation slidesGDPR Presentation slides
GDPR Presentation slidesNaomi Holmes
 
Slides dr farah jameel's gdpr presentation april 2018
Slides dr farah jameel's gdpr presentation april 2018Slides dr farah jameel's gdpr presentation april 2018
Slides dr farah jameel's gdpr presentation april 2018amirhannan
 
Data Privacy in India and data theft
Data Privacy in India and data theftData Privacy in India and data theft
Data Privacy in India and data theftAmber Gupta
 
GDPR Introduction and overview
GDPR Introduction and overviewGDPR Introduction and overview
GDPR Introduction and overviewJane Lambert
 
Chapter 08 – Data Protection, Privacy and Freedom of Information - BIT IT5104
Chapter 08 – Data Protection, Privacy and Freedom of Information - BIT IT5104 Chapter 08 – Data Protection, Privacy and Freedom of Information - BIT IT5104
Chapter 08 – Data Protection, Privacy and Freedom of Information - BIT IT5104 Upekha Vandebona
 
Data Protection and Privacy
Data Protection and PrivacyData Protection and Privacy
Data Protection and PrivacyVertex Holdings
 
General Data Protection Regulation (GDPR) - Cross-Border Data Transfers
General Data Protection Regulation (GDPR) - Cross-Border Data TransfersGeneral Data Protection Regulation (GDPR) - Cross-Border Data Transfers
General Data Protection Regulation (GDPR) - Cross-Border Data Transferspi
 
Data protection ppt
Data protection pptData protection ppt
Data protection pptgrahamwell
 
Data protection in_india
Data protection in_indiaData protection in_india
Data protection in_indiaAltacit Global
 
Data Protection (Download for slideshow)
Data Protection (Download for slideshow)Data Protection (Download for slideshow)
Data Protection (Download for slideshow)Andrew Sharpe
 
Data Processing - data privacy and sensitive data
Data Processing - data privacy and sensitive dataData Processing - data privacy and sensitive data
Data Processing - data privacy and sensitive dataOpenAIRE
 
Personal Data Protection Singapore - Pdpc corporate-brochure
Personal Data Protection Singapore - Pdpc corporate-brochurePersonal Data Protection Singapore - Pdpc corporate-brochure
Personal Data Protection Singapore - Pdpc corporate-brochureJean Luc Creppy
 

What's hot (20)

GDPR Presentation slides
GDPR Presentation slidesGDPR Presentation slides
GDPR Presentation slides
 
Slides dr farah jameel's gdpr presentation april 2018
Slides dr farah jameel's gdpr presentation april 2018Slides dr farah jameel's gdpr presentation april 2018
Slides dr farah jameel's gdpr presentation april 2018
 
Data Privacy in India and data theft
Data Privacy in India and data theftData Privacy in India and data theft
Data Privacy in India and data theft
 
GDPR Introduction and overview
GDPR Introduction and overviewGDPR Introduction and overview
GDPR Introduction and overview
 
Chapter 08 – Data Protection, Privacy and Freedom of Information - BIT IT5104
Chapter 08 – Data Protection, Privacy and Freedom of Information - BIT IT5104 Chapter 08 – Data Protection, Privacy and Freedom of Information - BIT IT5104
Chapter 08 – Data Protection, Privacy and Freedom of Information - BIT IT5104
 
IT Policy
IT PolicyIT Policy
IT Policy
 
Data Privacy & Security
Data Privacy & SecurityData Privacy & Security
Data Privacy & Security
 
Data Protection and Privacy
Data Protection and PrivacyData Protection and Privacy
Data Protection and Privacy
 
An Overview of GDPR
An Overview of GDPR An Overview of GDPR
An Overview of GDPR
 
Privacy and Data Protection
Privacy and Data ProtectionPrivacy and Data Protection
Privacy and Data Protection
 
General Data Protection Regulation (GDPR) - Cross-Border Data Transfers
General Data Protection Regulation (GDPR) - Cross-Border Data TransfersGeneral Data Protection Regulation (GDPR) - Cross-Border Data Transfers
General Data Protection Regulation (GDPR) - Cross-Border Data Transfers
 
Data protection ppt
Data protection pptData protection ppt
Data protection ppt
 
Data protection in_india
Data protection in_indiaData protection in_india
Data protection in_india
 
Data Protection (Download for slideshow)
Data Protection (Download for slideshow)Data Protection (Download for slideshow)
Data Protection (Download for slideshow)
 
Pdpa(kewal)
Pdpa(kewal)Pdpa(kewal)
Pdpa(kewal)
 
Gdpr presentation
Gdpr presentationGdpr presentation
Gdpr presentation
 
Data Processing - data privacy and sensitive data
Data Processing - data privacy and sensitive dataData Processing - data privacy and sensitive data
Data Processing - data privacy and sensitive data
 
GDPR infographic
GDPR infographicGDPR infographic
GDPR infographic
 
Privacy by Design: legal perspective
Privacy by Design: legal perspectivePrivacy by Design: legal perspective
Privacy by Design: legal perspective
 
Personal Data Protection Singapore - Pdpc corporate-brochure
Personal Data Protection Singapore - Pdpc corporate-brochurePersonal Data Protection Singapore - Pdpc corporate-brochure
Personal Data Protection Singapore - Pdpc corporate-brochure
 

Viewers also liked

Half day public-seminar_on_pdpa_2010_-_250711
Half day public-seminar_on_pdpa_2010_-_250711Half day public-seminar_on_pdpa_2010_-_250711
Half day public-seminar_on_pdpa_2010_-_250711Quotient Consulting
 
Brussels Privacy Hub: SATORI and iTRACK
Brussels Privacy Hub: SATORI and iTRACKBrussels Privacy Hub: SATORI and iTRACK
Brussels Privacy Hub: SATORI and iTRACKTrilateral Research
 
Privacy in Computing - Impact on emerging technologies
Privacy in Computing - Impact on emerging technologiesPrivacy in Computing - Impact on emerging technologies
Privacy in Computing - Impact on emerging technologiesMensah Sitti
 
StuartMillar_13616005_PIA
StuartMillar_13616005_PIAStuartMillar_13616005_PIA
StuartMillar_13616005_PIAStuart Millar
 
Impact of CCTV on 'Right to Privacy'
Impact of CCTV on 'Right to Privacy'Impact of CCTV on 'Right to Privacy'
Impact of CCTV on 'Right to Privacy'SSoujanya
 
Robert beggs incident response teams - atlseccon2011
Robert beggs   incident response teams - atlseccon2011Robert beggs   incident response teams - atlseccon2011
Robert beggs incident response teams - atlseccon2011Atlantic Security Conference
 
Integrated Privacy Impact Assessment
Integrated Privacy Impact AssessmentIntegrated Privacy Impact Assessment
Integrated Privacy Impact AssessmentJeremy Hilton
 
From Privacy Impact Assessment to Social Impact Assessment: Preserving TRrus...
From Privacy Impact Assessment to Social Impact Assessment: Preserving TRrus...From Privacy Impact Assessment to Social Impact Assessment: Preserving TRrus...
From Privacy Impact Assessment to Social Impact Assessment: Preserving TRrus...Lilian Edwards
 
Trackment
TrackmentTrackment
Trackmentmeaannn
 
The Impact of Cloud: Cloud Computing Security and Privacy
The Impact of Cloud: Cloud Computing Security and PrivacyThe Impact of Cloud: Cloud Computing Security and Privacy
The Impact of Cloud: Cloud Computing Security and PrivacyCharles Mok
 
Privacy Impact Assessment Methodologies for Protection of Personal Data
Privacy Impact Assessment Methodologies for Protection of Personal DataPrivacy Impact Assessment Methodologies for Protection of Personal Data
Privacy Impact Assessment Methodologies for Protection of Personal DataH. T. Besik
 
Privacy Impact Assessment Management System (PIAMS)
Privacy Impact Assessment Management System (PIAMS) Privacy Impact Assessment Management System (PIAMS)
Privacy Impact Assessment Management System (PIAMS) The Canton Group
 
Encryption and Key Management: Ensuring Compliance, Privacy, and Minimizing t...
Encryption and Key Management: Ensuring Compliance, Privacy, and Minimizing t...Encryption and Key Management: Ensuring Compliance, Privacy, and Minimizing t...
Encryption and Key Management: Ensuring Compliance, Privacy, and Minimizing t...IBM Security
 
Privacy, Drones, and IoT
Privacy, Drones, and IoTPrivacy, Drones, and IoT
Privacy, Drones, and IoTLAURA VIVET
 
Lean Thinking in IT by Marie-Pia Ignace, Lean IT Summit 2014
Lean Thinking in IT by Marie-Pia Ignace, Lean IT Summit 2014Lean Thinking in IT by Marie-Pia Ignace, Lean IT Summit 2014
Lean Thinking in IT by Marie-Pia Ignace, Lean IT Summit 2014Institut Lean France
 
Discover The Top 10 Types Of Colleagues Around You
Discover The Top 10 Types Of Colleagues Around YouDiscover The Top 10 Types Of Colleagues Around You
Discover The Top 10 Types Of Colleagues Around YouAnkur Tandon
 

Viewers also liked (20)

Half day public-seminar_on_pdpa_2010_-_250711
Half day public-seminar_on_pdpa_2010_-_250711Half day public-seminar_on_pdpa_2010_-_250711
Half day public-seminar_on_pdpa_2010_-_250711
 
Dean carey - data loss-prevention - atlseccon2011
Dean carey - data loss-prevention - atlseccon2011Dean carey - data loss-prevention - atlseccon2011
Dean carey - data loss-prevention - atlseccon2011
 
Brussels Privacy Hub: SATORI and iTRACK
Brussels Privacy Hub: SATORI and iTRACKBrussels Privacy Hub: SATORI and iTRACK
Brussels Privacy Hub: SATORI and iTRACK
 
Privacy in Computing - Impact on emerging technologies
Privacy in Computing - Impact on emerging technologiesPrivacy in Computing - Impact on emerging technologies
Privacy in Computing - Impact on emerging technologies
 
StuartMillar_13616005_PIA
StuartMillar_13616005_PIAStuartMillar_13616005_PIA
StuartMillar_13616005_PIA
 
Impact of CCTV on 'Right to Privacy'
Impact of CCTV on 'Right to Privacy'Impact of CCTV on 'Right to Privacy'
Impact of CCTV on 'Right to Privacy'
 
Robert beggs incident response teams - atlseccon2011
Robert beggs   incident response teams - atlseccon2011Robert beggs   incident response teams - atlseccon2011
Robert beggs incident response teams - atlseccon2011
 
Integrated Privacy Impact Assessment
Integrated Privacy Impact AssessmentIntegrated Privacy Impact Assessment
Integrated Privacy Impact Assessment
 
From Privacy Impact Assessment to Social Impact Assessment: Preserving TRrus...
From Privacy Impact Assessment to Social Impact Assessment: Preserving TRrus...From Privacy Impact Assessment to Social Impact Assessment: Preserving TRrus...
From Privacy Impact Assessment to Social Impact Assessment: Preserving TRrus...
 
WRC Newsletter Feb 2013
WRC Newsletter Feb 2013WRC Newsletter Feb 2013
WRC Newsletter Feb 2013
 
opncc_certificate
opncc_certificateopncc_certificate
opncc_certificate
 
Trackment
TrackmentTrackment
Trackment
 
iTrack WP3 workshop
iTrack WP3 workshopiTrack WP3 workshop
iTrack WP3 workshop
 
The Impact of Cloud: Cloud Computing Security and Privacy
The Impact of Cloud: Cloud Computing Security and PrivacyThe Impact of Cloud: Cloud Computing Security and Privacy
The Impact of Cloud: Cloud Computing Security and Privacy
 
Privacy Impact Assessment Methodologies for Protection of Personal Data
Privacy Impact Assessment Methodologies for Protection of Personal DataPrivacy Impact Assessment Methodologies for Protection of Personal Data
Privacy Impact Assessment Methodologies for Protection of Personal Data
 
Privacy Impact Assessment Management System (PIAMS)
Privacy Impact Assessment Management System (PIAMS) Privacy Impact Assessment Management System (PIAMS)
Privacy Impact Assessment Management System (PIAMS)
 
Encryption and Key Management: Ensuring Compliance, Privacy, and Minimizing t...
Encryption and Key Management: Ensuring Compliance, Privacy, and Minimizing t...Encryption and Key Management: Ensuring Compliance, Privacy, and Minimizing t...
Encryption and Key Management: Ensuring Compliance, Privacy, and Minimizing t...
 
Privacy, Drones, and IoT
Privacy, Drones, and IoTPrivacy, Drones, and IoT
Privacy, Drones, and IoT
 
Lean Thinking in IT by Marie-Pia Ignace, Lean IT Summit 2014
Lean Thinking in IT by Marie-Pia Ignace, Lean IT Summit 2014Lean Thinking in IT by Marie-Pia Ignace, Lean IT Summit 2014
Lean Thinking in IT by Marie-Pia Ignace, Lean IT Summit 2014
 
Discover The Top 10 Types Of Colleagues Around You
Discover The Top 10 Types Of Colleagues Around YouDiscover The Top 10 Types Of Colleagues Around You
Discover The Top 10 Types Of Colleagues Around You
 

Similar to Impact of ict on privacy and personal data

Researching Data Privacy in eLearning
Researching Data Privacy in eLearningResearching Data Privacy in eLearning
Researching Data Privacy in eLearningMalinka Ivanova
 
Researching Data Privacy in eLearning
Researching Data Privacy in eLearningResearching Data Privacy in eLearning
Researching Data Privacy in eLearningGabriela Grosseck
 
Ethical issues related to is design and its use
Ethical  issues  related  to  is  design  and its useEthical  issues  related  to  is  design  and its use
Ethical issues related to is design and its useNoriha Nori
 
005. Ethics, Privacy and Security
005. Ethics, Privacy and Security005. Ethics, Privacy and Security
005. Ethics, Privacy and SecurityArianto Muditomo
 
Ethics and Privacy in the Application of Learning Analytics (#EP4LA)
Ethics and Privacy in the Application of Learning Analytics (#EP4LA)Ethics and Privacy in the Application of Learning Analytics (#EP4LA)
Ethics and Privacy in the Application of Learning Analytics (#EP4LA)Hendrik Drachsler
 
Data Sharing with ICPSR: Fueling the Cycle of Science through Discovery, Acce...
Data Sharing with ICPSR: Fueling the Cycle of Science through Discovery, Acce...Data Sharing with ICPSR: Fueling the Cycle of Science through Discovery, Acce...
Data Sharing with ICPSR: Fueling the Cycle of Science through Discovery, Acce...ICPSR
 
Ethics of Information
Ethics of InformationEthics of Information
Ethics of InformationFiona Beals
 
Aim analytics panel (2017 Fall): Privacy & ethics
Aim analytics panel (2017 Fall): Privacy & ethicsAim analytics panel (2017 Fall): Privacy & ethics
Aim analytics panel (2017 Fall): Privacy & ethicsSungjin Nam
 
ETHICAL ISSUES RELATED TO DATA COLLECTION.pptx
ETHICAL ISSUES RELATED TO DATA COLLECTION.pptxETHICAL ISSUES RELATED TO DATA COLLECTION.pptx
ETHICAL ISSUES RELATED TO DATA COLLECTION.pptxurvashipundir04
 
Information policy sunil sir
Information policy sunil sirInformation policy sunil sir
Information policy sunil sirbgshalini
 
اخلاقيات الثاني
اخلاقيات الثانياخلاقيات الثاني
اخلاقيات الثانيBunayan ALdosari
 
Hivos and Responsible Data
Hivos and Responsible DataHivos and Responsible Data
Hivos and Responsible DataTom Walker
 
Urgensi Perlindungan Data Pribadi Menuju ASEAN Community 2015
Urgensi Perlindungan Data Pribadi Menuju ASEAN Community 2015Urgensi Perlindungan Data Pribadi Menuju ASEAN Community 2015
Urgensi Perlindungan Data Pribadi Menuju ASEAN Community 2015ICT Watch
 
Ethical Issues related to Information System Design and Use
Ethical Issues related to Information System Design and UseEthical Issues related to Information System Design and Use
Ethical Issues related to Information System Design and Useuniversity of education,Lahore
 
Ethical Issues related to Information System Design and Use
Ethical Issues related to Information System Design and UseEthical Issues related to Information System Design and Use
Ethical Issues related to Information System Design and Useuniversity of education,Lahore
 
Mha 690 week 1 discussion presentation
Mha 690 week 1 discussion presentationMha 690 week 1 discussion presentation
Mha 690 week 1 discussion presentationfalane
 
Brisbane Health-y Data: What are health and sensitive data and why are they t...
Brisbane Health-y Data: What are health and sensitive data and why are they t...Brisbane Health-y Data: What are health and sensitive data and why are they t...
Brisbane Health-y Data: What are health and sensitive data and why are they t...ARDC
 
STDL Privacy Project Case Study Research Proposal
STDL Privacy Project Case Study Research ProposalSTDL Privacy Project Case Study Research Proposal
STDL Privacy Project Case Study Research ProposalSusanGordon42
 

Similar to Impact of ict on privacy and personal data (20)

Researching Data Privacy in eLearning
Researching Data Privacy in eLearningResearching Data Privacy in eLearning
Researching Data Privacy in eLearning
 
Researching Data Privacy in eLearning
Researching Data Privacy in eLearningResearching Data Privacy in eLearning
Researching Data Privacy in eLearning
 
Ethical issues related to is design and its use
Ethical  issues  related  to  is  design  and its useEthical  issues  related  to  is  design  and its use
Ethical issues related to is design and its use
 
005. Ethics, Privacy and Security
005. Ethics, Privacy and Security005. Ethics, Privacy and Security
005. Ethics, Privacy and Security
 
Ethics and Privacy in the Application of Learning Analytics (#EP4LA)
Ethics and Privacy in the Application of Learning Analytics (#EP4LA)Ethics and Privacy in the Application of Learning Analytics (#EP4LA)
Ethics and Privacy in the Application of Learning Analytics (#EP4LA)
 
week 7.pptx
week 7.pptxweek 7.pptx
week 7.pptx
 
Data Sharing with ICPSR: Fueling the Cycle of Science through Discovery, Acce...
Data Sharing with ICPSR: Fueling the Cycle of Science through Discovery, Acce...Data Sharing with ICPSR: Fueling the Cycle of Science through Discovery, Acce...
Data Sharing with ICPSR: Fueling the Cycle of Science through Discovery, Acce...
 
Ethics of Information
Ethics of InformationEthics of Information
Ethics of Information
 
Aim analytics panel (2017 Fall): Privacy & ethics
Aim analytics panel (2017 Fall): Privacy & ethicsAim analytics panel (2017 Fall): Privacy & ethics
Aim analytics panel (2017 Fall): Privacy & ethics
 
ETHICAL ISSUES RELATED TO DATA COLLECTION.pptx
ETHICAL ISSUES RELATED TO DATA COLLECTION.pptxETHICAL ISSUES RELATED TO DATA COLLECTION.pptx
ETHICAL ISSUES RELATED TO DATA COLLECTION.pptx
 
Information policy sunil sir
Information policy sunil sirInformation policy sunil sir
Information policy sunil sir
 
اخلاقيات الثاني
اخلاقيات الثانياخلاقيات الثاني
اخلاقيات الثاني
 
Hivos and Responsible Data
Hivos and Responsible DataHivos and Responsible Data
Hivos and Responsible Data
 
Urgensi Perlindungan Data Pribadi Menuju ASEAN Community 2015
Urgensi Perlindungan Data Pribadi Menuju ASEAN Community 2015Urgensi Perlindungan Data Pribadi Menuju ASEAN Community 2015
Urgensi Perlindungan Data Pribadi Menuju ASEAN Community 2015
 
Ethical Issues related to Information System Design and Use
Ethical Issues related to Information System Design and UseEthical Issues related to Information System Design and Use
Ethical Issues related to Information System Design and Use
 
Ethical Issues related to Information System Design and Use
Ethical Issues related to Information System Design and UseEthical Issues related to Information System Design and Use
Ethical Issues related to Information System Design and Use
 
Mha 690 week 1 discussion presentation
Mha 690 week 1 discussion presentationMha 690 week 1 discussion presentation
Mha 690 week 1 discussion presentation
 
Brisbane Health-y Data: What are health and sensitive data and why are they t...
Brisbane Health-y Data: What are health and sensitive data and why are they t...Brisbane Health-y Data: What are health and sensitive data and why are they t...
Brisbane Health-y Data: What are health and sensitive data and why are they t...
 
Reflections on cohorts and longitudinal studies
Reflections on cohorts and longitudinal studiesReflections on cohorts and longitudinal studies
Reflections on cohorts and longitudinal studies
 
STDL Privacy Project Case Study Research Proposal
STDL Privacy Project Case Study Research ProposalSTDL Privacy Project Case Study Research Proposal
STDL Privacy Project Case Study Research Proposal
 

More from mohd kamal

Information Literacy Skills (Advanced)
Information Literacy Skills (Advanced)Information Literacy Skills (Advanced)
Information Literacy Skills (Advanced)mohd kamal
 
Kerjaya pustakawan
Kerjaya pustakawanKerjaya pustakawan
Kerjaya pustakawanmohd kamal
 
Kenali perpustakaan
Kenali perpustakaan Kenali perpustakaan
Kenali perpustakaan mohd kamal
 
Foundation of library management
Foundation of library management   Foundation of library management
Foundation of library management mohd kamal
 
aku mahu jadi pustakawan
aku mahu jadi pustakawanaku mahu jadi pustakawan
aku mahu jadi pustakawanmohd kamal
 
Aktiviti Bahagian Perhubungan Pelanggan 2015
Aktiviti Bahagian Perhubungan Pelanggan 2015Aktiviti Bahagian Perhubungan Pelanggan 2015
Aktiviti Bahagian Perhubungan Pelanggan 2015mohd kamal
 
Intro to bpp@phs
Intro to bpp@phsIntro to bpp@phs
Intro to bpp@phsmohd kamal
 
PHS@tadika lestari ilmu
PHS@tadika lestari ilmuPHS@tadika lestari ilmu
PHS@tadika lestari ilmumohd kamal
 
Jom cari maklumat
Jom cari maklumat Jom cari maklumat
Jom cari maklumat mohd kamal
 
Fear factors in cataloguing arabic books
Fear factors in cataloguing arabic booksFear factors in cataloguing arabic books
Fear factors in cataloguing arabic booksmohd kamal
 
International students friendly library
International students friendly libraryInternational students friendly library
International students friendly librarymohd kamal
 
zoom in Pustakawan
zoom in Pustakawanzoom in Pustakawan
zoom in Pustakawanmohd kamal
 
Connecting library with apex community
Connecting library with apex communityConnecting library with apex community
Connecting library with apex communitymohd kamal
 

More from mohd kamal (16)

Information Literacy Skills (Advanced)
Information Literacy Skills (Advanced)Information Literacy Skills (Advanced)
Information Literacy Skills (Advanced)
 
Kerjaya pustakawan
Kerjaya pustakawanKerjaya pustakawan
Kerjaya pustakawan
 
Kenali perpustakaan
Kenali perpustakaan Kenali perpustakaan
Kenali perpustakaan
 
Foundation of library management
Foundation of library management   Foundation of library management
Foundation of library management
 
aku mahu jadi pustakawan
aku mahu jadi pustakawanaku mahu jadi pustakawan
aku mahu jadi pustakawan
 
Aktiviti Bahagian Perhubungan Pelanggan 2015
Aktiviti Bahagian Perhubungan Pelanggan 2015Aktiviti Bahagian Perhubungan Pelanggan 2015
Aktiviti Bahagian Perhubungan Pelanggan 2015
 
Intro to bpp@phs
Intro to bpp@phsIntro to bpp@phs
Intro to bpp@phs
 
5s
5s5s
5s
 
PHS@tadika lestari ilmu
PHS@tadika lestari ilmuPHS@tadika lestari ilmu
PHS@tadika lestari ilmu
 
Jombaca@phs
Jombaca@phs Jombaca@phs
Jombaca@phs
 
Jom cari maklumat
Jom cari maklumat Jom cari maklumat
Jom cari maklumat
 
Fear factors in cataloguing arabic books
Fear factors in cataloguing arabic booksFear factors in cataloguing arabic books
Fear factors in cataloguing arabic books
 
International students friendly library
International students friendly libraryInternational students friendly library
International students friendly library
 
zoom in Pustakawan
zoom in Pustakawanzoom in Pustakawan
zoom in Pustakawan
 
Connecting library with apex community
Connecting library with apex communityConnecting library with apex community
Connecting library with apex community
 
mendeley
mendeleymendeley
mendeley
 

Recently uploaded

Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeThiyagu K
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Celine George
 
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...fonyou31
 
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...Sapna Thakur
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Krashi Coaching
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 
JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...
JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...
JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...anjaliyadav012327
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphThiyagu K
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
social pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajansocial pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajanpragatimahajan3
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactPECB
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
9548086042 for call girls in Indira Nagar with room service
9548086042  for call girls in Indira Nagar  with room service9548086042  for call girls in Indira Nagar  with room service
9548086042 for call girls in Indira Nagar with room servicediscovermytutordmt
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxGaneshChakor2
 

Recently uploaded (20)

Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17
 
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
 
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 
JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...
JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...
JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot Graph
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
Advance Mobile Application Development class 07
Advance Mobile Application Development class 07Advance Mobile Application Development class 07
Advance Mobile Application Development class 07
 
social pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajansocial pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajan
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 
9548086042 for call girls in Indira Nagar with room service
9548086042  for call girls in Indira Nagar  with room service9548086042  for call girls in Indira Nagar  with room service
9548086042 for call girls in Indira Nagar with room service
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptx
 

Impact of ict on privacy and personal data

  • 1. Impact of ICT on Privacy and Personal Data Protection in Two Malaysian Academic Libraries NURUL AZURAH MOHD RONI Hamdan Tahir Library Universiti Sains Malaysia azurah@kk.usm.my MOHD KAMAL MOHD NAPIAH Hamzah Sendut Library Universiti Sains Malaysia mohdkamal@usm.my BASRI HASSAN Kulliyyah of ICT International Islamic University Malaysia basrihassan@iiu.edu.my
  • 2. We lead • To investigate policies, preparedness & awareness of two Malaysian Academic Libraries; International Islamic University Malaysia (IIUM) & Universiti Putra Malaysia (UPM) on the issues of privacy and data protection • To discover library users’ perceptions with regard to the collection and use of their personal data • To examine the policies and practices adopted by libraries in relation to users’ privacy Objectives of the Study
  • 3. We lead Overview • The digital form of information resources & services in the library keep growing • Library keep data in digital form: easy to retrieve & organize • The advent of digital technology has posed some threats especially in term of personal data privacy • What is the THREAT?
  • 4. We lead Overview “Great deal of information is already being gathered about each of us, by private companies as well as government agencies, and we often have no idea how it is used or whether it is accurate” Bill Gates , 1996
  • 5. We lead Buying and selling personal data is widespread worldwide
  • 7. We lead Selling millions email addresses for RM20
  • 8. We lead • Gazetted on 10th June 2010 • Personal Data is a data relates directly or indirectly to data subject • Data User is a person who either alone or jointly or in common with other person processes or authorizes the processing of any personal data or has control over personal data Malaysian Personal Data Protection Act
  • 9. We lead Exemptions of the act 1. Federal & States Government 2. Non-commercial transactions 3. Personal, family & household affairs 4. Credit Reference Agencies 5. Data processed outside Malaysia 6. Partial exemptions: prevention or detection of crime/for preparing statistics or research/ for journalistic, literary or artistic purpose/ for physical or mental health of data subject/apprehension or prosecution of offenders
  • 10. We lead Data Protection Principles 1. Data cannot be processed without consent of data subject 2. Data user shall inform the data subject that his data is being processed, while data subject has the right to request access 3. Data cannot be disclosed to others without consent of data subject 4. Data cannot be kept longer than it is necessary for the fulfillment of the purpose
  • 11. We lead Data Protection Principles 5. Data user shall take reasonable steps to ensure that the data is accurate, not misleading & kept up-to- date 6. Data subject shall be given access & be able to correct the personal data 7. Data user shall take practical steps to protect the data from any loss, misuse, modification, unauthorized or accidental access or disclosure, alteration or destruction
  • 12. We lead Library Scenario Disclosure Selling Data Misuse Alteration Unauthorized Access Transfer Data without Protection
  • 13. We lead Do your library has a guideline? • It is important to have a privacy policy/professional code of ethics and conducts as a guideline Code of Ethics, ALA (1995): “ We protect each library user’s right to privacy and confidentiality with respect to information sought or received and resources consulted, borrowed, acquired, or transmitted”.
  • 15. We lead The Study • Methods of the study: interview & questionnaires • The total number of the sample was 170 respondents. Out of this, 160 respondents were surveyed through questionnaires, and 10 respondents (library personnel) were interviewed. They were from the Department of Technical Application Services and Collection Development Division in the IIUM library, and the System and Information Technology Division and Circulation and Promotion Division in the UPM library.
  • 16. Findings Library personnel aware and observe the privacy & data protection policies in the library even though there were no official written statements
  • 17. Findings Library personnel realized that privacy & data protection policies still pending in term of implementation at their parent organization (university) as well as in the libraries
  • 18. Findings Library users were aware about their privacy & personal data protection Library users realized that their privacy & data protection were threatened
  • 19. We lead What’s next • Study the implementation of data protection guideline/policy among Malaysian Libraries • Bigger respondents for more data • More libraries for comparison • For those having such policy, sharing is caring? • Malaysian Libraries Personal Data Privacy Policy? PERPUN?PPM?PNM?
  • 20. We lead • Data Protection is all about respect & common sense • It is about striking a balance between the need of organization to process data and the privacy of the individual Prof Abu Bakar Munir, University of Malaya