University Core Values And Private Data Essay

PAGES
3
WORDS
1035
Cite

¶ … Values The core values of St. Leo's are expressed on the university's website as excellence, community, respect, personal development, responsible stewardship and integrity. These all in some way inform how the university and its staff handle private data, but in particular the values of integrity, respect and responsible stewardship all apply. Respect for others is a core value that relates to private data, because to protect the privacy of the data is to respect the individual. This is something that should always be remembered -- that data represents individual people, and that is the reason why it is important to protect data.

The most important core value with respect to data privacy is integrity. The value of integrity stands for a pledge to be "honest, just and consistent in deed." This value implies that there should be a high value placed on integrity in terms of behavior -- deeds -- and that this integrity includes things like honesty. Integrity means that everybody should be treated well, and this treatment extends to the information that the school collects about each and every individual.

Respect as a core value is described as "fostering a commitment to excellence in our work" and the community with which we work expects nothing less. It is reasonable, therefore, that the people who give us privileged or private data receive our best efforts at all times with respect to the security of that data. We can do everything that is in our power, and demonstrate our commitment to their best interests, and in doing so we will, the entire St. Leo's community, be able to ensure that each and every individual can trust in our work, and know that we are doing everything we can for them. This demonstration of excellence comes with understanding the position of the other person, respecting that position, and ensuring that we safeguard their data as well as possible.

The school collects a range of data, about both students and staff members, as well as faculty. This information is sometimes mundane, and sometimes sensitive, but the school has a duty, or obligation, to respect the privacy of this data. There are several ways in which this manifests. First, it manifests in terms of the people who have access to this data only accessing the data for the reasons that it was collected....

...

Some of this information is person al in nature, and personal information is given to the school in confidence. The information is given by the person because the school needs it for some reason -- be this basic address information, academic records or even in some cases medical information. Whatever the information, the university and its staff are mandated by the need for integrity to safeguard this information carefully, because that is the expectation that the student has when he or she gives us this information.
When such an obligation is placed upon us, it thus becomes our duty as servants to ensure that the confidence in which that information was conveyed is not broken. That is our duty. If we cannot be trusted, if for some reason we access private information for purposes other than official duties, then that indicates a violation of trust. To violate trust is something that will damage the school, and it will damage the people involved. As a member of St. Leo's one is obligated to uphold the core value of integrity, and that means maintaining the trust and confidence that students or other stakeholders place in us when they provide private information.

In addition to accessing information when it is not needed to perform a task, the integrity aspect involves ensuring that there is a high level of security for the systems. There are a number of security best practices that need to be upheld in order to maintain the integrity for which we are known. For example, when we access information, even for the performance of official duties, we learn things, but that knowledge must be held in the strictest confidence. It is not possible to talk about people's private information with others, even sharing it in an informal or offhand way, without violating the core value of integrity. All information that was given in confidence can be transmitted by many different means, but no means of transmitting private information for anything other than official purposes would be upholding the integrity of yourself, or the school.

The school itself also has an obligation. The performance of tasks at St. Leo's is, per the core values, to be conducted at a very high level. Excellence is one of the core values, and it goes along with integrity. Security systems and protocols are put into place…

Cite this Document:

"University Core Values And Private Data" (2015, November 01) Retrieved April 16, 2024, from
https://www.paperdue.com/essay/university-core-values-and-private-data-2157547

"University Core Values And Private Data" 01 November 2015. Web.16 April. 2024. <
https://www.paperdue.com/essay/university-core-values-and-private-data-2157547>

"University Core Values And Private Data", 01 November 2015, Accessed.16 April. 2024,
https://www.paperdue.com/essay/university-core-values-and-private-data-2157547

Related Documents

Psychosocial factors, such as depression, anxiety and social support, also induce drinking. This study confirmed that social cognitive factors drove college students to report on their own drinking. Psychosocial motives drove them to do so only at 1%. Social support was the only significant psychosocial predictor. The awareness of both the positive and negative consequences of drinking was quite likely behind the willingness of college students to report on

Data Warehousing and Data Mining Executive Overview Analytics, Business Intelligence (BI) and the exponential increase of insight and decision making accuracy and quality in many enterprises today can be directly attributed to the successful implementation of Enterprise Data Warehouse (EDW) and data mining systems. The examples of how Continental Airlines (Watson, Wixom, Hoffer, 2006) and Toyota (Dyer, Nobeoka, 2000) continue to use advanced EDW and data mining systems and processes to streamline

Value Chains Porter (1985) introduced the concept of "physical" value chain. According to Porter (1985), by understanding and analyzing physical value chain, a business can uncover strategically relevant activities -- purchase of raw material, design, manufacture, market, and support of the products or services it sells -- for adding value to the customers. A physical value chain consists of five core activities: inbound logistic, operations, outbound logistics, marketing & sales, and services, and

Data Warehousing: A Strategic Weapon of an Organization. Within Chapter One, an introduction to the study will be provided. Initially, the overall aims of the research proposal will be discussed. This will be followed by a presentation of the overall objectives of the study will be delineated. After this, the significance of the research will be discussed, including a justification and rationale for the investigation. The aims of the study are to

organization is derived from the preparedness cycle developed by the National Incident Management System (NIMS) and utilized by the Federal Emergency Management Association (FEMA) of the U.S. Department of Homeland Security and other disaster response / emergency preparedness organizations. A primary advantage of using this proven model is that it provides a consistently implemented and commonly understood approach to disaster preparedness. The preparedness cycle is a continuously renewing series

To some, that suggests that college is a more viable alternative for many of those who would otherwise have sought jobs in the manufacturing sector previously. However, there are at least two reasons that such a conclusion may be invalid. First, while many manufacturing jobs have disappeared, many other types of technical jobs opportunities have emerged from numerous new technologies (Klein, 2012). Many of them require vocational degrees and certifications