Tuesday, October 29, 2019
Privacy Laws related to Information Technology use Research Paper
Privacy Laws related to Information Technology use - Research Paper Example In this regard, it is arguable that the privacy of individual data depends on the ability of organizations to employ security measures for the protection of individual information and private data (Kerr, 2004). The various online companies and websites such as Facebook, Google, LimkedIn, Yahoo and Skype are mandated by the law to protect the privacy of individuals. Regardless of the provisions of the law, it is notable that many online organizations and companies have disclosed private information to third parties such as advertisers who use it without the consent of the holders of the information. Sensitive information such as financial records, bank and credit card details are also protected by the legal framework. This is due to the need for the security of personal data and the consequent prevention of possible fraud (Gillmor, 1998). The modern computing and transactional environments are characterized by online shopping and banking. This means that the users of the online bankin g services are predisposed to the risk of disclosure of their private information to organizations (Messmer, 2001). Additionally, digital records of employees within various organization is at a risk f unauthorized access and use. ... that organizations and individuals are protected from unauthorized use of private information by internal or external intruders to information systems (Miller and Tucker, 2007). The law also protects individual information from misuse by government agencies and the media (Sullivan, 2005). According to the fourth amendment, individual data and information must be kept private and free from unauthorized access and use (Lock, Conger and Oz, 1998). This illustrates the role of the law in ensuring that organizations keep the information on their employees and clients as private as necessary (OConnor and Matthews, 2011). Infringement of the privacy of individual information is thus a legal felony (Thibodeau, 2001). Sometimes governing authorities such as the police perform thorough surveillance of a suspectââ¬â¢s private information and activities. Regardless of the justification that the governing authorities give for the infringement of individual privacy, such actions are legally wro ng (Lock, Conger and Oz, 1998). The emergency of creative, innovative and up to date technological tools represents the challenge which many individuals and organizations face in trying to achieve adherence to information privacy laws. Nonetheless, the application of information systems within organizations and institutions is attributed to the increased challenge of securing private information (Canoni, 2004). However, organizations have laid security policies which are geared at promoting the enforcement of legal framework on the privacy of private information (Bernstein, 2007). Information security policies play a significant role in defining the procedure of access, retrieval, modification and use of private information with a view of ensuring preservation of individual rights to privacy
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.