A Research Paper
For
Data Privacy
by
John Patrick Pahunang
Bachelor of Science Information Technology
University of Science and Technology of Southern Philippines
In Fulfillment of Social and Professional Issues Final Performance Innovative Task
January 2023
Introduction
It is important to understand the consequences of this data collecting and how it affects our
privacy given the prevalence of personal information and data being gathered, utilized, and stored
by both individuals and organizations. We shall examine the idea of data privacy and its
significance in the modern world in this research paper. We will study the rules and laws that are
in place to protect people's privacy as well as the many methods of data collection, use, and storage.
We will also go through the possible repercussions of data breaches and the precautions that people
and businesses may take to safeguard themselves. By understanding the current state of data
privacy and its importance, we can work towards creating a safer and more secure online
environment for all.
Objective of the Study
The objective of this study is to examine the current state of data privacy and its importance in
the modern world. The study aims to:
1. Define data privacy and its relevance in today's digital age.
2. Explore the various ways in which data is collected, used, and stored by individuals and
organizations.
3. Analyze the regulations and laws that are in place to protect individuals' privacy.
4. Discuss the potential consequences of data breaches and the steps that can be taken to
prevent them.
5. Provide recommendations for improving data privacy and protecting against potential
breaches.
By achieving these objectives, the study aims to increase awareness and understanding of data
privacy and its importance, as well as provide practical guidance on how to protect one's own
privacy in the digital age.
Significance of the Study
This study is essential in terms of data privacy for a number of reasons. In today's digital
world, data privacy is firstly a crucial problem. It is crucial to comprehend the ramifications of this
data collecting and how it affects our privacy given the prevalence of personal information and
data being gathered, utilized, and stored by both individuals and organizations. We may raise
awareness of and knowledge of data privacy and its significance by carrying out this study. As a
result, people may be better able to decide how to share their personal information and data and
how to safeguard their own privacy.
This analysis can also aid in locating any potential holes or flaws in the current system by assessing
the current state of data privacy and the rules and laws that are in place to safeguard it. This can
help with the creation of new laws and regulations that will better safeguard people's privacy in
the digital era. Overall, this work has the potential to significantly advance our knowledge of and
ability to preserve the privacy of personal information, as well as contribute to the development of
a more secure and safe online environment for everyone.
Scope and Limitations
This research paper will focus on the concept of data privacy and its importance in the
modern world. The study will examine the various ways in which data is collected, used, and stored
by individuals and organizations, as well as the regulations and laws that are in place to protect
individuals' privacy. The paper will also discuss the potential consequences of data breaches and
the steps that can be taken to prevent them. The focus of the study will be on data privacy as it
pertains to individuals in the general population, rather than specific industries or sectors.
One limitation of this study is that it will not delve into the specific technical details of how
data is collected, used, and stored. Instead, it will provide a general overview of these concepts
and their relevance to data privacy. Additionally, the study will not focus on the specific data
privacy regulations and laws of any one country, but rather will provide a broad overview of the
legal landscape surrounding data privacy. Finally, this study will not address the potential ethical
considerations involved in data collection and use, but will rather focus on the practical
implications of data privacy for individuals.
Review of Related Literature
Lloyd v Google LLC
The data protection class action against Google which found that they are permissible in the case
of DPA breaches for the Safari Workaround. The case sets a precedent for representative opt-out
style class actions for data protection breaches under UK law. An application for permission to
appeal to the Supreme Court is pending. INFORRM had a case comment. Coverage from legal
outlets was broad including Matrix Chambers, DLA Piper, Linklaters and Farrer & Co.
R (Bridges) v Chief Constable of South Wales Police and Others [2019] EWHC 2341 (Admin)
The decision of the Administrative Court that the police’s use of facial recognition software was
lawful. The case applied the UK’s pre-existing data protection framework to determine the
lawfulness of the software, a precedential exercise. An appeal to the Court of Appeal is pending.
We had a post on Inform and there were posts also on Panopticon, Law Gazette, Matrix
Chambers and the Privacy Law Barrister.
ZXC v Bloomberg LP [2019] EWHC 970 (QB)
A case bought on the grounds that those investigated by law enforcement have the right to privacy
generally. A newspaper named the claimant in the course of citing confidential information
obtained from a UK law enforcement agency. The claimant was successful and awarded
£25,000. We had a case comment on INFORRM. Matrix Chambers, 5RB, Wiggin and Practical
Law also had commentary.
Google LLC v CNIL[2019] EUECJ C-507/17
The Court of Justice found that the territorial scope of the right to be forgotten was jurisdictionally
limited and therefore could not be applied to worldwide domain names. We had an Inforrm post on
this. The case drew much commentary- see Harvard’s Law Blog, Monckton Chambers and The
European Law Blog.
R v Jarvis 2019 SCC 10
The Canadian Supreme Court’s important decision on “reasonable expectation of privacy” in the
context of the “voyeurism” offence, with wider implications for regulatory and common law
privacy. There were posts on the Canadian Privacy Law blog and on The [Link] blog.
Methodology
There are several ways to solve and prevent data privacy issues in the context of IT:
1. Implement strong security measures: This includes things like encrypting data, using strong
passwords, and regularly updating software and systems. These measures can help to
prevent unauthorized access to data and protect against data breaches.
2. Implement proper access controls: This involves setting up systems to ensure that only
authorized individuals are able to access certain data. This can include things like setting
up user accounts with unique login credentials and implementing multi-factor
authentication.
3. Regularly monitor systems: Regularly monitoring systems for potential security
vulnerabilities can help to identify and fix any issues before they are exploited.
4. Follow best practices for data storage: This includes things like storing data in secure
locations, such as encrypted servers, and regularly backing up data to prevent loss in the
event of a data breach.
5. Implement and follow proper data handling procedures: This involves setting up policies
and procedures for handling data, such as properly disposing of data when it is no longer
needed, and training employees on these procedures to ensure that they are followed.
By implementing these measures, organizations can help to protect the privacy of their customers
and users, and prevent data breaches and other security incidents.
There are several ways in which data privacy can be either safe or unsafe when implemented in IT
systems. Here are a few examples:
Safe:
• Encrypting data: Encrypting data means that it is converted into a code that can only be
accessed by someone with the proper decryption key. This can help to protect data from
being accessed by unauthorized parties.
• Implementing strong passwords: Using strong passwords and regularly updating them can
help to prevent unauthorized access to data.
• Regularly updating software and systems: By regularly updating software and systems,
organizations can ensure that they are protected against known security vulnerabilities.
Unsafe:
• Storing data in unsecured locations: Storing data in unsecured locations, such as on an
unencrypted computer or in an unsecured cloud storage system, can make it vulnerable to
being accessed by unauthorized parties.
• Using weak passwords: Using weak or easily guessable passwords can make it easier for
unauthorized parties to access data.
• Failing to properly secure data: Failing to properly secure data, such as by not encrypting
it or not implementing proper access controls, can make it vulnerable to being accessed by
unauthorized parties.
References
• [Link]
selection-suneet-sharma/
• [Link]
privacy/#:~:text=Data%20privacy%20is%20also%20important,trusted%20with%20their
%20personal%20data.
• [Link]
• [Link]
privacy/#:~:text=Data%20privacy%20is%20the%20right,regulated%20at%20the%20fed
eral%20level.