Verified Document

Ethical Problem Of Personally Identifiable Term Paper

Nonetheless, internet breach occurs routinely; further steps need to be taken. Options for resolving these issues

Part of the issue revolves around ambivalent ways of defining PII as well as the fact that the constructs of identity are still in flux. PII, at one moment, can become non-PII during the next, and the reverse is the case, too. Moreover, computer science has shown that, in many instance, data that is consider non-PII and, therefore, not regulated, has been used to identify a person and that this data should, theorem, be called PII. The definition of PII, accordingly, transcends boundaries, and may be difficult to pin down. Given its malleability, some observers have even suggested altogether rejecting PII as the tool for defining privacy law.

The first issue, therefore (it seems to me) is to start off with a clear definition of PII and here we may adopt the approach of Schwartz and Solove (2011) who recommend that rather than PII being dropped, we adopt a new standard (not a rule) called "PII 2.0," that measures constructs of identity along a continuum. This would also, incidentally, work towards safeguarding more vulnerable individuals since data can be included / omitted at one's discretion. Moreover, this new construct, PII 2.0, would be divided into two categories. One category would be information that identifies the individual, whilst the other category would be information that could be traced back to the individual. Government and departments (as well as institutions) would know how to protect the individual depending on which of these two categories the information falls into.

The suggestion of Schwartz and Solove (2011) agrees with the findings of the OMB which decided that sensitivity of the case hinges on context. Not every case is sensitive (an HIV case for instance may be more sensitive than another). More so, the accumulation of data increases the sensitivity of the case. It may be, therefore, that in sensitive cases data can be retained to the essential minimum that, whilst helping the government and institution (such as medical institution, would also better protect the individual in question (Johnson III, 2007). or, one can use the proposal of Schwartz and Solove (2011) of dividing into two categories.

Conclusion

Personally Identifiable Information (PII)...

The ethical problem inherent in PII is that unscrupulous individuals can abuse the concept robbing a person of their personal identity or, in other ways, using the PII to force the person to cooperate. It is extremely important, therefore, to safeguard the person's PII and the more vulnerable the individual the more important protection of PII becomes.
Laws have been passed for PII protection but breaches persist. Recommendations, therefore, include passage of a new category of PII (PII 2.0) that more strictly defines PII and divides it into two categories enabling relevant institutions to beater identify the individual and to choose which data to include and which to exclude. These bits of data can also be placed along a spectrum.

National and logistical matters necessitate that we be uniquely identified. Doing this can, however, be occasionally, harmful. Steps have been, and can continue to be taken, to guarantee a person's safety.

Source

Directive 95/46/EC of the European Parliament and of the Council of 24 October 1995 on the protection of individuals with regard to the processing of personal data and on the free movement of such data http://eur-lex.europa.eu/LexUriServ/LexUriServ.do?uri=CELEX:31995L0046:EN:HTML

Johnson III, Deputy Director for Management (2007/05/22) M-07-16 SUBJECT:Safeguarding Against and Responding to the Breach of Personally Identifiable Information http://www.whitehouse.gov/omb/memoranda/fy2007/m07-16.pdf

Merriam-Webster.

http://www.merriam-webster.com/dictionary/ethic

Schwartz, PM & Solove, DJ (2011) the PII Problem: Privacy and a New Concept of Personally Identifiable Information New York University Law Review, Vol. 86, p. 1814,

Sweeney, L (n.d.) Standards of Privacy of Individually Identifiable Health Information. Carnegie Mellon University. http://privacy.cs.cmu.edu/dataprivacy/HIPAA/HIPAAcomments.html

United States Department of Defense. "MEMORANDUM for DOD FOIA OFFICES." http://www.dod.mil/pubs/foi/withhold.pdf)

Sources used in this document:
Schwartz, PM & Solove, DJ (2011) the PII Problem: Privacy and a New Concept of Personally Identifiable Information New York University Law Review, Vol. 86, p. 1814,

Sweeney, L (n.d.) Standards of Privacy of Individually Identifiable Health Information. Carnegie Mellon University. http://privacy.cs.cmu.edu/dataprivacy/HIPAA/HIPAAcomments.html

United States Department of Defense. "MEMORANDUM for DOD FOIA OFFICES." http://www.dod.mil/pubs/foi/withhold.pdf)
Cite this Document:
Copy Bibliography Citation

Related Documents

Ethical and Legal Issues Involved in E-Commerce
Words: 4942 Length: 15 Document Type: Term Paper

Ethical and Legal Issues in Ecommerce A Concise Definition of ecommerce Motivation for E-Commerce Ethical and Legal Issues in E-Commerce Enforcement of Legal Directives and Contracts Collecting and Securing Consumer Information Lack of Uniform Laws Copyright and Patent Laws Violation Taxation Other Issues: In Brief Privacy and Security 'Extinction' of Some Small Businesses Electronic Deception Language Issues Declaration During the last one decade, the internet has experienced unprecedented growth. Thanks to this increase in online activity, consumers and businesses from all over the world are

Ethics After Being Rejected for
Words: 3579 Length: 13 Document Type: Thesis

In 2003, he resigned both posts as news of the twin scandals emerged. The Air Force froze the contract that Druyun had negotiated, precipitating Condit's resignation and retirement. Condit had joined Boeing in 1965 as an engineer and moved into management in 1973, working on marketing the 727. He completed an MBA at Sloan in 1975 and returned to Boeing, progressing rapidly up the ranks. By 1983, he became VP

Computer Science Legislative, Ethical, and
Words: 1588 Length: 5 Document Type: Term Paper

One can also set up policies and procedures to respond to and reduce the effects of the loss or damage to ones it environment (Capability: Security Process, 2012). The assess phase should decide the fitting security needs for an organization and which processes are presently in place. Security requirements can vary radically from company to company or institution to institution based, for instance, on dimension, industry or field, regional laws,

Rosa's Ethics Ever Since December
Words: 1944 Length: 6 Document Type: Term Paper

The most convincing interpretation might be that, as she contended, she did not foresee the consequences. Parks stated that "it was not a time for me to be planning to get arrested." (Reader 2005). So, if she was not considering the consequences, then she was not thinking rationally; if she was not thinking rationally, according to Aristotle, then she was not behaving virtuously. Since we should probably use Parks'

Global, Ethical, and Professional Issues
Words: 2788 Length: 10 Document Type: Research Paper

" (Johnson, 2005) the notion of ruling against the defendant in all identity theft or related cases may establish the wrong precedent for future cases. "On the other hand, if liability is too readily assessed, it will have the power to bankrupt valuable enterprises because of the often vast numbers of potential plaintiffs and consequent extensive resulting damages." (Johnson, 2005) Internet security and identity theft is a very pervasive problem globally.

Quality of Life Among Tawau Hospital Staff
Words: 5746 Length: 15 Document Type: Research Paper

Quality of Life Among Tawau Hospital Staff With Osteoarthritis (knees) Been Treated in Physiotherapy Unit Quality of life among Tawau hospital staff with osteoarthritis (knees) being treated in physiotherapy unit Pilot study Demographics Knowledge about OA before physiotherapy Severity of disease before and after rehabilitation Degree of difficulty as a result of knee OA Effect on work performance Effect on emotional status and social activities Opinion on self-management Impact of physiotherapy on their knowledge and understanding of the disease Impact of

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now