StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Personally Identifiable Information - Essay Example

Cite this document
Summary
The paper "Personally Identifiable Information " states that using information processing technologies especially the digital technologies are the most effective ways of enhancing integration in the contemporary society besides enhancing commercial activities…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER97.5% of users find it useful
Personally Identifiable Information
Read Text Preview

Extract of sample "Personally Identifiable Information"

Personally Identifiable Information (PII) Introduction The use of the digital technologies in processing information exposes usersto the risk of losing the vital personal information to fraudsters. While computers have revolutionized numerous aspects of human life including communication and economics, the same technology has equally presented numerous risks. Cybercrime refers to a unique type of criminal activities carried out through the internet. This implies that users must employ appropriate measures in order to curb the infiltration of privacy and the loss of vital personal information on the digital formats. Cyber criminals use numerous technologies in forcing entrance into personal accounts thus obtaining valuable personal information most of which have financial value. It thus becomes prudent for users to understand the technologies effectively thus employing appropriate technology and measures to curb the spread of such costly vises. In order to cushion themselves from such risks, users must ensure to keep their personal information secure in both online and offline platforms. Online platforms refer to the platforms found on the internet. People often store their personal information on the cyber space on such media as emails, social media among other types of online accounts (Fafinski, 2009). Offline platforms on the other hand refer to the use of digital technology in storing data without necessarily connecting to the internet. Such media as smart phones, computers and media players have digital storage spaces. Storing data on such platforms do not require any internet connection but the information stored therein face eminent risk of destruction and unauthorized access features that require effective management in order to prevent. Disclosing personal information online is often the main cause of such loses. This implies that users of such technologies must use the technologies cautiously. Among the scenarios that often require disclosure of such information, include online shopping, online games, online competitions and subscribing to the numerous online services. Using such services therefor3e require extreme caution. In order to prevent the loss of personal information while taking part in such important online activities, users must always investigate the authenticity of both the services and the service providers. Users must take care and engage only the legitimate companies. Engaging legitimate companies and understanding their terms and conditions are important since it becomes possible to investigate cases of loss of personal information. Legitimate companies have elaborate laws to govern their operations. Furthermore, such companies often take responsibilities thus compensating their aggrieved clients. Users of the internet must limit sharing their contact details, login information and financial information to people they meet online. Spam is a form of cybercrime through which unscrupulous people fill an individual’s account with useless messages with the view of obtaining their valuable details. Additionally, cyber criminals can easily impersonate a legitimate user by taking over the management of their accounts thus using them to commit crimes. This underscores the need for users to limit sharing their personal information especially with strangers while logged into the internet. The social media often present users with the temptation to share personal information with strangers. Doing so compounds the risk of becoming a victim of cybercrime (Easttom, 2010). Making online transactions is risky processes that just as discussed above require users to engage in such transactions carefully. Besides giving personal details, users must always give their financial details besides making financial commitments. Such are therefore precarious transactions that present users with the risk of losing their assets. In order to curb such, users must use specific credit or debit cards with appropriate protection. Furthermore, some payment companies offer appropriate one-time transaction cards. Such are appropriate since a user loads money into the card before proceeding with the transactions. This way, any unauthorized user attempting to trail the transactions is does not obtain any money in the credit and debit cards. Such are effective ways of minimizing the risk of losing money among other assets in cases of online transactions. Offline platforms have equally proportionate security risks. Smart phones and laptops are often prone to theft, crashes and virus attack. Such are potential ways of losing vital personal information. As such, users must employ appropriate technologies and measures in order curb the loss of personal information. Backups are the most appropriate way of safeguarding the loss of personal files in case of thefts, fires, destruction and crashes among many other technical malfunctions. Digital files are easily to duplicate and store. As such, backups refer to duplicating copies of the files and storing them in different media such as external hard drives, flash drives and even compact disks. Through such media, a user would still have his or her data even after the loss or destruction of the media. Numerous other measures apply to both online and offline platforms. The use of passwords for example is a sure way of curbing unfathomed access of personal information stored on the digital platforms. Passwords and personal identity numbers are unique digits that the computer system recognizes before permitting access into the protected files. The digits are unique and known only to the specific user (Fafinski, 2009). This way, it becomes difficult for strangers to log onto another person’s computer, smart phones or even accounts without their permission. Guessing such digits is often gruesome and impractical. They therefore present the most appropriate way of protecting personal information on both the offline and online media. However, just as discussed above, users must limit sharing such digits with other people. In retrospect, using information processing technologies especially the digital technologies are the most effective ways of enhancing integration in the contemporary society besides enhancing commercial activities. Such telecommunication technologies such as the internet and its associated inventions such as the social media have succeeded in developing a global village. While such enhances economic activities, it heightens the risk of losing vital personal information as people continue to use such technologies. Users of such technologies must therefore uphold high ethical standards besides using appropriate techniques to curb the threat of unauthorized access of personal data. The use of passwords, limiting sharing of log in details, using appropriate antiviruses and backing up data are some of the most appropriate way of curbing the loss of persona information on such digital media. References Brenner, S. (2007). Law in an Era of Smart Technology. Oxford: Oxford University Press. Easttom C. (2010). Computer Crime Investigation and the Law. New Jersey: Prentice Hall. Fafinski, S. (2009). Computer Misuse: Response, regulation and the law. Cullompton: Willan Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Research Paper PII Essay Example | Topics and Well Written Essays - 1000 words”, n.d.)
Research Paper PII Essay Example | Topics and Well Written Essays - 1000 words. Retrieved from https://studentshare.org/information-technology/1652988-research-paper-pii
(Research Paper PII Essay Example | Topics and Well Written Essays - 1000 Words)
Research Paper PII Essay Example | Topics and Well Written Essays - 1000 Words. https://studentshare.org/information-technology/1652988-research-paper-pii.
“Research Paper PII Essay Example | Topics and Well Written Essays - 1000 Words”, n.d. https://studentshare.org/information-technology/1652988-research-paper-pii.
  • Cited: 0 times

CHECK THESE SAMPLES OF Personally Identifiable Information

Personally Identifiable Information (PII) : Ethical Implications

Personally Identifiable Information (PII) – Ethical Implications Name: Institution Date: Personally Identifiable Information (PII) - Ethical Implications Personal Identifiable Information abbreviated as PII refers to the info that can be used to contact, locate or identify a single person.... The terrorists should not have any access to their Personally Identifiable Information such as face recognition or places residence.... On the other hand, fraudsters can access an individual's Personally Identifiable Information and use the information to defraud a hardworking citizen of his or her hard-earned...
3 Pages (750 words) Research Paper

Protecting Personally Identifiable Information and other ethical issues

Protection of Personally Identifiable Information, ensuring safety of involved stakeholders, benefiting stakeholders, respecting autonomy, acting with integrity are some of the ethical issues, and this paper explores them subject to ethical theories.... Protection of Personally Identifiable Information is a significant ethical issue and involves such principles as privacy, confidentiality, and anonymity and traverses utilitarianism, deontology, and virtue ethics theories....
3 Pages (750 words) Research Paper

Secure Computer Systems

'Protecting Personally Identifiable Information (PII) (http://www.... 'Protecting Personally Identifiable Information (PII) (http://www.... "Improving data protection reduces risks associated with breaches and will enhance confidence in the government's ability to protect citizens' privacy and personal information, while simultaneously enabling greater efficiency in the delivery of e government services.... "Improving data protection reduces risks associated with breaches and will enhance confidence in the government's ability to protect citizens' privacy and personal information, while simultaneously enabling greater efficiency in the delivery of e government services....
2 Pages (500 words) Essay

W5-Data Security Policy

Business and client information security and privacy are the leading concern in.... This research is about the preservation of the business and client information as well as other confidential information ... y information we point out data that have been produced into the structure that is significant and functional to the human beings (Laudon & Modern technology poses modern confronts to the protection of entity privacy which existing (Laudon & Laudon, 1999)....
5 Pages (1250 words) Essay

Final Project Problem at Work

4), “Personally Identifiable Information (PII) is any information that permits the identity of an individual to be directly inferred.... This is because it has been discovered that loss of Personally Identifiable Information has resulted to loss of millions of records over the past few years thus causing massive harms to both individuals and organizations (McCallister, 2010).... However, in most cases the loss of Personally Identifiable Information is only discovered after it has already caused massive harm to the victims some of which are irreversible....
4 Pages (1000 words) Essay

Personally Identifiable Information

PII is the type of information that distinguishes the identity of a person e.... In the recent past, millions of consumers have had their identity compromised leading to information in the modern society is becoming easily available to many people.... The internet in specific is one of the main sources through, which many people are obtaining information concerning other persons.... Therefore, the private sector as well as public sector should ensure that vital information of people is protected from being accessed by an unauthorized persons....
4 Pages (1000 words) Research Paper

Advancements in User Interfaces by Example UX/UI

The windows 10 can compromise a user's security through the collection of your browsing history, targeted advertising and recording location information.... The paper "Advancements in User Interfaces" analyzes that there is rapid development in the personal computing and technology sector accompanied by advancements in user interfaces that seek to improve user experiences when engaging with the digital products....
8 Pages (2000 words) Case Study

Windows 10 Inspection Tests

The paper "Windows 10 Inspection Tests" states that the widespread usage of the system makes an evaluation necessary to improve the experience for many users.... An inspection of the software will also provide a framework through which firms can implement changes if it deems appropriate.... .... ...
8 Pages (2000 words) Essay
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us