Digital Privacy

Read Complete Research Material



Digital Privacy

Abstract

This research paper represents information about digital privacy. This paper also has discussion technologies through which users can access personal information of others. There are certain laws which allow and secure personal information on large platform. This paper also represents advantages and disadvantages of accessing personal information.

Contents

Introduction4

Discussion4

Enhancement in RFID5

Advantages and disadvantages of Public Access5

Genealogy records6

Risks6

Edge Networks7

Improved Timeline of Response7

Threat Management7

Laws7

HIPAA and GLBA7

European Data Privacy laws8

Conclusion8

References9

Digital Privacy

Introduction

Privacy is the biggest concern in all over the world related to Information Technology especially in United States of America. There is an increase in troubles of users with the advancement of much technology than earlier decades. Technology is getting advanced each day. Every day in our life brings new concepts of technology. There is no house and organization in our society, which is without computer. Information technology is playing tremendous role in valuing our lives and societies.

Discussion

RIFD tags, video surveillances and social networking are the technologies which can allow access to individuals to access exclusive data through various means. In RFID applications, there should be a proper step to get information.

It is essential to consider a suitable choice. The provider selected can save our data in any way. When security measures are implemented on a large scale, then it will be cheap for organizations to take safety measures easily. It includes all kinds of safety measures, which include patch management hardening of virtual machine, hypervisors, human resource management, hardware and software redundancy, strong authentication, and federated identity based management resources.

Enhancement in RFID

With the increase, of huge traffic of users, it is not possible to control such privacy issues; hence, certain steps should be taken to improve RFID applications by providing limited rights to access for users. There should be an active system of control. Users should be making sure that their privacies are not interruptible. RFID applications should also provide tools which enable users to have confidence on their data privacy. There are legal measures required in this technology, to give proper outcome of privacy. There is also a user friendly design but with security measures. There should be proper identification of personal and non personal data in RFID applications.

Advantages and disadvantages of Public Access

There are many websites, which keeps the record of our friends and relatives. These websites enable to interact with them easily as well as it is easy to find a lost friend through these sites. Few individuals use these sites to remember every record of their family. Many of these sites have strong search engines which make the user search the target person easily. It is very easier, and quicker to get the information by just typing the name and information rather finding through different means.

Many times we think about our ancestors. Some individuals, wanted to know more about these sites. There are also few individuals who spend time to find out history of their families. Any one chooses will choose such a way which makes him easy to search all things through one ...
Related Ads