Misuses of Government Databases


Topic area

Privacy and Spams 

Target audience

Undergraduate or graduate students in CS or CIS

Activity type

Reading assignments, research, worksheet, class discussion

Time required

Out of class 1-2 hours; In class - 30 minutes or more depending on how long you want the discussion to last

Attachments

Worksheet

Additional materials

U.S. Helped Fund License Photo Database. The Washington Post, February 18, 1999. www.washingtonpost.com/wp-srv/business/daily/feb99/privacy18.htm

Doors Fling Open to Public Records. The Washington Post, March 8, 1998. www.washingtonpost.com/wp-srv/frompost/march98/privacy9.htm

Merging County Social Services Data Bases: Privacy Pitfalls and a Policy Solution. Speech by Beth Givens, Director of Privacy Rights Clearinghouse, April 9, 1998.

www.privacyrights.org/pitfall.htm

Background needed to complete the assignment

Students need to be able to use a browser to surf the net 

References

Fact Sheet #11: From Cradle to Grave: Government Records and Your Privacy. www.privacyrights.org/FS/fs11-pub.htm

Privacy Act of 1974. www.usdoj.gov/foia/privstat.htm

A Review of the Fair Information Principles: The Foundation of Privacy Public Policy www.privacyrights.org/AR/fairinfo.html

Code of Fair Information Practice. www.epic.org/privacy/consumer/code_fair_info.html

"Computer Matching is a Serious Threat to Individual Rights" in Computers, Ethics & Social Values. D. Johnson (ed.), H. Nissenbaum (ed.), Prentice-Hall pp. 305-310.

"The Federal Right of Information Privacy: The Need for Reform" in Computers, Ethics & Social Values. D. Johnson (ed.), H. Nissenbaum (ed.), Prentice-Hall pp. 374-393.

Last modified

August 99


Abstract: This assignment deals with both the ethical and legal issues surrounding dissemination and use of government database contents. Two articles deal with the misuse (or inappropriate use) of government database contents, and the third deals with guidelines for protecting privacy in a social services database.

Goals for the activity:

1. To learn the extent of our loss of privacy

2. To understand our ethical responsibilities as computer professionals to protect and guard our privacy rights

3. To learn about the legal guidelines for government database compilations and use

 

Knowledge / skills / attitudes to be developed (behavioral objectives):

Procedure:

The students are given 3 articles to read (or sent to the appropriate web sites: www.washingtonpost.com, www.privacyrights.org). They are also encouraged to do research to locate additional relevant information and to look over material in the References. Students are also given the worksheet that is to be completed before the next class. (You can collect the worksheet in order to give a grade or to better insure completion). Class discussion (seminar style--in circle) should then be directed to cover the articles and the worksheet.

Assessing outcomes: Worksheet can be graded traditionally or points can be given for outstanding, basic or no work (e.g. 2,1,0 scale or comparable). Participation points for relevant class discussion are also suggested.

Additional remarks: None

Author contact information:

Mary Jane Peters

MCIS Department

Jacksonville State University

Jacksonville, Alabama 36265

Ph: (256) 782-5720

mjpeters@jsucc.jsu.edu

 


Page maintained by: kwb@csee.usf.edu