Free Essay

Information Privacy

In: Computers and Technology

Submitted By vladotch2001
Words 864
Pages 4
The privacy of personal information related to the data stored on the computer systems is termed as Information privacy. The information privacy is related to the privacy of personal data that is collected by various organizations for personal use. The private information can be stored in medical records, political records, criminal records, financial data, data on website or any information related to the business which needs to be protected and kept secured. The type of information that can be found is usually social security number, date and place of birth, and the place of domicile just to name of few. The invention of technology has caused many to lose sight of the definition of privacy .
The advancement of technology is causing an increase in vulnerabilities in information privacy which is the reason why most companies had to adapt a code of ethics to protect consumers, employees and the company itself. According to (Ashurst, 2011) “Sensitive data in the right hands is vital, in the wrong hands it can cause offence, destroy reputations and cost businesses”. Thus to protect the personal data, information privacy can be applied in various ways such as encrypting the data, data masking and authentication by which only the people who are legitimate users can have access to the data of the organization with authorized access.
When it comes to information Privacy the focus cannot be kept strictly on businesses, another major key player is Social media. Merriam Webster defines social media as forms of electronic communication (as Web sites for social networking and micro blogging) through which users create online communities to share information, ideas, personal messages, and other content ( such as videos).Social media can impact lives in many ways. It can impact things as public as a business that grosses billions of dollars every year, to something as small as your personal life. It has been known to greatly improve an image or it can tear it apart from the inside out. One of the many ways social media can impact someone is through the information that is shared and how it is being used and also perceived. There are several ethical issues that arise when referencing to Information Privacy. Ethics is the fact that a human is able to distinguish between right or wrong when it pertains to our actions. When referring to Information Privacy computer ethics or information ethics comes to mind; according to (P., 2007)“Computer ethics analyzes moral responsibilities of computer professionals and computer users and ethical issues in public policy for information technology development and use”. Therefore setting a form of guideline that everyone will be able to use not only to protect themselves but also make a decision on what information they want to divulge to different companies or allow those companies to share. Due to the extent to which most employees and the general public have access to sensitive information and to non-sensitive information, a number of societal ethical changes have become mandatory. These changes would include accessing private information for personal gain such as identify theft, reverse engineering software to gain trade secrets and using information technology to cyberbully or cyberstalk individuals, crimes against children. These ethical concerns have led to the development of laws and security measures that are intended to protect people and companies from the vulnerabilities caused by the mass usage of information technology. Because of all the unethical possibilities an individual or a company can do, a code of ethics had to be developed in order to minimize the damage as much as possible.
Companies, just like individuals, are finding multiple ways to protect their information and the information of their clients. Although hacking and other unethical usage of information will never go away because of its profitability, laws and punishments should be put in place to protect everyone. Companies should put their resources together to develop a law that will not only protect themselves but also the consumers. Consumers and the general public should become more educated of the type information that they are providing to different websites and companies in order to minimize their digital footprint. According to (Yardonn, 20125) ” Governments and organizations have to create social norms that make hacking too risky for the hackers, much like they have with attacks in the physical world”.
As technology progresses, Information Privacy and Security will always be an issue and the forefront of every discussion when it comes to dealing with national security. Since a baby is born, he will forever have a digital footprint because all hospitals are digital now. But it will be ultimately up to him how much information he is willing to give to the digital world. In hindsight as a nation we should take the proper steps to ensure that we are protecting ourselves from the different malicious ways that hackers can harm us.

Ashurst, A. (2011). Can you handle all of the information. Nursing & Residential Care.
P., B. (2007). Ethical Aspects of Information Security and Privacy. Security, Privacy and Trust in Modern Data Management , 21-36.
Yardonn, D. (20125, April 19). Retrieved from wsj:

Similar Documents

Premium Essay

Information Privacy

...Information Privacy Name of the student The privacy of personal information related to the data stored on the computer systems is termed as Information privacy. The information privacy is related to privacy of personal data that is collected by various organizations for personal use. The private information can be stored in medical records, political records, criminal records, financial data, data on website or any information related to the business related which needs to be protected and keep it secured. Thus information privacy may also be called as data privacy. An important aspect of information sharing is information privacy. With the advancement in technology, there has been increase in vulnerabilities related to personal information. Thus to protect the personal data, information privacy can be applied in various ways like encrypting the data, data masking and authentication by which only the people who are legitimate users can have access to the private data of the organization with authorized access. Using these measures, the personal information can be protected from illegal and unauthorized access and also prevent data mining (Bergstein, Brian , 2004; Swartz, Nikki, 2006) which otherwise is illegal in many parts of the world. As we know that in today’s world, the information technology sector is changing very rapidly, where location tracking is becoming a norm and smart phones that are becoming even smarter....

Words: 1338 - Pages: 6

Premium Essay

Information Age & Information Privacy

...With so many advancements in technology and the reliability of computers in our daily lives, the exchange of personal information has brought the need to have information privacy. The intent of this essay is to show how the “Information Age” has affected “Information Privacy.” These statements ultimately end with the fact that, it is impossible for computer users to expect information privacy because that privacy does not exist. We live in the “Information...

Words: 1364 - Pages: 6

Premium Essay

Information Privacy Law

...Because the Privacy act of 1974 does not cover in great depth email and communications traffic, I will also discuss other laws that assist in governing the privacy of information flow, especially email and electronic communications. The Privacy Act of 1974 (Dec. 31, 1974) establishes a Code of Fair Information Practice that governs the collection, maintenance, use, and dissemination of personally identifiable information about individuals that is maintained in systems of records...

Words: 1995 - Pages: 8

Free Essay

Distinguish Between Information Privacy and Electronic Privacy

...Distinguish between information privacy and electronic privacy Information privacy is the security of individual data and normally identifies with individual information put away on PC frameworks. The need to keep up data protection is material to gathered individual data, for example, restorative records, monetary information, criminal records, political records, business related data or site information. Information privacy is viewed as a vital part of data imparting. With the progression of the advanced age, individual data vulnerabilities have expanded. Information privacy may be connected from various perspectives, including encryption, confirmation and information veiling very endeavoring to guarantee that data is accessible just to those with approved access. These defensive measures are intended for avoiding information mining and the unapproved utilization of individual data, which are illicit in numerous parts of the world. Information security, additionally called data protection, is the part of data innovation (IT) that arrangements with the capacity an association or individual needs to figure out what information in a PC framework can be imparted to outsiders. In the United States, enactment concerning information security has been sanctioned in a sectorial way, which implies that every law or consistence regulation has been made in light of the needs of a specific industry or segment of the populace....

Words: 523 - Pages: 3

Premium Essay

“Privacy and Health Information Technology”

...A Literature Review “Privacy and Health Information Technology” Deborah Jones Dr. Udoh Udom Health Information Systems HAS 520 12/06/10 Introduction The increased use of health information technology (Health IT) is a common element of privacy of medical information. Proponents hope that the increased use of health IT will improve health outcomes for individual patients by facilitating the delivery of evidence-based care and reducing medical errors. Additionally, proponents hope that increasing information sharing among providers will better coordinate care within and across health care settings. Health IT facilitates the creation of a comprehensive health record that can move with an individual over his or her lifetime, in contrast to the fragmented records that exist today. Further, health IT is promoted as a critical tool for improving population health by allowing for the more efficient gathering of data regarding the effectiveness of certain treatments. Finally, health IT is also expected to help decrease health costs by reducing the duplication of services and the delivery of unnecessary or inappropriate care. This paper examines some of the “gaps” in privacy protections that arise out of the current federal health privacy standard, the Health Insurance Portability and Accountability (HIPAA) Privacy Rule, the main federal law which governs the use and disclosure of health information....

Words: 3190 - Pages: 13

Premium Essay

Practical Applications of an Information Privacy Plan

...Assignment 1 Alexander Winkka HRM320 Instructor Diane Moffat 9-27-2014 Abstract In this paper I will address the three questions for each of the three scenarios required by the Case Study: Practical Applications of an Information Privacy Plan which can be found in Chapter 16 of the text Human Resource Information Systems: Basics, Applications, and Future Directions, Second Edition. Keywords: case study Assignment 1 Scenario 1: Roger, a photocopier technician, has been asked to repair an office photocopier that just broke down while someone was copying a grievance matter against an employee of the agency. The officer who was copying the file takes the opportunity to grab a cup of coffee and leaves Roger in the photocopy room while the photocopier cools down. While waiting, Roger flips through the file and realizes that the person against whom the grievance was made lives on the same street as he does. 1. What information privacy principles (IPPs) have been breached? Answer: Roger breached IPP 4 (Security) and IPP 11 (Disclosure) is the privacy principles that have been breached. IPP 4 has requirements of securing and protecting files against loss, unauthorized access, use, modification, disclosure and any other misuse. IPP 11 is has the requirements of disclosing personal information. 2. How? Answer: An IPP 4 could have been breached by leaving files in areas where others could access them....

Words: 781 - Pages: 4

Premium Essay

Se571 Principles of Information Security and Privacy

...This can be a direct in for someone that knows what they are doing not to mention if someone just wanted to corrupt the system they could plant a virus and destroy a lot of information. This would be classified as a software security weakness. Since contractors, customer and clients have access to the company network, it would be best for everyone if more security measure were taken to protect everyone involved. Trade...

Words: 1725 - Pages: 7

Premium Essay

The Value of Digital Privacy in an Information Technology Age

...The Value of Digital Privacy in an Information Technology Age Diana Flynn Strayer University Professor James Merola April 30, 2012 1. List and describe at least three (3) technologies that allow an individual to research citizen’s private data. is a technology that helps people find family members, friends, classmates, military buddies and almost anyone living in the United States. It sells background information to anyone or anybody regardless of who you are. DateCheck is a site hosted by Intelius which stores reports including names, addresses, birth dates, court records, and cell phone numbers. People can access personal records by name, social security number or phone number through Intelius. The second technology is If you are looking for information on someone, searching the web using Google is one of the best places to start. A person can find background information, phone numbers, addresses, maps and more. On the flip side, anyone can find the same information about you. Information is given by citizens opening up an account. It is the basic information such as name, address, phone, email or credit card number. Information is shared with companies, organizations, and in individuals outside of Google with consent. Data searched on the web is stored to improve and maintain the security of their systems....

Words: 1451 - Pages: 6

Free Essay

Physical Privacy; Stealing Employees Genetic Information

...“Inappropriate genetic testing can threaten individual autonomy, privacy, and confidentiality and lead to various types of genetic stigmatization and discrimination without any commensurate benefit for the individual tested,” (Brandt; Rauf, 2004). When Burlington Northern Santa Fe Railway (BNSF) tested their employees without the employees knowing about it, the Equal Employment Opportunity Commission (EEOC) stepped in and cited that BNSF violated the employee’s equal rights through discrimination and the employee’s rights of privacy. These actions “raise serious concerns that such testing could pose a significant threat to workers' privacy, autonomy, and dignity. Thus, defining the ethically, legally, and socially appropriate and inappropriate uses of genetic testing in the workplace,” (DEHS, 2001) presents a major breach in a workers legal right to privacy. One hundred and twenty-five BNSF employees filed on-the-job injury claims citing carpal tunnel syndrome (CTS) for “years of repetitive activity such as wielding a wrench or operating a jackhammer,” (Lehrer, 2001; UNK, 2001). While investigating these claims, BNSF medical doctor required further testing of 20 employees (UNK, 2001). The medical company pulled blood for genetic testing without telling the BNSF employees what kind of test that they were performing, (Mahanna, 2001; Schafer, 2001; BNSF, 2002; Lehrer, 2001; Lewin, 2002)....

Words: 2875 - Pages: 12

Premium Essay

Se 571 Principles of Information Security and Privacy Midterm Exam

...SE 571 Principles of Information Security and privacy Midterm Exam Follow Link Below To Get Tutorial SE 571 Principles of Information Security and privacy Midterm Exam 1. (TCO A) What are the three goals of security in computing? For each goal, list two controls that can be implemented to help achieve that goal. 2. (TCO A) List and define five desirable qualities in a process designed to evaluate the trustworthiness of an operating system 3. (TCO B) Suppose you have a high capacity network connection coming into your home, and you also have a wireless network access point. Also suppose you do not use the full capacity of your network connection. List three reasons you might still want to prevent an outsider obtaining free network access by intruding into your wireless network 4. (TCO C) Explain how a hashing algorithm works and how it can be used to provide authentication and data integrity 5. (TCO B) Which of the following is a correct statement? SE 571 Principles of Information Security and privacy Midterm Exam Follow Link Below To Get Tutorial SE 571 Principles of Information Security and privacy Midterm Exam 1. (TCO A) What are the three goals of security in computing?...

Words: 3561 - Pages: 15

Premium Essay

Assignment 2: the Value of Digital Privacy in an Information Technology Age

...Assignment 2: The Value of Digital Privacy in an Information Technology Age Professor Weekley Law, Ethics and Corporate Governance May 5, 2013 There are many reasons you may want to get someone’s personal information, maybe you just need their address to send a card, but there are many people who have access to citizen’s private data with the click of a button. Your information can be searched for by anybody for any reason, and there are companies out there willing to help for a fee. The fourth amendment states, “The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall not be violated” (Halburt/Ingulli 2012). This law keeps people safe from searches for absolutely no reason, but the same protection does not expand to the internet, where these searches happen every day. There are a few ways of obtaining information about someone, and all you need to do is pay a small fee then you can have access to their address, phone number, criminal record and much more. You should only be able to get a background check on a person if you are a potential employer and after the person has signed a waiver. One such site offering these services is

Words: 1128 - Pages: 5

Premium Essay

The Value of Digital Privacy in an Information Technology Age Brenda Steen Strayer University Leg/500 December 19, 2012 Professor: Dr. Pino the Following Assignment Contains Information Regarding Individual

...The following assignment contains information regarding individual privacy in this age of information technology. On today’s vast information superhighway, private information can be found on most individuals within a couple of clicks of a computer mouse. This assignment will describe a minimum of three technologies that allow people to research the private information of citizens. This report provides and analysis of the advantages and disadvantages of having this information made public. Additionally, this report includes options individuals have to protect their private information. Last, this report discusses the existence and effectiveness of electronic privacy laws enacted to protect private information. Google is probably the most used search engine on the internet. It is usually the first step used to research private information. Google collects all available private information and conveniently places it at a researcher’s fingertips. Such information as address, telephone numbers, pictures and work history is available on Google. Facebook is another popular website people use to obtain private information. Researchers can gain information such as posted pictures, family/friend information, and place of employment. Researchers can also find out recreational information such as local establishments a person frequents or when he or she is on vacation. Many states use have county property tax websites....

Words: 951 - Pages: 4

Free Essay

Case Analysis Case Analysis “Robert Princeton” Loginjoin Rss ©2012 Termpaperwarehouse.Com Privacy Policy Terms of Service Copyright Information Contact Us Help Advertise with Us

...Charlotte Beers (Ogilvy & Mather) Case analysis At the point of planning to the launch of the business, the owner of the business is very passionate and usually experienced in the line-of-business; as David Ogilvy was at the age of 38 when he started his own advertising agency in 1948. Ogilvy & Mather, an advertising agency was started in New York and expanded worldwide. By 1991, O&M was ranked the largest marketing company in the world.[1] But there comes a time when a company must look to adapt a change. With competition growing, clients of O&M changed their demands. O&M was a high-cost agency that was failing in controlling their budget and lowering their cost; they failed to see the reason for a change. Due to that fact, O&M had lost few of their multi-million dollar accounts. Many companies may have either filed bankruptcy or have shutdown in the process of losing their clients but O&M was not the type of company that would give up that easily. In 1992, Charlotte Beers was appointed CEO of O&M and a massive change was underway. She was not the type of person who would dwell on the past, but instead look to better the future. Charlotte Beers clearly made an impression on the O&M employees as she had the ability to inspire. But more importantly, she came up with three strategies which turned the company around 360 degrees; Client Security, Better Work/More Often, and Financial Discipline. Yes these strategies were formed for an advertising......

Words: 492 - Pages: 2

Premium Essay

Privacy in the 21st Century

...Everyone likes privacy but it is no longer “available.” Everything people hope is private is no longer private. For example, before data bases were even created a patient’s information was recorded and put into files in a filing cabinet. There were no security precautions preventing another doctor from exploring someone’s files. A doctor could do anything with the files without anyone’s knowledge because there was no way...

Words: 1903 - Pages: 8

Premium Essay


...There was some privacy but as a rule it was a community existence. It is possible that complete privacy has never occurred, short of an individual being removed from all elements of society. If sharing personal information is not the natural order, checks and balances must be instituted to ensure private information remains as...

Words: 1783 - Pages: 8