🔒 Module 13: Data Ethics, Privacy & Compliance (USA/Canada)
This module covers essential data analytics concepts and practical applications.
Advanced Level
⏱️ 45-60 minutes
📚 Topics Covered
-
✓ Introduction to Data Ethics
-
✓ Privacy Laws: GDPR, CCPA, PIPEDA
-
✓ Data Collection & Consent Best Practices
-
✓ Data Security & Protection
-
✓ Ethical Use of Analytics & AI
-
✓ Bias in Data & Algorithms
-
✓ Data Retention & Right to Deletion
-
✓ Compliance Frameworks & Auditing
🔑 Key Concepts
-
• Understanding privacy regulations in USA and Canada
-
• Implementing ethical data collection and usage
-
• Recognizing and mitigating bias in analytics
-
• Ensuring data security and compliance
-
• Building trust through responsible data practices
13.1 Why Data Ethics and Privacy Matter
Data ethics goes beyond legal compliance - it's about earning and maintaining customer trust.
The Stakes Are High:
- Legal Penalties - GDPR fines up to €20M or 4% of global revenue (whichever is higher)
- Reputation Damage - Data breaches destroy customer trust permanently
- Business Impact - 87% of consumers say they won't do business with companies they don't trust with data
- Personal Responsibility - Analysts handle sensitive personal information daily
Real Breach Example (USA):
Equifax data breach (2017) exposed 147 million Americans' personal data including SSNs, birth dates,
addresses. Result: $700M settlement, stock dropped 35%, CEO resigned, multiple lawsuits.
Root cause: Failure to patch known security vulnerability. Prevention cost: ~$10K. Actual cost: $1.4B+.
Core Principles of Data Ethics:
| Principle |
Meaning |
Example |
| Transparency |
Tell people what data you collect and why |
Clear privacy policy in plain language |
| Consent |
Get explicit permission before collecting data |
Opt-in checkboxes (not pre-checked) |
| Purpose Limitation |
Use data only for stated purposes |
Email for order updates only, not marketing |
| Data Minimization |
Collect only what you actually need |
Don't ask for SSN if not required |
| Accuracy |
Keep data current and correct |
Allow customers to update their info |
| Security |
Protect data from unauthorized access |
Encryption, access controls, monitoring |
| Accountability |
Take responsibility for data practices |
Appoint Data Protection Officer (DPO) |
13.2 Privacy Regulations: USA, Canada, and International
Multiple laws govern data privacy depending on location and industry. Analysts must understand applicable regulations.
Major Privacy Laws:
| Law |
Jurisdiction |
Key Requirements |
Penalties |
| GDPR |
EU (applies globally if serving EU residents) |
Consent, data portability, right to erasure |
€20M or 4% revenue |
| CCPA/CPRA |
California, USA |
Right to know, delete, opt-out of sale |
$2,500-$7,500 per violation |
| PIPEDA |
Canada (federal) |
Consent, access, accuracy, safeguards |
Up to $100K per violation |
| HIPAA |
USA (healthcare) |
Protected health information security |
$100-$50K per violation |
| COPPA |
USA (children <13) |
Parental consent for children's data |
$43,280 per violation |
CCPA/CPRA Consumer Rights (California):
California residents have the right to:
1. Know - What personal information is collected, used, shared, or sold
2. Delete - Request deletion of their personal information
3. Opt-Out - Opt out of sale of personal information
4. Non-Discrimination - Equal service/price regardless of privacy choices
5. Correct - Request correction of inaccurate information (CPRA addition)
6. Limit - Limit use of sensitive personal information (CPRA addition)
Who Must Comply:
Businesses that collect CA resident data AND meet one of:
• Annual gross revenue >$25 million
• Buy/sell personal info of 100K+ CA residents/households
• Derive 50%+ of revenue from selling personal information
PIPEDA Principles (Canada):
10 Fair Information Principles:
1. Accountability - Organization responsible for data under its control
2. Identifying Purposes - Tell why you're collecting data before/at collection
3. Consent - Get meaningful consent for collection, use, disclosure
4. Limiting Collection - Collect only what's necessary
5. Limiting Use, Disclosure, Retention - Use only for stated purposes
6. Accuracy - Keep data accurate, complete, up-to-date
7. Safeguards - Protect with security appropriate to sensitivity
8. Openness - Make policies and practices readily available
9. Individual Access - Give people access to their data
10. Challenging Compliance - Provide procedures to challenge compliance
Note: Quebec, BC, Alberta have provincial privacy laws that may apply instead
13.3 Data Collection & Consent Best Practices
Proper consent is the foundation of ethical data collection.
Valid Consent Requirements:
- Freely Given - Not coerced or conditional on service (unless necessary)
- Specific - Separate consent for different purposes (marketing vs. analytics)
- Informed - Clear explanation in plain language, not legalese
- Unambiguous - Affirmative action required (opt-in, not pre-checked boxes)
- Withdrawable - Easy to withdraw consent anytime
Consent Examples:
❌ Bad Consent (Non-Compliant):
☑ I agree to the Terms and Conditions and Privacy Policy
(Pre-checked box, bundled consent, no clear explanation)
✓ Good Consent (Compliant):
☐ I consent to receive marketing emails about products and offers.
You can unsubscribe anytime by clicking the link in any email.
☐ I consent to my purchase history being analyzed to provide personalized
product recommendations. You can opt-out in Account Settings.
(Separate unchecked boxes, clear purpose, easy withdrawal)
Data Collection Checklist:
Before Collecting Any Data, Ask:
☐ Do we have a legitimate business need for this data?
☐ Have we informed the person what we're collecting and why?
☐ Have we obtained proper consent (opt-in, not opt-out)?
☐ Are we collecting the minimum data necessary?
☐ Do we have security measures to protect this data?
☐ Do we have a data retention policy (when to delete)?
☐ Can people access, correct, and delete their data?
☐ Are we compliant with all applicable regulations?
13.4 Data Security & Protection
Security protects data from unauthorized access, breaches, and misuse.
Essential Security Measures:
| Security Layer |
Techniques |
Purpose |
| Encryption |
AES-256, TLS/SSL, HTTPS |
Protect data in transit and at rest |
| Access Controls |
Role-based access (RBAC), MFA |
Limit who can view/edit data |
| Anonymization |
Remove PII, pseudonymization, masking |
Analyze data without exposing identity |
| Monitoring |
Audit logs, intrusion detection |
Detect suspicious activity |
| Backup & Recovery |
Regular backups, disaster recovery plan |
Protect against data loss |
Data Anonymization Techniques:
1. Data Masking:
Original: john.smith@email.com, SSN: 123-45-6789
Masked: j***@email.com, SSN: ***-**-6789
2. Pseudonymization:
Original: Customer_ID: 12345, Name: John Smith
Pseudonym: Customer_ID: ABC-XYZ-789, Name: [removed]
(Reversible with key, still allows analysis)
3. Aggregation:
Original: Individual purchase amounts
Aggregated: Average purchase by zip code
(Cannot identify individuals)
4. Generalization:
Original: Age: 34, Income: $87,500
Generalized: Age: 30-39, Income: $75K-$100K
(Reduces precision to protect identity)
13.5 Ethical Use of Analytics & AI
Advanced analytics and AI raise unique ethical challenges beyond basic data collection.
Ethical Concerns in Analytics:
- Predictive Profiling - Using data to predict behavior, creditworthiness, health risks
- Algorithmic Decision-Making - Automated decisions affecting people's lives
- Surveillance - Tracking behavior, location, web activity
- Manipulation - Using behavioral insights to influence decisions
- Discrimination - Models that unfairly disadvantage protected groups
Questions to Ask Before Deploying Analytics:
Ethical Impact Assessment:
1. Transparency: Can we explain how the model makes decisions?
2. Fairness: Does it treat all groups equitably?
3. Accountability: Who is responsible if the model causes harm?
4. Purpose: Is this analysis serving a legitimate business need?
5. Consent: Do people know their data is being used this way?
6. Alternatives: Could we achieve the goal without invasive analytics?
7. Opt-Out: Can people opt out of automated decisions?
8. Human Review: Is there human oversight for high-stakes decisions?
Target Pregnancy Prediction Example (USA):
Target developed a model predicting pregnancy based on purchase patterns (unscented lotion,
supplements, etc.). Sent baby-related coupons to pregnant customers - but father of teen daughter
complained before knowing she was pregnant. Lesson: Predictive analytics can reveal sensitive
information people haven't disclosed. Always consider unintended consequences and privacy implications.
13.6 Recognizing and Mitigating Bias in Data
Biased data leads to biased decisions. Analysts must actively identify and correct bias.
Types of Data Bias:
| Bias Type |
Description |
Example |
| Selection Bias |
Training data not representative |
Facial recognition trained only on lighter skin tones |
| Historical Bias |
Past discrimination in data |
Hiring data reflects past gender imbalances |
| Measurement Bias |
How data is collected/measured |
Crime data reflects policing patterns, not actual crime |
| Confirmation Bias |
Interpreting data to confirm beliefs |
Cherry-picking metrics that support decision |
| Aggregation Bias |
One model for diverse populations |
Medical model based only on male patients |
Bias Mitigation Strategies:
- Diverse Teams - Include varied perspectives in analytics projects
- Representative Data - Ensure training data reflects reality
- Fairness Metrics - Test model performance across demographic groups
- Regular Audits - Continuously monitor for disparate impact
- Transparency - Document data sources, assumptions, limitations
- Human Oversight - Don't fully automate high-stakes decisions
⚠️ COMPAS Recidivism Algorithm (USA):
Algorithm used by courts to predict reoffending risk. ProPublica investigation found Black defendants
were twice as likely to be incorrectly flagged as high-risk compared to white defendants. Despite
not explicitly using race, correlated variables created disparate impact. Lesson: Even "objective"
algorithms can perpetuate bias. Always test for fairness across protected groups.
13.7 Data Retention & Right to Deletion
Organizations must have policies for how long to keep data and when to delete it.
Data Retention Principles:
- Define Retention Periods - How long to keep each data type
- Business Need - Keep only as long as necessary for stated purpose
- Legal Requirements - Some data must be kept (tax records: 7 years in USA/Canada)
- Secure Deletion - Permanently remove data when retention period ends
- Document Policy - Written retention schedule for all data types
Sample Data Retention Schedule:
| Data Type |
Retention Period |
Reason |
| Customer Account Info |
Active + 2 years after closure |
Support historical queries |
| Transaction Records |
7 years |
Tax/legal requirements |
| Marketing Analytics |
2 years |
Campaign analysis |
| Website Logs |
90 days |
Security monitoring |
| Job Applications |
1 year |
Legal compliance |
Honoring Deletion Requests:
When Customer Requests Deletion:
1. Verify Identity - Confirm it's actually the data subject
2. Check Exceptions - Legal obligation to retain? (e.g., tax records)
3. Scope Deletion - Delete from all systems (production, backups, analytics)
4. Timeline - GDPR: 30 days, CCPA: 45 days to respond
5. Confirm - Notify requester when deletion is complete
6. Document - Log the request and actions taken
Exceptions (May Refuse Deletion):
• Complete transaction/provide requested service
• Detect security incidents, fraud, illegal activity
• Comply with legal obligations
• Internal uses reasonably aligned with expectations
13.8 Building a Compliance Program
Systematic approach to ensuring ongoing compliance with privacy regulations.
Compliance Program Components:
- Data Inventory (Data Mapping)
- What personal data do we collect?
- Where is it stored? (databases, files, cloud, third-parties)
- Who has access?
- How is it used?
- Where is it transferred?
- Privacy Policy & Notices
- Clear, accessible privacy policy
- Collection notices at point of data capture
- Plain language, not just legal jargon
- Regularly updated
- Consent Management
- Record and track consent
- Easy opt-in/opt-out mechanisms
- Granular consent (separate for different purposes)
- Refresh consent periodically
- Data Subject Rights
- Process for access requests
- Deletion/correction procedures
- Portability (export data in usable format)
- Response within regulatory timeframes
- Vendor Management
- Due diligence on third-party processors
- Data Processing Agreements (DPAs)
- Regular vendor audits
- Ensure vendors are compliant
- Training & Awareness
- Regular privacy training for all employees
- Specialized training for analysts/developers
- Clear escalation procedures
- Privacy-by-design culture
- Incident Response Plan
- Breach detection procedures
- Containment and remediation
- Notification requirements (72 hours for GDPR)
- Post-incident review
- Regular Audits
- Internal privacy assessments
- External compliance audits
- Privacy Impact Assessments (PIAs) for new projects
- Continuous monitoring
13.9 Analyst's Role in Data Ethics
As a data analyst, you are a steward of sensitive information. Your daily decisions impact privacy and ethics.
Analyst Best Practices:
Daily Checklist:
☐ Only access data necessary for your analysis
☐ Anonymize/pseudonymize when possible
☐ Never share personal data outside approved channels
☐ Use secure connections (VPN, encrypted transfers)
☐ Delete working files with personal data when done
☐ Question requests that seem ethically dubious
☐ Report suspected data breaches immediately
☐ Keep software/systems updated for security
☐ Lock your computer when stepping away
☐ Think: "Would I be comfortable if my data was used this way?"
When to Speak Up:
Red Flags - Escalate to Privacy Officer/Legal:
⚠️ Asked to analyze data without proper consent
⚠️ Project targets protected characteristics (race, religion, health)
⚠️ Model shows clear bias against certain groups
⚠️ Data breach or unauthorized access discovered
⚠️ Pressure to circumvent security controls
⚠️ Vendor sharing data inappropriately
⚠️ Analytics being used for surveillance without disclosure
Remember: "I was just following orders" is not a defense.
You have professional and ethical responsibility to raise concerns.
✓ Module 13 Complete
You've learned:
- Core principles of data ethics (transparency, consent, minimization)
- Major privacy laws: GDPR, CCPA/CPRA, PIPEDA, HIPAA, COPPA
- Best practices for data collection and valid consent
- Security measures: encryption, access controls, anonymization
- Ethical considerations in analytics and AI deployment
- Types of bias in data and mitigation strategies
- Data retention policies and honoring deletion requests
- Building a comprehensive compliance program
- Analyst's daily responsibilities and when to escalate concerns
Congratulations! You've completed all 13 modules of the Data Analytics course. You now have comprehensive knowledge spanning technical skills, business applications, and ethical considerations.