Tag: Data Security
-
Ethical Principles
Author: N/A; Publisher: U.K. Statistics Authority; Publication Year: 2020. The following visual provides a resource that outlines data ethics into 6 different categories. These categories are public good, data security, methods, legal compliance, public views/engagement,…
-
How to Make Your Data Project Ethical by Design
Data Security, Data Transformation, Ethical Conduct, Ethical Data Usage, Ethical Thinking, Sensitive DataAuthor: Tom Jongen; Publisher: Medium; Publication Year: 2021. The following article gives a bit of background on the current issues with using data for malintent. He then outlines some of the necessities of working with…
-
Responsible AI: Scale AI with Confidence
Artificial Intelligence, Data Governance, Data Security, Privacy Protection, Responsible AI, Transparency, Unintended BiasAuthor: N/A; Publisher: Accenture; Publication Year: N/A. The following article discuss how artificial intelligence (AI) has proved to be beneficial to business time and time again but with the use of AI comes a great…
-
The Basics of Ethical Data Management for Technologists
Author: Mark Feffer; Publisher: Dice; Publication Year: 2020. The following article discusses ethical data usage in the real world. There are many opportunities for employees of a particular company to view detailed data on an…
-
Towards Data Science (Channel)
Author: N/A; Publisher: Medium; Publication Year: N/A. The following communication channel offers publications of independent authors if they follow specific guidelines specified by the editors. The channel places attention on the question of ethics in…
-
Sports Betting and Data Security: Cybersecurity, Data Protection, and Privacy Rights in Gaming Law Practice
Author: Kathryn R.L. Rand, Steven Andrew Light; Publisher: American Bar Association; Publication Year: 2021. The following article describes how with the rise of legalized sports gambling, the authors point out the rise of data ownership,…
-
Are Law Firms Liable When Their Computers Are Hacked?
Author: N/A; Publisher: HG Legal Resources; Publication Year: N/A. The following resource discusses how despite being a victim, organizations and individuals can be held liable for data security breaches. Outsourcing to a third party vendor…