Verified Document

Protecting One S Personal Information Online Essay

Personally Identifiable Information is any information that pertains directly to an individual's identity, such as SSN, birthdate, etc., and any information that can be linked to an individual, such as health records, education records, IP address, etc. (McCallister, Grance, Scarfone, 2010). When it comes to ethically protecting the PII of clients and workers in organizations, information technology and information systems must be engaged in order to ensure that cyber security is a top concern especially in a digital era where information is power and where hacking accounts and firms is a probable threat no matter what one's business is. The task of approaching PII from an ethical standpoint where regard for clients' and workers' personal information stored by the organization is one that factors into risk assessment and risk management guidelines used in order to create cyber security networks (Vacca, 2009). However, PII is something that may also be collected by firms via the Internet and used to gather information on consumers. For instance, organizations that use websites can users cookies to track the online movements of Internet users to collect "big data" that can be utilized to draw a better...

The question is: is this collection of data and storing of it whether on drives or in the cloud in line with a legal process, or is it violating an ethical code established by law? As McCallister et al. (2010) observe, firms must obey the laws, guides, regulations and mandates that are given them when it comes to safeguarding PII. If for example, a firm wishes to sell PII to a company that wants to use it for marketing, the firm has the legal responsibility of telling clients that its information will be sold. However, it is not as clear cut as that makes it seem. There are many laws and guidelines regarding PII and its collection and use, and some violations are prosecuted as civil cases and some as criminal cases. Understanding a firm's responsibility in the light of government regulations regarding PII is a sure way to enhance one's own organization and ensure that it is not violating any laws and is always acting responsibly and ethically about PII.
For example, by using a web audit system, a firm can monitor and keep track of user information, such as IP addresses, URLs, dates/times, and pages…

Sources used in this document:
References

McCallister, E., Grance, T., Scarfone, K. (2010). Guide to Protecting the Confidentiality

of Personally Identifiable Information (PII): Recommendations of the National Institute of Standards and Technology. NIST. Retrieved from http://csrc.nist.gov/publications/nistpubs/800-122/sp800-122.pdf

Vacca, J. (2009). Computer and Information Security Handbook. Burlington, MA:

Morgan Kaufmann Publishers.
Wambler, S. (2015). Relational Databases. Retrieved from http://www.agiledata.org/essays/relationalDatabases.html
Cite this Document:
Copy Bibliography Citation

Related Documents

Information System on Ethical and
Words: 6479 Length: 15 Document Type: Research Paper

They have a moral obligation to the South African people in this area for many reasons. First, they have an obligation to make certain that they can participate in the global economy to give their citizens the same chances for advancement as other nations. Secondly, they have a moral obligation to do everything possible to keep their citizens safe. When one discusses the topic of security in Information and Communication

Protecting Personal Information Employee Monitoring
Words: 672 Length: 2 Document Type: Research Paper

In particular, employees can feel as though they have a lack of privacy and that they are constantly being micro-managed. Studies have shown that workers who are monitored through outlets such as call centres have elevated levels of depression and anxiety (Holman, 2002). As the worker loses their autonomy, it is also common for them to lose a substantial degree of intrinsic motivation. Another negative consequence of employee monitoring is

Protecting Data and Health Information
Words: 2132 Length: 7 Document Type: Essay

Protecting Personal Data Protection of personal data is paramount in any situation. Battered women receiving help in a shelter, part of a community clinic require confidentiality to avoid problems should their abusers locate them. When computerizing an appointment system and records, sometimes such information can easily be taken if there is no protection available. Things like passwords and encryption help keep would be criminals from accessing sensitive data. Although hackers may

Personal Security and the Internet
Words: 2573 Length: 8 Document Type: Term Paper

The responsibility to seek out and use the most appropriate form of protection for a particular system lies with its user. If a user does not regard these duties with the appropriate seriousness, the consequences could be dire indeed. Another very threatening form of computer crime is the phishing scam. Phishing Phishing involves email from an apparently legitimate source such as a bank or other place of business that requires the user

Challenges of Protecting Personal Information
Words: 2593 Length: 9 Document Type: Research Paper

Protecting Personal Information When considering the ever-changing and highly competitive global landscape of business today, large firms must be able to effectively globalize their operations in order to reach a greater potential client base, stay at the cutting edge of their respective fields and sustain profitability in the long-term. With the current exponential growth of technology and computerization of business and learning, consumers have become much more connected to the

Online Venture Business Plan
Words: 2497 Length: 8 Document Type: Business Plan

Online Venture Business Plan Four Significant Steps for Establishing an Online Business Basic Overview of the Online Venture Mission of the Online Business Venture Business Model to be Used Infomediary Brokerage Tempting Features Features Attracting Diverse Culture Ethical Issues Potential Risks Strategies for Protecting Privacy Potential Benefits This research paper is about onlinebusiness.com which is an online forum that will be a global leader in e-commerce for business. It will act as a powerful tools for finding reliable and capable suppliers. Numerous advanatages,

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now