Preview

Case Study Irm

Good Essays
Open Document
Open Document
426 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Case Study Irm
LAVARES, Prosper Jan Alfred D.
LUNA, Kier Erikko M.

Suppose that your local bank has a data mining system. The bank has been studying your debit card usage patterns. Noticing that you make many transactions at home renovation stores, the bank decides to contact you, offering information regarding their special loans for home improvements.

a. Discuss how this may conflict with your right to privacy.
R.A. 10173 or the Data Privacy Act is an act protecting individual personal information in information and communications systems in the government and the private sector, creating for this purpose a national privacy commission, and for other purposes. In this case, the bank used your personal information without you knowing. The bank is neither recognized as a PERSONAL INFORMATION CONTROLLER nor a PERSONAL INFORMATION PROCESSOR by the government so it does not have the right to use your personal information which caused your right to privacy to be violated. b. Describe another situation in which you feel that data mining can infringe on your privacy. * Your personal data and friends list is acquired through “Like”-ing Facebook pages. * Agreeing to the “access permissions”, such as contacts, upon installment of Android apps. * Turning on “Location Services” and “Geo-tagging” features of mobile devices. * Forced acceptance of software’s EULA before installation. * Yahoo Mail’s and Google Mail’s mandatory and automatic access to every user’s data on his/her email account which is sent to both Yahoo and Google’s business partners which results in Spam mails.

c. Describe a privacy-preserving data mining method that may allow the bank to perform customer pattern analysis without infringing on customers’ right to privacy.
First of all, the government must recognize the bank as a PERSONAL INFORMATION CONTROLLER and/or a PERSONAL INFORMATION PROCESSOR. The bank must then “request” for permission from the clients (waiver) if they would

You May Also Find These Documents Helpful

  • Powerful Essays

    It255 Final Study Guide

    • 843 Words
    • 4 Pages

    2. Which law requires all types of financial institutions to protect customers’ private financial information?…

    • 843 Words
    • 4 Pages
    Powerful Essays
  • Powerful Essays

    NT2580 Final Study Guide

    • 1423 Words
    • 6 Pages

    2. Which law requires all types of financial institutions to protect customers’ private financial information? (Page 9)…

    • 1423 Words
    • 6 Pages
    Powerful Essays
  • Good Essays

    Nt1310 Final Exam

    • 3599 Words
    • 15 Pages

    10. Which of the following can organizations use to protect the privacy of a customer’s personal information when giving programmers a realistic data set with which to test a new application?…

    • 3599 Words
    • 15 Pages
    Good Essays
  • Good Essays

    Lm's Case Study

    • 715 Words
    • 3 Pages

    LM is currently a 7th grade student. The school reports that LM is a bright and gifted student who does well academically, he thrives on routine and values being at school and in class. LM describes himself as having positive relationships with both of his parents, he values relationships with his peers, and has participated in sports and student council at school, as well as participates in Boy Scouts. He loves technology, especially video games.…

    • 715 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Unit 4222 - 307

    • 395 Words
    • 2 Pages

    2. Personal data shall be obtained only for one or more specified and lawful purposes, and shall not be further processed in any manner incompatible with that purpose or those purposes.…

    • 395 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    The objectives of Section II, part B outline the FDIC’s intent to protect the Confidentiality, Integrity, and Availability (CIA) of customer data (FDIC, 2014). Section III covers the majority of the tasks to be performed in the implementation of the security policy. Those actions identification of stakeholders, assessment and management of risk, due diligence in oversight (of providers and third party personnel), monitoring, evaluating and, adjusting policy components as applicable, and reporting to an authoritative body (FDIC, 2014). Each of these actions can be found in other industry standards such as the NIST SP 800-53 Rev.4’s Risk Management Framework Security Life Cycle and Security Control Structure (NIST, 2013, pp. 8-9). This just further solidifies the ubiquity of sound security policies across multiple sectors of the United States Federal and consumer…

    • 1156 Words
    • 5 Pages
    Powerful Essays
  • Satisfactory Essays

    Mining customer databases raises the ethical issue of customer privacy. Companies who collect data such as name, age, marital status, address, shopping habits, and geographic location without informing their customers makes their customers feel invaded. For example, when Target started sending coupons for baby items to customers according to their pregnancy prediction scores, expecting mothers felt spied on. Women were uncomfortable with the idea that Target knew about their personal lives. To correct this ethical issue, Target merged their pregnancy coupons items with items pregnant mothers would never purchase. This formula became a closely guarded secret. There are no privacy laws Target is violating, thus, they found a way around the ethical…

    • 120 Words
    • 1 Page
    Satisfactory Essays
  • Powerful Essays

    Cis 500 Data Mining Report

    • 2046 Words
    • 9 Pages

    This report is an analysis of the benefits of data mining to business practices. It also assesses the reliability of data mining algorithms and with examples. “Data Mining is a process that uses statistical, mathematical, artificial intelligence, and machine learning techniques…

    • 2046 Words
    • 9 Pages
    Powerful Essays
  • Powerful Essays

    DATA CLUSTERING

    • 1179 Words
    • 8 Pages

    Data mining is the analysis step of knowledge discovery in databases or a field at the…

    • 1179 Words
    • 8 Pages
    Powerful Essays
  • Powerful Essays

    As Americans in the 21st century, living amidst Facebook, Twitter, internet technology, satellite surveillance, GPS tracking and chips, the lack of privacy regarding the ability to provide acceptable and appropriate protection to individual identity and personal information have risen. Despite advancements in current security configuration, users of these products are still not receiving the privacy they deserve. Some views state that privacy is a right guaranteed to citizens by the United States Privacy Act of 1974, limiting the use of personal data by Federal agencies.…

    • 2210 Words
    • 9 Pages
    Powerful Essays
  • Powerful Essays

    Security and Privacy

    • 1517 Words
    • 7 Pages

    Identity theft has become a very popular topic for the past decade or so, the number of complaints has increased and is costing more than anyone wants to be spending on that issue. The Federal Trade commission estimates that as many as nine million Americans have their identity stolen each year, resulting in over 50 billion dollars of financial loss (Mercuri, 2006). Very common on Television to hear news and commercials warning about identity theft or some company trying to sell their services, helping in the fight to prevent it. In this paper, there will be discussions on the disadvantages of the break in privacy dealing with identity theft and on possible action plan to prevent the incident.…

    • 1517 Words
    • 7 Pages
    Powerful Essays
  • Powerful Essays

    Association Rule Mining using Apriori Algorithm Ghanshyam Verma, Shruthi Varadhan Computer Technology Department KITS-Ramtek, Nagpur-441106 gs.verma@live.com shruthivaradhan@gmail.com Abstract— Data mining is the process that results in the discovery of new patterns in large data sets. Data mining involves six common classes of tasks: Anomaly detection, Association Rule Mining, clustering, classification, regression and summarization. Association rule learning is a popular and well researched method for discovering interesting relations between variables in large databases.…

    • 3016 Words
    • 13 Pages
    Powerful Essays
  • Good Essays

    Data is numbers or text which is a statement of a fact. It is unprocessed and stored in database for further analysis. Operational and transaction data such as cost and sales, is essential to modern enterprise's internal environment. Non-operational data such as competitors' sales and forecasting data, is responsible for analysis of external environment.…

    • 837 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    Data mining

    • 1174 Words
    • 5 Pages

    Yes, this is a data mining task because it requires data analysis to determine who the costumers are that brings more business to the company.…

    • 1174 Words
    • 5 Pages
    Satisfactory Essays
  • Good Essays

    Data Resource Management

    • 869 Words
    • 4 Pages

    A process where data in a data warehouse is identified to discover key business trends and factors.…

    • 869 Words
    • 4 Pages
    Good Essays