SlideShare a Scribd company logo
1 of 11
Accenture Labs
Building Digital Trust
The role of data ethics in the digital age
2
Data is the biggest risk that is
unaccounted for by businesses today
Copyright © 2016 Accenture All rights reserved.
81% of executives agree
that as the business value
of data grows, the risk
companies face from
improper handling of data
are growing exponentially
Data ethics in the digital economy
Copyright © 2016 Accenture All rights reserved. 3
80% of executives
report strong demand
among knowledge
workers for increased
ethical controls for data
83% of executives
agree that trust is the
cornerstone of the
digital economy
Accenture survey confirms importance of digital trust
Data ethics across the supply chain
Every step of the data supply chain is an entry point for new classes of risk
Copyright © 2016 Accenture All rights reserved. 4
Mitigating risks – Addressing External Concerns
Data
Supply
Chain
Step
Lifecycle
Phase
Initiation
Strategy
Planning
Design
Executing
Launch
Monitoring
Operation
Closing
Improvement
Sample
ethical
questions
to address
external
concerns
Are data disclosers
aware that they have
disclosed data? Can
they inspect it? Are
they aware of how
they disclosed this
data (e.g. directly,
tracking, derived)?
Has intent for how
the data will be used
been communicated?
What are the classes
of harm that a bad
actor or group of
actors could cause if
they had access to
the entire set of
aggregated data
sources or any
related analysis?
Did the data discloser
provide consent to
this specific data
use? Did any consent
agreement make it
clear that data could
be used in this way?
Do data disclosers
expect control,
ownership,
remuneration, or
transparency over
the data they have
disclosed if it is
being shared or sold?
Did they provide
informed consent for
this action?
Are stakeholders
aware of the time
frame that their data
will be retained?
Would they be
surprised to learn
it still exists?
Copyright © 2016 Accenture All rights reserved. 5
Implementing ethics assessments throughout the data supply chain can help mitigate these risks
Mitigating risks – Addressing Internal Concerns
Data
Supply
Chain
Step
Lifecycle
Phase
Initiation
Strategy
Planning
Design
Executing
Launch
Monitoring
Operation
Closing
Improvement
Sample
ethical
questions
to address
internal
concerns
What methods were
used to collect the
data? Do collection
methods align with
best practices? Did
data disclosers
provide informed
consent? What are
the security risks
with how the data
is stored?
What biases have
been introduced
during manipulation?
Was an ethics review
performed?
Are the uses of the
data consistent with
the intentions of the
discloser? What are
the potential risks to
the organization if a
watchdog group knew
the data was used in
this way?
Does the act of
sharing or selling
data enhance the
experience for the
data discloser (not
including the data
seller’s own ability
to operate)? Is there
another way to share
or sell this data that
would increase
transparency?
Should the original
discloser be notified?
Is metadata being
retained? Are there
any disaster recovery
archives that have
copies of the data?
Copyright © 2016 Accenture All rights reserved. 6
Implementing ethics assessments throughout the data supply chain can help mitigate these risks
DATA AT REST
Data Disclosure
Data may be sourced from archives or other backups
Guideline: Ensure the context of original consent is known and respected; data security practices should
be revisited on a regular basis to minimize risk of accidental disclosure. Aggregation of data from multiple
sources often represents a new context for disclosure; have the responsible parties made a meaningful
effort to renew informed consent agreements for this new context?
Data Manipulation
Data is stored locally without widespread distribution channels;
all transformations happen locally
Guideline: Set up a secure environment for handling static data so the risk of security breaches is
minimized and data is not mistakenly shared with external networks. Data movement and transformation
should be fully auditable.
Data Consumption
Data analytics processes do not rely on live or real-time updates
Guideline: Consider how comfortable data disclosers would be with how the derived insights are being
applied. Gain consent, preferably informed consent, from data disclosers for application-specific uses of
data.
Informed consent and avoiding harm
To maximize digital trust, organizations must practice a “do no harm” ethos and strive for informed consent from data subjects
Copyright © 2016 Accenture All rights reserved. 7
DATA IN MOTION
Data Disclosure
Data is collected in real-time from machine sensors, automated processes, or human input;
while in motion, data may or may not be retained, reshaped, corrupted, disclosed, etc.
Guideline: Be respectful of data disclosers and the individuals behind the data. Protect the integrity and security of data
throughout networks and supply chains. Only collect the minimum amount of data needed for a specific application.
Avoid collecting personally identifiable information, or any associated meta-data whenever possible. Maximize preservation
of provenance.
Data Manipulation
Data is actively being moved or aggregated; data transformations use multiple datasets or
API calls which might be from multiple parties; the Internet may be used
Guideline: Ensure that data moving between networks and cloud service providers is encrypted; shared datasets should
strive to minimize the amount of data shared and anonymize as much as possible. Be sure to destroy any temporary
databases that contain aggregated data. Are research outcomes consistent with the discloser’s original intentions?
Data Consumption
Data insights could be context-aware, informed by sensors, or might benefit from streamed
data or API calls
Guideline: The data at rest guidelines for data consumption are equally important here. In addition, adhere to any license
agreements associated with the APIs being used. Encrypt data. Be conscious of the lack of control over streamed data once
it is broadcast. Streaming data also has a unique range of potential harms—the ability to track individuals, deciphering
network vulnerabilities, etc.
Informed consent and avoiding harm
To maximize digital trust, organizations must practice a “do no harm” ethos and strive for informed consent from data subjects
Copyright © 2016 Accenture All rights reserved. 8
Best practices for data sharing
94% of
organizations
are required to
comply with ethical
data handling
requirements that
go beyond their
own protocols
Copyright © 2016 Accenture All rights reserved. 9
1. Ongoing
collaboration and
mutual accountability
are necessary
between data
sharing partners.
2. Build common
contracting procedures,
but treat every contract
and dataset as unique.
3. Develop ethical
review procedures
between partners.
4. Be mutually
accountable for
interpretive
resources.
5. Maximalist
approaches to
sharing are not
always advisable.
6. Identify potential
risks of sharing
data within sharing
agreements.
8. When ethical
principles or
regulations are
unclear, emphasize
process and
transparency.
9. Published
research requires
additional attention.
10. Treat trust as a
networked
phenomenon.
7. Repurposed
data requires
special attention.
Applying best practices for data sharing helps mitigate risk without sacrificing the value data-sharing
agreements create
Building a code of data ethics—12 guidelines
1. The highest priority is to respect the persons
behind the data.
Copyright © 2016 Accenture All rights reserved. 10
2. Account for the downstream uses of datasets.
3. The consequences of utilizing data and analytical
tools today are shaped by how they’ve been used
in the past.
4. Seek to match privacy and security safeguards
with privacy and security expectations.
5. Always follow the law, but understand that the law
is often a minimum bar.
6. Be wary of collecting data just for the sake of
having more data.
For more in-depth
description:
https://www.accenture.com/
us-en/insight-data-ethics
7. Data can be a tool of both inclusion and exclusion.
8. As far as possible, explain methods for analysis and
marketing to data disclosers.
9. Data scientists and practitioners should accurately
represent their qualifications (and limits to their
expertise), adhere to professional standards, and
strive for peer accountability.
10. Aspire to design practices that incorporate
transparency, configurability, accountability, and
auditability.
11. Products and research practices should be subject
to internal (and potentially external) ethical review.
12. Governance practices should be robust, known to all
team members and regularly reviewed.
i
Start building trust today
The ethical treatment of data does not begin and end with a
single project in today’s digital economy – it needs to become
a core value across an organization
The embodiment of these actions into an organizational code
of data ethics is an opportunity for organizations to distinguish
themselves as industry leaders both in product/service value
and winning the trust of digital consumers
As organizations move forward in the digital economy,
embracing data ethics offers a way to engender trust and
provide vital differentiation in a crowded marketplace
Copyright © 2016 Accenture All rights reserved. 11

More Related Content

What's hot

Final cyber physical system (1)
Final cyber physical system (1)Final cyber physical system (1)
Final cyber physical system (1)vanisre jaiswal
 
Latest trends in information technology
Latest trends in information technologyLatest trends in information technology
Latest trends in information technologyAtifa Aqueel
 
Cryptography-Known plain text attack
Cryptography-Known plain text attack Cryptography-Known plain text attack
Cryptography-Known plain text attack amiteshg
 
6. cryptography
6. cryptography6. cryptography
6. cryptography7wounders
 
cyber security presentation.pptx
cyber security presentation.pptxcyber security presentation.pptx
cyber security presentation.pptxkishore golla
 
Legal, Ethical and Social Issues in Technology
Legal, Ethical and Social Issues in TechnologyLegal, Ethical and Social Issues in Technology
Legal, Ethical and Social Issues in TechnologyRachel Farnese
 
Cyber Crime And Security
Cyber Crime And Security Cyber Crime And Security
Cyber Crime And Security ritik shukla
 
Ethics in Information Technology
Ethics in Information TechnologyEthics in Information Technology
Ethics in Information TechnologyAtul Kumar Pandey
 
Presentation(group j)implementing trustworthy computing by Sundas Ilyas
Presentation(group j)implementing  trustworthy computing by Sundas IlyasPresentation(group j)implementing  trustworthy computing by Sundas Ilyas
Presentation(group j)implementing trustworthy computing by Sundas IlyasSundas Kayani
 
Cyber-physical systems Industrial applications in the CPSwarm Project
Cyber-physical systems Industrial applications in the CPSwarm ProjectCyber-physical systems Industrial applications in the CPSwarm Project
Cyber-physical systems Industrial applications in the CPSwarm ProjectAlessandra Bagnato
 
Data Privacy and Protection Presentation
Data Privacy and Protection PresentationData Privacy and Protection Presentation
Data Privacy and Protection Presentationmlw32785
 
Green computing ppt
Green computing  pptGreen computing  ppt
Green computing pptneenasahni
 
Wireless security presentation
Wireless security presentationWireless security presentation
Wireless security presentationMuhammad Zia
 
Data Protection Act presentation
Data Protection Act presentationData Protection Act presentation
Data Protection Act presentationIan Clive Oultram
 

What's hot (20)

Final cyber physical system (1)
Final cyber physical system (1)Final cyber physical system (1)
Final cyber physical system (1)
 
Latest trends in information technology
Latest trends in information technologyLatest trends in information technology
Latest trends in information technology
 
Cryptography-Known plain text attack
Cryptography-Known plain text attack Cryptography-Known plain text attack
Cryptography-Known plain text attack
 
6. cryptography
6. cryptography6. cryptography
6. cryptography
 
Ethics in it
Ethics in itEthics in it
Ethics in it
 
Network security
Network securityNetwork security
Network security
 
cyber security presentation.pptx
cyber security presentation.pptxcyber security presentation.pptx
cyber security presentation.pptx
 
Legal, Ethical and Social Issues in Technology
Legal, Ethical and Social Issues in TechnologyLegal, Ethical and Social Issues in Technology
Legal, Ethical and Social Issues in Technology
 
Overview of cryptography
Overview of cryptographyOverview of cryptography
Overview of cryptography
 
Cyber Crime And Security
Cyber Crime And Security Cyber Crime And Security
Cyber Crime And Security
 
Ethics in Information Technology
Ethics in Information TechnologyEthics in Information Technology
Ethics in Information Technology
 
Presentation(group j)implementing trustworthy computing by Sundas Ilyas
Presentation(group j)implementing  trustworthy computing by Sundas IlyasPresentation(group j)implementing  trustworthy computing by Sundas Ilyas
Presentation(group j)implementing trustworthy computing by Sundas Ilyas
 
Cyber-physical systems Industrial applications in the CPSwarm Project
Cyber-physical systems Industrial applications in the CPSwarm ProjectCyber-physical systems Industrial applications in the CPSwarm Project
Cyber-physical systems Industrial applications in the CPSwarm Project
 
Data Privacy and Protection Presentation
Data Privacy and Protection PresentationData Privacy and Protection Presentation
Data Privacy and Protection Presentation
 
Cyber security
Cyber securityCyber security
Cyber security
 
Green computing ppt
Green computing  pptGreen computing  ppt
Green computing ppt
 
Wireless security presentation
Wireless security presentationWireless security presentation
Wireless security presentation
 
Cyber Security PPT.pptx
Cyber Security PPT.pptxCyber Security PPT.pptx
Cyber Security PPT.pptx
 
Data Protection Act presentation
Data Protection Act presentationData Protection Act presentation
Data Protection Act presentation
 
Computer Ethics
Computer EthicsComputer Ethics
Computer Ethics
 

Viewers also liked

Guarding and Growing Personal Data Value
Guarding and Growing Personal Data ValueGuarding and Growing Personal Data Value
Guarding and Growing Personal Data Valueaccenture
 
Technology Factor: Accelerating Your Journey to As a Service
Technology Factor: Accelerating Your Journey to As a ServiceTechnology Factor: Accelerating Your Journey to As a Service
Technology Factor: Accelerating Your Journey to As a Serviceaccenture
 
Development Frameworks and Methods (University of Greenwich BIT Coursework) b...
Development Frameworks and Methods (University of Greenwich BIT Coursework) b...Development Frameworks and Methods (University of Greenwich BIT Coursework) b...
Development Frameworks and Methods (University of Greenwich BIT Coursework) b...Nay Linn Ko
 
Digital Trust - Tech Vision 2016 Trend 5
Digital Trust - Tech Vision 2016 Trend 5Digital Trust - Tech Vision 2016 Trend 5
Digital Trust - Tech Vision 2016 Trend 5Accenture Technology
 
Development, Frameworks and Methods
Development, Frameworks and MethodsDevelopment, Frameworks and Methods
Development, Frameworks and MethodsMd. Mahbub Alam
 
Development Framework & Methods
Development Framework & MethodsDevelopment Framework & Methods
Development Framework & MethodsNay Lynn Aung
 

Viewers also liked (11)

Technology Vision 2017 - Overview
Technology Vision 2017 - OverviewTechnology Vision 2017 - Overview
Technology Vision 2017 - Overview
 
Guarding and Growing Personal Data Value
Guarding and Growing Personal Data ValueGuarding and Growing Personal Data Value
Guarding and Growing Personal Data Value
 
Technology Factor: Accelerating Your Journey to As a Service
Technology Factor: Accelerating Your Journey to As a ServiceTechnology Factor: Accelerating Your Journey to As a Service
Technology Factor: Accelerating Your Journey to As a Service
 
Security Technology Vision 2016
Security Technology Vision 2016Security Technology Vision 2016
Security Technology Vision 2016
 
Development Frameworks and Methods (University of Greenwich BIT Coursework) b...
Development Frameworks and Methods (University of Greenwich BIT Coursework) b...Development Frameworks and Methods (University of Greenwich BIT Coursework) b...
Development Frameworks and Methods (University of Greenwich BIT Coursework) b...
 
Digital Trust - Tech Vision 2016 Trend 5
Digital Trust - Tech Vision 2016 Trend 5Digital Trust - Tech Vision 2016 Trend 5
Digital Trust - Tech Vision 2016 Trend 5
 
Development, Frameworks and Methods
Development, Frameworks and MethodsDevelopment, Frameworks and Methods
Development, Frameworks and Methods
 
DFM BIT Coursework
DFM BIT CourseworkDFM BIT Coursework
DFM BIT Coursework
 
Development Framework & Methods
Development Framework & MethodsDevelopment Framework & Methods
Development Framework & Methods
 
The Promise of as-a-Service
The Promise of as-a-ServiceThe Promise of as-a-Service
The Promise of as-a-Service
 
AI and the Future of Growth
AI and the Future of GrowthAI and the Future of Growth
AI and the Future of Growth
 

Similar to Building Digital Trust : The role of data ethics in the digital age

Ethical Considerations in Data Analytics
Ethical Considerations in Data AnalyticsEthical Considerations in Data Analytics
Ethical Considerations in Data Analyticspriyanka rajput
 
Ethical Considerations in Data Analytics
Ethical Considerations in Data AnalyticsEthical Considerations in Data Analytics
Ethical Considerations in Data Analyticsarchijain931
 
Ethical Considerations in Data Analysis_ Balancing Power, Privacy, and Respon...
Ethical Considerations in Data Analysis_ Balancing Power, Privacy, and Respon...Ethical Considerations in Data Analysis_ Balancing Power, Privacy, and Respon...
Ethical Considerations in Data Analysis_ Balancing Power, Privacy, and Respon...Soumodeep Nanee Kundu
 
An examination of the ethical considerations involved in data analytics
An examination of the ethical considerations involved in data analyticsAn examination of the ethical considerations involved in data analytics
An examination of the ethical considerations involved in data analyticsUncodemy
 
The CISO’s Guide to Data Loss Prevention
The CISO’s Guide to Data Loss PreventionThe CISO’s Guide to Data Loss Prevention
The CISO’s Guide to Data Loss PreventionDigital Guardian
 
The value of big data analytics
The value of big data analyticsThe value of big data analytics
The value of big data analyticsMarc Vael
 
A Research Project PresentationOnline Policies for Enabling Fi.docx
A Research Project PresentationOnline Policies for Enabling Fi.docxA Research Project PresentationOnline Policies for Enabling Fi.docx
A Research Project PresentationOnline Policies for Enabling Fi.docxmakdul
 
Data mining and privacy preserving in data mining
Data mining and privacy preserving in data miningData mining and privacy preserving in data mining
Data mining and privacy preserving in data miningNeeda Multani
 
Research Ethics and Integrity | Ethical Standards | Data Mining | Mixed Metho...
Research Ethics and Integrity | Ethical Standards | Data Mining | Mixed Metho...Research Ethics and Integrity | Ethical Standards | Data Mining | Mixed Metho...
Research Ethics and Integrity | Ethical Standards | Data Mining | Mixed Metho...Glenn Villanueva
 
Overcoming Hidden Risks in a Shared Security Model
Overcoming Hidden Risks in a Shared Security ModelOvercoming Hidden Risks in a Shared Security Model
Overcoming Hidden Risks in a Shared Security ModelOnRamp
 
From information to intelligence
From information to intelligence From information to intelligence
From information to intelligence Srini Koushik
 
What Are the Challenges and Opportunities in Big Data Analytics.pdf
What Are the Challenges and Opportunities in Big Data Analytics.pdfWhat Are the Challenges and Opportunities in Big Data Analytics.pdf
What Are the Challenges and Opportunities in Big Data Analytics.pdfMr. Business Magazine
 
Article - 10 best data compliance practices .pdf
Article - 10 best data compliance practices .pdfArticle - 10 best data compliance practices .pdf
Article - 10 best data compliance practices .pdfEnov8
 
data minig for eng with all topics and history
data minig for eng with all topics and historydata minig for eng with all topics and history
data minig for eng with all topics and historynbaisane16
 
Ethics in Data Management.pptx
Ethics in Data Management.pptxEthics in Data Management.pptx
Ethics in Data Management.pptxRavindra Babu
 
Digital Ethical Risk Assessment
Digital Ethical Risk AssessmentDigital Ethical Risk Assessment
Digital Ethical Risk AssessmentMarc St-Pierre
 
Putting data science into perspective
Putting data science into perspectivePutting data science into perspective
Putting data science into perspectiveSravan Ankaraju
 
Addressing the EU GDPR & New York Cybersecurity Requirements: 3 Keys to Success
Addressing the EU GDPR & New York Cybersecurity Requirements: 3 Keys to SuccessAddressing the EU GDPR & New York Cybersecurity Requirements: 3 Keys to Success
Addressing the EU GDPR & New York Cybersecurity Requirements: 3 Keys to SuccessSirius
 

Similar to Building Digital Trust : The role of data ethics in the digital age (20)

Ethical Considerations in Data Analytics
Ethical Considerations in Data AnalyticsEthical Considerations in Data Analytics
Ethical Considerations in Data Analytics
 
Ethical Considerations in Data Analytics
Ethical Considerations in Data AnalyticsEthical Considerations in Data Analytics
Ethical Considerations in Data Analytics
 
Ethical Considerations in Data Analysis_ Balancing Power, Privacy, and Respon...
Ethical Considerations in Data Analysis_ Balancing Power, Privacy, and Respon...Ethical Considerations in Data Analysis_ Balancing Power, Privacy, and Respon...
Ethical Considerations in Data Analysis_ Balancing Power, Privacy, and Respon...
 
An examination of the ethical considerations involved in data analytics
An examination of the ethical considerations involved in data analyticsAn examination of the ethical considerations involved in data analytics
An examination of the ethical considerations involved in data analytics
 
The CISO’s Guide to Data Loss Prevention
The CISO’s Guide to Data Loss PreventionThe CISO’s Guide to Data Loss Prevention
The CISO’s Guide to Data Loss Prevention
 
The value of big data analytics
The value of big data analyticsThe value of big data analytics
The value of big data analytics
 
A Research Project PresentationOnline Policies for Enabling Fi.docx
A Research Project PresentationOnline Policies for Enabling Fi.docxA Research Project PresentationOnline Policies for Enabling Fi.docx
A Research Project PresentationOnline Policies for Enabling Fi.docx
 
Data mining and privacy preserving in data mining
Data mining and privacy preserving in data miningData mining and privacy preserving in data mining
Data mining and privacy preserving in data mining
 
Research Ethics and Integrity | Ethical Standards | Data Mining | Mixed Metho...
Research Ethics and Integrity | Ethical Standards | Data Mining | Mixed Metho...Research Ethics and Integrity | Ethical Standards | Data Mining | Mixed Metho...
Research Ethics and Integrity | Ethical Standards | Data Mining | Mixed Metho...
 
Data Governance and Marketing
Data Governance and MarketingData Governance and Marketing
Data Governance and Marketing
 
Data security and privacy
Data security and privacyData security and privacy
Data security and privacy
 
Overcoming Hidden Risks in a Shared Security Model
Overcoming Hidden Risks in a Shared Security ModelOvercoming Hidden Risks in a Shared Security Model
Overcoming Hidden Risks in a Shared Security Model
 
From information to intelligence
From information to intelligence From information to intelligence
From information to intelligence
 
What Are the Challenges and Opportunities in Big Data Analytics.pdf
What Are the Challenges and Opportunities in Big Data Analytics.pdfWhat Are the Challenges and Opportunities in Big Data Analytics.pdf
What Are the Challenges and Opportunities in Big Data Analytics.pdf
 
Article - 10 best data compliance practices .pdf
Article - 10 best data compliance practices .pdfArticle - 10 best data compliance practices .pdf
Article - 10 best data compliance practices .pdf
 
data minig for eng with all topics and history
data minig for eng with all topics and historydata minig for eng with all topics and history
data minig for eng with all topics and history
 
Ethics in Data Management.pptx
Ethics in Data Management.pptxEthics in Data Management.pptx
Ethics in Data Management.pptx
 
Digital Ethical Risk Assessment
Digital Ethical Risk AssessmentDigital Ethical Risk Assessment
Digital Ethical Risk Assessment
 
Putting data science into perspective
Putting data science into perspectivePutting data science into perspective
Putting data science into perspective
 
Addressing the EU GDPR & New York Cybersecurity Requirements: 3 Keys to Success
Addressing the EU GDPR & New York Cybersecurity Requirements: 3 Keys to SuccessAddressing the EU GDPR & New York Cybersecurity Requirements: 3 Keys to Success
Addressing the EU GDPR & New York Cybersecurity Requirements: 3 Keys to Success
 

More from Accenture Technology

Accenture Labs Innovation Stories 2020
Accenture Labs Innovation Stories 2020Accenture Labs Innovation Stories 2020
Accenture Labs Innovation Stories 2020Accenture Technology
 
Helping people to be ‘net better off’ with Accenture + Workday
Helping people to be ‘net better off’ with Accenture + WorkdayHelping people to be ‘net better off’ with Accenture + Workday
Helping people to be ‘net better off’ with Accenture + WorkdayAccenture Technology
 
Accenture Tech Vision 2020 for SAP Solutions
Accenture Tech Vision 2020 for SAP SolutionsAccenture Tech Vision 2020 for SAP Solutions
Accenture Tech Vision 2020 for SAP SolutionsAccenture Technology
 
Helping you get back to the workplace confidently
Helping you get back to the workplace confidentlyHelping you get back to the workplace confidently
Helping you get back to the workplace confidentlyAccenture Technology
 
Driving Workday transformation in a virtual world
Driving Workday transformation in a virtual worldDriving Workday transformation in a virtual world
Driving Workday transformation in a virtual worldAccenture Technology
 
Accenture Technology Vision 2020: Infographic
Accenture Technology Vision 2020: InfographicAccenture Technology Vision 2020: Infographic
Accenture Technology Vision 2020: InfographicAccenture Technology
 
Accenture Technology Vision 2020: Overview
Accenture Technology Vision 2020: OverviewAccenture Technology Vision 2020: Overview
Accenture Technology Vision 2020: OverviewAccenture Technology
 
Accenture Technology Vision 2020: AI and Me
Accenture Technology Vision 2020: AI and MeAccenture Technology Vision 2020: AI and Me
Accenture Technology Vision 2020: AI and MeAccenture Technology
 
Accenture Technology Vision 2020: Innovation DNA
Accenture Technology Vision 2020: Innovation DNAAccenture Technology Vision 2020: Innovation DNA
Accenture Technology Vision 2020: Innovation DNAAccenture Technology
 
Elevating the Workforce Experience with Workday
Elevating the Workforce Experience with WorkdayElevating the Workforce Experience with Workday
Elevating the Workforce Experience with WorkdayAccenture Technology
 
Automating HR Correspondence: Experiences in HR at ZF Friedrichshafen AG
Automating HR Correspondence: Experiences in HR at ZF Friedrichshafen AGAutomating HR Correspondence: Experiences in HR at ZF Friedrichshafen AG
Automating HR Correspondence: Experiences in HR at ZF Friedrichshafen AGAccenture Technology
 
Technology Vision 2019 for Workday
Technology Vision 2019 for WorkdayTechnology Vision 2019 for Workday
Technology Vision 2019 for WorkdayAccenture Technology
 
Accenture Technology Vision 2019 for Pega
Accenture Technology Vision 2019 for PegaAccenture Technology Vision 2019 for Pega
Accenture Technology Vision 2019 for PegaAccenture Technology
 

More from Accenture Technology (20)

Accenture Labs Innovation Stories 2020
Accenture Labs Innovation Stories 2020Accenture Labs Innovation Stories 2020
Accenture Labs Innovation Stories 2020
 
Helping people to be ‘net better off’ with Accenture + Workday
Helping people to be ‘net better off’ with Accenture + WorkdayHelping people to be ‘net better off’ with Accenture + Workday
Helping people to be ‘net better off’ with Accenture + Workday
 
Accenture Labs Innovation Stories
Accenture Labs Innovation StoriesAccenture Labs Innovation Stories
Accenture Labs Innovation Stories
 
Resetting Tech Culture
Resetting Tech CultureResetting Tech Culture
Resetting Tech Culture
 
Resetting Tech Culture
Resetting Tech CultureResetting Tech Culture
Resetting Tech Culture
 
Accenture Tech Vision 2020 for SAP Solutions
Accenture Tech Vision 2020 for SAP SolutionsAccenture Tech Vision 2020 for SAP Solutions
Accenture Tech Vision 2020 for SAP Solutions
 
Highlights on the five key trends
Highlights on the five key trendsHighlights on the five key trends
Highlights on the five key trends
 
Helping you get back to the workplace confidently
Helping you get back to the workplace confidentlyHelping you get back to the workplace confidently
Helping you get back to the workplace confidently
 
Driving Workday transformation in a virtual world
Driving Workday transformation in a virtual worldDriving Workday transformation in a virtual world
Driving Workday transformation in a virtual world
 
Accenture + Red Hat
Accenture + Red HatAccenture + Red Hat
Accenture + Red Hat
 
Accenture and Mercedes Case Study
Accenture and Mercedes Case StudyAccenture and Mercedes Case Study
Accenture and Mercedes Case Study
 
Accenture Technology Vision 2020: Infographic
Accenture Technology Vision 2020: InfographicAccenture Technology Vision 2020: Infographic
Accenture Technology Vision 2020: Infographic
 
Accenture Technology Vision 2020: Overview
Accenture Technology Vision 2020: OverviewAccenture Technology Vision 2020: Overview
Accenture Technology Vision 2020: Overview
 
Accenture Technology Vision 2020: AI and Me
Accenture Technology Vision 2020: AI and MeAccenture Technology Vision 2020: AI and Me
Accenture Technology Vision 2020: AI and Me
 
Accenture Technology Vision 2020: Innovation DNA
Accenture Technology Vision 2020: Innovation DNAAccenture Technology Vision 2020: Innovation DNA
Accenture Technology Vision 2020: Innovation DNA
 
Elevating the Workforce Experience with Workday
Elevating the Workforce Experience with WorkdayElevating the Workforce Experience with Workday
Elevating the Workforce Experience with Workday
 
Automating HR Correspondence: Experiences in HR at ZF Friedrichshafen AG
Automating HR Correspondence: Experiences in HR at ZF Friedrichshafen AGAutomating HR Correspondence: Experiences in HR at ZF Friedrichshafen AG
Automating HR Correspondence: Experiences in HR at ZF Friedrichshafen AG
 
Technology Vision for SAP 2019
Technology Vision for SAP 2019Technology Vision for SAP 2019
Technology Vision for SAP 2019
 
Technology Vision 2019 for Workday
Technology Vision 2019 for WorkdayTechnology Vision 2019 for Workday
Technology Vision 2019 for Workday
 
Accenture Technology Vision 2019 for Pega
Accenture Technology Vision 2019 for PegaAccenture Technology Vision 2019 for Pega
Accenture Technology Vision 2019 for Pega
 

Recently uploaded

Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsNathaniel Shimoni
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
What is Artificial Intelligence?????????
What is Artificial Intelligence?????????What is Artificial Intelligence?????????
What is Artificial Intelligence?????????blackmambaettijean
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demoHarshalMandlekar2
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningLars Bell
 

Recently uploaded (20)

Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directions
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
What is Artificial Intelligence?????????
What is Artificial Intelligence?????????What is Artificial Intelligence?????????
What is Artificial Intelligence?????????
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demo
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
 

Building Digital Trust : The role of data ethics in the digital age

  • 1. Accenture Labs Building Digital Trust The role of data ethics in the digital age
  • 2. 2 Data is the biggest risk that is unaccounted for by businesses today Copyright © 2016 Accenture All rights reserved.
  • 3. 81% of executives agree that as the business value of data grows, the risk companies face from improper handling of data are growing exponentially Data ethics in the digital economy Copyright © 2016 Accenture All rights reserved. 3 80% of executives report strong demand among knowledge workers for increased ethical controls for data 83% of executives agree that trust is the cornerstone of the digital economy Accenture survey confirms importance of digital trust
  • 4. Data ethics across the supply chain Every step of the data supply chain is an entry point for new classes of risk Copyright © 2016 Accenture All rights reserved. 4
  • 5. Mitigating risks – Addressing External Concerns Data Supply Chain Step Lifecycle Phase Initiation Strategy Planning Design Executing Launch Monitoring Operation Closing Improvement Sample ethical questions to address external concerns Are data disclosers aware that they have disclosed data? Can they inspect it? Are they aware of how they disclosed this data (e.g. directly, tracking, derived)? Has intent for how the data will be used been communicated? What are the classes of harm that a bad actor or group of actors could cause if they had access to the entire set of aggregated data sources or any related analysis? Did the data discloser provide consent to this specific data use? Did any consent agreement make it clear that data could be used in this way? Do data disclosers expect control, ownership, remuneration, or transparency over the data they have disclosed if it is being shared or sold? Did they provide informed consent for this action? Are stakeholders aware of the time frame that their data will be retained? Would they be surprised to learn it still exists? Copyright © 2016 Accenture All rights reserved. 5 Implementing ethics assessments throughout the data supply chain can help mitigate these risks
  • 6. Mitigating risks – Addressing Internal Concerns Data Supply Chain Step Lifecycle Phase Initiation Strategy Planning Design Executing Launch Monitoring Operation Closing Improvement Sample ethical questions to address internal concerns What methods were used to collect the data? Do collection methods align with best practices? Did data disclosers provide informed consent? What are the security risks with how the data is stored? What biases have been introduced during manipulation? Was an ethics review performed? Are the uses of the data consistent with the intentions of the discloser? What are the potential risks to the organization if a watchdog group knew the data was used in this way? Does the act of sharing or selling data enhance the experience for the data discloser (not including the data seller’s own ability to operate)? Is there another way to share or sell this data that would increase transparency? Should the original discloser be notified? Is metadata being retained? Are there any disaster recovery archives that have copies of the data? Copyright © 2016 Accenture All rights reserved. 6 Implementing ethics assessments throughout the data supply chain can help mitigate these risks
  • 7. DATA AT REST Data Disclosure Data may be sourced from archives or other backups Guideline: Ensure the context of original consent is known and respected; data security practices should be revisited on a regular basis to minimize risk of accidental disclosure. Aggregation of data from multiple sources often represents a new context for disclosure; have the responsible parties made a meaningful effort to renew informed consent agreements for this new context? Data Manipulation Data is stored locally without widespread distribution channels; all transformations happen locally Guideline: Set up a secure environment for handling static data so the risk of security breaches is minimized and data is not mistakenly shared with external networks. Data movement and transformation should be fully auditable. Data Consumption Data analytics processes do not rely on live or real-time updates Guideline: Consider how comfortable data disclosers would be with how the derived insights are being applied. Gain consent, preferably informed consent, from data disclosers for application-specific uses of data. Informed consent and avoiding harm To maximize digital trust, organizations must practice a “do no harm” ethos and strive for informed consent from data subjects Copyright © 2016 Accenture All rights reserved. 7
  • 8. DATA IN MOTION Data Disclosure Data is collected in real-time from machine sensors, automated processes, or human input; while in motion, data may or may not be retained, reshaped, corrupted, disclosed, etc. Guideline: Be respectful of data disclosers and the individuals behind the data. Protect the integrity and security of data throughout networks and supply chains. Only collect the minimum amount of data needed for a specific application. Avoid collecting personally identifiable information, or any associated meta-data whenever possible. Maximize preservation of provenance. Data Manipulation Data is actively being moved or aggregated; data transformations use multiple datasets or API calls which might be from multiple parties; the Internet may be used Guideline: Ensure that data moving between networks and cloud service providers is encrypted; shared datasets should strive to minimize the amount of data shared and anonymize as much as possible. Be sure to destroy any temporary databases that contain aggregated data. Are research outcomes consistent with the discloser’s original intentions? Data Consumption Data insights could be context-aware, informed by sensors, or might benefit from streamed data or API calls Guideline: The data at rest guidelines for data consumption are equally important here. In addition, adhere to any license agreements associated with the APIs being used. Encrypt data. Be conscious of the lack of control over streamed data once it is broadcast. Streaming data also has a unique range of potential harms—the ability to track individuals, deciphering network vulnerabilities, etc. Informed consent and avoiding harm To maximize digital trust, organizations must practice a “do no harm” ethos and strive for informed consent from data subjects Copyright © 2016 Accenture All rights reserved. 8
  • 9. Best practices for data sharing 94% of organizations are required to comply with ethical data handling requirements that go beyond their own protocols Copyright © 2016 Accenture All rights reserved. 9 1. Ongoing collaboration and mutual accountability are necessary between data sharing partners. 2. Build common contracting procedures, but treat every contract and dataset as unique. 3. Develop ethical review procedures between partners. 4. Be mutually accountable for interpretive resources. 5. Maximalist approaches to sharing are not always advisable. 6. Identify potential risks of sharing data within sharing agreements. 8. When ethical principles or regulations are unclear, emphasize process and transparency. 9. Published research requires additional attention. 10. Treat trust as a networked phenomenon. 7. Repurposed data requires special attention. Applying best practices for data sharing helps mitigate risk without sacrificing the value data-sharing agreements create
  • 10. Building a code of data ethics—12 guidelines 1. The highest priority is to respect the persons behind the data. Copyright © 2016 Accenture All rights reserved. 10 2. Account for the downstream uses of datasets. 3. The consequences of utilizing data and analytical tools today are shaped by how they’ve been used in the past. 4. Seek to match privacy and security safeguards with privacy and security expectations. 5. Always follow the law, but understand that the law is often a minimum bar. 6. Be wary of collecting data just for the sake of having more data. For more in-depth description: https://www.accenture.com/ us-en/insight-data-ethics 7. Data can be a tool of both inclusion and exclusion. 8. As far as possible, explain methods for analysis and marketing to data disclosers. 9. Data scientists and practitioners should accurately represent their qualifications (and limits to their expertise), adhere to professional standards, and strive for peer accountability. 10. Aspire to design practices that incorporate transparency, configurability, accountability, and auditability. 11. Products and research practices should be subject to internal (and potentially external) ethical review. 12. Governance practices should be robust, known to all team members and regularly reviewed. i
  • 11. Start building trust today The ethical treatment of data does not begin and end with a single project in today’s digital economy – it needs to become a core value across an organization The embodiment of these actions into an organizational code of data ethics is an opportunity for organizations to distinguish themselves as industry leaders both in product/service value and winning the trust of digital consumers As organizations move forward in the digital economy, embracing data ethics offers a way to engender trust and provide vital differentiation in a crowded marketplace Copyright © 2016 Accenture All rights reserved. 11

Editor's Notes

  1. Today’s digital economies are built on creating, collecting, combining, and sharing data Existing governance frameworks and risk mitigation strategies are focused on preventing cybersecurity threats These techniques fall short considering that unethical and illegal use of data insights can amplify biases, or be used for purposes far outside the consent of original data disclosers Success in the digital economy will hinge on an organization’s ability to create and maintain ”digital-trust,” thereby reinforcing the notion that a brand is reliable, capable, safe, transparent, and truthful in its digital practices A focus on ethics puts emphasis on addressing these new risk vectors while creating confidence in a brand built on digital-trust
  2. Ethical treatment of materials and labor in a conventional supply chain generates respect and trust in brands from consumers Ethical treatment of digital assets in a data supply chain garners trust in similar ways Beyond consumer trust, an ethical understanding of potential risks and harms that result from misusing data helps an organization better manage their risk exposure in digital ecosystems Creating cross-organizational/industry taxonomies, or classifications, of these risks and harms opens up the discussion around these issues and allows for future planning as new risk vectors are discovered
  3. Project management and service design professionals can help mitigate these risks Along with understanding the risks and harms that access and use of new data bring, applying risk and harm reduction techniques allows a business to escape potentially paralyzing situations Incorporating ethical reviews throughout project and service lifecycles helps project managers stay on top of internal and external concerns around data use Approaching ethical problems proactively can help organizations accomplish that trust is baked into and reinforced with new offerings, engendering loyalty and confidence among consumers and partners
  4. Project management and service design professionals can help mitigate these risks Along with understanding the risks and harms that access and use of new data bring, applying risk and harm reduction techniques allows a business to escape potentially paralyzing situations Incorporating ethical reviews throughout project and service lifecycles helps project managers stay on top of internal and external concerns around data use Approaching ethical problems proactively can help organizations accomplish that trust is baked into and reinforced with new offerings, engendering loyalty and confidence among consumers and partners
  5. Actively managing risks helps minimize the potential for harm As data manipulation and consumption are planned, digital-trust is strengthened by ensuring data disclosers are fully aware of what their data could be used for, and how potential data use impacts them As the amount of collected data increases and its potential for use grows with an emerging platform economy, measures of informed consent that demonstrate a “do no harm” ethos promote digital-trust and reduces an organization’s risk exposure An organization will stand out and truly embody this ethos if they distinguish and clarify how consent agreements treat data at rest and data in motion, two paradigms that define modern day data use
  6. Actively managing risks helps minimize the potential for harm As data manipulation and consumption are planned, digital-trust is strengthened by ensuring data disclosers are fully aware of what their data could be used for, and how potential data use impacts them As the amount of collected data increases and its potential for use grows with an emerging platform economy, measures of informed consent that demonstrate a “do no harm” ethos promote digital-trust and reduces an organization’s risk exposure An organization will stand out and truly embody this ethos if they distinguish and clarify how consent agreements treat data at rest and data in motion, two paradigms that define modern day data use
  7. As opportunities to share data data and increase that data’s value present themselves, organizations need to be mindful of consent agreements data disclosers signed as well as the potential for ethical misuse of the data in question