StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Privacy of Information - Assignment Example

Cite this document
Summary
In considering the issue of privacy of information as pertains to online customer transactions, there are a number of key issues that need to be considered. These issues include the fact that some websites can be able to automatically collect information every time that an…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER97.5% of users find it useful
Privacy of Information
Read Text Preview

Extract of sample "Privacy of Information"

Privacy of Information Question In considering the issue of privacy of information as pertains to online transactions, there are a number of key issues that need to be considered. These issues include the fact that some websites can be able to automatically collect information every time that an individual visits them. Other websites either plant cookies on the user’s system or ask for the user to provide personal information such as name, phone number and email address before a user can be allowed to view the website’s content or even become a member.

A number of serious privacy of information security concerns have been raised as a result of this practice. This is because it is possible for companies and organizations to use this data in an unauthorized manner.The main stakeholders around the privacy of information include the internet users, the websites visited by these internet users and the United States National Security Agency that has the ability to access internet communication from across the globe.Question 2: In considering the issue of privacy of information in respect to online customer transactions, there are a number of factors that the team needs to consider.

One of these is the question as to whether there are currently any legal restrictions that target the issue of privacy of information. This is important as it is essential for the company to ensure that it constantly remains within the legal parameters. Another aspect that the team needs to think about is the question as to what is the current prevailing feeling among customers about the collection of their personal information from the online transactions that they make. This is important as it will help in informing the company’s decision making process.

To learn more about the main issues, the best action that the team can engage in is to organize a professional training course whereby the team members can be educated on the latest main issues surrounding the issues of privacy of information and exactly how to tackle them.Question 3:There are a number of difficulties that surround the maintaining of privacy of information. Some of these include the difficulty facing users in preventing cookies spyware from illegally accessing their information.

Companies such as social media sites, email service providers and banks are faced with the risk of having their customer information becoming illegally accessed by hackers (Easttom and Taylor, 10).Question 4:Some of the possible solutions that can be employed by users to help in better securing their personal information include the installation of quality antispyware detection and removal software onto their systems. This will ensure that their systems do not become compromised by any unwanted spyware that might inadvertently gain access to their systems.

Users can also ensure that they do not allow unnecessary cookies onto their systems. In addition to this, they should also ensure that they regularly delete cookies from their systems.Companies such as social media sites, banks and email service providers should ensure that the personal customer information that is contained on their websites is encrypted and properly secured against access by third party illegal users (Finkelstein and Sims, 361). They should also ensure that their company servers have the latest security systems to prevent unauthorized access by hackers.

Question 5:The potential effects of using antispyware detection and removal software and the regulation of which cookies will have access to a users system, is that the customer will enjoy better privacy of information. In addition, the securing of company servers from access by hackers will help ensure that customer personal information is well secured and not easily accessed by unauthorized individuals. The encryption of the data stored in company servers will help ensure that the customer personal information is better secured as it will be difficult for hackers to decipher it in the event that they do manage to access it.

Works citedEasttom, Chuck, and Jeffrey Taylor. Computer Crime, Investigation, and the Law. Boston, MA: Course Technology, a part of Cengage Learning, 2010. Print.Finkelstein, William A, and James R. Sims. The Intellectual Property Handbook: A Practical Guide for Franchise, Business, and Ip Counsel. Chicago: ABA, 2005. Print.

Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Privacy of Information Assignment Example | Topics and Well Written Essays - 250 words”, n.d.)
Privacy of Information Assignment Example | Topics and Well Written Essays - 250 words. Retrieved from https://studentshare.org/information-technology/1669317-privacy-of-information
(Privacy of Information Assignment Example | Topics and Well Written Essays - 250 Words)
Privacy of Information Assignment Example | Topics and Well Written Essays - 250 Words. https://studentshare.org/information-technology/1669317-privacy-of-information.
“Privacy of Information Assignment Example | Topics and Well Written Essays - 250 Words”, n.d. https://studentshare.org/information-technology/1669317-privacy-of-information.
  • Cited: 0 times

CHECK THESE SAMPLES OF Privacy of Information

Radio Frequency Identification Tags

Privacy of Information stored in RFID tags should start at the design and engineering stage.... The uses include tracking and inventories, storage of information about personal and financial matters, and property monitoring.... The RFID tags must be designed in such a way that it holds the minimum amount of information possible, without compromising its function and performance.... They should limit the use of RFID in the disclosure of information by assessing their files and classifying them according to their relevance and confidentiality....
3 Pages (750 words) Essay

The Ethical Dilemma for a Manager

As the technology emerges it brings with it new and creative ways of information sharing.... The dilemma that manager in the case faces concerns with the privacy of the respondents or the so called subjects of the research.... If they have the right to use the respondents' information in any way and context with the prior permission of the client, then only the data should be used.... But as we move forward issues concerning intrusion of privacy are enhanced; since individuals are too cautious about their personal lives and the style with which they live....
5 Pages (1250 words) Essay

Legal Aspects of Documenting Patient Care

hellip; According to the study the government should impose stiffer fines and graver penalties to individuals or group of individuals who disrespects the patient's right to Privacy of Information through any unlawful means.... At a higher political level, the government should impose stiffer fines and graver penalties to individuals or group of individuals who disrespects the patient's right to Privacy of Information through any unlawful means.... Because of the security weaknesses in the information system, there lies a question about the quality of information used in professional studies....
1 Pages (250 words) Essay

Application of Radio Frequency Identification Devices

Risks associated with RFID TechnologyOne of the risks associated with RFID technology is ascribed to Privacy of Information; experts have argued that improper application of this technology may lead to jeopardy of the Privacy of Information transferred.... use of passwords to access information transferred from RFID gadgets installed in vehicle and products....
1 Pages (250 words) Coursework

The Privacy Trends That Match with the Current Technologies in Organizations

The article, however, argues that companies need to analyze the use of this service to ensure that it does not threaten the Privacy of Information.... However, the article warns organizations that they should ensure that the monitoring tools safeguard only essential information to avoid interfering with the private information of workers.... The next trend is the use of data analytics to conceal the information that companies get from consumers on social media....
1 Pages (250 words) Article

Criminal Cases in Health Care

This essay revolves around a Texas healthcare provider who wrongfully… In divulging the information, the healthcare provider in question violated the Health Insurance Portability Accountability Act (HIPAA) of 1996, which govern and protects the Privacy of Information that healthcare providers collect from Criminal Cases in Healthcare Criminal Cases in Healthcare Healthcare laws stipulate that healthcare providers should routinely guarantee the anonymity of the data they collect from their patients and that they use the information for the intended purposes only....
1 Pages (250 words) Research Paper

Privacy Impact Assessment for Cloud Privacy

What are the risks posed on the Privacy of Information?... This PIA Report is aimed at providing the necessary information required to guide and direct the usage of cloud computing tools within an organization.... The PIA is applied to existing systems of an organization being assessed in order to ensure there is a subsequent conformity to both Privacy Impact Assessment for Cloud Privacy al Affiliation Privacy Impact Assessment on of the project] andaddress of the organization sponsoring the PIAContact person (the assessor), title and e-mail addressDate of the PIA reportThis PIA Report is aimed at providing the necessary information required to guide and direct the usage of cloud computing tools within an organization....
1 Pages (250 words) Article
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us