Laws and Security Measures

Privacy is the rights an organization or an individual has to collect, disclose, retain and use their personal information (Subramanian, 2008). When we talk about privacy, most of the times it deals with private information which is the information that are linked directly or indirectly to an individual. Private information helps identify customers, employees and other stakeholders of the organization (Verlag, 2012). Many organizations today are facing privacy issues which can ruin their businesses and information networks. When an organization is

concerned with information on medical or health conditions, matters to deal with finances, political opinions and others such as information’s on offenses or criminal investigations, then the law defines these issues as sensitive personal information. These pieces of information are supposed to be handled with a lot of care. In this information age where everything is technological based, there is an invasion of private space. These threats such as spam, cookies and click stream are just few examples of the challenges the organizations that are relying on IT are facing.

Let’s look at some of the private issues that organizations are facing. One, there is consumer privacy which is not at all new. When consumers fill in their personal and private data, they have to keep on being worried as they wonder how the government and the organizations are using this information. A great number of people are getting into the internet and accessing the private internet’s information. This has left consumers with a lot of discomforts. Secondly, most consumers who use credit cards to make electronic purchases are faced with a major threat of fraud.

Non-credit worthy orders of amount to more than one- sixth of all the purchases made through the internet. Everyone who faces these challenges have all the reasons to get worried. Any issues that are concerned with finances are so sensitive and this means that it is a serious private issue. 3 PRIVACY Thirdly, today most of us use electronic mail for communication. It is the easiest way of communication because it has a lot of advantages. Most of the organization use this means to communicate. There is however a great challenge. This is the concern over the increase in the junk e-mail or also known as sperm.

Any organization that is not up to date on IT is seemingly lagging behind. This comes with a lot of strain because now and then the information communicated can be hacked and this can result to information getting into unauthorized hands. The above privacy issues relate mostly to technology. In the sporting goods store, most of the activities, that are; maintaining an internal network and intranet protected by farewell, accept credit card sales in the store and over the web via e-commerce transactions and even the others relate to technology (Verlag, 2012).

A security risk is a situation or situations that pose a possible threat to the security of something. To protect private information, it requires identification of this risks and getting the means of how to eliminate them. Everyone in an organization is responsible to identify and to protect privacy risks. Privacy risks are operational risks that cause losses either directly or indirectly. This can result from failures that result from internal processes, staff issues and external events.

There are laws however that govern privacy risks as described below. Constitutional right to privacy; these rights give individuals protection from unwarranted governmental intrusions. It doesn’t however to all aspects of citizen’s daily lives, but only when the government invades their privacy. This law is provided through the constitution. Another law is the current state privacy regulations such as COPPA that is responsible for websites that collect information from children below 13 years old (Subramanian, 2008). The requirement for this law

is to make the parents aware of the information that is collected from their kids. The parents are 4 PRIVACY also given a chance to control the amount of information that is to be sited in those websites. Again, before collecting this information, there must be prior consultation with the parents of these students. It also provides for reasonable procedures to protect the confidentiality, security and integrity of any information collected (Jayson, 2014). There is also the federal trade commission. This has played a crucial role in the online and offline issues.

It emphasizes on the consumers being notified of the web site’s privacy policy, giving them a choice of how the information collected can be used, giving the consumers a chance to participate and correct the information posted on the websites about them and lastly this personal data being kept reasonably secure and updated. The fourth law is the current self- regulatory initiatives among others. There are measures that organizations are supposed to be implemented to mitigate the risks. One, it is for the organization to accept, to acknowledge that a risk exists.

Every time we want to solve our problems entirely, we must accept that they are there and make the necessary decisions and efforts to control it without sugarcoating it. From there, a program or a project might be put in place. The second step is to adjust programs to reduce these risks (Jayson, 2014). These programs must be very flexible to accommodate changes in funding and other technical requirements. The third measure is to implement actions that can reduce the likelihood of the risk. If people keep on making decisions and they are not implemented, then the projects made

can turn out just to be useless. The fourth measure is transfer. It is good to transfer the responsibility and authority to a different stakeholder who can accept to take these risks. Not many people can take risks for the fear of failure and the fear of getting on the negative side of the law (Subramanian, 2008). 5 PRIVACY Transferring this risk to ready people who can handle them can really help. Lastly, it is good to monitor the effects of this risks and measures to the environment. It is imperative to do impact assessment on the nature.

If the effects are very negative, then people can think of changing the direction of managing it. 6 PRIVACY References Verlag, G. (2012). Investigation of internet privacy issues within social networking. S. l. : Grin Verlag. Jayson, S. (2014, March 12). Social media research raises privacy and ethics issues. USA Today. Retrieved October 5, 2014, from http://www. usatoday. com/story/news/nation/2014/03/08/data-online-behavior- research/5781447/ Subramanian, R. (2008). Computer security, privacy, and politics current issues, challenges and solutions. Hershey PA: IRM Press