More Subjects
Assignment 1: Privacy, Laws, and Security Measures
Kwaku Adomako
School or Institution Name (University at Place or Town, State)
Assignment 1: Privacy, Laws, and Security Measures
Protecting digital information against privacy and security issues is the most important concern for all modern businesses. Most of the businesses strive to provide flexible e-commerce services to their customers that require extensive amounts of private data to be processed for business operations. Storage and processing of sensitive information such as social security numbers, contact details, and credit card information for payment processing have made businesses a potential target of cyber criminals ADDIN ZOTERO_ITEM CSL_CITATION {"citationID":"8dg7Hwhx","properties":{"formattedCitation":"(Weiss & Archick, 2016)","plainCitation":"(Weiss & Archick, 2016)","noteIndex":0},"citationItems":[{"id":13,"uris":["http://zotero.org/users/local/BeyJjeak/items/YSL8U9YK"],"uri":["http://zotero.org/users/local/BeyJjeak/items/YSL8U9YK"],"itemData":{"id":13,"type":"book","title":"US-EU data privacy: from safe harbor to privacy shield","publisher":"Congressional Research Service","author":[{"family":"Weiss","given":"Martin A."},{"family":"Archick","given":"Kristin"}],"issued":{"date-parts":[["2016"]]}}}],"schema":"https://github.com/citation-style-language/schema/raw/master/csl-citation.json"} (Weiss & Archick, 2016). Organizations are facing privacy issues as customers are becoming more vigilant about the privacy of their personal information. Where every organization claims to be the best in privacy protection, the headlines are filled with news of successful data breaches compromising personal information.
Cyber-criminals discover vulnerabilities in information systems and exploit them to gain access to private information stored in the systems. In the given scenario for a retail store, the information such as social security numbers, credit card details can be compromised by criminals. Protection of such sensitive information is the responsibility of the organization collecting the details from customers. The European Union has implemented a general data protection regulation known as GDPR. As per GDPR, the individuals in Europe have extensive privacy rights regarding their digital information ADDIN ZOTERO_ITEM CSL_CITATION {"citationID":"Ok4jQMLh","properties":{"formattedCitation":"(Allen, 2016)","plainCitation":"(Allen, 2016)","noteIndex":0},"citationItems":[{"id":14,"uris":["http://zotero.org/users/local/BeyJjeak/items/DP2T27QB"],"uri":["http://zotero.org/users/local/BeyJjeak/items/DP2T27QB"],"itemData":{"id":14,"type":"article-journal","title":"Protecting one's own privacy in a big data economy","container-title":"Harv. L. Rev. F.","page":"71","volume":"130","author":[{"family":"Allen","given":"Anita L."}],"issued":{"date-parts":[["2016"]]}}}],"schema":"https://github.com/citation-style-language/schema/raw/master/csl-citation.json"} (Allen, 2016). In the United States, there is no single data protection legislation. However, various privacy and data protection regulations are implemented at national as well as state levels. For example, the HIPAA act that provide businesses with guidelines to protect personal health information (PHI) of patients. National Institute of Standards in Technology has developed comprehensive data protection and privacy framework that is applicable in a vast variety of organizations ADDIN ZOTERO_ITEM CSL_CITATION {"citationID":"wIWIAfiK","properties":{"formattedCitation":"(Vogt, 2017)","plainCitation":"(Vogt, 2017)","noteIndex":0},"citationItems":[{"id":15,"uris":["http://zotero.org/users/local/BeyJjeak/items/VV6PJ5MY"],"uri":["http://zotero.org/users/local/BeyJjeak/items/VV6PJ5MY"],"itemData":{"id":15,"type":"article-journal","title":"The Digital Underworld: Combating Crime on the Dark Web in the Modern Era","container-title":"Santa Clara J. Int'l L.","page":"104","volume":"15","author":[{"family":"Vogt","given":"Sophia Dastagir"}],"issued":{"date-parts":[["2017"]]}}}],"schema":"https://github.com/citation-style-language/schema/raw/master/csl-citation.json"} (Vogt, 2017). Organizations such as retail stores must be compliant to the NIST standards of data privacy and information security assurance frameworks imposed by concerned departments of the government.
References
ADDIN ZOTERO_BIBL {"uncited":[],"omitted":[],"custom":[]} CSL_BIBLIOGRAPHY Allen, A. L. (2016). Protecting one’s own privacy in a big data economy. Harv. L. Rev. F., 130, 71.
Vogt, S. D. (2017). The Digital Underworld: Combating Crime on the Dark Web in the Modern Era. Santa Clara J. Int’l L., 15, 104.
Weiss, M. A., & Archick, K. (2016). US-EU data privacy: from safe harbor to privacy shield. Congressional Research Service.
More Subjects
Join our mailing list
@ All Rights Reserved 2023 info@freeessaywriter.net