StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Discussion for Week 6 Chapter 9 Question 1 Information Protection and Privacy - Assignment Example

Cite this document
Summary
The acquisition and the utilization of personal and private information by various media channels such as internet, marketers, websites, legal enforcement institutions as well as network marketers has led to an increased concern over privacy issues. Information regarded as…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER96.5% of users find it useful
Discussion for Week 6 Chapter 9 Question 1 Information Protection and Privacy
Read Text Preview

Extract of sample "Discussion for Week 6 Chapter 9 Question 1 Information Protection and Privacy"

Introduction The acquisition and the utilization of personal and private information by various media channelssuch as internet, marketers, websites, legal enforcement institutions as well as network marketers has led to an increased concern over privacy issues. Information regarded as personal and private has become increasingly easily accessible due to high rates of cloud computing and the use of internet sources in advertisements. Protection of personal and private company information is imperative in all the societal dimensions and in the competitive business world.

Question one: Based on the e-Activity, evaluate the circumstances that contributed to the privacy violation, the consequence to the company to the breach, and management’s response to the breach, indicating the appropriateness of the response. Suggest how the company may have presented the breach and / or responded differently once the breach was discovered. Provide support for your rationale. The violation of personal information and company privacy has been experienced in the LexisNexis Company where three people hacked into the database and accessed personal information concerning several celebrities; however, investigations have shown that the three hackers have not used the information for any ill purpose (Biz Media pg.2) The hackers are believed to belong to a group of hackers known as the Operation Boca Grande; they claimed that they hacked into the LexisNexis Database while they were in a cyber just as a “joyride”.

LexisNexis database is easily available in the internet thus making it more vulnerable to hacking; this has also been increased by high levels of technology accessibility to the current generation.The breach of the LexisNexis company privacy created a lot of concern from a number of celebrities who demanded that the LexisNexis Database Company ensure that their personal information is not misused. The Company responded by hiring the services of a law enforcer to investigate the extent to which the hackers have misused the Company and Clients’ private information (Biz Media, pg.2). Although the Company applied the use of a legal enforcer to investigate the breach, it is still imperative that the management shut down the website to avoid further breaches that may occur and provide a chance for more investigation (Wack 1989, pg.4).Question Two: Assess the ethical considerations for information privacy, indicating how these considerations should be addressed with a corporate policy.

Provide support for your rationale. One of the ethical issues that need to be taken into consideration is the classification or categorizing of data that persons can access. The corporate policy can be formulated in a manner that certain private information is not posted on the Company’s website; this information can only be accessed by receiving consent from the Company. The other ethical issue that can be taken into consideration is the accuracy of the information posted on the website; company policies should include provisions that ensure the review of information before it is posted.

Information accuracy minimizes the chances of a company’s negative portrayal in the society as a result of negative or inaccurate data that may be posted on its website (Biz Media, pg.3)Work CitedBiz Media, Tech. Database Hackers Reveal Tactics." The Future of Cities 25 Mar. 2005: 2-3. Print. Wacks, Raymond. Personal information: privacy and the law. Oxford: Clarendon Press ;, 1989. Print.

Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Discussion for Week 6 Chapter 9 Question 1 Information Protection and Assignment”, n.d.)
Discussion for Week 6 Chapter 9 Question 1 Information Protection and Assignment. Retrieved from https://studentshare.org/finance-accounting/1608256-discussion-for-week-6-chapter-9-question-1-information-protection-and-privacy
(Discussion for Week 6 Chapter 9 Question 1 Information Protection and Assignment)
Discussion for Week 6 Chapter 9 Question 1 Information Protection and Assignment. https://studentshare.org/finance-accounting/1608256-discussion-for-week-6-chapter-9-question-1-information-protection-and-privacy.
“Discussion for Week 6 Chapter 9 Question 1 Information Protection and Assignment”, n.d. https://studentshare.org/finance-accounting/1608256-discussion-for-week-6-chapter-9-question-1-information-protection-and-privacy.
  • Cited: 0 times

CHECK THESE SAMPLES OF Discussion for Week 6 Chapter 9 Question 1 Information Protection and Privacy

Measuring Client Outcomes in Disability and Out of Home Care Services

?? This definition does not include children who are living in Out of Home Care outside of the child protection system.... Title Client Outcomes Framework Institution E.... .... Tipping Foundation (Large Non-profit Provider) Purpose Meet the need of a large non-profit provider providing care and support service to Out of Home Care for children, and for disability clients Target Audience Senior Management of E....
16 Pages (4000 words) Research Paper

Legal Limits to Press Freedom

This paper focuses its attention on the dividing line between press freedom and the legal statutes that protect citizens' rights to privacy and to fair trial when they run afoul of the law.... The paper chose this topic on the belief that the right to privacy and right to fair trial are inter-related in a particular way: the right to privacy of a defendant in a court case is violated twice over if news reporters run commentaries that tend to prejudge the case....
13 Pages (3250 words) Essay

Capital Funding in the Development of New Businesses

The questions will be, Since it is highly necessary to gather accurate information for giving an ample scope to my research problem, I will approach autonomous and governmental bodies like Department for international development, office of foreign common wealth offices and HM treasury....
12 Pages (3000 words) Essay

Employee is at Liberty: The Employment Rights

For the purposes of this discussion Sections, 95(2) and 96 are not relevant as Section 95 applies to notice of termination and Section 96 applies to dismissal with regards to childbirth.... Based on the facts of the case for discussion it appears that the three employees were dismissed for misconduct within the meaning of Section 98(2)(b) of the Employment Rights Act 1996....
21 Pages (5250 words) Essay

The Hacker Hunters

Transactional information technology and phishing methodology is exercised by the organizations and big retailers for the protection of their data and products.... The paper "Hacker Hunters" describes that identity theft refers to the hacking of private data and personal information of the clients and customers of organizations, retailers, banks, companies and financial institutions, where the customers have their accounts and get involved into business transactions....
4 Pages (1000 words) Essay

Changing Behavior of Students to Online Shopping

Online shopping takes the experience of shopping… altogether a new dimension and helps in improving the necessary services given to the consumers as well as the vendors and also helps in managing all the required information of the payments of the customers, receipt of products of the new customers, their product and updating The primary features of the online shopping helps in providing business accuracy, flexibility of design and readiness of accessibility (Gay, Charlesworth & Esen, 2007, p....
10 Pages (2500 words) Essay

Whither Information Governance

the threats to information and privacy in a world that is increasingly reliant upon technology.... As a resulе, the need to safeguard, protect, and promote informational freedom and privacy stand as a fundamental need that is not likely to decrease soon.... hellip; privacy and the way in which information is utilized has come to be an increasingly important aspect of the modern world.... Accordingly, in order to more deeply understand these dynamics and the means through which information governance is shifting and continually redefined, the following analysis will focus on defining information privacy, specifying why it is of importance, how privacy can be protected, discussing freedom of information, and how freedom of information can be guaranteed in a world that is increasingly paranoid about access to information and the need to safeguard it....
17 Pages (4250 words) Essay

The Development of Measurement Systems

Thus the question remains is how to set up a performance management process that supports the organisational mission and objectives.... Increasing focus on improving the productivity of firms and developing an efficient workforce has also evolved the performance management systems being used in the corporate sector....
10 Pages (2500 words) Thesis Proposal
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us