Free

Privacy of Information - Assignment Example

Comments (0) Cite this document
Summary
In considering the issue of privacy of information as pertains to online customer transactions, there are a number of key issues that need to be considered. These issues include the fact that some websites can be able to automatically collect information every time that an…
Download full paperFile format: .doc, available for editing
GRAB THE BEST PAPER91.8% of users find it useful
Privacy of Information
Read TextPreview

Extract of sample "Privacy of Information"

Privacy of Information Question In considering the issue of privacy of information as pertains to online transactions, there are a number of key issues that need to be considered. These issues include the fact that some websites can be able to automatically collect information every time that an individual visits them. Other websites either plant cookies on the user’s system or ask for the user to provide personal information such as name, phone number and email address before a user can be allowed to view the website’s content or even become a member. A number of serious privacy of information security concerns have been raised as a result of this practice. This is because it is possible for companies and organizations to use this data in an unauthorized manner.
The main stakeholders around the privacy of information include the internet users, the websites visited by these internet users and the United States National Security Agency that has the ability to access internet communication from across the globe.
Question 2:
In considering the issue of privacy of information in respect to online customer transactions, there are a number of factors that the team needs to consider. One of these is the question as to whether there are currently any legal restrictions that target the issue of privacy of information. This is important as it is essential for the company to ensure that it constantly remains within the legal parameters. Another aspect that the team needs to think about is the question as to what is the current prevailing feeling among customers about the collection of their personal information from the online transactions that they make. This is important as it will help in informing the company’s decision making process. To learn more about the main issues, the best action that the team can engage in is to organize a professional training course whereby the team members can be educated on the latest main issues surrounding the issues of privacy of information and exactly how to tackle them.
Question 3:
There are a number of difficulties that surround the maintaining of privacy of information. Some of these include the difficulty facing users in preventing cookies spyware from illegally accessing their information. Companies such as social media sites, email service providers and banks are faced with the risk of having their customer information becoming illegally accessed by hackers (Easttom and Taylor, 10).
Question 4:
Some of the possible solutions that can be employed by users to help in better securing their personal information include the installation of quality antispyware detection and removal software onto their systems. This will ensure that their systems do not become compromised by any unwanted spyware that might inadvertently gain access to their systems. Users can also ensure that they do not allow unnecessary cookies onto their systems. In addition to this, they should also ensure that they regularly delete cookies from their systems.
Companies such as social media sites, banks and email service providers should ensure that the personal customer information that is contained on their websites is encrypted and properly secured against access by third party illegal users (Finkelstein and Sims, 361). They should also ensure that their company servers have the latest security systems to prevent unauthorized access by hackers.
Question 5:
The potential effects of using antispyware detection and removal software and the regulation of which cookies will have access to a users system, is that the customer will enjoy better privacy of information. In addition, the securing of company servers from access by hackers will help ensure that customer personal information is well secured and not easily accessed by unauthorized individuals. The encryption of the data stored in company servers will help ensure that the customer personal information is better secured as it will be difficult for hackers to decipher it in the event that they do manage to access it.
Works cited
Easttom, Chuck, and Jeffrey Taylor. Computer Crime, Investigation, and the Law. Boston, MA: Course Technology, a part of Cengage Learning, 2010. Print.
Finkelstein, William A, and James R. Sims. The Intellectual Property Handbook: A Practical Guide for Franchise, Business, and Ip Counsel. Chicago: ABA, 2005. Print. Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Privacy of Information Assignment Example | Topics and Well Written Essays - 250 words”, n.d.)
Privacy of Information Assignment Example | Topics and Well Written Essays - 250 words. Retrieved from https://studentshare.org/information-technology/1669317-privacy-of-information
(Privacy of Information Assignment Example | Topics and Well Written Essays - 250 Words)
Privacy of Information Assignment Example | Topics and Well Written Essays - 250 Words. https://studentshare.org/information-technology/1669317-privacy-of-information.
“Privacy of Information Assignment Example | Topics and Well Written Essays - 250 Words”, n.d. https://studentshare.org/information-technology/1669317-privacy-of-information.
  • Cited: 0 times
Comments (0)
Click to create a comment or rate a document

CHECK THESE SAMPLES OF Privacy of Information

Privacy and Misuse of Private Information

...would advise Baking! Magazine to take legal action against Splat! Magazine because in case, the claimant has an expectation which is reasonable to privacy regarding the information under disclosure, Melinda expects the Baking! Magazine to publish the photos that are showing her better self but Splat! Magazine goes ahead and publishes the photos that show the unpleasant side of Melinda; thus the initial magazine considers the person’s right to privy more than the second magazine’s freedom of expression. Further, the court may rule that, Splat! Magazine is not liable because the photographs were under publication of peripherals that require publication showing the bright side of Melinda. Thus, the magazine...
6 Pages(1500 words)Essay

Privacy Laws related to Information Technology use

...? Privacy Laws in IT use Privacy Laws in IT use All individuals are en d to privacy of private information and protection from unauthorized access and use of private data (Canoni, 2004). The contemporary business environment is characterized by application of information and communication technology and the use of internet in the communication process. The applicable technologies have challenges related to the effective protection of individual private information and data. The digital world makes people to provide private data and information to various organizations into which they make subscriptions (Bernstein, 2007)....
3 Pages(750 words)Research Paper

Information privacy

...?Who Should Have Access to Justin Ellsworth's Emails? For the most part, the internet has offered people unbridled privacy when it comes to person toperson or personal communication. Letters that used to be sent via postal mail and could be tampered with by people who had either honest or dishonest interests in the documents that a person received were now a thing of the past. Electronic mail became the keyword for instant communication exchanges. The email password was the key with which the owner of the account can unlock his mailbox. Without the password, nobody could gain access to his mail. That was the privacy assurance given by email companies such as Gmail, Hotmail, and Yahoo. However, of the 3...
3 Pages(750 words)Coursework

Security, Privacy and Ethical Issues in Information Systems

...1. Security, Privacy and Ethical Issues in Information Systems 1 Introduction In this age of information systems, presence of internet and distributed applications provide a wealth of information and knowledge to users; but at the same time, they contribute towards development of new and innovative forms of data and personal privacy, ethical and security threats. This has caused a sharp decline in consumers' trust over technology and usage of web based applications. This paper focuses on the issues of security and privacy in e-commerce applications; tries to strike an ethical balance between security, privacy and freedom...
7 Pages(1750 words)Essay

Information Security and Privacy

...Information Security and Privacy/Legal Concerns Introduction Networks are built in order to allow users to share, however it also allows other users the possibility to obtain information and other data that are not meant for them. This is becoming a bigger problem as organizations connect their private networks onto the internet. Despite the security problems the internet posses, businesses need to be connected to be able to compete as the use f the internet offer many advantages such as internet mail, file transfers and homepages for business. As organizations need to be connected to the internet, protection and security is required to prevent unauthorised users from accessing...
6 Pages(1500 words)Essay

Privacy of Information and Advertising

...and thus using it for some other reason might not be right. Third, the subjects i.e. the fat people might agree to participate and act as the spokesperson and participate in the advertising campaign for the company. But this may embarrass them in the future and bound them to work for the company even if they later realize that they don't like working in the ad or made public about their weakness i.e. being fat. Prevailing community or the societal attitudes of the person may not allow him to such a behaviour. Solutions to the case Solution 1: First and foremost the general business ethics of the company maintaining databases and their privacy policy should be analysed. If they have the right to use the respondents'...
6 Pages(1500 words)Essay

Customer Information Privacy

...Information Privacy Enter the Number or College of the 18th June, 2009 Information Privacy Business organizations collect the information about their customers on the assurance that they will be utilized only for the purpose of business between the firm and the customers. Also, the customers are assured that customers' information such as name and email id will never be disclosed to any other for any consideration or otherwise. This is more in the case of firms that sell and purchase their products and services though internet and e-commerce. Business operations through e-division involve the firm to collect customers'...
2 Pages(500 words)Essay

US stock market Indexes

4 Pages(1000 words)Research Paper

Privacy and surveillance in the Information Age

...Privacy and Surveillance in the Information Age Introduction Technology has been at the heart of development and civilization. While technology has been there since prehistoric times, today the term technology is used to refer to ICT. Communication technology has also a long history beginning with inscriptions on the walls of caves to the modern computers and digital networks. In a modern world, the use of technology has managed to increase communication among human beings, but at the expense of personal privacy. The issue of surveillance is one that has received the most heated debate in the American public (Petersen, 2012). According to Nissenbaum (1998, p.4),...
12 Pages(3000 words)Essay

Freedom of Information and Privacy

...Freedom of Information and Privacy Yes, in my opinion I think that if the private companies are utilizing the public funding so the pubic as well as the fund providers have every right to know that for what purpose these funds are being utilized. There are several laws present that restrict the organizations and the individuals to use public funding for personal use. Public funding should be declared solemnly for the betterment of the public using it for any other purpose such as paying salaries to the employees, or investing in any other business venture can be counted as a crime and the government has every right to charge the organization; therefore it is better that the organization must make sure...
2 Pages(500 words)Essay
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.

Let us find you another Assignment on topic Privacy of Information for FREE!

Contact Us