Privacy Security & Information Sharing

Read Complete Research Material

Privacy Security & Information Sharing

Privacy Security & Information Sharing

The legal and ethical values of IT is that it should be used in such a way that greatest benefit the mankind. As the modern innovations and modifications are to allow human beings to use it to do their work faster and safer, therefore it should cover all the aspects of security and privacy so that the confidential information of business in particular and individual personal interest can be saved.

The concept of privacy and security information pertain to the amount of personal or otherwise sensitive information that can be gleaned directly from the contents of one data source or indirectly when one source is analyzed in combination with other data sources. The concept of security of security information relates to the set of rules or practices that enforces who can access what data, under what circumstances, and by what means.

The wide variety of types, uses, and content of security information requires that notions of privacy and security cover a vast range of topics, including an individual's right to privacy and control over information about herself or himself and the rights of governments and organizations to guard information from public view. However, with the advent of modern security information techniques and technologies, these issues continue to gain ardent and vocal supporters on all sides (Baker, Lachman, et al 2004)

A wide variety of federal laws about the security and privacy, together with those along with social security fraud, welfare fraud, computer fraud, wire fraud, and financial institution fraud. This assessment focuses on definite laws premeditated and endorsed to criminalize the proceeds of identity security and privacy (McQuade, 2006).

The first federal law to fight the issues of privacy were brought in action in 1998 with the passage of the Identity Theft Assumption and Deterrence ...
Related Ads