These laws also emphasize that obtaining such personal information and how it will be used should be made with the individual's knowledge and consent. Moreover, individuals also have the additional rights of viewing, correcting, and deleting the information pertaining to them. But do we really have access to all information that is being taken from us? We can never tell and we might end waking up one day being accused by actions we haven't taken or worst waking up with a different identity.
II. Security of the Data Gathered
Database Systems are designed and programmed by no less than humans. Securing these databases involves the protection against unauthorized disclosures, alteration and destruction. Security that focuses on stopping people without database access from having any form of access at all and stopping people with access to perform any data manipulation that are not part of their duties or not included in the main reasons of acquiring the data.
The Data Protection Act places restrictions on databases that contain personal and sensitive information. Although a database may be legal, it doesn't necessarily mean that the data will be used ethically. For example, the existence of hospital records is legal in itself. However, inadequate security may lead insurance companies to use this information to reject life insurance applications.
We need to consider several factors of security:
On the actual premises where the data is stored, on who can access the building or the room where the database runs and is accessed.
The ease and reliability of database systems cannot be questioned but are they protected enough? It might just be a set of letters and numbers but these letters and numbers could dictate how we run our lives. Movies like The Net, Minority Report and Hackers are fictitious movies based from exaggerated facts, but these represent a major concern that should be addressed immediately.
Bibliography:
ALR (Feb 06, 2006) Regulation of Data Brokerage Retrieved June 03, 2006 at http://courseblog.cs.princeton.edu/spring06/wws528f/?author=15
Computer Underground Digest #6.27 (Mar 27, 1994). Retrieved June 03, 2006 from "Ethical issues in hacking and piracy"
Data Protection Act 1998. Retrieved June 03, 2006 at http://www.opsi.gov.uk/ACTS/acts1998/19980029.htm
Right of self-decision, self-control on one's own personal information" Retrieved June 03, 2006 at http://rights.jinbo.net/english/privacy.html
Robert w. Hahn (2001) "The Benefits and Costs Of Online Privacy Legislation" Retrieved June 03, 2006 from AEI-Brookings Joint Center Working Paper No. 01-14
Systems Life Cycle and Database Systems Including > Define systems, including why systems have a beginning and end. > Discuss the importance of integrating a life cycle into the plan for development of a database > Consider your organization or a business with which you are familiar. Provide examples of the database system it uses, its systems life cycle and how they are related. Is this effective? Why or why not? > If
Databases Analysis and Overview of Database Systems in the Enterprise The pervasive adoption of databases for aggregating, analyzing, parsing, reporting and storing data continues to exponentially increase over time, as the information needs of companies continued to increase. The foundation fo nearly every enterprise-wide system and computing platform includes integration to databases of many types, from object-oriented to relational (Lungu, Velicanu, Botha, 2009). Every Enterprise Resource Planning (ERP) system today relies
To implement this algorithm, it is essential to simulate locking of what the books mentions as an item X that has been transcribed by transaction T until T is either committed or aborted. This algorithm is not what would turn into deadlock, for the reason that T. waits for T only if TS (T) > TS (T ) (Elmasri, 2011). According to the book, strict timestamp ordering differs from basic timestamp ordering because basic
Kaizen is so engrained in the Toyota culture and the corresponding House of Quality that internally when planned results are not achieved it is considered more of a failure of process and execution (Gong, Wang, Lai, 2009). This is where the TPS varies significantly from American-based approaches to managing variation in results and failure to attain results as well. The Kaizen approach systematically analyzes why a process did not
Database Design for Spa/Hotel Booking System The WR (Woodlands Retreat) is a medium sized organization currently intending to build a database system to integrate modern IT (information systems) in its business operation to enhance its dynamic and innovative business operations. Although, the Woodlands Retreat has an IT system, however, the current systems are not capable of keeping book records as well as not capable of managing all data for the company
Database Differentiation Description of the data models A detailed description of all the tables that a database consists of is referred to as a data dictionary. A data dictionary will contain all the attribute characteristics and names for every table found within a database system. A data dictionary can also be referred to as a metadata repository. This is because it contains information like relationships with other data, meaning, usage, format, and
Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.
Get Started Now