Friday, June 14, 2019

Depersonalization as a method of representation and protection of Research Paper

Depersonalization as a method of representation and protection of personal data - Research Paper fontComputers and the Internet paved the way for more efficient and fast methods to gather, store and organize personal teaching. Since the 1970s the number of computer data banks or databases became staggering. on that point are the databases from Social Security Administration, Federal Bureau of Investigation, Medical Information Bureau, state criminal justice systems, municipal data systems, credit card companies, foretell companies, Medicaid, and, recently, Google, Facebook and so much more. The huge amount of tuition that governments and businesses collect from separates have become a cause of concern. Personal data collection encroaches on the individuals right, particularly as it invades loneliness or the right to control information about ourselves there is a disclosure of private personal facts and, the information can be used in such a way that a person is cast in a bad light or in a case of identity theft. The method of personal data collection, its use and security, hence, necessitate citizen protection. Through the years, laws have enacted that aim to protect personal cover but they appear to be insufficient. This paper will explore depersonalization as an effective method of personal data collection, where privacy is still protected. ... 3. approaching or the level of access provided to individuals on the gathered data about them. 4. Security or the responsibility of data gatherers to provide adequate protection for the information collected (Bidgoli 2004, 98). Based from these principles, a number of laws were enacted covering individual privacy across different sectors. For instance, the Gramm-Leach-Bliley Act protects personal banking information the Fair Credit describe Act provides the framework for handling personal credit data. There are also laws that cover the collection and use of medical and health data, government records, childr ens privacy, and so forth. Laws are also enacted in other countries such as the European Union Data Protection Directive, the OECD privacy guidelines adopted by countries such as Mexico, Australia, Japan and Czech Republic (Conrad, Misenar and Feldman 2012, 401). But these laws and even some ethical guidelines (see Kluge 2000), no matter how specific and comprehensive, still fail to address privacy issues. Neubauer and Kolb (2009), for example, noted that approaches and methods for protecting privacy often do not comply with legal requirements or basic security requirements without suffering any penalty, (7). Szeto and Miri (2007) revealed the same findings when they analyse the Canadian experience. According to Hildebrandt and Gutwirth (2008), this is because most statutes builds on traditional ways of thinking data, personal data and their abuse, without understanding or recognizing the new type of knowledge that go forth from modern data processing (321). It was further argued that even when recent or updated laws were effective regarding personal data, they are still not equipped to deal with gibe data, which is persistent today

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.