StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

The Security of Personal Information - Assignment Example

Cite this document
Summary
"The Security of Personal Information" paper argues that privacy must be protected, but there should also be a limit to how “secretive” a person could be. There are times when it is in a person’s best interest that information about him/her should be made known…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER92.7% of users find it useful

Extract of sample "The Security of Personal Information"

Data protection is an important issue. Companies or agencies must declare what data they are using as well as for which purpose they are using the information. Additionally, only relevant information should be stored, those that are needed should be discarded in order to protect the person concerned.On one hand, today’s advanced marketing systems want to use personal records in order to target specific services for certain individuals. This availability of records has made background checks easier.

The great thing however is that the government of Australia is taking steps in order to protect its citizen’s privacy. The government has formulated laws restricting the kind of information any agency might require. Examining mails and tapping phone lines are also deemed illegal unless mandated by law.As individuals, we have certain responsibilities to help protect ourselves. We should know and monitor the information we give away and the purposes of its use, after all our safety lies in the security of our personal information.

Censorship is a hotbed for debates among the general public. Certain countries set limits when it comes to access to certain sites and information. For example in the US, the government is seeking to limit or at least monitor the propagation or access of pornography on the Internet. The same goes for Germany who absolutely prohibits the right to use Neo-Nazi sites. In China, the government has agreements with ISP providers. All of these countries have their own ethical reasons for the prohibitions.

There are many kinds of censorship. There is one imposed by a governing body and the other a kind of self-imposed censorship for personal reasons. The censorship that is imposed by a governing body is usually done when a certain material does not coincide with that governing body’s belief or standing. The other kind of censorship is when a certain author, publication, or etc decides to censor their material for fear of recrimination from the government. It may also be that they are simply monitoring to which audience the movie, music, information, would reach.  

Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(The Security of Personal Information Assignment Example | Topics and Well Written Essays - 750 words, n.d.)
The Security of Personal Information Assignment Example | Topics and Well Written Essays - 750 words. https://studentshare.org/social-science/2043204-business-ethics
(The Security of Personal Information Assignment Example | Topics and Well Written Essays - 750 Words)
The Security of Personal Information Assignment Example | Topics and Well Written Essays - 750 Words. https://studentshare.org/social-science/2043204-business-ethics.
“The Security of Personal Information Assignment Example | Topics and Well Written Essays - 750 Words”. https://studentshare.org/social-science/2043204-business-ethics.
  • Cited: 0 times

CHECK THESE SAMPLES OF The Security of Personal Information

Systems Management and Security for Wal-Mart Business

10 Pages (2500 words) Coursework

National Ward Level Classification

The Security of Personal Information was made sure by the government.... Census The census is the count of people and households and is the most reliable source of information (ONS, 2011).... Cluster Analysis and details of methodology of classification The segmentation of people on the basis of where they reside etc is making clusters of people into groups whose information is easy to analyze.... In the cluster analysis none of the information is wrong but things differ place to place and person to person....
7 Pages (1750 words) Essay

Digital Literacy in Teenagers

Subject 16 February 2013 Digital Literacy and Teenagers Introduction: The developments in information technology and computer science have made a great impact in the way people live and work in the 21st century.... This is the digital age where people live in an information society and digital literacy is essential to take part in this society .... In simple terms, Digital Literacy is defined as “the ability to use information and communication technologies to find, evaluate, create, and communicate information, requiring both cognitive and technical skills” (Visser par....
7 Pages (1750 words) Essay

Knowledge and Information Security

It will describe the vulnerability of electronic information held by individuals to a variety of threats.... eek 3's topic entitled,… Criminal Conspiracy - Database Attack, centres on a hypothetical scenario in Australia, to allow you to examine the motivation and methodologies of conspirators attempting to illegally obtain information from a police crime database.... It will introduce the threat to information Please provide answers to the following three (3) questions....
8 Pages (2000 words) Essay

Is Online Privacy Dead

Despite being a digital world where every kind of transaction, application or interaction requires the disclosure of personal information, the privacy rules have become less relevant (Jose, 2013).... This privacy ensures the security of such kind of information and requires that such information should not be revealed or made available to a third party without the owner's consent (Society, Nd).... No one seems to be bothered by the fact that personal information belonging to uninformed individuals are traded on the internet like mere business commodities....
10 Pages (2500 words) Research Paper

Effects of Social Media on Society

This factor reduces The Security of Personal Information and data uploaded on the social networking websites.... The information uploaded on the websites can be easily accessed by computer programmers and hackers.... The rapid development of internet has provided great opportunities to individuals and financial groups to share information and experiences worldwide....
8 Pages (2000 words) Essay

Privacy Issues Related to Cyberspace

This term paper "Privacy Issues Related to Cyberspace" tries to analyze the privacy policies of three companies in the mobile industry and they include Verizon wireless, T-mobile and AT&T Company.... nbsp;Cybersecurity has become one of the major concerns for many organizations.... hellip; The paper will describe the organizations and their main missions in the industry, compare and contrast the privacy policies, and propose recommendations that better protect the privacy of the consumers and give the organizations flexibility....
8 Pages (2000 words) Term Paper

Ethical Issues of Australian Computer Society

4 Pages (1000 words) Assignment
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us