Privacy and Surveillance Summary

All the important information in the company is stored in a computer on a hard drive. Hard drives have moving parts so therefore like all the other things that are movable, the parts of the hard drive will eventually wear out (Brankovic & Estivill-Castro 1999). A copy of the information must also be kept in other storage areas. There is much data that is being stored in a computer system. The user should be able to decide what his back-up system will be. There are other options available like a CD and the USB flashdisk.

As long as the original CD is available for the software of the computer, there will be no need to back up the entire programs themselves. The operating system should not be backed up (Samuelson 1991). The data files must be included in the back-up. The important data that should have back-ups are databases, inventory control, customer databases, internal memorandums and files and other pertinent information to the company or organization (Kling et. al. , 1996). Having a back-up plan will reduce and control the risk of the information stored by the company.

The employees play significant roles in the security of the company (Milberg et. al. , 1995). Many of these employees do not yet understand the perils of using USB drives. The leakage of data have been one of the major issues in the business world as many companies have already experienced theft of confidential information in their laptops or leakage due to the lapse in security. Several cases have also seen information being uploaded on the Internet (Clarke 1999).

The spread of the Internet worms have already died down because it has become less popular with those who hackers to favor the use of bot software. Other software and attack tools have also be used to put the computers under a compromising situation with focus on profits (Meeks 1999). Those malicious coders have targeted companies using programs like the Trojan horse that are usually attached to USB drives and e-mails to steal confidential information (Weisband & Reinig 1995).

Information security must be strengthened to maintain the privacy of company data and prevent the leakage of valuable information. References Brankovic, L. & Estivill-Castro, V. (1999). “Privacy issues in knowledge discovery and data mining”, in Proceedings of the Australian Institute of Computer Ethics Conference, Lilydale, July 1999, pp 91- 99 Clarke, R. (1999). “Internet privacy concerns confirm the case for intervention”, Communications of the ACM, 42(2), pp. 60- 67 Kling, R. , Ackerman, M. S. and Allen, J. P.

, (1996) “Information Entrepreneurialism, Information Technologies, and the Continuing Vulnerability of Privacy”, in Computerisation and Controversy Value Conflicts and Social Choices, Kling, R. (ed. ) San Diego, Ca: Academic Press, Inc. pp 727-743. Meeks, B. N. (1999). “The Privacy Hoax”, Communications of the ACM, 42(2) pp. 17- 19 Milberg, S. J. , Burke, S. J. , Smith H. J. , & Kallman, E. A. (1995). “Values, personal information, privacy and regulatory approaches”, Communications of the ACM, 38(12), pp 65- 74