Free Essay

Information Privacy

In: Computers and Technology

Submitted By vladotch2001
Words 864
Pages 4
The privacy of personal information related to the data stored on the computer systems is termed as Information privacy. The information privacy is related to the privacy of personal data that is collected by various organizations for personal use. The private information can be stored in medical records, political records, criminal records, financial data, data on website or any information related to the business which needs to be protected and kept secured. The type of information that can be found is usually social security number, date and place of birth, and the place of domicile just to name of few. The invention of technology has caused many to lose sight of the definition of privacy .
The advancement of technology is causing an increase in vulnerabilities in information privacy which is the reason why most companies had to adapt a code of ethics to protect consumers, employees and the company itself. According to (Ashurst, 2011) “Sensitive data in the right hands is vital, in the wrong hands it can cause offence, destroy reputations and cost businesses”. Thus to protect the personal data, information privacy can be applied in various ways such as encrypting the data, data masking and authentication by which only the people who are legitimate users can have access to the data of the organization with authorized access.
When it comes to information Privacy the focus cannot be kept strictly on businesses, another major key player is Social media. Merriam Webster defines social media as forms of electronic communication (as Web sites for social networking and micro blogging) through which users create online communities to share information, ideas, personal messages, and other content ( such as videos).Social media can impact lives in many ways. It can impact things as public as a business that grosses billions of dollars every year, to something as small as your personal life. It has been known to greatly improve an image or it can tear it apart from the inside out. One of the many ways social media can impact someone is through the information that is shared and how it is being used and also perceived. There are several ethical issues that arise when referencing to Information Privacy. Ethics is the fact that a human is able to distinguish between right or wrong when it pertains to our actions. When referring to Information Privacy computer ethics or information ethics comes to mind; according to (P., 2007)“Computer ethics analyzes moral responsibilities of computer professionals and computer users and ethical issues in public policy for information technology development and use”. Therefore setting a form of guideline that everyone will be able to use not only to protect themselves but also make a decision on what information they want to divulge to different companies or allow those companies to share. Due to the extent to which most employees and the general public have access to sensitive information and to non-sensitive information, a number of societal ethical changes have become mandatory. These changes would include accessing private information for personal gain such as identify theft, reverse engineering software to gain trade secrets and using information technology to cyberbully or cyberstalk individuals, crimes against children. These ethical concerns have led to the development of laws and security measures that are intended to protect people and companies from the vulnerabilities caused by the mass usage of information technology. Because of all the unethical possibilities an individual or a company can do, a code of ethics had to be developed in order to minimize the damage as much as possible.
Companies, just like individuals, are finding multiple ways to protect their information and the information of their clients. Although hacking and other unethical usage of information will never go away because of its profitability, laws and punishments should be put in place to protect everyone. Companies should put their resources together to develop a law that will not only protect themselves but also the consumers. Consumers and the general public should become more educated of the type information that they are providing to different websites and companies in order to minimize their digital footprint. According to (Yardonn, 20125) ” Governments and organizations have to create social norms that make hacking too risky for the hackers, much like they have with attacks in the physical world”.
As technology progresses, Information Privacy and Security will always be an issue and the forefront of every discussion when it comes to dealing with national security. Since a baby is born, he will forever have a digital footprint because all hospitals are digital now. But it will be ultimately up to him how much information he is willing to give to the digital world. In hindsight as a nation we should take the proper steps to ensure that we are protecting ourselves from the different malicious ways that hackers can harm us.

Ashurst, A. (2011). Can you handle all of the information. Nursing & Residential Care.
P., B. (2007). Ethical Aspects of Information Security and Privacy. Security, Privacy and Trust in Modern Data Management , 21-36.
Yardonn, D. (20125, April 19). Retrieved from wsj:

Similar Documents

Premium Essay

Information Privacy

...Information Privacy Name of the student The privacy of personal information related to the data stored on the computer systems is termed as Information privacy. The information privacy is related to privacy of personal data that is collected by various organizations for personal use. The private information can be stored in medical records, political records, criminal records, financial data, data on website or any information related to the business related which needs to be protected and keep it secured. Thus information privacy may also be called as data privacy. An important aspect of information sharing is information privacy. With the advancement in technology, there has been increase in vulnerabilities related to personal information. Thus to protect the personal data, information privacy can be applied in various ways like encrypting the data, data masking and authentication by which only the people who are legitimate users can have access to the private data of the organization with authorized access. Using these measures, the personal information can be protected from illegal and unauthorized access and also prevent data mining (Bergstein, Brian , 2004; Swartz, Nikki, 2006) which otherwise is illegal in many parts of the world. As we know that in today’s world, the information technology sector is changing very rapidly, where location tracking is becoming a norm and smart phones that are becoming even smarter. Thus an attempt is being made by the officials to......

Words: 1338 - Pages: 6

Premium Essay

Information Age & Information Privacy

...INFORMATION AGE AND INFORMATION PRIVACY UNIVERISTY OF MARYLAND UNIVERSITY COLLEGE 5 AUGUST 2011 | An estimated 35 million people use e-mail – either via their company’s computers or on paid networks. Unlike telephone calls, which by law are private because the phone lines are considered common carriers, a company owns its computer network and all the data in it. Seemingly, private email has been used against employees in everything from sexual harassment cases to charge of trade secret theft. Even employees who carefully delete their email cannot escape cyber-investigators who can hunt through a computer’s backup system to find just about anything ever stored in a computer. That is to say, the use of email is like having a video camera consistently running. Information Privacy can be defined as the relationship between collection and dissemination of the information. There is no doubt that there is a public expectation of privacy, however, the term itself has legal and political issues surrounding it. Information Privacy affects our personal and professional life. With the invention of the personal computer in 1970 and the internet reaching a critical mass in 1990, and the adoption of this technology three decades later, we society catapulted into what is known as the “Information Age”. The “Information Age” has allowed global network communication and shaped our modern society. With so many advancements in technology and the reliability of computers in......

Words: 1364 - Pages: 6

Free Essay

Distinguish Between Information Privacy and Electronic Privacy

...Distinguish between information privacy and electronic privacy Information privacy is the security of individual data and normally identifies with individual information put away on PC frameworks. The need to keep up data protection is material to gathered individual data, for example, restorative records, monetary information, criminal records, political records, business related data or site information. Information privacy is viewed as a vital part of data imparting. With the progression of the advanced age, individual data vulnerabilities have expanded. Information privacy may be connected from various perspectives, including encryption, confirmation and information veiling very endeavoring to guarantee that data is accessible just to those with approved access. These defensive measures are intended for avoiding information mining and the unapproved utilization of individual data, which are illicit in numerous parts of the world. Information security, additionally called data protection, is the part of data innovation (IT) that arrangements with the capacity an association or individual needs to figure out what information in a PC framework can be imparted to outsiders. In the United States, enactment concerning information security has been sanctioned in a sectorial way, which implies that every law or consistence regulation has been made in light of the needs of a specific industry or segment of the populace. Electronic privacy is a dubious idea......

Words: 523 - Pages: 3

Premium Essay

Information Privacy Law

...This essay discuss the Privacy Act of 1974, the Information Privacy Law, Electronic Communications Privacy Act, and other laws and provisions designed to protect an individual’s privacy. In this essay I will also discuss the importance on trust and integrity in the work environment. As communication technology expands, and the possibility of accessing that technology has grow increasingly less challenging to gain, it has become more difficult to protect personal information and the use of an individual’s personal information. Whether this information is used for business, consensus, personal, educational, or even fraudulent reasons, the Individual’s right to control his or her personal information held by others has grown into an enormous concern for most people over the age of eighteen. Additionally, considering the average age for acceptance to most internet social forums and email accounts is thirteen years old, the concern for personal information security can begin even before puberty. In this essay I will also discuss how Legislation and Law makers are have and are continuing to attempt to protect information privacy as new technologies and new institutional procedures arise. This essay will talk about but not go into great detail about how the information privacy is covered in the American Constitution, the provisions for this law, and the conditions of disclosure for this law. Because the Privacy act of 1974 does not cover in great depth email and communications......

Words: 1995 - Pages: 8

Free Essay

Physical Privacy; Stealing Employees Genetic Information

...“Inappropriate genetic testing can threaten individual autonomy, privacy, and confidentiality and lead to various types of genetic stigmatization and discrimination without any commensurate benefit for the individual tested,” (Brandt; Rauf, 2004). When Burlington Northern Santa Fe Railway (BNSF) tested their employees without the employees knowing about it, the Equal Employment Opportunity Commission (EEOC) stepped in and cited that BNSF violated the employee’s equal rights through discrimination and the employee’s rights of privacy. These actions “raise serious concerns that such testing could pose a significant threat to workers' privacy, autonomy, and dignity. Thus, defining the ethically, legally, and socially appropriate and inappropriate uses of genetic testing in the workplace,” (DEHS, 2001) presents a major breach in a workers legal right to privacy. One hundred and twenty-five BNSF employees filed on-the-job injury claims citing carpal tunnel syndrome (CTS) for “years of repetitive activity such as wielding a wrench or operating a jackhammer,” (Lehrer, 2001; UNK, 2001). While investigating these claims, BNSF medical doctor required further testing of 20 employees (UNK, 2001). The medical company pulled blood for genetic testing without telling the BNSF employees what kind of test that they were performing, (Mahanna, 2001; Schafer, 2001; BNSF, 2002; Lehrer, 2001; Lewin, 2002). One employee refused to submit to the tests and BNSF threatened to terminate his job......

Words: 2875 - Pages: 12

Premium Essay

Practical Applications of an Information Privacy Plan

...Study: Practical Applications of an Information Privacy Plan which can be found in Chapter 16 of the text Human Resource Information Systems: Basics, Applications, and Future Directions, Second Edition. Keywords: case study Assignment 1 Scenario 1: Roger, a photocopier technician, has been asked to repair an office photocopier that just broke down while someone was copying a grievance matter against an employee of the agency. The officer who was copying the file takes the opportunity to grab a cup of coffee and leaves Roger in the photocopy room while the photocopier cools down. While waiting, Roger flips through the file and realizes that the person against whom the grievance was made lives on the same street as he does. 1. What information privacy principles (IPPs) have been breached? Answer: Roger breached IPP 4 (Security) and IPP 11 (Disclosure) is the privacy principles that have been breached. IPP 4 has requirements of securing and protecting files against loss, unauthorized access, use, modification, disclosure and any other misuse. IPP 11 is has the requirements of disclosing personal information. 2. How? Answer: An IPP 4 could have been breached by leaving files in areas where others could access them. IPP 11 was breached because Roger read the file and seen that the person in the grievance lives on the same street that he does. 3. What you would do to address the situation? Answer: For the IPP 4 privacy principle the files should never be......

Words: 781 - Pages: 4

Premium Essay

Se571 Principles of Information Security and Privacy

...Aircraft Solutions Security Weaknesses Final Project SE571 Principles of Information Security and Privacy Keller Graduate School of Management Table of Contents Executive Summary ……………………………………………………………………..1 Company Overview……………………………………………………………………...1 Security Vulnerabilities .................................................................................................1-3 Recommended Solution.....................................................................................................4 A Software/ Hardware Bundle Example Solution 4 Cost of Hardware/Software…………………………………………………………...3-6 Summary……………………………………………………………………………….…6 References…………………………………………………...……………………………7 Executive Summary This paper’s purpose is to point out and resolve the security vulnerabilities of Aircraft Solutions. Company Overview My focus is on Aircraft Solution’s weaknesses, after gaining employment with AS I have noticed some problems. Two Security Vulnerabilities In the beginning I see that all the computers have independent antivirus software and firewalls on the servers. The diagram shows that the CD has no firewall at all and is still connected to the headquarters server behind its firewall. The CD is directly connected to the net. This could be a good input for an attack. IT, Finance, S&M and the DD are all at risk for this weakness at this point. This can be a direct in for......

Words: 1725 - Pages: 7

Premium Essay

The Value of Digital Privacy in an Information Technology Age

...of Digital Privacy in an Information Technology Age Diana Flynn Strayer University Professor James Merola April 30, 2012 1. List and describe at least three (3) technologies that allow an individual to research citizen’s private data. is a technology that helps people find family members, friends, classmates, military buddies and almost anyone living in the United States. It sells background information to anyone or anybody regardless of who you are. DateCheck is a site hosted by Intelius which stores reports including names, addresses, birth dates, court records, and cell phone numbers. People can access personal records by name, social security number or phone number through Intelius. The second technology is If you are looking for information on someone, searching the web using Google is one of the best places to start. A person can find background information, phone numbers, addresses, maps and more. On the flip side, anyone can find the same information about you. Information is given by citizens opening up an account. It is the basic information such as name, address, phone, email or credit card number. Information is shared with companies, organizations, and in individuals outside of Google with consent. Data searched on the web is stored to improve and maintain the security of their systems. Government agencies request information from......

Words: 1451 - Pages: 6

Free Essay

Case Analysis Case Analysis “Robert Princeton” Loginjoin Rss ©2012 Termpaperwarehouse.Com Privacy Policy Terms of Service Copyright Information Contact Us Help Advertise with Us

...Charlotte Beers (Ogilvy & Mather) Case analysis At the point of planning to the launch of the business, the owner of the business is very passionate and usually experienced in the line-of-business; as David Ogilvy was at the age of 38 when he started his own advertising agency in 1948. Ogilvy & Mather, an advertising agency was started in New York and expanded worldwide. By 1991, O&M was ranked the largest marketing company in the world.[1] But there comes a time when a company must look to adapt a change. With competition growing, clients of O&M changed their demands. O&M was a high-cost agency that was failing in controlling their budget and lowering their cost; they failed to see the reason for a change. Due to that fact, O&M had lost few of their multi-million dollar accounts. Many companies may have either filed bankruptcy or have shutdown in the process of losing their clients but O&M was not the type of company that would give up that easily. In 1992, Charlotte Beers was appointed CEO of O&M and a massive change was underway. She was not the type of person who would dwell on the past, but instead look to better the future. Charlotte Beers clearly made an impression on the O&M employees as she had the ability to inspire. But more importantly, she came up with three strategies which turned the company around 360 degrees; Client Security, Better Work/More Often, and Financial Discipline. Yes these strategies were formed for an advertising......

Words: 492 - Pages: 2

Premium Essay

“Privacy and Health Information Technology”

...A Literature Review “Privacy and Health Information Technology” Deborah Jones Dr. Udoh Udom Health Information Systems HAS 520 12/06/10 Introduction The increased use of health information technology (Health IT) is a common element of privacy of medical information. Proponents hope that the increased use of health IT will improve health outcomes for individual patients by facilitating the delivery of evidence-based care and reducing medical errors. Additionally, proponents hope that increasing information sharing among providers will better coordinate care within and across health care settings. Health IT facilitates the creation of a comprehensive health record that can move with an individual over his or her lifetime, in contrast to the fragmented records that exist today. Further, health IT is promoted as a critical tool for improving population health by allowing for the more efficient gathering of data regarding the effectiveness of certain treatments. Finally, health IT is also expected to help decrease health costs by reducing the duplication of services and the delivery of unnecessary or inappropriate care. This paper examines some of the “gaps” in privacy protections that arise out of the current federal health privacy standard, the Health Insurance Portability and Accountability (HIPAA) Privacy Rule, the main federal law which governs the use and disclosure of health information. Additionally, it puts forth a range of possible solutions, accompanied by...

Words: 3190 - Pages: 13

Premium Essay

Mobile Technology and Privacy

...Privacy and Culture: Comparative study of privacy issues with respect to mobile technology in India and America Sreeranjani K Pattabiraman Abstract The past decade has witnessed a huge shift in the development of mobile technology which has led to privacy issues, murmurings of which started surfacing only in recent years. A lot of research has been carried out by academicians on mobile technology and its impact on society. There have also been comparative studies on how privacy has changed for people over the years with the boom of social networking sites and smart phones. But, there has not been a substantial study or analysis conducted on how people's privacy has been directly affected by the ever-increasing population boom of mobile-phone users. This comparative study analyzes the concept of privacy with respect to mobile surveillance and draws upon prior work in the field of mobile surveillance, ranging from popular press on government surveillance in India and USA and case studies in these two countries related to people’s view on privacy, to the works of ACLU (American Civil Liberty Union) in USA and Stop CMS (Central Monitoring System) in India. The study is built around the analysis and comparison of the issue of mobile surveillance in both the countries, how people dealt with this, and the role of culture in determining people’s view on privacy. It also proposes suggestions for how future research can be carried out in the field of mobile......

Words: 7224 - Pages: 29

Premium Essay

Technology and Privavy

...Technology and Privacy Name: Course: Institution: Lecture Date: The world today has modern technology that makes life easier and dependable on it. Technology claims a huge influence on many aspects of life: economic, social and political among others. There are both aesthetic and scientific dimensions towards technology in that those scientists and artists have worked single-handedly or together in the future and present-day like in making dimensional inventions. Although the technology has its positive on the human life, it also has its negative effects on humans. Over years now so many evils against humanity have cropped up socially, politically and even economically (Agre & Rotenberg 1998). Politically, people have pointed accusing fingers to the government for failing to safeguard their privacy but only to make false assurances. The government has been repeatedly allowed its agencies to monitor phone calls and emails from foreigners visiting the USA with the intention of protecting its national security. They monitor these communications in hope that they detect any terrorist plans against the country. Although monitoring may have succeeded extensively in a repeated occasions, the privacy of innocent individuals has been violated by accessing private conversations. It is the fear of many too that while only government agencies can access private information, the data gathered could be used not only for the right reasons. Personal information of people is......

Words: 652 - Pages: 3

Free Essay

Facebook Has Always Been Accused for Giving Users a False Sense of Control over Their Data Privacy.

...Facebook Facebook has always been accused for giving users a false sense of control over their data privacy. Firstly, it is because Facebook places too much burden on users to navigate a complex web of settings, including for privacy, advertisements and followers. Since the process of changing setting is so tedious, many users may just do not care about the privacy setting. Opt-outs for sponsored stories or collection of location data aren’t provided so users are forced to tell their locations to Facebook. Secondly, Facebook’s ability to track users’ activity outside Facebook have increased exponentially as time has passed. Facebook now gathers information through these plugins regardless of whether the buttons are used. Every time a user goes on a website with a Facebook like button, the browsing history with be recorded and Facebook may give the information to a third party for advertising and other purposes. In addition, Facebook’s acquisition of Instagram and WhatsApp has allowed them to collect more kinds of user data, which enables more detailed profiling. Facebook’s terms don’t properly acknowledge the data subject rights of users as well. Though users have some options to control the visibility of their information within their networks, they are not able to prevent Facebook from further using this information for its purposes. The privacy settings were less clear in relation to the collection and use of data by Facebook itself or by third-parties like application...

Words: 496 - Pages: 2

Premium Essay

The Value of Digital Privacy in an Information Technology Age Brenda Steen Strayer University Leg/500 December 19, 2012 Professor: Dr. Pino the Following Assignment Contains Information Regarding Individual

...contains information regarding individual privacy in this age of information technology. On today’s vast information superhighway, private information can be found on most individuals within a couple of clicks of a computer mouse. This assignment will describe a minimum of three technologies that allow people to research the private information of citizens. This report provides and analysis of the advantages and disadvantages of having this information made public. Additionally, this report includes options individuals have to protect their private information. Last, this report discusses the existence and effectiveness of electronic privacy laws enacted to protect private information. Google is probably the most used search engine on the internet. It is usually the first step used to research private information. Google collects all available private information and conveniently places it at a researcher’s fingertips. Such information as address, telephone numbers, pictures and work history is available on Google. Facebook is another popular website people use to obtain private information. Researchers can gain information such as posted pictures, family/friend information, and place of employment. Researchers can also find out recreational information such as local establishments a person frequents or when he or she is on vacation. Many states use have county property tax websites. A researcher can simply type in a person’s name and find out information......

Words: 951 - Pages: 4

Premium Essay

Cmu Essay

...Mark I. Preamble A data broker industry is prevalent in this age of information technology today. With the explosion of the Internet, sites like USAData, ChoicePoint or Acxiom has been built to store their personal data is quite large. 3877 list of charitable contributions in Detroit can be purchased from the site USAData cost $ 465.24 or college Broad also sold student data of 1700 with prices 28 cents per person. Business occupations are permitted by law and it exists depends on the information needs of the growing society. For example, data from ChoicePoint or Acxiom has helped the IRS Tax Department, Department of Homeland Security, Justice and other government departments in the U.S. anti-terrorism policy. But the sale of these data affect the privacy of individuals and social stability. The wrong information can cause confusion or individuals lose their jobs or are disadvantaged in the job. The business side of the data shows the necessity to set out the legal documents to manage this sector II. THE ANSWER TO QUESTION Question 1: Does the data brokers have caused a dilemma (dilemma), moral or not? Explain Data broker is an individual or organization searching, collecting information, data, and then sold him back the data. Data brokers are actually interested in career in the exploding information age and the amount of information customers need is increasing. While brokers bring more information to customers and efficient organization, private data brokers......

Words: 2093 - Pages: 9