Sunday, April 21, 2019

Privacy Laws related to Information Technology use Research Paper

mysteriousness Laws related to Information Technology mathematical function - Research Paper ExampleIn this regard, it is arguable that the hiding of undivided data depends on the ability of organizations to employ warrantor measures for the protection of individual breeding and private data (Kerr, 2004). The various online companies and websites much(prenominal)(prenominal) as Facebook, Google, LimkedIn, Yahoo and Skype atomic number 18 mandated by the law to protect the covert of individuals. Regardless of the provisions of the law, it is notable that many online organizations and companies have disclosed private data to third parties such as advertisers who use it without the consent of the holders of the info. Sensitive information such as financial records, bank and acknowledgment card details are also protected by the legal framework. This is due to the need for the security of personal data and the consequent prevention of possible fraud (Gillmor, 1998). The modern computing and transactional environments are characterized by online shopping and banking. This means that the users of the online banking services are predisposed to the risk of disclosure of their private information to organizations (Messmer, 2001). Additionally, digital records of employees within various organization is at a risk f unauthorized access and use. ... that organizations and individuals are protected from unauthorized use of private information by internal or external intruders to information systems (Miller and Tucker, 2007). The law also protects individual information from misuse by government agencies and the media (Sullivan, 2005). According to the fourth amendment, individual data and information must be kept private and free from unauthorized access and use (Lock, Conger and Oz, 1998). This illustrates the role of the law in ensuring that organizations keep the information on their employees and clients as private as necessary (OConnor and Matthews, 2011). I nfringement of the privacy of individual information is thus a legal felony (Thibodeau, 2001). Sometimes presidency authorities such as the police perform thorough surveillance of a suspects private information and activities. Regardless of the justification that the governing authorities give for the infringement of individual privacy, such actions are legally wrong (Lock, Conger and Oz, 1998). The emergency of creative, innovative and up to date technological tools represents the contest which many individuals and organizations face in trying to achieve adherence to information privacy laws. Nonetheless, the application of information systems within organizations and institutions is attributed to the increased challenge of securing private information (Canoni, 2004). However, organizations have laid security policies which are pitch at promoting the enforcement of legal framework on the privacy of private information (Bernstein, 2007). Information security policies sour a sign ificant role in defining the procedure of access, retrieval, modification and use of private information with a view of ensuring preservation of individual rights to privacy

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.