StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...

Privacy Laws related to Information Technology use - Research Paper Example

Cite this document
Summary
Privacy Laws in IT use Instructor Institution Date Privacy Laws in IT use All individuals are entitled to privacy of private information and protection from unauthorized access and use of private data (Canoni, 2004). The contemporary business environment is characterized by application of information and communication technology and the use of internet in the communication process…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER97.1% of users find it useful
Privacy Laws related to Information Technology use
Read Text Preview

Extract of sample "Privacy Laws related to Information Technology use"

Download file to see previous pages

In this regard, it is arguable that the privacy of individual data depends on the ability of organizations to employ security measures for the protection of individual information and private data (Kerr, 2004). The various online companies and websites such as Facebook, Google, LimkedIn, Yahoo and Skype are mandated by the law to protect the privacy of individuals. Regardless of the provisions of the law, it is notable that many online organizations and companies have disclosed private information to third parties such as advertisers who use it without the consent of the holders of the information.

Sensitive information such as financial records, bank and credit card details are also protected by the legal framework. This is due to the need for the security of personal data and the consequent prevention of possible fraud (Gillmor, 1998). The modern computing and transactional environments are characterized by online shopping and banking. This means that the users of the online banking services are predisposed to the risk of disclosure of their private information to organizations (Messmer, 2001).

Additionally, digital records of employees within various organization is at a risk f unauthorized access and use. . that organizations and individuals are protected from unauthorized use of private information by internal or external intruders to information systems (Miller and Tucker, 2007). The law also protects individual information from misuse by government agencies and the media (Sullivan, 2005). According to the fourth amendment, individual data and information must be kept private and free from unauthorized access and use (Lock, Conger and Oz, 1998).

This illustrates the role of the law in ensuring that organizations keep the information on their employees and clients as private as necessary (OConnor and Matthews, 2011). Infringement of the privacy of individual information is thus a legal felony (Thibodeau, 2001). Sometimes governing authorities such as the police perform thorough surveillance of a suspect’s private information and activities. Regardless of the justification that the governing authorities give for the infringement of individual privacy, such actions are legally wrong (Lock, Conger and Oz, 1998).

The emergency of creative, innovative and up to date technological tools represents the challenge which many individuals and organizations face in trying to achieve adherence to information privacy laws. Nonetheless, the application of information systems within organizations and institutions is attributed to the increased challenge of securing private information (Canoni, 2004). However, organizations have laid security policies which are geared at promoting the enforcement of legal framework on the privacy of private information (Bernstein, 2007).

Information security policies play a significant role in defining the procedure of access, retrieval, modification and use of private information with a view of ensuring preservation of individual rights to privacy

...Download file to see next pages Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Privacy Laws related to Information Technology use Research Paper”, n.d.)
Privacy Laws related to Information Technology use Research Paper. Retrieved from https://studentshare.org/information-technology/1450716-privacy-laws-related-to-information-technology-use
(Privacy Laws Related to Information Technology Use Research Paper)
Privacy Laws Related to Information Technology Use Research Paper. https://studentshare.org/information-technology/1450716-privacy-laws-related-to-information-technology-use.
“Privacy Laws Related to Information Technology Use Research Paper”, n.d. https://studentshare.org/information-technology/1450716-privacy-laws-related-to-information-technology-use.
  • Cited: 0 times

CHECK THESE SAMPLES OF Privacy Laws related to Information Technology use

Laws on Information Technology in the UK

This report "Laws on information technology in the UK" discusses information technology laws that have created another branch if not another skill set in the information technology industry that has defined a career path with the onus of governance and compliance.... hellip; The laws not only legitimize the need for an information security system in every information technology infrastructure through a legislated fresh mandate to secure data from hackers, identity thieves and persons with criminal intent....
8 Pages (2000 words) Report

The Value of Digital Privacy in an Information Technology Age

The Value of Digital Privacy in an information technology Age Name of Author Author's Affiliation Author Note Author's note with more information about affiliation, research grants, conflict of interest and how to contact 1....   This stores numerous reports including names, addresses, birth dates, court records, and cell phone numbers” (The Value of Digital Privacy in an information technology Age, 2013, par.... Google is a platform where a person has access to information relating to anything and everything....
4 Pages (1000 words) Research Paper

IT-related Professional Issues

hellip; The information technology industry is one of the most rapidly changing industries.... An information technology professional should ensure that confidential information is handled with confidentiality.... The paper "IT-related Professional Issues" overviews how technology affects the creation, organization, dissemination, and use of data.... The major issues still to be addressed by this changing technology are those of privacy, harm limitation, confidentiality, and intellectual property protection....
7 Pages (1750 words) Essay

Effect of Technology on Workplace Privacy

The use of technology in workplace surveillance... As the society developed and the modern civilisation flourished further, there took place expansion and progression in the world of technology.... hellip; This advancement in the field of technology, most particularly in the surveillance technology has had abounding effects on the extent of privacy granted to individuals at the workplace.... In other words, it has affected the extent to which the employees have been deprived of their rights of solitude. As the masses became cognisant of the consequences followed by the increasing attacks to individual's privacy in the workplace owing to the development in surveillance technology, the demand for legal demarcation strengthened and eventually several laws were created by the government to curtail and confine the scope of the surveillance technology to accomplish only the legitimate objectives of the employers....
20 Pages (5000 words) Essay

Privacy in Electronic Commerce

In the present day world, regulation of the internet assumes a position of immense significance and is inevitable for the smooth operation of all activities and particularly, those related to business practices.... In the process, the competitive advantage available at the disposal of firms and individuals has widened drastically, completely transforming the conventional business practices giving rise to various issues related to data protection and security....
16 Pages (4000 words) Research Paper

Ethical Issue in Information Technology

This paper, Ethical Issue in information technology, stresses that the term information ethics refers to the discipline of applies ethics developed by Luciano Floridi.... This area of ethics examines the concerns arising in the modern world due to the constant development of information technology.... Otherwise, the innovation and invention in information technology will cease.... Humanity is confronting the crucial issues like access to information, privacy, intellectual property rights etc....
6 Pages (1500 words) Term Paper

Software Piracy and Privacy Policy

The truth related to incurrence of any act in relation to software piracy should be brought into the limelight so that any such occurrence of piracy in the future can be prevented.... The author of this paper "Software Piracy and Privacy Policy" discusses the benefit of the use of authentic and licensed software protection, the organization policy, the three principles selected for the matrix, software application piracy and dilemma, the factors that attract researchers....
7 Pages (1750 words) Assignment

The Principles of Information Protection and Privacy in Australia

hellip; There has been an increase in privacy intimidation caused by the use of information technology to gather information in every scope.... This commission contradicts the information privacy laws which protect personal information from being accessed by journalists.... The author of the paper "The Principles of information Protection and Privacy in Australia" will begin with the statement that the legislation refers to the act of law-making aimed at protecting the rights of the citizens....
7 Pages (1750 words) Case Study
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us