Free

File Sharing & Social Media Security - Assignment Example

Comments (0) Cite this document
Summary
A peer to peer system can basically be defined as a communication model that is decentralized and all the parties have the same capabilities to initiate a session of communication. Peer to peer systems are mainly associated with piracy of software and violation of copyright. In…
Download full paperFile format: .doc, available for editing
GRAB THE BEST PAPER95.7% of users find it useful
File Sharing & Social Media Security
Read TextPreview

Extract of sample "File Sharing & Social Media Security"

A peer to peer system can basically be defined as a communication model that is decentralized and all the parties have the same capabilities to initiate a session of communication. Peer to peer systems are mainly associated with piracy of software and violation of copyright. In this paper, we shall analyze the privacy policies on the websites belonging to three institutions and use the findings to determine the most appropriate online policy.
The US Bank privacy policy can be obtained from https://www.usbank.com/privacy/security.html. The policy states that the institution collects three types of information namely; personal information, anonymous information and location information. Data can either be collected directly from the customer or through the services offered to the customers. The information can be used to evaluate the eligibility of the customers for various services, participation of customers in various corporate events, for consistency with the law and for improvement of the services offered by the bank. Information cannot be shared outside the bank unless compelled under limited circumstances. Customers are protected from liability of unwarranted online transactions under the online risk free guarantee. These policies are updated from time to time.
The Harvard Divinity School privacy policy can be accessed from http://hds.harvard.edu/privacy-policy. The policy indicates that information is gathered when one applies or registers for a program with the institution, through cookies stored by their servers and from users’ communication. This information is used to tailor the website to the needs of the users, to improve their services, to generate reports and for research purposes. The institution bears no responsibility for cookies accessed by a third party to the information. The institution protects users against loss of information, misuse of data and alteration of the information. However, they do not give 100% guarantee to data safety. The policy changes from time to time.
The Merchant warehouse.com privacy policy can be retrieved from http://merchantwarehouse.com/privacy-policy. It states that company collects information from browser information, forms and inquiries, gateway services and application of accounts with the company. They can share the information with a third party in order to improve their products and services. However, they do not sell any information to a third party but they can disclose it in order to comply with a legal process. They may use the email policy to communicate with their customers. Security for the information on the site is not guaranteed and the company takes no responsibility for any damage incurred. There may be inks to a third party website and the company takes no responsibility for any harm incurred since it has no control over them.
Conclusion
From the analysis, the most appropriate privacy policy is that which protects the users and gives them guarantee that their information is safe. In case of any breach, the company should be able to take responsibility to protect the user. The US Bank can be said to have the best privacy policy in this regard and offers the best protection to users.
References
US Bank. https://www.usbank.com/privacy/security.html.
Harvard Divinity School http://hds.harvard.edu/privacy-policy.
Merchant warehouse.com. http://merchantwarehouse.com/privacy-policy. Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“File Sharing & Social Media Security Assignment Example | Topics and Well Written Essays - 250 words”, n.d.)
File Sharing & Social Media Security Assignment Example | Topics and Well Written Essays - 250 words. Retrieved from https://studentshare.org/information-technology/1685446-file-sharing-social-media-security
(File Sharing & Social Media Security Assignment Example | Topics and Well Written Essays - 250 Words)
File Sharing & Social Media Security Assignment Example | Topics and Well Written Essays - 250 Words. https://studentshare.org/information-technology/1685446-file-sharing-social-media-security.
“File Sharing & Social Media Security Assignment Example | Topics and Well Written Essays - 250 Words”, n.d. https://studentshare.org/information-technology/1685446-file-sharing-social-media-security.
  • Cited: 0 times
Comments (0)
Click to create a comment or rate a document

CHECK THESE SAMPLES OF File Sharing & Social Media Security

Information assurance and security: Social media power

...? Information Assurance and Security: Social Media Power Social media is considered as one of the most significant technological improvements, which empowers effective communication. This social media provides a platform for organizations in order to conduct marketing activities effectively. Social media has huge influence on different scenarios of organizations. For instance, it provides great opportunities for marketers to develop relationships with online communities. With respect to sales, social media can help to generate awareness among people in...
15 Pages(3750 words)Term Paper

Recent Development in Fight against Peer to Peer File Sharing: Legal Issues and Alternative Solutions

...of individuals. Most importantly Sony does not have the right and ability to control VTR users and does not gain any benefit from the future infringement of users. Ninth Circuit verified the Northern District of California’s decision on shutting down users' sharing of files through Napster's P2P system as it constituted towards both contributory and vicarious infringement. Using the Sony "substantial non infringing uses" test as a guide, the court depicted that the Napster system did not have the intention of non infringing uses, such as downloading media from the public domain, however the site is considered to be infringed as the court did not define the level of knowledge the Napster...
29 Pages(7250 words)Assignment

Social media - internet forum,email and picture sharing

...?Social Media - Internet Forum, Email and Picture Sharing Carolina Castro MKT 233 Online April 25, Table of Contents Social Media - Internet Forum, Email and Picture Sharing 1 Introduction At the present, almost all the business organizations are well aware of the fact that the use of the Internet can be very helpful for better serving customers and reaching into the international markets. When the size and business of a company expands the need for the distribution of these products to their target customers also increases. In this scenario, the Internet marketing is the most excellent way that offers higher potency and access to international markets for the marketing of products. On the other hand, traditional marketing and its... ...
5 Pages(1250 words)Term Paper

Psychology- Media File

...Working Psychology- Media File Psychology Article on Family Violence Morocco child maids toil for pittance, face abuse Reuters 20 June 2007 Khaleej Times Online URL: http://www.khaleejtimes.ae/DisplayArticleNew.asp?section=todaysfeatures&xfile=data/todaysfeatures/2007/june/todaysfeatures_june23.xml Brief Synopsis of Article: This news story discusses the aspect of abuse that a child had to go through in the wake of domestic violence. The mother of the child under question sent her to work so that she could stop suffering. The reason for this was that there were four other children that the parents had to look after as well. The child recalls her ordeal as to how her master treated her. They used to beat her to death every now... . More than...
10 Pages(2500 words)Essay

Peer to Peer Files Sharing: Cause and Solution

...in income loss, which has become particularly pertinent regarding file sharing or peer to peer (P2P) file swapping online with media entertainment formats22; blurring the distinction between infringement and the parameters of the “fair use” defence under the Copyright Designs and Patents Act 1988 (CDPA). Furthermore, despite the implementation of the Copyright and Related Rights Regulations 2003 (Regulations) granting right holders the right to reproduction, exceptions have made under the Regulations to ensure smooth transmission online, which creates the same problems of policing effective copyright protection online. This is clearly highlighted by declining CD sales...
46 Pages(11500 words)Essay

File Sharing and Burning CDs

...File Sharing and Burning CDs My cousin is a software engineer. We used to be childhood friends and spent a lot of time playing together. However withthe passage of we drifted apart. The time came when he went to pursue studies in a well know university. His majors were computer science. In vacations he used to visit my home and tell me about his university experiences. In his house he had setup a large computer system. It is state of the art Pentium desktop with a five in one DVD burning jacket. Using this he can burn up to 20 DVDs in an hour. This has really changed his image for all of us who used to know him as a child. He is now known as the media man. All the videos and movies in...
2 Pages(500 words)Essay

Peer To Peer File Sharing

...p2p application, reaching 50 million user marks quicker than any technology. It is further stated that p2p technologies have become subject of many controversial discussions and red rag to the media industry because the technology is often used for the unauthorized distribution of copyrighted material (Aichroth, Hasselbach, Thommes and Ullrich, n.d., p.47). The music industry is suffering huge losses due to decrease in their sales of record labels which has given rise to legal sanctions ordering the closure of websites indulging in file sharing activities. The music industry has repeatedly expressed concern over potentially devastating impacts of online music sharing as...
4 Pages(1000 words)Essay

The Detrimental Effects of Illegal File Sharing

...18 November The Detrimental Effects of Illegal File Sharing Thesis Does the thesis match what the essay seems to be arguing? How can the thesis wording be edited to better match the content of the essay? The thesis matches what the essay seems to be arguing, because it does provide testimonials and statistics to support its main argument, “Illegal file sharing allows down-loaders to take business away from the original artists and affects the overall sales and revenue of products worldwide.” For instance, to support the claim that “illegal file sharing allows down-loaders to take business away from the original artists,” the...
4 Pages(1000 words)Essay

Video Sharing on Social Media

...Video Sharing on Social Media ABSTRACT Proliferation of the Internet, consumer literacy and the growth of the social media have changed how organizations try to reach their audience. Social media has the power to topple governments and even to uplift an individual artist. Social media has enabled people to ‘see’ each other’s world which was previously within defined boundaries. The availability of many social networking and video sharing sites have promoted file and video sharing to the extent that people are known to...
46 Pages(11500 words)Dissertation

Positive Impacts of Digital File Sharing

...to discover new artists and songs through file sharing networks, social networks, streaming, podcasts and internet radio. They have new formats in which they can listen to music, and MP3 players in particular have increased the exposure that consumers have to music. A great tool for music exploration is online community since it is possible to get personal recommendations. A phenomenon of longtail is generated. This is a model that explains the exploitation of products that are difficult to find in physical stores (Alain and Waelbroeck n.p). These communities comprise of file sharing networks against which companies have gone to court and...
4 Pages(1000 words)Article
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.

Let us find you another Assignment on topic File Sharing & Social Media Security for FREE!

Contact Us