Sign In
Not register? Register Now!
You are here: HomeEssayCommunications & Media
Pages:
5 pages/≈1375 words
Sources:
4 Sources
Level:
APA
Subject:
Communications & Media
Type:
Essay
Language:
English (U.S.)
Document:
MS Word
Date:
Total cost:
$ 19.8
Topic:

Information Privacy (Essay Sample)

Instructions:

the TASK WAS TO WRITE AN ESSAY TITLED "INFORMATION PRIVACY". the SAMPLE EXPLAINS THE IMPORTANCE OF INFORMATION PRIVACY.IT ALSO TALKS ABOUT SECURITY TO INFORMATION IN ORGANIZATIONS SET UP.

source..
Content:

Information Privacy
Name
Institution
Information Privacy
Information privacy is the privacy of personal information within organizations, and their attempts to define content of information stored on computer systems that third party can also access. Data masking, encryption, and authentication are some of the ways of protecting data from the public so that only authorized personnel can access such information (Rouse, 2013). Organizations always use this aspect of information technology (IT) to increase confidentiality within the management in order to reduce vulnerability and exposure of their systems to unauthorized segment. Information on finance, medical data, criminal records, and business information are some of the personal data that require continuous privacy. The United States, for instance, has different legislations on data privacy that deal with specific sectors given the different needs that emanate from them. Data usage by unauthorized persons is illegal in most parts of the globe. Therefore, concerned parties must come up with relevant protective measures to address the possibilities of such pieces of information of finding their way on the wrong hands.
Patients’ records are essential in managing health facilities by ensuring that they offer quality services to the clients. For instance, a patient’s medical history is essential in determining the types of medication to administer to the patient. Such data remain confidential, and should only be used for treatment purposes only. As a way of preventing information leakage, which may result in stigma to a patient, the management must ensure that pieces of information on all patients are kept securely to maintain confidentiality. The US has the Health Insurance Portability and Accountability Act (HIPPA) that ensures that patients’ data remain accessible only to the authorized segment of the staff. HIPAA uses electronic data interchange to give patients’ information unique identifiers that the unauthorized group cannot interpret. Users are given privileges under strict laws to access all medical records, and, at the same time, have to maintain data integrity and confidentiality on information that may lead to identification of a patient (Rouse, 2013).
Websites also have confidentiality policies that guide their service provision. Some organizations have put tracking measures in place to identify those accessing their websites for security purposes. For example, when one accesses such sites, the computer stores cookies automatically. This move prevents hacking of information by third parties as the organizations can trace all their users. This issue of cyber security has been contentious, with opponents arguing that it is against the privacy policy to allow organizations to track their users through cookies. However, proponents hold that even though the move infringes on the privacy of the public, it has impressive impacts on guarding the security of organizations. That is, loss of data by an organization has great impacts on society as compared to tracking individuals. The US citizens use cyberspace to travel, power their homes, communicate, provide essential government services, and run their economy. The overreliance on the network has posed serious attacks thus causing more information vulnerability. Organizations should work towards limiting data breaches that may arise from information hacking. Using password-protected data is one way of improving the security of online data (Zhan, 2009). Markedly, choice of passwords is key in limiting data loss. In cybercrimes, one does not need to break into a physical property to steal information or use force to access the materials. For example, bank frauds have been on the rise with the coming of this new technology. In addition, cases of information confidentiality is worrying, as other internet savvy people can access such information, a recent example is the Wikileaks. These cases prompted US to pass legislations that could help in eradicating this menace. Since many departments and organizations use this modern technology, fighting the vices is a shared responsibility (Raab & Mason, 2002). The private and public sectors are collaborating to create awareness on cyber security among the internet users. With the high rates of cybercrimes, financial institutions, for instance, have to use complex mechanisms to enhance the security of their data, as fraudsters can easily transfer funds through the online platform to their accounts. In this aspect, the browsing history of users is significant in enhancing information security for the benefit of both the users and website owners.
In...
Get the Whole Paper!
Not exactly what you need?
Do you need a custom essay? Order right now:

Other Topics:

  • Airtel 4G Trial in Mumbai
    Description: According to Gozalvez, (2012) Airtel got affiliated with Flipkart to provide this service package to the devices of Xiaomi, Motorola, Lenovo...
    1 page/≈275 words| 2 Sources | APA | Communications & Media | Essay |
  • Information Governance
    Description: The tasks was a case study that discussed how failure of formation systems can negatively impact service delivery in a healthcare setting...
    7 pages/≈1925 words| 5 Sources | APA | Communications & Media | Essay |
  • Traveling the Too-Much-Information Highway
    Description: The use of personal anecdotes, contrast, and comparison techniques create a relationship between the readers and the author....
    1 page/≈275 words| 2 Sources | APA | Communications & Media | Essay |
Need a Custom Essay Written?
First time 15% Discount!