{"id":16005,"date":"2024-07-08T08:00:30","date_gmt":"2024-07-08T15:00:30","guid":{"rendered":"https:\/\/www.couchbase.com\/blog\/?p=16005"},"modified":"2024-07-12T09:12:46","modified_gmt":"2024-07-12T16:12:46","slug":"ethical-data-stewardship","status":"publish","type":"post","link":"https:\/\/www.couchbase.com\/blog\/pt\/ethical-data-stewardship\/","title":{"rendered":"Criando c\u00f3digos com consci\u00eancia: Seu papel na administra\u00e7\u00e3o \u00e9tica de dados"},"content":{"rendered":"<p><span style=\"font-weight: 400;\">Se os dados s\u00e3o ouro, ent\u00e3o esse ouro deve ser protegido. No desenvolvimento de software, costuma-se pensar que os dados s\u00e3o imparciais, puramente matem\u00e1ticos e n\u00e3o t\u00eam motivo para se envolver com a \u00e9tica. No entanto, quero afirmar que n\u00e3o apenas proteger os dados, mas centralizar seu uso \u00e9tico \u00e9 fundamental para a fun\u00e7\u00e3o de todo desenvolvedor de software e, al\u00e9m disso, para a fun\u00e7\u00e3o de cada pessoa em uma empresa de tecnologia. Faremos um mergulho profundo na administra\u00e7\u00e3o \u00e9tica de dados e, ao mesmo tempo, apresentaremos estruturas abrangentes, diretrizes e um passo a passo de um sprint t\u00e9cnico \u00e9tico projetado para integrar esses princ\u00edpios \u00e0s suas pr\u00e1ticas de desenvolvimento de software.<\/span><\/p>\n<h2>Entendendo a administra\u00e7\u00e3o \u00e9tica no desenvolvimento de software<\/h2>\n<p><span style=\"font-weight: 400;\">A administra\u00e7\u00e3o \u00e9tica de dados \u00e9 definida pelo Open Data Institute como \"um processo iterativo e sist\u00eamico de garantir que os dados sejam coletados, usados e compartilhados para o benef\u00edcio p\u00fablico, mitigando as maneiras pelas quais os dados podem causar danos e abordando como eles podem corrigir desigualdades estruturais\". Esse entendimento e essa abordagem s\u00e3o fundamentais para evitar o uso indevido de dados e manter a confian\u00e7a do p\u00fablico, principalmente porque as tecnologias orientadas por dados afetam cada vez mais todos os aspectos de nossas vidas.<\/span><\/p>\n<h2>Estruturas b\u00e1sicas para a tomada de decis\u00f5es \u00e9ticas<\/h2>\n<p><span style=\"font-weight: 400;\">Como engenheiros de software e profissionais de tecnologia, muitas vezes n\u00e3o nos envolvemos com a \u00e9tica em nossas pr\u00e1ticas di\u00e1rias de desenvolvimento de software. No entanto, h\u00e1 v\u00e1rias estruturas \u00e9ticas que podemos incorporar em nossa vida di\u00e1ria para ajudar os colegas desenvolvedores a navegar em cen\u00e1rios \u00e9ticos complexos em torno dos dados:<\/span><\/p>\n<ol>\n<li style=\"list-style-type: none;\">\n<ol>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><a href=\"https:\/\/standards.ieee.org\/wp-content\/uploads\/import\/documents\/other\/ead_v2.pdf\"><b>O design eticamente alinhado do IEEE<\/b><\/a><span style=\"font-weight: 400;\">:<\/span>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"2\"><b>Princ\u00edpios<\/b><span style=\"font-weight: 400;\">: Concentra-se na prote\u00e7\u00e3o dos direitos humanos, priorizando o bem-estar do usu\u00e1rio e garantindo a responsabilidade do sistema.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"2\"><b>Aplicativo<\/b><span style=\"font-weight: 400;\">: Considere um aplicativo de assist\u00eancia m\u00e9dica orientado por IA em que os princ\u00edpios do IEEE guiam o desenvolvimento para garantir que os algoritmos forne\u00e7am conselhos de sa\u00fade equitativos sem discriminar com base em preconceitos inerentes.<\/span><\/li>\n<\/ul>\n<\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><a href=\"https:\/\/en.wikipedia.org\/wiki\/Menlo_Report\"><b>Relat\u00f3rio Menlo<\/b><\/a><span style=\"font-weight: 400;\">:<\/span>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"2\"><b>Princ\u00edpios<\/b><span style=\"font-weight: 400;\">: Enfatiza o respeito pelos indiv\u00edduos, a benefic\u00eancia, a justi\u00e7a e o respeito pela lei e pelo interesse p\u00fablico.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"2\"><b>Aplicativo<\/b><span style=\"font-weight: 400;\">: \u00datil para aplicativos m\u00f3veis que coletam dados de localiza\u00e7\u00e3o do usu\u00e1rio, a aplica\u00e7\u00e3o dos princ\u00edpios da Menlo envolveria a garantia de que a coleta de dados seja transparente, beneficie os usu\u00e1rios e distribua os benef\u00edcios dos dados de forma justa, sem explorar grupos espec\u00edficos.<\/span><\/li>\n<\/ul>\n<\/li>\n<\/ol>\n<\/li>\n<\/ol>\n<h2>Ferramentas e tecnologias para aprimorar as pr\u00e1ticas \u00e9ticas<\/h2>\n<p><span style=\"font-weight: 400;\">Os desenvolvedores t\u00eam v\u00e1rias tecnologias \u00e0 sua disposi\u00e7\u00e3o para facilitar o tratamento \u00e9tico dos dados:<\/span><\/p>\n<ul>\n<li style=\"list-style-type: none;\">\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Criptografia homom\u00f3rfica<\/b><span style=\"font-weight: 400;\">:<\/span>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"2\"><b>Detalhes<\/b><span style=\"font-weight: 400;\">: Permite que os dados sejam criptografados e processados simultaneamente, possibilitando a an\u00e1lise segura dos dados sem exposi\u00e7\u00e3o.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"2\"><b>Caso de uso<\/b><span style=\"font-weight: 400;\">: Nos servi\u00e7os financeiros, a criptografia homom\u00f3rfica pode ser usada para analisar dados de investimentos pessoais, fornecendo consultoria personalizada sem comprometer a confidencialidade do cliente.<\/span><\/li>\n<\/ul>\n<\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Privacidade diferencial<\/b><span style=\"font-weight: 400;\">:<\/span>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"2\"><b>Detalhes<\/b><span style=\"font-weight: 400;\">: Adiciona ru\u00eddo matem\u00e1tico a conjuntos de dados ou consultas, garantindo a privacidade individual e mantendo a utilidade dos dados agregados.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"2\"><b>Caso de uso<\/b><span style=\"font-weight: 400;\">: Ao analisar os dados de comportamento do usu\u00e1rio para um estudo de marketing, a privacidade diferencial garante que os insights obtidos n\u00e3o permitam que os dados de nenhum usu\u00e1rio individual sejam distinguidos.<\/span><\/li>\n<\/ul>\n<\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Lista de verifica\u00e7\u00e3o de \u00e9tica de dados<\/b><span style=\"font-weight: 400;\">:<\/span>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"2\"><b>Detalhes<\/b><span style=\"font-weight: 400;\">: Uma lista de verifica\u00e7\u00e3o abrangente que garante que todos os aspectos do manuseio de dados, da coleta \u00e0 an\u00e1lise, atendam aos padr\u00f5es \u00e9ticos.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"2\"><b>Implementa\u00e7\u00e3o<\/b><span style=\"font-weight: 400;\">: Antes de implantar um novo recurso de rastreamento de usu\u00e1rios, os desenvolvedores podem usar a lista de verifica\u00e7\u00e3o para analisar as implica\u00e7\u00f5es \u00e9ticas, garantindo que o consentimento do usu\u00e1rio seja obtido e que os princ\u00edpios de minimiza\u00e7\u00e3o de dados sejam seguidos.<\/span><\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<h2>Passo a passo detalhado de um Ethical Sprint: anonimiza\u00e7\u00e3o de dados em um aplicativo \"HealthTrack\" de amostra<\/h2>\n<p>Vamos dar uma olhada em um projeto de aplicativo de exemplo para explorar como podemos aplicar t\u00e9cnicas avan\u00e7adas de anonimiza\u00e7\u00e3o de dados. Nosso objetivo \u00e9 proteger a privacidade do usu\u00e1rio e, ao mesmo tempo, manter os insights de sa\u00fade personalizados do aplicativo eficazes e funcionais.<\/p>\n<p><b>Objetivo<\/b><span style=\"font-weight: 400;\">: Implementar t\u00e9cnicas de anonimiza\u00e7\u00e3o de dados de \u00faltima gera\u00e7\u00e3o no HealthTrack, um aplicativo que usa dados pessoais de sa\u00fade para fornecer informa\u00e7\u00f5es personalizadas sobre sa\u00fade.<\/span><\/p>\n<h3>Fase de planejamento<\/h3>\n<ul>\n<li style=\"list-style-type: none;\">\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Composi\u00e7\u00e3o da equipe<\/b><span style=\"font-weight: 400;\">: Re\u00fana uma equipe multidisciplinar, incluindo um gerente de projeto para supervisionar o sprint, um desenvolvedor de back-end especializado em seguran\u00e7a de dados, um desenvolvedor de front-end e um especialista em privacidade de dados.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Metas do Sprint<\/b><span style=\"font-weight: 400;\">: Estabele\u00e7a objetivos claros para integrar protocolos de anonimiza\u00e7\u00e3o robustos que protejam a privacidade do usu\u00e1rio sem prejudicar a funcionalidade do aplicativo.<\/span><\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<h3>Fase de implementa\u00e7\u00e3o e teste<\/h3>\n<ul>\n<li style=\"list-style-type: none;\">\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Dias 1 e 2<\/b><span style=\"font-weight: 400;\">: Desenvolver protocolos de anonimiza\u00e7\u00e3o.<\/span>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"2\"><b>Privacidade diferencial<\/b><span style=\"font-weight: 400;\">: A equipe de back-end integra algoritmos para injetar ru\u00eddo estat\u00edstico nos conjuntos de dados, garantindo que os resultados n\u00e3o comprometam a privacidade individual.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"2\"><b>T\u00e9cnicas de pseudonimiza\u00e7\u00e3o<\/b><span style=\"font-weight: 400;\">: Implemente processos para substituir sistematicamente identificadores diretos por pseud\u00f4nimos, acrescentando uma camada adicional de seguran\u00e7a.<\/span><\/li>\n<\/ul>\n<\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Dia 3<\/b><span style=\"font-weight: 400;\">: Teste de prot\u00f3tipo e feedback do usu\u00e1rio.<\/span>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"2\"><b>Testes de experi\u00eancia do usu\u00e1rio<\/b><span style=\"font-weight: 400;\">: Realize testes em grupos focados para obter feedback sobre como a anonimiza\u00e7\u00e3o afeta a experi\u00eancia do usu\u00e1rio e a personaliza\u00e7\u00e3o dos insights de sa\u00fade.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"2\"><b>An\u00e1lise de feedback<\/b><span style=\"font-weight: 400;\">: Analise o feedback para identificar poss\u00edveis compensa\u00e7\u00f5es entre a for\u00e7a da anonimiza\u00e7\u00e3o e a funcionalidade.<\/span><\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<h3>Fase de revis\u00e3o e itera\u00e7\u00e3o<\/h3>\n<ul>\n<li style=\"list-style-type: none;\">\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Dia 4<\/b><span style=\"font-weight: 400;\">: An\u00e1lises das partes interessadas e avalia\u00e7\u00f5es \u00e9ticas.<\/span>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"2\"><b>Revis\u00e3o ampla<\/b><span style=\"font-weight: 400;\">: Apresentar estrat\u00e9gias de anonimiza\u00e7\u00e3o a um grupo mais amplo de partes interessadas, incluindo poss\u00edveis usu\u00e1rios e equipes internas de conformidade, para garantir que todos os padr\u00f5es \u00e9ticos e operacionais sejam atendidos.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"2\"><b>Avalia\u00e7\u00e3o do impacto \u00e9tico<\/b><span style=\"font-weight: 400;\">: Conduzir uma an\u00e1lise abrangente para garantir que todas as implementa\u00e7\u00f5es estejam alinhadas com o Relat\u00f3rio Menlo e os princ\u00edpios do IEEE.<\/span><\/li>\n<\/ul>\n<\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Dia 5<\/b><span style=\"font-weight: 400;\">: Ajustes finais e documenta\u00e7\u00e3o.<\/span>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"2\"><b>Refinamentos<\/b><span style=\"font-weight: 400;\">: Fa\u00e7a os ajustes necess\u00e1rios nas t\u00e9cnicas de anonimiza\u00e7\u00e3o com base no feedback das partes interessadas.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"2\"><b>Documenta\u00e7\u00e3o e relat\u00f3rios<\/b><span style=\"font-weight: 400;\">: Documentar as metodologias, os processos de tomada de decis\u00e3o e as justificativas das estrat\u00e9gias escolhidas para garantir a transpar\u00eancia e a responsabilidade.<\/span><\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<h2>Promo\u00e7\u00e3o de uma cultura \u00e9tica<\/h2>\n<p><span style=\"font-weight: 400;\">A cria\u00e7\u00e3o de uma cultura \u00e9tica sustent\u00e1vel envolve mais do que verifica\u00e7\u00f5es peri\u00f3dicas:<\/span><\/p>\n<ul>\n<li style=\"list-style-type: none;\">\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Treinamento \u00e9tico regular<\/b><span style=\"font-weight: 400;\">: Implementar programas educacionais cont\u00ednuos que mantenham a equipe atualizada sobre quest\u00f5es \u00e9ticas e tecnologias emergentes.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Pr\u00e1ticas \u00e9ticas cotidianas<\/b><span style=\"font-weight: 400;\">: Incorpore discuss\u00f5es \u00e9ticas nas rotinas di\u00e1rias, como reuni\u00f5es de stand-up e revis\u00f5es de c\u00f3digo, para manter um foco cont\u00ednuo na tomada de decis\u00f5es \u00e9ticas.<\/span><\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<h2>Conclus\u00e3o<\/h2>\n<p><span style=\"font-weight: 400;\">A administra\u00e7\u00e3o \u00e9tica de dados \u00e9 um aspecto crucial do desenvolvimento de software que exige aten\u00e7\u00e3o e a\u00e7\u00e3o. Ao adotar as estruturas, ferramentas e pr\u00e1ticas descritas acima, os engenheiros e profissionais de tecnologia podem garantir que seus recursos e produtos n\u00e3o apenas ultrapassem os limites tecnol\u00f3gicos, mas tamb\u00e9m promovam a justi\u00e7a, a privacidade e a confiabilidade em todos os aspectos do processo de desenvolvimento de software.<\/span><\/p>\n<h2>Recursos adicionais<\/h2>\n<ul>\n<li style=\"list-style-type: none;\">\n<ul>\n<li><a href=\"https:\/\/theodi.org\/insights\/tools\/the-data-ethics-canvas-2021\/\">Tela de \u00e9tica de dados do Open Data Institute<\/a><\/li>\n<li><a href=\"https:\/\/standards.ieee.org\/industry-connections\/ec\/\">O design eticamente alinhado do IEEE<\/a><\/li>\n<li><a href=\"https:\/\/www.microsoft.com\/en-us\/research\/publication\/protecting-privacy-through-homomorphic-encryption\/\">Pesquisa da Microsoft: Protegendo a privacidade por meio da criptografia homom\u00f3rfica<\/a><\/li>\n<\/ul>\n<\/li>\n<\/ul>","protected":false},"excerpt":{"rendered":"<p>If data is gold, then that gold must be protected. In software development, data is often thought to be unbiased, purely mathematical, and have no reason to engage with ethics. However, I want to posit that not just protecting one\u2019s [&hellip;]<\/p>","protected":false},"author":84838,"featured_media":16008,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"categories":[1814,1815],"tags":[9991,1532,9990],"ppma_author":[9897],"class_list":["post-16005","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-application-design","category-best-practices-and-tutorials","tag-data-stewardship","tag-developers","tag-ethics"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v25.7.1 (Yoast SEO v25.7) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Crafting Code With A Conscience: Your Role In Ethical Data Stewardship - The Couchbase Blog<\/title>\n<meta name=\"description\" content=\"Discover essential frameworks and technologies for ethical data stewardship in software development, ensuring privacy and integrity.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.couchbase.com\/blog\/pt\/ethical-data-stewardship\/\" \/>\n<meta property=\"og:locale\" content=\"pt_BR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Crafting Code With A Conscience: Your Role In Ethical Data Stewardship\" \/>\n<meta property=\"og:description\" content=\"Discover essential frameworks and technologies for ethical data stewardship in software development, ensuring privacy and integrity.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.couchbase.com\/blog\/pt\/ethical-data-stewardship\/\" \/>\n<meta property=\"og:site_name\" content=\"The Couchbase Blog\" \/>\n<meta property=\"article:published_time\" content=\"2024-07-08T15:00:30+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-07-12T16:12:46+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.couchbase.com\/blog\/wp-content\/uploads\/2024\/07\/blog-ethics-conscience.png\" \/>\n\t<meta property=\"og:image:width\" content=\"2400\" \/>\n\t<meta property=\"og:image:height\" content=\"1256\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Nyah Macklin - Developer Evangelist\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@NyahMacklinDev\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Nyah Macklin - Developer Evangelist\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutos\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.couchbase.com\/blog\/ethical-data-stewardship\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.couchbase.com\/blog\/ethical-data-stewardship\/\"},\"author\":{\"name\":\"Nyah Macklin - Developer Evangelist @ Couchbase\",\"@id\":\"https:\/\/www.couchbase.com\/blog\/#\/schema\/person\/69a3940e6ac02b2cdb3c95fbe435bb45\"},\"headline\":\"Crafting Code With A Conscience: Your Role In Ethical Data Stewardship\",\"datePublished\":\"2024-07-08T15:00:30+00:00\",\"dateModified\":\"2024-07-12T16:12:46+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.couchbase.com\/blog\/ethical-data-stewardship\/\"},\"wordCount\":919,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.couchbase.com\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.couchbase.com\/blog\/ethical-data-stewardship\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.couchbase.com\/blog\/wp-content\/uploads\/sites\/1\/2024\/07\/blog-ethics-conscience.png\",\"keywords\":[\"data stewardship\",\"Developers\",\"ethics\"],\"articleSection\":[\"Application Design\",\"Best Practices and Tutorials\"],\"inLanguage\":\"pt-BR\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.couchbase.com\/blog\/ethical-data-stewardship\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.couchbase.com\/blog\/ethical-data-stewardship\/\",\"url\":\"https:\/\/www.couchbase.com\/blog\/ethical-data-stewardship\/\",\"name\":\"Crafting Code With A Conscience: Your Role In Ethical Data Stewardship - The Couchbase Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.couchbase.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.couchbase.com\/blog\/ethical-data-stewardship\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.couchbase.com\/blog\/ethical-data-stewardship\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.couchbase.com\/blog\/wp-content\/uploads\/sites\/1\/2024\/07\/blog-ethics-conscience.png\",\"datePublished\":\"2024-07-08T15:00:30+00:00\",\"dateModified\":\"2024-07-12T16:12:46+00:00\",\"description\":\"Discover essential frameworks and technologies for ethical data stewardship in software development, ensuring privacy and integrity.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.couchbase.com\/blog\/ethical-data-stewardship\/#breadcrumb\"},\"inLanguage\":\"pt-BR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.couchbase.com\/blog\/ethical-data-stewardship\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\/\/www.couchbase.com\/blog\/ethical-data-stewardship\/#primaryimage\",\"url\":\"https:\/\/www.couchbase.com\/blog\/wp-content\/uploads\/sites\/1\/2024\/07\/blog-ethics-conscience.png\",\"contentUrl\":\"https:\/\/www.couchbase.com\/blog\/wp-content\/uploads\/sites\/1\/2024\/07\/blog-ethics-conscience.png\",\"width\":2400,\"height\":1256,\"caption\":\"Crafting Code With A Conscience: Your Role In Ethical Data Stewardship\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.couchbase.com\/blog\/ethical-data-stewardship\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.couchbase.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Crafting Code With A Conscience: Your Role In Ethical Data Stewardship\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.couchbase.com\/blog\/#website\",\"url\":\"https:\/\/www.couchbase.com\/blog\/\",\"name\":\"The Couchbase Blog\",\"description\":\"Couchbase, the NoSQL Database\",\"publisher\":{\"@id\":\"https:\/\/www.couchbase.com\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.couchbase.com\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"pt-BR\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.couchbase.com\/blog\/#organization\",\"name\":\"The Couchbase Blog\",\"url\":\"https:\/\/www.couchbase.com\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\/\/www.couchbase.com\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.couchbase.com\/blog\/wp-content\/uploads\/2023\/04\/admin-logo.png\",\"contentUrl\":\"https:\/\/www.couchbase.com\/blog\/wp-content\/uploads\/2023\/04\/admin-logo.png\",\"width\":218,\"height\":34,\"caption\":\"The Couchbase Blog\"},\"image\":{\"@id\":\"https:\/\/www.couchbase.com\/blog\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.couchbase.com\/blog\/#\/schema\/person\/69a3940e6ac02b2cdb3c95fbe435bb45\",\"name\":\"Nyah Macklin - Developer Evangelist @ Couchbase\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\/\/www.couchbase.com\/blog\/#\/schema\/person\/image\/6a141e3847fc5140407d649ab3b4de7c\",\"url\":\"https:\/\/www.couchbase.com\/blog\/wp-content\/uploads\/sites\/1\/2023\/12\/image_2023-12-08_125555188.png\",\"contentUrl\":\"https:\/\/www.couchbase.com\/blog\/wp-content\/uploads\/sites\/1\/2023\/12\/image_2023-12-08_125555188.png\",\"caption\":\"Nyah Macklin - Developer Evangelist @ Couchbase\"},\"description\":\"Nyah Macklin is a Developer Evangelist who cares about making developers lives easier. They do that through learning in public, teaching and speaking. Nyah can be found keynoting international conferences and on Twitter @NyahMacklinDev speaking about data privacy, security, and breakthrough developments in artificial intelligence. Reach out to Nyah on Twitter or on the Couchbase Discord to learn more!\",\"sameAs\":[\"https:\/\/x.com\/NyahMacklinDev\"],\"url\":\"https:\/\/www.couchbase.com\/blog\/pt\/author\/nyahmacklin\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Crafting Code With A Conscience: Your Role In Ethical Data Stewardship - The Couchbase Blog","description":"Discover essential frameworks and technologies for ethical data stewardship in software development, ensuring privacy and integrity.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.couchbase.com\/blog\/pt\/ethical-data-stewardship\/","og_locale":"pt_BR","og_type":"article","og_title":"Crafting Code With A Conscience: Your Role In Ethical Data Stewardship","og_description":"Discover essential frameworks and technologies for ethical data stewardship in software development, ensuring privacy and integrity.","og_url":"https:\/\/www.couchbase.com\/blog\/pt\/ethical-data-stewardship\/","og_site_name":"The Couchbase Blog","article_published_time":"2024-07-08T15:00:30+00:00","article_modified_time":"2024-07-12T16:12:46+00:00","og_image":[{"width":2400,"height":1256,"url":"https:\/\/www.couchbase.com\/blog\/wp-content\/uploads\/2024\/07\/blog-ethics-conscience.png","type":"image\/png"}],"author":"Nyah Macklin - Developer Evangelist","twitter_card":"summary_large_image","twitter_creator":"@NyahMacklinDev","twitter_misc":{"Written by":"Nyah Macklin - Developer Evangelist","Est. reading time":"5 minutos"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.couchbase.com\/blog\/ethical-data-stewardship\/#article","isPartOf":{"@id":"https:\/\/www.couchbase.com\/blog\/ethical-data-stewardship\/"},"author":{"name":"Nyah Macklin - Developer Evangelist @ Couchbase","@id":"https:\/\/www.couchbase.com\/blog\/#\/schema\/person\/69a3940e6ac02b2cdb3c95fbe435bb45"},"headline":"Crafting Code With A Conscience: Your Role In Ethical Data Stewardship","datePublished":"2024-07-08T15:00:30+00:00","dateModified":"2024-07-12T16:12:46+00:00","mainEntityOfPage":{"@id":"https:\/\/www.couchbase.com\/blog\/ethical-data-stewardship\/"},"wordCount":919,"commentCount":0,"publisher":{"@id":"https:\/\/www.couchbase.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.couchbase.com\/blog\/ethical-data-stewardship\/#primaryimage"},"thumbnailUrl":"https:\/\/www.couchbase.com\/blog\/wp-content\/uploads\/sites\/1\/2024\/07\/blog-ethics-conscience.png","keywords":["data stewardship","Developers","ethics"],"articleSection":["Application Design","Best Practices and Tutorials"],"inLanguage":"pt-BR","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.couchbase.com\/blog\/ethical-data-stewardship\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.couchbase.com\/blog\/ethical-data-stewardship\/","url":"https:\/\/www.couchbase.com\/blog\/ethical-data-stewardship\/","name":"Crafting Code With A Conscience: Your Role In Ethical Data Stewardship - The Couchbase Blog","isPartOf":{"@id":"https:\/\/www.couchbase.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.couchbase.com\/blog\/ethical-data-stewardship\/#primaryimage"},"image":{"@id":"https:\/\/www.couchbase.com\/blog\/ethical-data-stewardship\/#primaryimage"},"thumbnailUrl":"https:\/\/www.couchbase.com\/blog\/wp-content\/uploads\/sites\/1\/2024\/07\/blog-ethics-conscience.png","datePublished":"2024-07-08T15:00:30+00:00","dateModified":"2024-07-12T16:12:46+00:00","description":"Discover essential frameworks and technologies for ethical data stewardship in software development, ensuring privacy and integrity.","breadcrumb":{"@id":"https:\/\/www.couchbase.com\/blog\/ethical-data-stewardship\/#breadcrumb"},"inLanguage":"pt-BR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.couchbase.com\/blog\/ethical-data-stewardship\/"]}]},{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/www.couchbase.com\/blog\/ethical-data-stewardship\/#primaryimage","url":"https:\/\/www.couchbase.com\/blog\/wp-content\/uploads\/sites\/1\/2024\/07\/blog-ethics-conscience.png","contentUrl":"https:\/\/www.couchbase.com\/blog\/wp-content\/uploads\/sites\/1\/2024\/07\/blog-ethics-conscience.png","width":2400,"height":1256,"caption":"Crafting Code With A Conscience: Your Role In Ethical Data Stewardship"},{"@type":"BreadcrumbList","@id":"https:\/\/www.couchbase.com\/blog\/ethical-data-stewardship\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.couchbase.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Crafting Code With A Conscience: Your Role In Ethical Data Stewardship"}]},{"@type":"WebSite","@id":"https:\/\/www.couchbase.com\/blog\/#website","url":"https:\/\/www.couchbase.com\/blog\/","name":"Blog do Couchbase","description":"Couchbase, o banco de dados NoSQL","publisher":{"@id":"https:\/\/www.couchbase.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.couchbase.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"pt-BR"},{"@type":"Organization","@id":"https:\/\/www.couchbase.com\/blog\/#organization","name":"Blog do Couchbase","url":"https:\/\/www.couchbase.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/www.couchbase.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.couchbase.com\/blog\/wp-content\/uploads\/2023\/04\/admin-logo.png","contentUrl":"https:\/\/www.couchbase.com\/blog\/wp-content\/uploads\/2023\/04\/admin-logo.png","width":218,"height":34,"caption":"The Couchbase Blog"},"image":{"@id":"https:\/\/www.couchbase.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.couchbase.com\/blog\/#\/schema\/person\/69a3940e6ac02b2cdb3c95fbe435bb45","name":"Nyah Macklin - Desenvolvedor Evangelista @ Couchbase","image":{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/www.couchbase.com\/blog\/#\/schema\/person\/image\/6a141e3847fc5140407d649ab3b4de7c","url":"https:\/\/www.couchbase.com\/blog\/wp-content\/uploads\/sites\/1\/2023\/12\/image_2023-12-08_125555188.png","contentUrl":"https:\/\/www.couchbase.com\/blog\/wp-content\/uploads\/sites\/1\/2023\/12\/image_2023-12-08_125555188.png","caption":"Nyah Macklin - Developer Evangelist @ Couchbase"},"description":"Nyah Macklin \u00e9 uma desenvolvedora evangelista que se preocupa em facilitar a vida dos desenvolvedores. Ela faz isso por meio de aprendizado em p\u00fablico, ensino e palestras. Nyah pode ser encontrada em confer\u00eancias internacionais e no Twitter @NyahMacklinDev falando sobre privacidade de dados, seguran\u00e7a e desenvolvimentos inovadores em intelig\u00eancia artificial. Entre em contato com Nyah no Twitter ou no Discord do Couchbase para saber mais!","sameAs":["https:\/\/x.com\/NyahMacklinDev"],"url":"https:\/\/www.couchbase.com\/blog\/pt\/author\/nyahmacklin\/"}]}},"authors":[{"term_id":9897,"user_id":84838,"is_guest":0,"slug":"nyahmacklin","display_name":"Nyah Macklin - Developer Evangelist","avatar_url":{"url":"https:\/\/www.couchbase.com\/blog\/wp-content\/uploads\/sites\/1\/2023\/12\/image_2023-12-08_125555188.png","url2x":"https:\/\/www.couchbase.com\/blog\/wp-content\/uploads\/sites\/1\/2023\/12\/image_2023-12-08_125555188.png"},"first_name":"Nyah","last_name":"Macklin - Developer Evangelist","user_url":"","author_category":"","description":"Nyah Macklin \u00e9 uma desenvolvedora evangelista que se preocupa em facilitar a vida dos desenvolvedores. Ela faz isso por meio de aprendizado em p\u00fablico, ensino e palestras. Nyah pode ser encontrada em confer\u00eancias internacionais e no Twitter @NyahMacklinDev falando sobre privacidade de dados, seguran\u00e7a e desenvolvimentos inovadores em intelig\u00eancia artificial. Entre em contato com Nyah no Twitter ou no Discord do Couchbase para saber mais!"}],"_links":{"self":[{"href":"https:\/\/www.couchbase.com\/blog\/pt\/wp-json\/wp\/v2\/posts\/16005","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.couchbase.com\/blog\/pt\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.couchbase.com\/blog\/pt\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.couchbase.com\/blog\/pt\/wp-json\/wp\/v2\/users\/84838"}],"replies":[{"embeddable":true,"href":"https:\/\/www.couchbase.com\/blog\/pt\/wp-json\/wp\/v2\/comments?post=16005"}],"version-history":[{"count":0,"href":"https:\/\/www.couchbase.com\/blog\/pt\/wp-json\/wp\/v2\/posts\/16005\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.couchbase.com\/blog\/pt\/wp-json\/wp\/v2\/media\/16008"}],"wp:attachment":[{"href":"https:\/\/www.couchbase.com\/blog\/pt\/wp-json\/wp\/v2\/media?parent=16005"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.couchbase.com\/blog\/pt\/wp-json\/wp\/v2\/categories?post=16005"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.couchbase.com\/blog\/pt\/wp-json\/wp\/v2\/tags?post=16005"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.couchbase.com\/blog\/pt\/wp-json\/wp\/v2\/ppma_author?post=16005"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}