Retrieved from https://studentshare.org/english/1599145-final-project-problem-at-work
https://studentshare.org/english/1599145-final-project-problem-at-work.
In explaining this problem, I explain how it occurs in organizations as well as in individuals. This problem takes place in two major steps. Step 1 is leaking out of this information to irresponsible individuals. In most cases these results from working routines in which the person given the mandate of safeguarding this information fails in his work. In step two, this information finds its way to an individual who use it for his malicious gains. These two steps are interconnected with step two depending largely on step one.
However, step one can occur but step two fails to occur when the information lands on another responsible person. The impact of this problem is actually very great in terms of what it can cost an individual or an organization. Moreover, it does not require a lot of time so that it can yield massive losses to the victims. This is because it has been discovered that loss of Personally Identifiable Information has resulted to loss of millions of records over the past few years thus causing massive harms to both individuals and organizations (McCallister, 2010).
However, in most cases the loss of Personally Identifiable Information is only discovered after it has already caused massive harm to the victims some of which are irreversible. To an individual this problem has been leading to identity theft, embarrassments, and blackmails all of which can make a person to incur losses and destroy his relationship with other people. All this are only possible when Personally Identifiable information gets lost and land on the hand of organizations or individuals who use it for malicious gains.
Therefore, if we can address this problem we can be able to avoid issues such as identity theft, embarrassments, and blackmails. Among the issues caused by this problem, the most prevalent one is the identity theft. Identity theft is undertaking an activity while pretending to be somebody else. In such cases, the activity is associated with the
...Download file to see next pages Read More