Everyone Has The Right to Privacy Essay

Published: 2020-04-22 08:25:56
1277 words
5 pages
printer Print
essay essay

Category: Privacy

Type of paper: Essay

This essay has been submitted by a student. This is not an example of the work written by our professional essay writers.

Hey! We can write a custom essay for you.

All possible types of assignments. Written by academics

Everyone has the right to privacy. This is the right to not have details about our lives to be held or circulated without our knowledge/consent. Data of personnel nature are collect every so often by organisations. For example:

* Employers hold personnel records that include data on address, age, qualification, salary, sick leave and so on.

* Stores hold detail on credit card payment, accounts history, items purchased;

* Banks hold details on salary, income and withdrawals, direct debits to various organisations;

* Insurance companies hold detail on property, cars, accidents, claims and health.

This list is endless. Modern technology has made it possible to store vast quantities of data, so that it can be viewed from all over the world and so that it can be used to create a profile of an individual.

Threats to information Systems

Organisations can protect the integrity of data (by preventing inaccurate data entry, malicious or accidental alteration), and simple measures can be taken to protect the security of data form theft or destruction.

Data Integrity

This refers to the correctness of data. The data held on a computer may become incorrect, corrupt or of poor quality. This could happen at different stages of data processing.

1. Errors in the Input. Data may be keyed in wrongly.

2. Errors in Operating Procedure. An update program may be ran twice in error, thus the master file would be updated twice.

3. Program errors could lead to corruption of files. A new system may have errors in it which may not surface for some time, but they may be introduced during program maintenance.

Standard Clerical procedures

To protect against input and operating, procedures can be documented and followed for both input and output.


* Data entry must be limited to authorized personnel only

* In large volume data entry, data may be verified (keyed in twice), to guard against keying errors

* Data control totals must be used wherever possible to verify the completeness and accuracy of the data, and to guard any copying/duplication or illegal entry.


* All output must be inspected for reasonableness and any inconsistencies investigated.

* Printed output containing sensitive information should be shredded after use.

Write-protecting Disks

Write-protecting disks and tapes can be used to avoid accidental overwrite on a disk or a tape. This can be effective against an operator error. Both disks and tapes have write-protecting mechanisms.

User IDs and passwords

Each user in an organisation who is permitted to the access of the company database is issued with a user id and a password. In most cases there are certain levels of access at which employees can access data. Some of the most common password rules are:

* Passwords must be at least six characters

* The password display must be automatically suppressed on the screen or printed output

* Files containing passwords must be encrypted

* All users must ensure that their password is kept confidential, not written down, not made up of easily guessed words and is changed at least every three months.

Access rights

Even authorized users don not normally have the right to see all the data held on a computer.

e.g. A hospital receptionist may have the right to view and change some patient details, such as the name, address, and appointments. But they may not have access to the patients medical file.

Access rights to data could be set to read only, read/write or no access. This way a user in a company can gain access to data which they are permitted to see and can only change data if they are authorised to do so.

Likewise, the computer it self can be programmed to allow access to data from a particular terminal, and only at a certain time of day. The terminal in the administrators office may be the only terminal which has authorisation to change the structure of a database. An access directory can be made, which shows each users access rights.

Securing against fraudulent use or malicious damage

Organisations are often exposed due to:

* The possibility of fraud;

* The deliberate corruption of data by unhappy employees;

* Theft of software or data which may fall into the hands of their competitors.

Measures to oppose these risks are as follows.

* Careful selection of employees

* Immediate removal of employees who have been sacked or who hand in their resignation, and the cancellation of their passwords and authorisation.

* Separation of duties. This is to ensure the involvement of two or more people to defraud the company.

* Prevention of unauthorised access by employees and others to secure areas such as computer operations rooms, by the use of machine readable cards/badges or other types of locks.

* The use off passwords to gain access to databases.

* Educate staff to be aware of security breaches, and to be alert in preventing them or reporting them.

* Appointing a security manager who can, with the use of special software, monitor all computer screens. The special software can also be used to record all logins at each terminal, time of logins and the number of times particular software is used. It will even log the security managers activities.

Protection against Viruses

Steps can be taken to minimize the risk of suffering damage from viruses:

* Making sure that all software which is purchased is in sealed, tamper-proof packaging;

* Not permitting floppy disks carrying software of and kind to be removed from or brought into the office;

* Using ant-virus software to check all applications brought into the office.

Biometric security measures

Biometric methods of identifying an authorised user are fingerprint scanning, voice recognition and face recognition. One such system uses infra-red scanners to capture the unique pattern of blood vessels under the skin. This system can even differentiate between identical twins by comparing the scans.

Communications Security

Telecommunications systems are vulnerable to hackers who discover user ids and passwords and can gain access to a database from their own computer. One way to avoid this is to use call-back procedure. This is when a remote user logs on, the computer automatically calls that user back on a pre-arranged number to confirm the log on.

Data encryption can also be used to scramble highly sensitive or confidential data before transmitting it.

Disaster Planning

No matter what precautions are taken, the possibility of data being destroyed is always great. A simple disk head crash can destroy a disk packing a fraction of a second. System designers must provide a reasonable backup facility that does not degrade the performance of the system and is not very expensive.

The cost of lack of planning for a computer failure can be ruinous.

Periodic Backups

The most common way to ensure that data is not lost is to make regular copies of files into a safe place. This is called Periodic Backups.

This scheme has several weaknesses:

* All updates to a file since the last backup may be lost;

* The systems may need to be shut down during backup operations;

* Backups of large files can be time consuming;

* When a failure occurs, recovery from the backup can be even more time consuming.

A benefit is that files which may have been fragmented can be reorganised to occupy smaller amounts of same, resulting in faster access time.

It is important to store copies of data in secure areas. One copy of data can be held in a fire-proof safe in a building and another off-site.

Recovery procedures

A contingency plan needs to be developed to allow rapid recovery of major disruptions. It is necessary to do the following in backup procedures:

1. Identify alternative compatible equipment and security facilities, or implement a service agreement which provides equipment when needed.

2. Have provision for alternative communication links.

Warning! This essay is not original. Get 100% unique essay within 45 seconds!


We can write your paper just for 11.99$

i want to copy...

This essay has been submitted by a student and contain not unique content

People also read