StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...

Protecting Personal Information - Essay Example

Cite this document
Summary
Identity theft is the crime that involves stealing a person's personally identifiable information. The writer of the paper "Protecting Personal Information" gives information about the means of identity theft, its reasons and the ways of protecting from it…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER94.1% of users find it useful
Protecting Personal Information
Read Text Preview

Extract of sample "Protecting Personal Information"

Download file to see previous pages

But there are many concerns which consumers must consider if they want to enter into protected and secure transactions with the seller companies without any security risks involved. They must watch what PII they are going to share with the companies online. Companies might ask them to give their PII like name, address, phone number, e-mail address, spouse’s name, name of parents and children, social insurance number, bank account number or credit card number. Consumers should make sure that the seller companies have a privacy policy mentioned on their websites and that the security of their credit cards or any other mode of payment is also guaranteed.

If the credit card number has been given, then the statement must be checked regularly so as to make sure that there are no unknown charges that are not in the consumer’s knowledge. It is also a sensible idea to keep a copy of all agreements, transactions, and communications that have been carried out with the online vendors so that a proof is always there in case of complaints- minor or severe.Two of the many laws regarding identity theft are discussed below:Computer Fraud and Abuse Act (CFAA)CFAA was designed in 1984 and deals with penalties for the intruders who gain access to sensitive information stored in a computer without authorized access.

Computers have to be protected when the consumers carry out commercial activities, engage in cross-border e-commerce, and make online business transactions and email communications with online traders.. It is also a sensible idea to keep a copy of all agreements, transactions and communications that have been carried out with the online vendors so that a proof is always there in case of complaints- minor or severe. Laws and Legislation Two of the many laws2 regarding identity theft are discussed below: Computer Fraud and Abuse Act (CFAA) CFAA was designed in 1984 and deals with penalties for the intruders who gain access to sensitive information stored in a computer without authorized access.

Computers have to be protected when the consumers carry out commercial activities, engage in cross-border e-commerce, and make online business transactions and email communications with online traders. The Act applies penalties upon the identity thieves starting from 10 years to 20 years of imprisonment. Health Insurance Portability and Accountability Act (HIPAA) This law was passed in order to eliminate the menace of identity theft. The need for secure online networks initially arose when issues like computer viruses and internet fraud posed a threat to the security and privacy of data stored on online servers and health records.

HIPAA was passed by U.S. Congress on August 21, 1996. It deals with the privacy issue of the consumer’s data and presents Privacy Rule which ensures fines and punishments for fraud and violation of the rule. Ethical, Moral and Social Issues It is important to educate the users of internet and computer systems about “intellectual property rights issues, privacy/ surveillance issues, access to data issues and issues of human-computer interaction” (Stahl, Carroll-Mayer and Norris, 2006, p.298). They should know that

...Download file to see next pages Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Protecting Personal Information Essay Example | Topics and Well Written Essays - 750 words”, n.d.)
Retrieved de https://studentshare.org/information-technology/1391704-identity-theft
(Protecting Personal Information Essay Example | Topics and Well Written Essays - 750 Words)
https://studentshare.org/information-technology/1391704-identity-theft.
“Protecting Personal Information Essay Example | Topics and Well Written Essays - 750 Words”, n.d. https://studentshare.org/information-technology/1391704-identity-theft.
  • Cited: 0 times

CHECK THESE SAMPLES OF Protecting Personal Information

Ethical Issues in Research

Background: It describes the basic information and history about the programmes or the project which is being evaluated.... The main aim of this is to provide detailed analysis or information about a narrow topic of academics.... In the paper “Ethical Issues in Research” the author discusses communication of key findings in the research report as one of the important works of the overall research....
6 Pages (1500 words) Personal Statement

Management Personal Statement

My primary mode of living is focused externally, where I deal with things according to how I feel about them, or how they fit into my personal value system.... I make things happen for people, and get my best personal satisfaction from this.... I lead through personal enthusiasm and take a participative stance in managing people and projects.... Some stressors for me include having my beliefs challenged, being unfairly or harshly Surname 3criticized by someone I trust or hold dear, and people who are unwilling to try to resolve personal differences....
12 Pages (3000 words) Personal Statement

To Be a Therapist

hellip; The author states that initially, Rogers, through sound recordings, looked for the crucial turn in the client change or information.... When personal experiences are not conducive with the self-identity of the person, psychological problems occur because the individual is unable to cope with the experiences and still maintain the personal identity to which he has become accustomed to, or of which he had certain self-confidence and pride....
9 Pages (2250 words) Personal Statement

Fear and Loathing on MySpace.com

He says that MySpace currently uses the honor system and uses the information you supply it.... The world of the Internet has forever altered the social habits of our population Children no longer cruise the local drive-in or hang out in the mall.... They don't go down the street to see the neighborhood kids or gather in a nearby park....
8 Pages (2000 words) Personal Statement

Short-Term and Long-Term Post-MBA Goals

hellip; The author states that having worked as an executive assistant to the mayor of Pingyao after serving three years in the information technology industry, he was given a chance to transplant business practices, methodologies, and skills into public management.... In the paper “Short-Term and Long-Term Post-MBA Goals,” the author tries to understand how Columbia Business School will help him short-term and long-term goals....
8 Pages (2000 words) Personal Statement

Master of Science in Information Management

Currently, I engage in activities where I teach the community members and those around me on the importance of protecting their personal information and ways through which they can do this.... I am currently a holder of a major in information Management at Syracuse University.... I got attracted to information technology as a young kid in school.... In my earlier school Personal ment Personal ment Part I hereby tender my application for a master's degree program in information management....
2 Pages (500 words) Personal Statement

Reflection on Experience Studying Postgraduate Bioethics Course

   … The bioethics postgraduate course that I am going to describe in this paper has been a wonderful experience for me as I learnt many personal and professional ethical considerations in this course.... The course that I attended taught me many important things which are going to help me in my personal and professional life....
6 Pages (1500 words) Personal Statement

Transportation Security

The writer of the paper “Transportation Security” states that to a nation like the USA, which is both a developed and developing country, the issue can bring down the nation.... The aim of solving legal issues that can help officials what they can and what they cannot.... America needs unity of effort to achievement....
6 Pages (1500 words) Personal Statement
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us