Data is the oil of the 21st century. Consumer data has become a valuable asset for businesses, especially for technology firms that involve, the processing of terabytes of data regularly. With the increase in computers, smartphones, smartwatches, cars, social media, and, IoT-based devices, data is collected, stored, and processed every second via internet. Data can be classified into structured and unstructured data, both forms of data are primitive in the business decision process. This helps organizations to understand users’ tastes and preferences so they can provide a curated experience back to users. Since the last decade, there have been major concerns for users regarding how organizations might use their personal data. Many renowned companies indulged in tampering with users’ data for profits. For these issues, many regulations and policies have been taken by the governments at the national and international levels. This study navigates through the abnormal consequences that might arise from unethical activities performed by organizations in mishandling consumers’ data. Also, helps to understand the right ethical data practices to be followed when collecting, maintaining, using, and sharing users’ sensitive data.
Users’ data can be classified into three major groups, namely: Explicit data, implicit data, and, Third-party data. Explicit data means the data that is directly given by the user, which includes preferences, ID’s such as name, email, social accounts, social media posts, contents, billing address, and much more. This explicit data can be gathered by social media applications, surveys, payment portals, shopping platforms, and more. The second group of data is not provided directly by users but collected by companies performing analysis and unconsciously gathering information prior to users’ consent. This includes product functioning, session duration, web activities, location, logs created by system software, and usage activities, especially on smartphones. And at last, the third group consists of information obtained from external parties. This may contain implicit or explicit data or even both, but the data is filtered and offered access by the primary organization. With an ample amount of benefits of collecting personal data, it is crucial to be known about some of the risks and complications involved in using this information. Privacy is the ability to restrict or deny admittance to one’s data. It is very important for organizations to value customers’/users sensitive data. Users have concerns related to their personal data collection specifically for sensitive data, like medical, financial & digital data. While some may not have any issues with certain kinds of data collection, they may be comfortable in sharing their preferences and desire to enhance the recommendations. Some companies trade or allow access to use the data collected from users to generate revenue. Data sharing and utilization beyond the agreement is viewed as a privacy infringement. Proper data management and security involve five vital approaches, the use of the latest and encrypted technology, guidelines and rules for maintaining data, governance and monitoring, welldefined structure, and, procedures for maintenance and sharing of data elements. The data controller is the one responsible for the maintenance and governance of personal data. It’s important to understand the legal charges and abide by the union and federal laws.
Facebook, one of the world’s largest social media tech giants designed with the goal of connecting humans virtually was involved in a data infringement scandal in March 2018. Facebook was extremely popular by 2018 with about 2.2 billion active monthly users yet the organization's consistent development was defaced by security concerns. Security concerns for Facebook began a long back. Particularly when Facebook launched ‘Open Graph’ API platforms for third-party apps in early 2010. This feature helped external organizations/developers to pull Facebook users’ data and their friends’ data with their single permission. By this, they were able to access personal information like name, sex, location, D.O.B, education, political views, relationship status, religion, text messages, and uploaded media. This was the biggest loophole Facebook failed to understand. In 2018, Facebook was trapped in a significant data breach in which political consulting agency ‘Cambridge Analytica’, drew the sensitive data of more than 87+ million Facebook users without their assent. They used this data with the prime motive of the U.S Presidential campaign, Donald Trump, in the course of the 2016 election. Also, it was found that the information was mishandled to influence the Brexit referendum results in the favor of the Vote Leave campaign. The organization’s response to the scandal was reportedly graceless, defensive, and disoriented. When Facebook learned all about the data breach, it supposedly remained idle and deferred for many months to send notice to Cambridge Analytica to wipe all the data collected. Further, the organization didn't follow up to check whether the illicitly procured information had been wiped out. The scandal put Facebook experiencing the same thing where it was left confronting the wrath of millions of Facebook clients, lawmakers, and sponsors. Further, the organization's share value likewise dropped soon after the news of the data breach came to light. There were several challenges coming up for Facebook, including hate speech and negative campaigns running against it, and claims petitioned for the break of users’ privacy protection. Plus Facebook was fined $ 643,000 by UK’s Information commissioner’s office in October 2018. Company CEO Mark Zuckerberg apologized for the significant ‘breach of trust’ but it was totally not up to the chaos that happened.
The Facebook and Cambridge Analytica incident shows how the abuse of sensitive data can harm business notorieties and trust, so businesses need to question themselves is it really worth taking the risk or if going with compliant data is a more rational choice. Adopting Data protection and privacy policies ensures the enforcement of compliance with mandatory regulatory, internal compliance, legal and ethical requirements along with the need for managing risks. Personal information security can be classified into three parts, specifying clearly the information usage & providing access controls, setting up privacy monitoring units & incident management panels in the organization, and creating privacy awareness among the consumers/users. Businesses must abide by state and federal laws of their respective nations such as the ‘General Protection Regulation’ (GDPR) in the European Union, ‘The Bureau of Indian Standards’ (BIS) & Information Technology Act in India, California Consumers Privacy Act (CCPA) in the US and other respective nations laws which gives people more control over the personal data that business accumulates about them. Also, these regulations provide supervision on the implementation of the laws.
1) Canterbury Christ Church University, “Data Protection in Research”.
2) Venky anant, Lisa Donchak, James Kaplan, and Henning Soller, “The consumer-data opportunity and the privacy imperative” available in: www.mckinsley.com/risk
3) Understanding Data Privacy and How to Build a Data Privacy Compliance Program Hyperproof.io
4) Akansha barua, “Ban on Chinese apps in India” available in: www.jetir.org (ISSN2349-5162)
5) Raquel Pita Guerreiro Marcelino Duarte, “Facebook in face of crisis”.
6) Article: Facebook sued over Cambridge Analytica data scandal.
7) The Facebook and Cambridge Analytica scandal, explained with a simple diagram.