Nobody downloaded yet

Depersonalization as a method of representation and protection of personal data - Research Paper Example

Comments (0) Cite this document
Depersonalization and the Protection of Personal Privacy The rapid development of computing technology has led to the emergence of the greater capacity to store personal data. These data are important and collected because of research. Governments collect them for the evaluation of its programs or for use databases such as in law enforcement and social security…
Download full paperFile format: .doc, available for editing
GRAB THE BEST PAPER93.9% of users find it useful
Depersonalization as a method of representation and protection of personal data
Read TextPreview

Extract of sample "Depersonalization as a method of representation and protection of personal data"

Download file to see previous pages Computers and the Internet paved the way for more efficient and fast methods to gather, store and organize personal information. Since the 1970s the number of computer data banks or databases became staggering. There are the databases from Social Security Administration, Federal Bureau of Investigation, Medical Information Bureau, state criminal justice systems, municipal data systems, credit card companies, telephone companies, Medicaid, and, recently, Google, Facebook and so much more. The huge amount of information that governments and businesses collect from individuals have become a cause of concern. Personal data collection encroaches on the individual’s right, particularly as it invades privacy or the right to control information about ourselves; there is a disclosure of private personal facts; and, the information can be used in such a way that a person is cast in a bad light or in a case of identity theft. The method of personal data collection, its use and security, hence, necessitate citizen protection. Through the years, laws have enacted that aim to protect personal privacy but they appear to be insufficient. This paper will explore depersonalization as an effective method of personal data collection, where privacy is still protected. ...
3. Access or the level of access provided to individuals on the gathered data about them. 4. Security or the responsibility of data gatherers to provide adequate protection for the information collected (Bidgoli 2004, 98). Based from these principles, a number of laws were enacted covering individual privacy across different sectors. For instance, the Gramm-Leach-Bliley Act protects personal banking information; the Fair Credit Reporting Act provides the framework for handling personal credit data. There are also laws that cover the collection and use of medical and health data, government records, children’s privacy, and so forth. Laws are also enacted in other countries such as the European Union Data Protection Directive, the OECD privacy guidelines adopted by countries such as Mexico, Australia, Japan and Czech Republic (Conrad, Misenar and Feldman 2012, 401). But these laws and even some ethical guidelines (see Kluge 2000), no matter how specific and comprehensive, still fail to address privacy issues. Neubauer and Kolb (2009), for example, noted that approaches and methods for protecting privacy often do not comply with legal requirements or basic security requirements without suffering any penalty, (7). Szeto and Miri (2007) revealed the same findings when they studied the Canadian experience. According to Hildebrandt and Gutwirth (2008), this is because most statutes builds on traditional ways of thinking data, personal data and their abuse, without understanding or recognizing the new type of knowledge that result from modern data processing (321). It was further argued that even when recent or updated laws were effective regarding personal data, they are still not equipped to deal with correlated data, which is persistent today ...Download file to see next pagesRead More
Cite this document
  • APA
  • MLA
(“Depersonalization as a method of representation and protection of Research Paper”, n.d.)
Depersonalization as a method of representation and protection of Research Paper. Retrieved from
(Depersonalization As a Method of Representation and Protection of Research Paper)
Depersonalization As a Method of Representation and Protection of Research Paper.
“Depersonalization As a Method of Representation and Protection of Research Paper”, n.d.
  • Cited: 0 times
Comments (0)
Click to create a comment or rate a document

CHECK THESE SAMPLES OF Depersonalization as a method of representation and protection of personal data

Protection of data

...and platform (Voltage 2011) The advantages of encrypted emails include safety, privacy, large file size, and non-traceability of exchanged emails. Safety provided by encrypted emails include prevention from interception by unauthorized user, disabling and distortion of text that cannot be understood until decrypted and making it useless in case of theft. Privacy provided by encrypted emails includes protection of personal information from getting into the hands of others. Non-traceability includes non-keeping of any sort of log of locations from where email pass. It works all around the world as long as the connectivity of internet is there (Kryptotel 2010) The encrypted data is...
10 Pages(2500 words)Essay

Information Sensitivity and Data Protection

...modification. C. Data Confidentiality: Proper authentication and identification procedures are available to provide role based access control for all the Personally Identifiable Information (PII) and Protected Health Information (PHI). The PII and PHI, IDs and passwords are encrypted in both rest and transit state, as per the Federal Information Processing Standards (FIPS) and Instruction Number 8500.2 (Department of Defence, 2003). TRICARE has comprehensive procedures for risk management for privacy risks and potential security threats (Department of Defense, 2003) ensuring a reliable system. MHS takes measures to keep the system hardware and security software technology updated, to...
1 Pages(250 words)Essay

Personal Data Protection

...? Personal Data Protection DQ1-Data protection: We’ve seen that protecting our personal data can be an overwhelming task. As many of us are busy, are we able to protect our data? If we are not able to protect our data, and data protection is left to the market, will data protection be possible only for the rich? Personal protection of data through high-tech means will not still be achievable. Building systems which do...
3 Pages(750 words)Assignment

The Data Protection Act

...record appeared in Boston in 1908. There are three types of cumulative records - the folder type as known pocket, the single card, and the combination of card, folder sheet, and envelop. . Data which are classified as confidential by the counselor are kept in a separate file and place. Interview notes, test results, personal data about the individual, home and family, which can have meaning only to the counselor, often prove to be means of solving many problems of maladjustment. This sample case is termed confidential. The following are some of the Key Principles of the Data Protection Act: Data should only be utilized for the...
4 Pages(1000 words)Essay

Data Protection

..." needs to be understood. Extensive material in literature on the definition of Privacy reveals that the term's meaning differs under various approaches to privacy offered by different scholars. Privacy's most widely spread definition has been coined by Warren & Brandeis (1890, p. 205) who define privacy, as an intrinsic value, the "right to be let alone" (Stahl, 2007). Another approach to define privacy by (Stalder, 2002) is that of informational self-determination which sees privacy as the right to determine who accesses person-related data. This interpretation is widely spread in continental Europe whereby privacy may be taken in terms of property which includes the protection of an...
12 Pages(3000 words)Essay

Principles of Data Privacy & Protection

...Is genetic profiling changing the scope of Data Privacy and Protection 26 February 2006 The of this paper questions whether genetic profiling is changing the scope of data privacy and protection. This is an important question, as current privacy and protection laws with regards to personal and private data, are not sufficient to cover genetic data. Data privacy and protection laws are broad and can be contradictory when it comes to protecting our rights with regards to genetic material. The argument is centred on the fact that genetic material is...
20 Pages(5000 words)Essay

Data Protection Regulation and control

...Introduction Data protection has become very important and relevant in the face of increased global rates of fraud and cyber crime. To counter the negative effects of fraud, it is imperative that, organizations come up with data protection policies aimed at curbing data misuse. By establishing a well crafted data protection policy, a company must bear in mind the nature of data, the nature of threat at hand, as well as the resources at its disposal. Data protection refers to the concept, which deals with sharing of data related to individual yet...
2 Pages(500 words)Essay

Data Protection and privacy institution be called of breach in giving a person’s pertinent data if ever they are liable. People have really grown out of their freedom shell as human right propagators and enthusiasts have culminated for the right of a person to data protection and privacy. What is data protection? It is the area of the law that governs what may, and what may not, be done with confidential information obtained. Personal information is in various forms, it may be in electronic form such as the ones stored on a computer hard drive or in manual form or the written forms. Furthermore data...
4 Pages(1000 words)Essay

Data collection method

...Data collection method Introduction Steven Hall & Partners is a New York Based organization. The organization is a specialized organization in the area of executive compensation. The organization has 30 years of reach history. The New York based organization is related with several services like Director Remuneration, Executive Compensation, Corporate Governance and Non-profit Compensation. The firm is an independent consulting firm. The organization maintains close relationship with the huge client base. Here in this essay a detailed internal analysis will be done about the organization. The essay will also identify the methods used for the purpose of data collection....
5 Pages(1250 words)Essay

Cryptology and Data Protection

...writing was discovered (Smith, 2015). With uses stretching from discreet communications to the war-duration combat plans, it is no surprise that new methods of cryptography appeared shortly after the extensive growth of computer communications. Telecommunications and data cryptography is essential when interacting over any unsecure channel, which comprises of almost all networks, especially the Internet (Zimmerman, 1994). This paper discusses the cryptography of information and the protection of data. Cryptography Computers have changed the Way People Keep Information Private Within the framework of every application-to-application communication, there are certain...
5 Pages(1250 words)Research Paper
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.

Let us find you another Research Paper on topic Depersonalization as a method of representation and protection of personal data for FREE!

Contact Us