Ethical Problem of Personally Identifiable Term Paper

Download this Term Paper in word format (.doc)

Note: Sample below may appear distorted but all corresponding word document files contain proper formatting

Excerpt from Term Paper:

Nonetheless, internet breach occurs routinely; further steps need to be taken.

Options for resolving these issues

Part of the issue revolves around ambivalent ways of defining PII as well as the fact that the constructs of identity are still in flux. PII, at one moment, can become non-PII during the next, and the reverse is the case, too. Moreover, computer science has shown that, in many instance, data that is consider non-PII and, therefore, not regulated, has been used to identify a person and that this data should, theorem, be called PII. The definition of PII, accordingly, transcends boundaries, and may be difficult to pin down. Given its malleability, some observers have even suggested altogether rejecting PII as the tool for defining privacy law.

The first issue, therefore (it seems to me) is to start off with a clear definition of PII and here we may adopt the approach of Schwartz and Solove (2011) who recommend that rather than PII being dropped, we adopt a new standard (not a rule) called "PII 2.0," that measures constructs of identity along a continuum. This would also, incidentally, work towards safeguarding more vulnerable individuals since data can be included / omitted at one's discretion. Moreover, this new construct, PII 2.0, would be divided into two categories. One category would be information that identifies the individual, whilst the other category would be information that could be traced back to the individual. Government and departments (as well as institutions) would know how to protect the individual depending on which of these two categories the information falls into.

The suggestion of Schwartz and Solove (2011) agrees with the findings of the OMB which decided that sensitivity of the case hinges on context. Not every case is sensitive (an HIV case for instance may be more sensitive than another). More so, the accumulation of data increases the sensitivity of the case. It may be, therefore, that in sensitive cases data can be retained to the essential minimum that, whilst helping the government and institution (such as medical institution, would also better protect the individual in question (Johnson III, 2007). or, one can use the proposal of Schwartz and Solove (2011) of dividing into two categories.

Conclusion

Personally Identifiable Information (PII) is any sort of information that identifies a person and that institutions and the government use for private and domestic concerns. The ethical problem inherent in PII is that unscrupulous individuals can abuse the concept robbing a person of their personal identity or, in other ways, using the PII to force the person to cooperate. It is extremely important, therefore, to safeguard the person's PII and the more vulnerable the individual the more important protection of PII becomes.

Laws have been passed for PII protection but breaches persist. Recommendations, therefore, include passage of a new category of PII (PII 2.0) that more strictly defines PII and divides it into two categories enabling relevant institutions to beater identify the individual and to choose which data to include and which to exclude. These bits of data can also be placed along a spectrum.

National and logistical matters necessitate that we be uniquely identified. Doing this can, however, be occasionally, harmful. Steps have been, and can continue to be taken, to guarantee a person's safety.

Source

Directive 95/46/EC of the European Parliament and of the Council of 24 October 1995 on the protection of individuals with regard to the processing of personal data and on the free movement of such data http://eur-lex.europa.eu/LexUriServ/LexUriServ.do?uri=CELEX:31995L0046:EN:HTML

Johnson III, Deputy Director for Management (2007/05/22) M-07-16 SUBJECT:Safeguarding Against and Responding to the Breach of Personally Identifiable Information http://www.whitehouse.gov/omb/memoranda/fy2007/m07-16.pdf

Merriam-Webster.

http://www.merriam-webster.com/dictionary/ethic

Schwartz, PM & Solove, DJ (2011) the PII Problem: Privacy and a New Concept of Personally Identifiable Information New York University Law Review, Vol. 86, p. 1814,

Sweeney, L (n.d.) Standards of Privacy of Individually Identifiable Health Information. Carnegie Mellon University. http://privacy.cs.cmu.edu/dataprivacy/HIPAA/HIPAAcomments.html

United States Department of Defense. "MEMORANDUM for DOD FOIA OFFICES." http://www.dod.mil/pubs/foi/withhold.pdf)[continue]

Cite This Term Paper:

"Ethical Problem Of Personally Identifiable" (2012, October 07) Retrieved December 9, 2016, from http://www.paperdue.com/essay/ethical-problem-of-personally-identifiable-75799

"Ethical Problem Of Personally Identifiable" 07 October 2012. Web.9 December. 2016. <http://www.paperdue.com/essay/ethical-problem-of-personally-identifiable-75799>

"Ethical Problem Of Personally Identifiable", 07 October 2012, Accessed.9 December. 2016, http://www.paperdue.com/essay/ethical-problem-of-personally-identifiable-75799

Other Documents Pertaining To This Topic

  • Ethical and Legal Issues Involved in E Commerce

    Ethical and Legal Issues in Ecommerce A Concise Definition of ecommerce Motivation for E-Commerce Ethical and Legal Issues in E-Commerce Enforcement of Legal Directives and Contracts Collecting and Securing Consumer Information Lack of Uniform Laws Copyright and Patent Laws Violation Taxation Other Issues: In Brief Privacy and Security 'Extinction' of Some Small Businesses Electronic Deception Language Issues Declaration During the last one decade, the internet has experienced unprecedented growth. Thanks to this increase in online activity, consumers and businesses from all over the world are

  • Computer Science Legislative Ethical and

    One can also set up policies and procedures to respond to and reduce the effects of the loss or damage to ones it environment (Capability: Security Process, 2012). The assess phase should decide the fitting security needs for an organization and which processes are presently in place. Security requirements can vary radically from company to company or institution to institution based, for instance, on dimension, industry or field, regional laws,

  • Quality of Life Among Tawau Hospital Staff

    Quality of Life Among Tawau Hospital Staff With Osteoarthritis (knees) Been Treated in Physiotherapy Unit Quality of life among Tawau hospital staff with osteoarthritis (knees) being treated in physiotherapy unit Pilot study Demographics Knowledge about OA before physiotherapy Severity of disease before and after rehabilitation Degree of difficulty as a result of knee OA Effect on work performance Effect on emotional status and social activities Opinion on self-management Impact of physiotherapy on their knowledge and understanding of the disease Impact of

  • Ethics Awareness Inventory the Individual Ethics Awareness

    Ethics Awareness Inventory The Individual Ethics Awareness Inventory examines which of four different components is the most critical in an individual's ethical position: character, obligation, results, and equity (CORE). When a person makes a decision or analyzes a scenario, their personal ethical perspective helps determine how they approach the issue. When character is the most important issue, the person's ethical perspective s based upon what it is good to be, rather

  • Ethics After Being Rejected for

    In 2003, he resigned both posts as news of the twin scandals emerged. The Air Force froze the contract that Druyun had negotiated, precipitating Condit's resignation and retirement. Condit had joined Boeing in 1965 as an engineer and moved into management in 1973, working on marketing the 727. He completed an MBA at Sloan in 1975 and returned to Boeing, progressing rapidly up the ranks. By 1983, he became VP

  • Elsevier Apply Case Studies

    This can determine where or not the situation will turn out to be a positive or negative outcome. Along with that, due to research, it is apparent that decision making is a process of identifying and evaluating choices since people make many decisions on a daily basis. Most of decisions range from routine to impulsive, which does not give critical thinking a chance to help a person to make

  • Webmd Web Portals Like Webmd

    Jurisdiction issues may also affect the insurance and the coverage provided by the agency as insurance coverage is also restricted to certain regions and not outside those jurisdictions. Identity Theft: Another issue or the problem is that of identity theft, which is considered to be the fastest growing crime in America as millions of victims have been reported over a period of last couple of years. Giving out information on


Read Full Term Paper
Copyright 2016 . All Rights Reserved