Preview

The Personal Data (Privacy) Ordinance and Octopus Card System  

Powerful Essays
Open Document
Open Document
1033 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
The Personal Data (Privacy) Ordinance and Octopus Card System  
The Personal Data (Privacy) Ordinance and Octopus Card System
Lam Ka Chun
3035069794
The University of Hong Kong
CCST9029 Cyberspace Crime: Technology and Ethics
Dr. K.P. Chow
Ms. Chan Vivien Pui Shan

Abstract
This article is about the leakage of data of the Octopus card company. In 2010 , Octopus sold the information of their clients to 6 companies for promotion and made a profit of 44 million Hong Kong dollars over 4.5 years .In view of the case of Octopus case, this article will go through three part to study it : technical aspect, ethical aspect and legal aspect. It will also suggest feasible suggestions.

The dis-honest company led a leakage of personal data:
Octopus Card Company
Introduction of Octopus card company
According to the statistics, 95% of those between the ages of 16 and 65 have an Octopus and Octopus processes over 12 million transactions a day. The card is accepted by more than 100 transportation service providers and 160 retailers, including 7-Eleven, Starbucks, and Park & Shop. It can also be used at pay phones, photo booths, and parking garages. This reveals that the octopus is commonly and widely used. Also implied that the leakage of personal data influences a lot of people.
Technical Issue
In terms of technical Issue, Octopus card is a rechargeable contactless stored value smart card used widely in transportation and retail business. How can it transfer the money without contact? It is because it used the technique of Radio Frequency Identification (RFID).
We will go into deeper of the RFID. RFID is the use of a wireless non-contact system that uses radio-frequency electromagnetic fields to transfer data from a tag attached to an object, for the purposes of automatic identification and tracking. The Octopus card requires no battery and are powered and read at short ranges via magnetic fields (electromagnetic induction). The tag contains electronically stored information which can be read from up to several meters

You May Also Find These Documents Helpful

  • Good Essays

    Credit Card Fraud

    • 729 Words
    • 3 Pages

    The raised letters and numbers on the plastic cards are now rarely used or even read. This then gave rise to “skimming” devices that could be used by some unscrupulous persons to electronically scan and save the information from many customers' cards. Techniques such as "skimming," in which criminals capture card information and personal-identification numbers, have existed for years, often on a small scale. A growing security concern with Skimming devices is the possible release of the user’s personal information or location to unauthorized parties. So, what is now needed is a way to increase the security of payment card use at merchant locations.…

    • 729 Words
    • 3 Pages
    Good Essays
  • Good Essays

    As seen in the video, criminals stealing hard drives from commercial establishments is becoming more common and holds the opportunity for criminals to steal hundreds of individuals’ credit and debit card information. This growing trend puts the consumer at risk for extra charges on their credit and debit cards as well as identify theft. What is even more surprising is that consumers are unaware of the true risks that are involved in using their card at terminals in stores. Moreover, even though businesses are to swipe the hard drives clean each day, many are failing to complete this proper procedure to prevent consumer’s stolen information. To add, where the consumer’s information was compromised is not made available to the consumer.…

    • 666 Words
    • 3 Pages
    Good Essays
  • Better Essays

    RFID Chips

    • 3547 Words
    • 15 Pages

    Radio-frequency identification (RFID) chips are small radio-frequency electromagnetic fields that can be used in a product, animal, and humans to track location, transfer data, and to identify the object. These chips are as small as a grain of rice and can store over 2,000 bytes of data. Some chips are powered by and read at short ranges via magnetic fields (electromagnetic induction). Certain chips use a local power source like a battery and some others that don’t use a local battery get the energy from interrogating electromagnetic fields and then act as a passive transponder to emit microwaves. RFID chips have been around for a very long time, but a lot of people don’t know what they are used for and what they are used in.…

    • 3547 Words
    • 15 Pages
    Better Essays
  • Powerful Essays

    Target Corporation, which is one of the leading retail companies the United States, was founded in 1902. The first target store was opened in 1962. Through the 52 years rapid development, Target stores are now located in over 1,924 places. About 90% of the stores are located within the United States, the other 10% stores are in Canada, Australia, and other countries (Target, 2014). All the Target stores are selling products at discount, from clothes to shoes, toys to electronics, home furniture to cosmetics etc., almost cover everything in people’s daily life. Target’s biggest competitors are Walmart and Kmart. However, the competitive advantage of Target is that Target provides not only low price, but also upscale and fashionable products, which is also coincided with the slogan: Expect More, Pay Less. 2012 Target Annual Report shows that Target annual sales is $71,960 million U.S. dollars, and net earnings $2,999 million U.S. dollars (Target, 2014). With the business expansion, more and more loyal customers applied for Target’s REDcard. This debit/credit card gives loyal customers further benefits, including 5% extra discount and everyday free shipping.…

    • 2317 Words
    • 7 Pages
    Powerful Essays
  • Best Essays

    This paper will discuss Information Technology (IT) and how there is value in the philosophy about ethical issues related to IT, chiefly, though not completely, issues concerning individuality and identity management, unequivocally in terms of respect for individual privacy and the responsibility of operators who access such personal identifiable information (PII) and understand the core values of IT ethics (Dillon, 2010).…

    • 3978 Words
    • 16 Pages
    Best Essays
  • Powerful Essays

    This paper will look at the ethical issues and use of Personally Identifiable Information, commonly known as PII, in computer systems, applications, and the internet. We will discuss what PII is and how it is used. There will be information on why Personally Identifiable Information is used and what can happen if it is misused. We will also discuss and look at some sample polices from the government and other large companies that address the use and safeguarding of Personally Identifiable Information. The next section will discuss what you can do to protect your Personally Identifiable Information. Finally we will look at how everything discussed can affect you and who is ultimately responsible for protecting Personally Identifiable Information.…

    • 2169 Words
    • 7 Pages
    Powerful Essays
  • Good Essays

    Smart Card

    • 2960 Words
    • 12 Pages

    Payment is a kind of feedback system that making a transaction of purchases at Octopus-enabled retailers. Holding the card against or waving it over an Octopus card reader from up to a few centimeters away without the user taking out the card. The reader will acknowledge payment by emitting a beep sound, and display the amount deducted and the remaining balance of the card in 0.3 seconds.…

    • 2960 Words
    • 12 Pages
    Good Essays
  • Satisfactory Essays

    Queuing Up

    • 608 Words
    • 3 Pages

    One of the reasons is the pepper lunch restaurant in Festival Walk lack a smart, fast and effective payment system. Only cash is accepted. Octopus card is not accepted as a payment method in the payment system. As all known, nowadays Octopus card is a well-known and very convenience payment method for people to use in buying things and pay transportation fare.…

    • 608 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    Isom Case

    • 705 Words
    • 3 Pages

    Have you ever counted the number of membership cards are there in your wallet? For mine, there are at least five. Membership reward program is now becoming more and more prevalent in the Hong Kong and is controversial. It brings huge benefits to the customers since they are rewarded considerably in some way by joining the membership, as the companies claimed. However, there are two sides of the same coin. Privacy related issues, like the Octopus Card Company scandal in 2010, are generated by the programs. In this paper, I will briefly introduce how the programs work and issues generated in the process, followed by reasons why I think the benefits of the programs outweigh privacy related issues.…

    • 705 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Pii Research Paper

    • 457 Words
    • 2 Pages

    “Virtually every organization acquires, uses and stores personally identifiable information about its customers, employees, patients, students and other individuals. These organizations are expected to manage this private data appropriately and take every precaution to protect it from loss, unauthorized access or theft.…

    • 457 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Name, age, address, social security number. all of these are the usual examples of “Personally identifiable information” or PII. We take for granted that our information is somewhere “out there”, on someone computer, safe, manned by an alert computer expert or office manager.The truest reality is unknown to us and the likelihood of nefarious access to our personal information grows along with the internet. While the majority of us are careful not to disclose our information,( just as we are careful not to leave the house without our keys) there is the occasion where we forget. We live in a state of constant distraction. We slip. Nevertheless, our own vigilance is the first level of many defenses that can protect our PII.…

    • 488 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    Maximum transaction amount for each trade is $1035 using octopus card. Inconvenient for target customers when paying for large amount and usually people get less than $500 credits in Octopus card. Replaced by credit card.…

    • 518 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    Leak of octopus card

    • 752 Words
    • 3 Pages

    In Hong Kong, the Octopus Card is not only treated as a means of electric payment. The Octopus Card interacts a lot with our daily life, like entering our apartments, registering students’ attendance in schools, recognizing our membership of certain organizations, etc.…

    • 752 Words
    • 3 Pages
    Good Essays
  • Good Essays

    “Information privacy is the privacy of personal information and usually relates to personal data stored on computer systems” (Techopedia, n.d.). It is the responsibility of the individual to protect their own privacy. Therefore, this essay will discuss the classifications of privacy rights by Durlak and linking it to the Utilitarian and Deontological ethics theories by referring to the An Ethical Duty to Protect One’s Own Information Privacy article.…

    • 1164 Words
    • 5 Pages
    Good Essays
  • Good Essays

    The benefit of these cards is that they will work using eye-identification, which is already a reality, meaning that if thieves steal your card, they will have to come back for your eyeball also.…

    • 1208 Words
    • 4 Pages
    Good Essays