How users’ data is collected, used, and shared within and beyond the common information management system is important for transparency. Such systems hold records of users’ profiles and their actions, forming user profile data. They also collect information and data which users contribute to the system. In common information management systems in the public domain, such as Facebook, this data is often mined and sold to third parties (for example, marketing companies). It is important for users to understand how their data is being processed and used in order to help create trust in the system. In particular, in the case of the PPDR domain, the mining and commercial exploitation of such data could have wider social ramifications which may throw into doubt whether collaboration through a common information management system is an ethically good practice.
Guiding Questions
How can participants in the common information management system find out about the purposes of data processing?
How are exceptions declared and implemented? When do they end?
Are data mining and social profiling possible through the common information management system?
Should the system make trace histories transparent and contestable to users?
If actions within a system are logged, to what extent could or should the system offer the possibility of contextualizing this information?
What negative consequences could arise from making inner-workings transparent? For whom?
Does your approach to information transparency fully uphold the rights of data subjects such as the right to rectification?
Comments 1
With highly standardized communication systems, security forces will benefit from latest mobile communications technologies. New services will be introduced much more frequently. Operational issues will have to be much more anticipated as welll as ethical issues since private life and private data must be protected against any possible misuse. In the short term, video service are raising many questions: Who can use a given video and what for? How do we control and check regulations are applied? We already know that ethical automatic controls and permissions will have to be implemented. Works on ethical issues can help in the definition of the system anticipating potential regulations and ethical rules. That is why this works needs to be anticipated and encouraged.