Unit 5.9: Data Security and Ethical Considerations
1. Introduction
In the modern business landscape, data is often called “the new oil”—a valuable asset that drives decision-making, innovation, and competitive advantage. However, like any valuable asset, data is a target for theft, misuse, and corruption. This section explores the two critical pillars of responsible data management: Data Security, which involves the technical and procedural measures to protect data, and Data Ethics, which concerns the moral principles guiding its collection, use, and handling. For any business, mastering both is essential for maintaining customer trust, ensuring legal compliance, and safeguarding its long-term viability.
2. Core Concepts in Data Security and Ethics
flowchart TB
subgraph DataResponsibility["📊 Responsible Data Management"]
direction TB
subgraph Security["🔐 Data Security (CIA Triad)"]
direction LR
C["🔒 Confidentiality\nAccess Control"]
I["✅ Integrity\nData Accuracy"]
A["🟢 Availability\nUptime & Access"]
end
subgraph Ethics["⚖️ Data Ethics (PAPA Framework)"]
direction LR
P1["👤 Privacy\nConsent & Rights"]
P2["🎯 Accuracy\nCorrect Data"]
P3["💼 Property\nOwnership"]
P4["🔓 Accessibility\nFair Access"]
end
subgraph Threats["⚠️ Common Threats"]
T1["🐛 Malware"]
T2["🎣 Phishing"]
T3["👤 Insider Threats"]
T4["💥 DoS Attacks"]
end
end
Security -->|"Technical Protection"| DATA(("💾 Business\nData"))
Ethics -->|"Moral Guidelines"| DATA
Threats -->|"Risks to"| DATA
Figure: Data Security and Ethics Framework - Protecting and Responsibly Using Business Data
2.1 Data Security: Protecting the Asset
Data Security refers to the practice of protecting digital information from unauthorized access, use, disclosure, alteration, or destruction. The foundational model for data security is the CIA Triad.
- Confidentiality: Ensuring that data is accessible only to authorized individuals. It’s about preventing sensitive information from reaching the wrong people.
- Methods: Encryption, access control lists (ACLs), user authentication (passwords, biometrics), and data classification.
- Integrity: Maintaining the consistency, accuracy, and trustworthiness of data over its entire lifecycle. Data must not be changed in transit or altered by unauthorized persons.
- Methods: Hashing algorithms, version control, data validation checks, and audit trails.
- Availability: Guaranteeing that data is accessible and usable when needed by authorized users. It protects against downtime and data loss.
- Methods: Regular backups, hardware redundancy (e.g., RAID), disaster recovery plans, and protection against Denial-of-Service (DoS) attacks.
Common Security Threats to Business Data:
- Malware: Malicious software like viruses, spyware, and ransomware that can steal, encrypt, or delete data.
- Phishing: Fraudulent attempts, usually via email, to trick employees into revealing sensitive information like passwords or financial details.
- Insider Threats: Current or former employees, contractors, or partners who intentionally or unintentionally misuse their authorized access to compromise data.
- Denial-of-Service (DoS) Attacks: Overwhelming a system’s resources (like a website’s server) to make it unavailable to legitimate users.
- Physical Theft: The theft of company laptops, servers, or storage devices containing sensitive data.
2.2 Ethical Considerations: Using Data Responsibly
Data Ethics involves the moral principles and judgments that govern the collection, analysis, and dissemination of data. While data security is about preventing unauthorized access, data ethics is about whether the authorized use of data is morally right. A useful framework for considering data ethics is PAPA.
- Privacy: The right of individuals to control information about themselves. Businesses must consider:
- Do we have the right to collect this data?
- Have we obtained clear and informed consent from the individual?
- Are we transparent about how we will use their data?
- Accuracy: The responsibility to ensure that data is correct, up-to-date, and not misleading. Inaccurate data can lead to wrong decisions and can unfairly harm individuals (e.g., a wrong credit score).
- Property: The question of who owns data and has rights to it. This includes intellectual property and the ownership of personal data.
- Can a business sell customer data to third parties? If so, under what conditions?
- Accessibility: Who should have access to information and under what conditions? This deals with defining access rights within an organization and preventing digital divides.
3. Business Applications Across Functions
Data security and ethics are not just an IT department’s concern; they are integral to every business function.
- Finance Department
- Security: Protecting highly sensitive financial data, such as customer bank account numbers, company revenue figures, and transaction records, is paramount. Encryption of financial databases and strict access controls are mandatory to prevent fraud and comply with regulations set by bodies like Nepal Rastra Bank (NRB).
- Ethics: Ensuring the accuracy of financial reporting is an ethical obligation to shareholders and regulators. Using customer transaction data ethically means not exploiting patterns (e.g., signs of financial distress) for predatory purposes.
- Human Resources (HR) Department
- Security: HR databases contain a wealth of Personally Identifiable Information (PII), including employee addresses, citizenship numbers, salaries, and performance reviews. A breach here can lead to identity theft and legal action. Role-based access control is critical to ensure a manager can’t see the salary of their peer.
- Ethics: Using data ethically in hiring involves avoiding biases in algorithms that screen resumes. It also means maintaining the confidentiality of employee health records and performance issues.
- Operations & Supply Chain Management
- Security: Protecting proprietary operational data, such as manufacturing processes, inventory levels, and supplier contracts, is crucial for maintaining a competitive edge. Securing the supply chain management system prevents rivals from seeing your suppliers or pricing.
- Ethics: Ensuring the integrity of quality control data is an ethical duty to customers to guarantee product safety. Transparency in the supply chain (e.g., ethically sourced materials) is increasingly demanded by consumers.
- Marketing Department
- Security: Marketing teams manage large databases of customer information, including contact details, purchase history, and browsing behavior. This data is a prime target for cybercriminals. Protecting this data from breaches is essential to maintain customer trust.
- Ethics: This is a major area of ethical concern. Marketing must be transparent about data collection (e.g., through clear privacy policies and cookie consent). Ethical marketing involves using personalization to add value for the customer, not to manipulate them. Selling customer lists without explicit consent is a major ethical violation.
4. Real-World Examples from Nepal
Case Study 1: Digital Wallets (eSewa, Khalti) and the CIA Triad
- Context: Digital payment providers like eSewa and Khalti handle millions of financial transactions daily. Their entire business model rests on user trust.
- Application:
- Confidentiality: They use end-to-end encryption to ensure that a user’s transaction details and account balance are unreadable to anyone trying to intercept them.
- Integrity: When you send Rs. 500, the system must ensure the recipient gets exactly Rs. 500 and your balance is debited by exactly Rs. 500. Hashing and transaction logs ensure data isn’t altered.
- Availability: Their services must be available 24/7. They invest heavily in redundant servers and backup systems to ensure their platform doesn’t go down, which would halt business for thousands of merchants and users. A failure in any part of the CIA Triad would be catastrophic for their business.
Case Study 2: Daraz Nepal and Ethical Data Collection
- Context: Daraz, as a leading e-commerce platform, collects vast amounts of customer data: what you search for, what you view, how long you stay on a page, your address, and your payment information.
- Application:
- Security Challenge: This centralized database of customer behavior is a goldmine for hackers. Daraz must invest in robust firewalls, intrusion detection systems, and secure coding practices to protect this data.
- Ethical Dilemma: Daraz uses this data to provide personalized recommendations, which enhances the user experience. However, the ethical line is thin. Are they transparent about how much data they collect? Do they share or sell this data with third-party advertisers? Their Privacy Policy must be clear, and users should have control over their data. This is a classic example of balancing business goals (more sales) with the ethical principle of customer privacy.
Case Study 3: Internet Service Providers (ISPs) and Data Privacy
- Context: ISPs in Nepal (e.g., WorldLink, Vianet) are the gatekeepers of all internet traffic for their customers. They have the technical ability to see which websites their customers visit.
- Application:
- Security Obligation: ISPs must secure their networks to protect users from attacks like DNS hijacking, where a user trying to visit their bank’s website could be redirected to a fake phishing site.
- Ethical Responsibility: The core ethical issue is privacy. While ISPs need to monitor traffic for network management, they have an ethical duty not to snoop on the content of their users’ communications or sell browsing histories to marketing companies. This is governed by laws like Nepal’s Individual Privacy Act, 2018, which establishes data privacy as a fundamental right.
5. Key Takeaways
- Data is a critical business asset that requires rigorous protection.
- Data Security is built on the CIA Triad: Confidentiality (secrecy), Integrity (accuracy), and Availability (accessibility).
- Data Ethics is guided by principles of PAPA: Privacy (consent), Accuracy (correctness), Property (ownership), and Accessibility (right to access).
- Security and ethics are not just IT issues; they are fundamental responsibilities of every business function, from Finance and HR to Operations and Marketing.
- Failure to manage data securely and ethically can result in severe financial losses, reputational damage, and legal penalties.
6. Review Questions
- Explain the three components of the CIA Triad and provide a business example for each from the perspective of a Nepali commercial bank.
- What is the difference between data security and data ethics? Why does a business need to focus on both?
- Describe two potential ethical dilemmas a marketing manager at an e-commerce company like SastoDeal might face when using customer data.
- Why is data integrity especially critical for a company’s Operations and Finance departments?

