Journal #3

When a company is in possession of personal information about a customer, such information has a duty of confidentiality toward both the company and the customer. It is immoral for hackers and thieves in today’s environment to try to steal information such as medical records, credit card information, Social Security numbers, and other personal information. The four ethical difficulties are as follows, however: Concerns have been expressed over the accuracy of the data, the level of privacy and confidentiality, the rollout of the system, and the number of security breaches. The first step in providing you with a choice is protecting your privacy and providing you with the opportunity to either approve or disapprove of the creation of information. People are able to make decisions for themselves regarding whether or not they wish to give up control of their personal information and the privacy that is linked with it. The second thing that people want to prevent as much as possible is a breach in security. This is especially the case when a company is in possession of sensitive information, such as information on individuals. In the event of a breach, the private information of an individual runs the risk of becoming accessible to third parties who do not have that individual’s permission to get the information. Firewalls are set up so that the stored data can be safeguarded against unauthorized access. You can further boost your level of safety by performing regular upgrades, such as changing your passwords and downloading the most recent patch, as well as other similar actions. You would want to double-check their entries so that they don’t screw up someone else’s information and allow the possibility of error. Third, the correctness of the data is vital and has to be reviewed periodically in order to ensure that everything is in working order. The majority of the time, data is lost during the process of transferring it from one electronic device to another, including mobile devices, computers, and laptops. If someone deliberately enters erroneous information, then that person will be charged and will be sent a bill. This will cause chaos for the person who does not have the money to pay the payment because they will not be able to pay the bill. In conclusion, system deployment frequently yields positive outcomes in terms of the protection of data, but there are still opportunities for error in areas such as the confidence of customers, concerns about safety, and frustration among suppliers.

Leave a Reply

Your email address will not be published. Required fields are marked *