Verified Document

Should Organizations Be Held Responsible Essay

Managers at businesses and organizations all over the United States collect and store information. It can be with tangible documents via filing cabinets, or digitally via networked servers. They may even rent "cloud" space to safeguard and keep vast volumes of personal information. Despite the growing occurrence of data breaches affecting private, public, and nonprofit organizations, the majority of organizations and businesses admit knowing too little concerning the consequences and risks of failing to sufficiently safeguard personal information collected from volunteers, employees, donors, and clients. The news has shown companies like Sony, Kmart, and Dairy Queen that have let leak sensitive information like credit card numbers and home addresses (MONEY.com, 2014). The question is should organizations and businesses like these be held liable for damages from the compromise of leaked sensitive data? The answer is yes. People are convinced by businesses and organizations to hand over sensitive information. They put their trust in these companies and nonprofits with information that, if in the wrong hands could wreak havoc in their lives from identity fraud to credit score damage. It truly shows how much people believe in the organization to let go of such potentially damaging information. Therefore, when a company/organization has a hacking incident or accidentally leaks the private information, they should pay the consequences.

People often cite hackers as the culprits for leaked information. However, sometimes-private information can be leaked from inside sources. In a 2015 article, council workers and social workers have been found to leak sensitive information or reveal private information and evade punishment. Some examples of leaked personal information go as far as revealing personal information of children. "In one instance, a social worker left papers containing confidential records about children and information linked to sex offenders on a train, and in another, an unencrypted laptop containing the details of 200 schoolchildren was stolen" (Ward, 2015). Because few of them faced any real consequences for their actions and the act itself was not frowned upon, the instances of leaked personal information grew.

People must be held responsible for their actions. If they are not, it could prove disastrous to many people's lives. The...

There are many more examples in private sector organizations. If the consequences for these actions continue to be lax, then people within these organizations will never learn to spot suspicious activity like card reader placements or implement standards that reduce exposure of sensitive data. Going back to the example of the sensitive documents left in the train, if standard protocol involved never leaving the office with physical copies of people's personal information that accident would have never happened.
Improving oversight must take priority. This is especially true as newer technology takes personal information off tangible documents and onto apps. "Yet few studies have evaluated the legal implications of the expansion of mHealth applications, or "apps." Such apps are affected by a patchwork of policies related to medical licensure, privacy and security protection, and malpractice liability" (Yang & Silverman, 2014, p. 222). Apps can be used with mobile phones and viewed from anywhere there is a mobile connection. It can also be easily accessed by hackers as mobile phones have become notoriously easy targets to hack into. Therefore, it becomes an issue of whether or not people are able to handle the influx of potential threats and/or care to handle them. If consequences are not met for those who break confidentiality, what will motivate them to improve? To safeguard the private data?

Google Inc. has made searching the internet easy and quick. However, it has also exposed people to those that wish to find them and gain their personal information. "In May 2014 the Court of Justice of the European Union delivered a landmark ruling in Google Spain SL, Google Inc. v Agencia Espanola de Proteccion de Datos Mario Costeja Gonzalez" (Lindsay, 2014, p. 159). The ruling helped to establish a "right to be forgotten" understanding that existed and continues to exist under the existing European data privacy law and the 1995 Data Protection Directive. People have under this law, the right to ask Google to remove certain material from their search results. Although Google Inc. has receive well over 170,000 requests by the middle of November 2014, they have refused to cooperate as quickly as expected.

Although companies like Google and…

Sources used in this document:
References

Axelrod, C., Bayuk, J., & Schutzer, D. (2009). Enterprise information security and privacy. Boston: Artech House.

Lindsay, D. (2014). The 'Right to be Forgotten' by Search Engines under Data Privacy Law: A Legal Analysis of the Costeja Ruling. Journal Of Media Law, 159. Retrieved from http://www.tandfonline.com/doi/abs/10.5235/17577632.6.2.159?journalCode=rjml20

MacKinnon, L. (2012). Data security and security data. Berlin: Springer.

MONEY.com,. (2014). Data Breach Tracker: All the Major Companies That Have Been Hacked. Retrieved 27 November 2015, from http://time.com/money/3528487/data-breach-identity-theft-jp-morgan-kmart-staples/
Ncsl.org,. (2015). Security Breach Notification Laws. Retrieved 27 November 2015, from http://www.ncsl.org/research/telecommunications-and-information-technology/security-breach-notification-laws.aspx
Ward, V. (2015). Revealed: Council workers who snoop on private data are rarely punished. Telegraph.co.uk. Retrieved 26 November 2015, from http://www.telegraph.co.uk/news/uknews/11795018/Revealed-Council-workers-who-snoop-on-private-data-are-rarely-punished.html
Yang, Y., & Silverman, R. (2014). Mobile Health Applications: The Patchwork Of Legal And Liability Issues Suggests Strategies To Improve Oversight. Health Affairs, 33(2), 222-227. http://dx.doi.org/10.1377/hlthaff.2013.0958
Cite this Document:
Copy Bibliography Citation

Related Documents

Task Management Organizations Hold Conferences and We
Words: 6176 Length: 18 Document Type: Term Paper

Task Management Organizations hold conferences and we shall deal with an analysis of the tasks associated with the management of conferences. We may define conferences as 'An event used by any organization to meet and exchange views, convey a message, open a debate or give publicity to some area of opinion on a specific issue Although not generally limited in time, conferences are usually of short duration with specific objectives.' (What is

Organizational Reflections Description of Organization We Are
Words: 2548 Length: 8 Document Type: Essay

Organizational Reflections Description of organization We are a nonprofit organization specializing in meeting the needs of our clientele. Our clientele primarily includes residents of nursing homes, disabled citizens, and those that reside in senior assisted living communities. Our organization provides services by way of compiling a shopping list with our customers, and then grocery shopping for the customers. This is very convenient because our clientele will not have to travel out of

Organizational Theory and Public Management: Marx, Weber,
Words: 1573 Length: 5 Document Type: Term Paper

Organizational Theory and Public Management: Marx, Weber, and Freud. When one considers the vast topic of organizational theory, one of the foremost names in modern study is undoubtedly Robert B. Denhardt. As a professor of Public Administration at Arizona State University, he has authored numerous works on the topic of human behavior as it relates to public organization. Of course, in today's world, this area of study is no small thing --

Organizational Accountability Review of Taiwan's Disaster Management...
Words: 5800 Length: 20 Document Type: Peer-Reviewed Journal

Organizational Accountability Review of Taiwan's Disaster Management Activities In Response To Typhoon Morakot Taiwanese System of Government 174 Responsibility of Emergency Management in Taiwan 175 Disasters in Taiwan 175 Citizen Participation 189 Shafritz defines citizen participation as follows: 192 Public Managers, Citizen Participation, and Decision Making 192 The Importance of Citizen Participation 197 Models of Citizen Participation 199 Citizen Participation Dilemmas 205 Accountability 207 Definitions of Accountability 207 The Meaning of Accountability 208 The Functions of Accountability 213 Citizen Participation and Accountability 216 Accountability Overloads

Organizational Chart for the Proposed Organization. XYZ
Words: 2822 Length: 10 Document Type: Essay

organizational chart for the proposed organization. XYZ Center Organizational Chart ADVISORY BOARD CENTER DIRECTOR CONSULTANTS SUPPORT STAFF ASSOCIATES MEDICAL DIRECTOR MEDICAL STAFF THERAPISTS ADDICTION STAFF CONTRACTS STAFF Include the title of positions and a brief description of the positions' duties and responsibilities. The organizational structure of the Center is founded on a shared services model. President/director of the center has administrative, management and clinical skills in the field of human welfare along with behavioral health industry for twenty years. Open-book management, mutual respect

Organizational Behavior Case Study
Words: 1948 Length: 6 Document Type: Case Study

Organizational Behavior Case Study ORGANIZATIONAL BEHAVIOUR Residential care facility's staff plays an important role in the daily lives of residents; unfortunately these facilities are usually faced with organizational obstacles and lack of information that prevents them from taking proper care of residents (Smith, 1998). This organizational behavioral case study is about a residential care facility which is part of a parent company that runs six different residential care facilities. The management of

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now