StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

File Sharing & Social Media Security - Assignment Example

Cite this document
Summary
A peer to peer system can basically be defined as a communication model that is decentralized and all the parties have the same capabilities to initiate a session of communication. Peer to peer systems are mainly associated with piracy of software and violation of copyright. In…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER97.8% of users find it useful
File Sharing & Social Media Security
Read Text Preview

Extract of sample "File Sharing & Social Media Security"

A peer to peer system can basically be defined as a communication model that is decentralized and all the parties have the same capabilities to initiate a session of communication. Peer to peer systems are mainly associated with piracy of software and violation of copyright. In this paper, we shall analyze the privacy policies on the websites belonging to three institutions and use the findings to determine the most appropriate online policy.The US Bank privacy policy can be obtained from https://www.usbank.com/privacy/security.html. The policy states that the institution collects three types of information namely; personal information, anonymous information and location information.

Data can either be collected directly from the customer or through the services offered to the customers. The information can be used to evaluate the eligibility of the customers for various services, participation of customers in various corporate events, for consistency with the law and for improvement of the services offered by the bank. Information cannot be shared outside the bank unless compelled under limited circumstances. Customers are protected from liability of unwarranted online transactions under the online risk free guarantee.

These policies are updated from time to time. The Harvard Divinity School privacy policy can be accessed from http://hds.harvard.edu/privacy-policy. The policy indicates that information is gathered when one applies or registers for a program with the institution, through cookies stored by their servers and from users’ communication. This information is used to tailor the website to the needs of the users, to improve their services, to generate reports and for research purposes. The institution bears no responsibility for cookies accessed by a third party to the information.

The institution protects users against loss of information, misuse of data and alteration of the information. However, they do not give 100% guarantee to data safety. The policy changes from time to time. The Merchant warehouse.com privacy policy can be retrieved from http://merchantwarehouse.com/privacy-policy. It states that company collects information from browser information, forms and inquiries, gateway services and application of accounts with the company. They can share the information with a third party in order to improve their products and services.

However, they do not sell any information to a third party but they can disclose it in order to comply with a legal process. They may use the email policy to communicate with their customers. Security for the information on the site is not guaranteed and the company takes no responsibility for any damage incurred. There may be inks to a third party website and the company takes no responsibility for any harm incurred since it has no control over them. ConclusionFrom the analysis, the most appropriate privacy policy is that which protects the users and gives them guarantee that their information is safe.

In case of any breach, the company should be able to take responsibility to protect the user. The US Bank can be said to have the best privacy policy in this regard and offers the best protection to users. References US Bank. https://www.usbank.com/privacy/security.html.Harvard Divinity School http://hds.harvard.edu/privacy-policy.Merchant warehouse.com. http://merchantwarehouse.com/privacy-policy.

Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“File Sharing & Social Media Security Assignment Example | Topics and Well Written Essays - 250 words”, n.d.)
File Sharing & Social Media Security Assignment Example | Topics and Well Written Essays - 250 words. Retrieved from https://studentshare.org/information-technology/1685446-file-sharing-social-media-security
(File Sharing & Social Media Security Assignment Example | Topics and Well Written Essays - 250 Words)
File Sharing & Social Media Security Assignment Example | Topics and Well Written Essays - 250 Words. https://studentshare.org/information-technology/1685446-file-sharing-social-media-security.
“File Sharing & Social Media Security Assignment Example | Topics and Well Written Essays - 250 Words”, n.d. https://studentshare.org/information-technology/1685446-file-sharing-social-media-security.
  • Cited: 0 times

CHECK THESE SAMPLES OF File Sharing & Social Media Security

Information Technology Law

The advances in internet use brought in its wagon lot of issues like privacy, security, and ethical.... But when you look this site, you can notice quickly that there is active sharing of MP3 and adult files, and gossiping about their old lecturers and colleagues.... X' who resigned over a payment and promotion row, is also demanding to see any file about him in the possession of WWW which give reasons why he was being, in his view, blocked from promotion....
9 Pages (2250 words) Essay

Social Media and Decision-Making Process

Relative its newness and exceptional growth, the use on online tools for marketing and sales are becoming the new model of success.... Online retailing is the newest shopping version available, and it is usual to observe the… From the latest news, majority of consumers have resorted to shopping from their computers and other devices that can connect to the Web....
7 Pages (1750 words) Essay

Oversharing of Information on Social Networks

Through social networks,… Additionally, people may engage in one-on-one conversations over the social media platforms, enabling them to share information and However, a vast majority of the social media users have resorted to sharing too much information that may compromises their integrity (Solomon 111).... Essentially, social media include all the sites in the internet that enable free interaction of people from different parts of the world....
6 Pages (1500 words) Research Paper

Social Media Individual Assignment

5 top social media security threats.... s social media enables its users to access the information uploaded on the social networking sites from any corner of the world it poses numerous problems.... The companies must set policies on regulation of social media use which should be amended from time to time especially in the discussions what to share through social networking sites and where to stop else facility like social media network will do more destruction than good4....
2 Pages (500 words) Essay

Homeland Security and Child Pornography

This "Homeland security and Child Pornography" paper explains why Child Pornography is considered as important or relevant in Information Warfare and Homeland security today, investigates and analyzes the relation among Homeland security, Information Warfare, and Child Pornography.... The Department of Homeland security considers child pornography as a serious crime against children and implements effective preventive measures against the same....
5 Pages (1250 words) Coursework

The Usage of Network Media Technology: the Needs of the Interacting Platform

The paper describes Networked media that creates a major impact in the way the media is produced and distributed among the systems of the organization.... Unlike the conventional means of sharing methods, this Networked media allows new possibilities for connecting, storing and handling the media.... hellip; The Network media is used among the internet platform for providing interaction between networks of computers in an efficient way, especially for sharing and accessing contents....
10 Pages (2500 words) Research Paper

Computer Security of Unix

er File SecurityWithin the various user groups some operating systems provides an additional future to protect files further on per file basis, the security properties that can be set at this point are auditing, permissions and ownership.... There are three basic access control namely; User (u) which gives the specific user most likely the file or directory owner.... There are three basic access control namely; User (u) which gives the specific user most likely the file or directory owner....
5 Pages (1250 words) Assignment

The Role of the Internet in Shaping the Lives of Individuals in Society

… The paper "The Role of the Internet in Shaping the Lives of Individuals in Society" is a good example of a social science essay.... The paper "The Role of the Internet in Shaping the Lives of Individuals in Society" is an outstanding example of an essay on social science.... With more than 2 billion people subscribed as users of the internet on a global scale, the internet influences both the social and physical lives of these users (Pew Research Centre et al 2012, p....
6 Pages (1500 words) Essay
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us