Verified Document

Protecting One S Personal Information Online Essay

Personally Identifiable Information is any information that pertains directly to an individual's identity, such as SSN, birthdate, etc., and any information that can be linked to an individual, such as health records, education records, IP address, etc. (McCallister, Grance, Scarfone, 2010). When it comes to ethically protecting the PII of clients and workers in organizations, information technology and information systems must be engaged in order to ensure that cyber security is a top concern especially in a digital era where information is power and where hacking accounts and firms is a probable threat no matter what one's business is. The task of approaching PII from an ethical standpoint where regard for clients' and workers' personal information stored by the organization is one that factors into risk assessment and risk management guidelines used in order to create cyber security networks (Vacca, 2009). However, PII is something that may also be collected by firms via the Internet and used to gather information on consumers. For instance, organizations that use websites can users cookies to track the online movements of Internet users to collect "big data" that can be utilized to draw a better...

The question is: is this collection of data and storing of it whether on drives or in the cloud in line with a legal process, or is it violating an ethical code established by law? As McCallister et al. (2010) observe, firms must obey the laws, guides, regulations and mandates that are given them when it comes to safeguarding PII. If for example, a firm wishes to sell PII to a company that wants to use it for marketing, the firm has the legal responsibility of telling clients that its information will be sold. However, it is not as clear cut as that makes it seem. There are many laws and guidelines regarding PII and its collection and use, and some violations are prosecuted as civil cases and some as criminal cases. Understanding a firm's responsibility in the light of government regulations regarding PII is a sure way to enhance one's own organization and ensure that it is not violating any laws and is always acting responsibly and ethically about PII.
For example, by using a web audit system, a firm can monitor and keep track of user information, such as IP addresses, URLs, dates/times, and pages…

Sources used in this document:
References

McCallister, E., Grance, T., Scarfone, K. (2010). Guide to Protecting the Confidentiality

of Personally Identifiable Information (PII): Recommendations of the National Institute of Standards and Technology. NIST. Retrieved from http://csrc.nist.gov/publications/nistpubs/800-122/sp800-122.pdf

Vacca, J. (2009). Computer and Information Security Handbook. Burlington, MA:

Morgan Kaufmann Publishers.
Wambler, S. (2015). Relational Databases. Retrieved from http://www.agiledata.org/essays/relationalDatabases.html
Cite this Document:
Copy Bibliography Citation

Related Documents

Information System on Ethical and
Words: 6479 Length: 15 Document Type: Research Paper

They have a moral obligation to the South African people in this area for many reasons. First, they have an obligation to make certain that they can participate in the global economy to give their citizens the same chances for advancement as other nations. Secondly, they have a moral obligation to do everything possible to keep their citizens safe. When one discusses the topic of security in Information and Communication

Protecting Personal Information Employee Monitoring
Words: 672 Length: 2 Document Type: Research Paper

In particular, employees can feel as though they have a lack of privacy and that they are constantly being micro-managed. Studies have shown that workers who are monitored through outlets such as call centres have elevated levels of depression and anxiety (Holman, 2002). As the worker loses their autonomy, it is also common for them to lose a substantial degree of intrinsic motivation. Another negative consequence of employee monitoring is

Internet Use Posting Personal Information
Words: 946 Length: 2 Document Type: Research Proposal

Included among the demographic data to be collected are: age and sex of the student, the type of school (private or public), the nature of internet access most frequently used (home, public library, school, others), primary guardian and relationship to the guardian (parent, grandparent, sister, etc.). A simple t-test will determine whether there is a significant difference in the frequency of posting scores between boys and girls or the 11-12

Protecting Data and Health Information
Words: 2132 Length: 7 Document Type: Essay

Protecting Personal Data Protection of personal data is paramount in any situation. Battered women receiving help in a shelter, part of a community clinic require confidentiality to avoid problems should their abusers locate them. When computerizing an appointment system and records, sometimes such information can easily be taken if there is no protection available. Things like passwords and encryption help keep would be criminals from accessing sensitive data. Although hackers may

Personal Security and the Internet
Words: 2573 Length: 8 Document Type: Term Paper

The responsibility to seek out and use the most appropriate form of protection for a particular system lies with its user. If a user does not regard these duties with the appropriate seriousness, the consequences could be dire indeed. Another very threatening form of computer crime is the phishing scam. Phishing Phishing involves email from an apparently legitimate source such as a bank or other place of business that requires the user

Information Technology a Home Network
Words: 1182 Length: 4 Document Type: Essay

Processing examples are conversion of encoded or typed words to printable format or running of computer programs such as the Statistical Package for Social Sciences (SPSS). Lastly, controlling ensures that all other four operations of the computer are efficiently working together, while at the same time, ensuring also that each operation does not interfere with the other operations. Examples of control measures in the computer are warnings or prompts

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now