Verified Document

Ethical Problem Of Personally Identifiable Term Paper

Nonetheless, internet breach occurs routinely; further steps need to be taken. Options for resolving these issues

Part of the issue revolves around ambivalent ways of defining PII as well as the fact that the constructs of identity are still in flux. PII, at one moment, can become non-PII during the next, and the reverse is the case, too. Moreover, computer science has shown that, in many instance, data that is consider non-PII and, therefore, not regulated, has been used to identify a person and that this data should, theorem, be called PII. The definition of PII, accordingly, transcends boundaries, and may be difficult to pin down. Given its malleability, some observers have even suggested altogether rejecting PII as the tool for defining privacy law.

The first issue, therefore (it seems to me) is to start off with a clear definition of PII and here we may adopt the approach of Schwartz and Solove (2011) who recommend that rather than PII being dropped, we adopt a new standard (not a rule) called "PII 2.0," that measures constructs of identity along a continuum. This would also, incidentally, work towards safeguarding more vulnerable individuals since data can be included / omitted at one's discretion. Moreover, this new construct, PII 2.0, would be divided into two categories. One category would be information that identifies the individual, whilst the other category would be information that could be traced back to the individual. Government and departments (as well as institutions) would know how to protect the individual depending on which of these two categories the information falls into.

The suggestion of Schwartz and Solove (2011) agrees with the findings of the OMB which decided that sensitivity of the case hinges on context. Not every case is sensitive (an HIV case for instance may be more sensitive than another). More so, the accumulation of data increases the sensitivity of the case. It may be, therefore, that in sensitive cases data can be retained to the essential minimum that, whilst helping the government and institution (such as medical institution, would also better protect the individual in question (Johnson III, 2007). or, one can use the proposal of Schwartz and Solove (2011) of dividing into two categories.

Conclusion

Personally Identifiable Information (PII)...

Parts of this document are hidden

View Full Document
svg-one

The ethical problem inherent in PII is that unscrupulous individuals can abuse the concept robbing a person of their personal identity or, in other ways, using the PII to force the person to cooperate. It is extremely important, therefore, to safeguard the person's PII and the more vulnerable the individual the more important protection of PII becomes.
Laws have been passed for PII protection but breaches persist. Recommendations, therefore, include passage of a new category of PII (PII 2.0) that more strictly defines PII and divides it into two categories enabling relevant institutions to beater identify the individual and to choose which data to include and which to exclude. These bits of data can also be placed along a spectrum.

National and logistical matters necessitate that we be uniquely identified. Doing this can, however, be occasionally, harmful. Steps have been, and can continue to be taken, to guarantee a person's safety.

Source

Directive 95/46/EC of the European Parliament and of the Council of 24 October 1995 on the protection of individuals with regard to the processing of personal data and on the free movement of such data http://eur-lex.europa.eu/LexUriServ/LexUriServ.do?uri=CELEX:31995L0046:EN:HTML

Johnson III, Deputy Director for Management (2007/05/22) M-07-16 SUBJECT:Safeguarding Against and Responding to the Breach of Personally Identifiable Information http://www.whitehouse.gov/omb/memoranda/fy2007/m07-16.pdf

Merriam-Webster.

http://www.merriam-webster.com/dictionary/ethic

Schwartz, PM & Solove, DJ (2011) the PII Problem: Privacy and a New Concept of Personally Identifiable Information New York University Law Review, Vol. 86, p. 1814,

Sweeney, L (n.d.) Standards of Privacy of Individually Identifiable Health Information. Carnegie Mellon University. http://privacy.cs.cmu.edu/dataprivacy/HIPAA/HIPAAcomments.html

United States Department of Defense. "MEMORANDUM for DOD FOIA OFFICES." http://www.dod.mil/pubs/foi/withhold.pdf)

Sources used in this document:
Schwartz, PM & Solove, DJ (2011) the PII Problem: Privacy and a New Concept of Personally Identifiable Information New York University Law Review, Vol. 86, p. 1814,

Sweeney, L (n.d.) Standards of Privacy of Individually Identifiable Health Information. Carnegie Mellon University. http://privacy.cs.cmu.edu/dataprivacy/HIPAA/HIPAAcomments.html

United States Department of Defense. "MEMORANDUM for DOD FOIA OFFICES." http://www.dod.mil/pubs/foi/withhold.pdf)
Cite this Document:
Copy Bibliography Citation

Related Documents

Technology in Film Fred Ott Was the
Words: 1898 Length: 6 Document Type: Essay

Technology in Film Fred Ott was the very first movie star that every existed. His brief starring role in the five-second film that showed him sneezing started the use of technology to make films. Since then, technology both in and out of film has changed immeasurably and what technology is used and is said about technology in these same films has evolved quite a lot and the statements sometimes made are

Technology Proposal Social Networking and
Words: 1070 Length: 4 Document Type: Term Paper

Creating an effective library social networking platform needs to start with a view of how to create a content management system (CMS) first (Dickson, Holley, 2010). The CMS serves as the system of record of all catalog and collection items, providing valuable statistics on how each book, content and collection item is being used (Shapira, Zabar, 2011). This is extremely valuable information for each department in the library to

Technology for Students With Disabilities
Words: 3214 Length: 11 Document Type: Research Paper

These benefits arise because of implementing both assistive technologies and Information Communication technology (ICT). The implementation of technology in classrooms usually has benefits to both the disabled students as well as the teachers (Kirk, Gallagher, Coleman, & Anastasiow, 2012, p.240). The general benefits of use of assistive technologies and ICT in teaching students with learning disabilities include greater learner autonomy and unlocking hidden potential with those with communication difficulties.

Technology in the Workplace the
Words: 2715 Length: 9 Document Type: Research Paper

Instead, organizations must strike a balance between the autonomy and independence offered by technology in the workplace and the need for employees to have some level of formal and informal commitment to the organization as a whole. Just as seemingly counterproductive activities such as doodling, daydreaming, or, in the information age, surfing the internet, can actually contribute to efficiency by offering employees productive mental stimulation, so too can the

Technology in the Classroom in Today's Society,
Words: 3260 Length: 10 Document Type: Research Paper

Technology in the Classroom In today's society, technology has become an accepted medium for communication. From email correspondence that has taken the place of mail, to texting instead of talking, advances in technology have become integrated into our daily lives. However, the line should be drawn when it comes to technology impeding academics and being incorporated into the classroom. Although many support the notion of technology in the class, others see

Technology Acceptance Model Tam and Information Systems Success...
Words: 4229 Length: 15 Document Type: Literature Review

Technology Acceptance Model Using Technology Acceptance Model (TAM) to Assess User Intentions and Satisfaction on Software as a Service (SaaS): The Value of SaaS Software as a Service (SaaS) was researched by Benlian and Hess (2011) in an effort to determine its value to companies. Among the arguments was that SaaS is already declining in popularity even though it is very new. The majority of the arguments that lean in that direction have

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now