This website uses cookies to ensure you have the best experience. Learn more

Privacy: Security, Confidentiality, Or Convenience? Essay

3398 words - 14 pages

Privacy: Security, Confidentiality, or Convenience?

INTRODUCTION

The evolution of the Internet started from the department of defense's project, and rapidly distributed to world wide. With the rise of the Internet age comes with the benefits and the concerns. Because of the easeness to communicate information and displaying data, the first amendment needs to be applied to this communication channel. How are we using and communicating information without offending and harm others? Since the evolution of the Internet, there has been acts from Congress to regulate the use the Internet such as the Communications Decency Act in 1996 and the Child Online Protection Act in 1998. These acts aim to forbid Internet users from displaying offensive speech to users or exposing children of indecent materials. The Internet raises other issues that people might have. The biggest and most debatable topic is the privacy issue. Is the Internet a safe place to protect personal information such as financial information, medical data, etc…? Some people who are computer literate or at least with some experience in software and technology would not trust to release the information on the web or at random sites . As a matter of fact, any unknown or small vendor on the web would have difficulty getting many customers to do business online. Big vendors such as Amazon would want to secure their network infrastructure to protect the users information, so that their server would not be hacked. However, even this style of protecting personal information is not enough. The users demand further protection such as ensuring their information is not being sold to other vendors for misuse, or spam the users mailbox with soliticing.

Privacy in terms of ethics is being defined in the AMA Code of Ethics as "Information collected from customers should be confidential and used only for expressed purposes. All data, especially confidential customer data, should be safeguarded against unauthorized access. The expressed wishes of others should be respected with regard to the receipt of unsolicited e-mail messages." 1 The AMA, American Marketing Association, is an organization for professional marketers, empowering them with information and education that will enrich the marketer's career. They define many codes of ethics in the marketing world such as honesty and fairness, rights and duties, organizational relationship, access to information.

Privacy issue in IEEE's Software Engineering Code of Ethics is "Keep private any confidential information gained in their professional work, where such confidentiality is consistent with the public interest and consistent with the law."2 A respectable organization such as the IEEE would have a powerful impact to the professional sofware engineers with its code of ethics. This code of ethic for privacy could be applicable and beneficial to all people, not only for us engineers.

In this discussion, we...

Find Another Essay On Privacy: Security, Confidentiality, or Convenience?

Privacy and Confidentiality in the Electronic Medical Record

1939 words - 8 pages government like HIPAA and pointed out some existing solutions and actions taken by Healthcare IT industry to protect privacy and confidentiality of the information. Being an amateur it is not my right to judge the decisions of the experts but I do Concluding Remark – It is not difficult to protect privacy and confidentiality of individual with new technology however “In the security system, the weak links are most likely to be human.” Even the

Patients' Rights and Access to Medical Records

1010 words - 4 pages medical personnel and others acquired by law. In July 1999, the Health Care Financing Administration (HCFA), introduced a new Patient's Rights Condition of Participation (CPO) that hospitals must meet to be approved for, or to continue participation in the Medicare and Medicaid programs. The Health Insurance and Accountability Act of 1996 (HIPAA) addresses the security and privacy of health data and also issues standards for electronic health

The Erosion of Patient Confidentiality

558 words - 2 pages ethical decision making that may arise in the course of treatment. The right to be notified of any medical research or educational projects that may affect the patient's care. The right to privacy and confidentiality of information. The right of an authorized representative to exercise these rights behalf of the patient if the patient is unable to do so. Confidentiality of information is an important basis for a good patient-physician relationship

Security in Healthcare: How Bring Your Own Device (BYOD) violates Health Insurance Portability and Accountability Act (HIPAA)

1209 words - 5 pages data on electronic devices are safeguarded. HIPAA cover how we can use and disclose patient information while the HIPAA privacy policies explain how patient information should be accessed and disclosed. Schneider (55) reviews that violation of HIPAA security and privacy laws majorly entail the attainment, retrieving and using medical information by a person who is not subject to the health data or is not permitted to offer medical services. How

Computer User Privacy

931 words - 4 pages User PrivacyPrivacy is of utmost importance to everyone on an everyday basis, no matter where you are. One thing most people don't understand is privacy while using their PC's, weather it's at work or home. There are countless programs, virus's and web trackers which can impose PC users' privacy, with many being unaware. Ensuring Privacy for users of any PC is the means and processes used to maintain the protection and confidentiality of any

Health Information Technology

2117 words - 9 pages blended with common rule. As the common rule takes care of the confidentiality aspect needed in the patient privacy, HIPAA takes care of the security that is mostly concerned with security of the patient database. Something that brings a clash is the research practices. Researches rely mostly on information transfer and sharing. Fortunately or unfortunately, these are not covered under the HIPAA. They are regulated by common rule. As noted

Confidentiality Limits and Responsibilities

831 words - 3 pages build a successful relationship with a client and begin a journey to healing and recovery by stressing the limits and boundaries of confidentiality. A client has the right to privacy, security, and privacy of not only his or her identity, but also a diagnosis, prognosis and source of payment. With regards to protecting a client’s information, he or she must first initiate the process. A client must provide written information to have his or her

Managing the development process with security in mind

619 words - 3 pages , authenticity, non-repudiation and risk management. All these security aspects, may be affected by purely technical issues (e.g., a malfunctioning part of a computer or communications device), natural phenomena (e.g., wind or water), or human causes (accidental or deliberate).This report will give a definition of these security issues with examples to illustrate them. Confidentiality Confidentiality is about stopping all unauthorised users to get access to

Security and Privacy on SAT´s (IRS) Electronic Signature

2298 words - 9 pages compromised it cannot longer be used as an authentication. Also, the user will quickly run out of biometric features, and when this happen the security and privacy is completely compromised. After it is compromised, it is compromised forever; a biometric cannot be revoked or changed very easily. The worst scenario is that several applications might use the same biometric, therefore, just by breaking into one application and obtaining the information

Impacting Laws, Regulations And Contractual Obligations For Critical Information Assets

1253 words - 5 pages will be used, and under what statutory or other authority the number is requested (5 USC 552a, note). The U.S. Office of Management and Budget, Office of Information and Regulatory Affairs (OIRA) provides guidance and oversight regarding the Privacy Act of 1974 (Privacy rights clearing house, 2008) . In this case of credit bureau this act is applicable to the credit agencies and it is their responsibility to govern the social security number from

Assignment 4

1113 words - 5 pages the violation involves intent to sell, transfer, cause malicious harm, or for personal gain, the penalties are up to $250,000, and up to 10 years in prison. 15. Which branch of the federal government (be specific) is responsible for investigating possible criminal violations on individuals violating privacy and security rules? While the Office of Civil Rights generally investigates complaints made for violations, if the violation is criminal in

Similar Essays

Security Or Privacy Essay

760 words - 4 pages surveillance, protecting the citizens of the United States? Is it worth giving up privacy for security that may not protect anyone after all? Recently Edward Snowden a former National Security Agent (NSA) said that the reason he leaked government information was to warn the United State citizen of the danger they are facing from the government surveillance programs. According to Snowden, the NSA is gathering phone calls context and internet

Privacy And Confidentiality In The Ehr

2036 words - 9 pages For long-term cost-effectiveness, accuracy, and convenience, healthcare organizations have adopted a computer system for the accumulation and storage of healthcare information. However, this technology has brought many issues in protecting patient privacy and confidentiality. In this paper, I have reviewed various journal articles to collect information and gather a better understanding regarding EHR, problems associated with the adoption of new

Public Or Private? Essay

1063 words - 5 pages of the fingerprint scanner feature on the iPhone 5s makes many people question whether the convenience of new technology is worth a possible rupture of privacy. The new technology was designed to make the accessibility of tasks less complicated. On the other hand, John Casper, the Hamburg commissioner for data protection and freedom of information, claims, “the use of technology to verify a person’s identity based on physical or behavioral

We Must Have A Right To Privacy

4031 words - 16 pages , whose users numbe red 30 million in 1996. As citizens perform more social and commercial transactions in cyberspace, it becomes easier to track down their spending habits, interests, life styles, and beliefs. A computer expert can take any person's Social Security number and find personal details abou this or her life and the history on the Internet (Everett-Green 158).   What is troubling about the issue of privacy, assaults on