Professional Documents
Culture Documents
protection of information from accidental or intentional misuse by persons inside or outside an organization. In this topic we will discuss how to prevent the information from being misused by other party.
PRIVACY ISSUES
The power of information technology to store and
retrieve information can have a negative effect on individuals right privacy. The internet itself gives users a feeling of anonymity while actually being quite the opposite.
VIOLATION OF PRIVACY
Accessing individuals private e-mail conversations,
and/or collecting and sharing information about individuals without their knowledge and consent.
mail addresses and other personal information to build individuals customer profiles.
COMPUTER MONITORING
The technology that we used to monitor the
conversation of peoples inside the organization. It also monitors the employee productivity or individual movement inside the organization.
COMPUTER MATCHING
Using customer information gained from multiple
sources to create customer profiles that can be sold to information brokers or other companies and used to market business services. People can get your information from other companies for their own benefits.
Computer Fraud and Abuse Act prohibit intercepting data communication message, stealing or destroying data. The Computer Matching and Privacy Act regulates the matching of data held in federal agency files. Individuals can also protect their privacy by using such software and service like encryption and anonymous remailers.
CENSORSHIP
The right of people to know about matters others may
want to keep quite, the right of people to express their opinion and to publish those opinion, is the centre of a major debate between the right of the individual and the right society. Issues regarding spamming, flaming, pornography and copyright protection are just some of the issues being debated by various groups and government.
Fin
prepare by
Aimran Zaman Muhd Akmal Shahrul Azwan Norhidayatul Najihah Nurul Izzati Nurul Liyana