ePortfolio Entry #3

While it becomes more and more peoples standards to store data in different technological systems, there is a positively correlated rise in the the possible intrusion and theft of an individuals private data. Information breaches as well as irresponsibly storing someone’s data is a direct violation of the confidentiality, integrity, and availability the user trusted upon the organization. Four of the ethical issues that are made apparent while storing someone’s data consist of the inappropriate use of data, storing someone’s data for longer than necessary, selling a customer’s private information to a third party company, or possibly omitting information breaches that happen to include customers’ information. Neglecting and acting ignorantly around these ethical issues can and will result in the downfall of a business. In the discussion of ethical treatment of private data, ensuring the proper oversight is essential in confirming adequate systems are used to protect customers’ information. When communicating with customers, the company needs to be transparent and present easily understood principles and ethical scripts to their previous and potential customers. On a similar note, with the intention of creating a complete series of moral standards of how to act while in possession of someone’s electronic data, the company must identify current standing uses and decipher possible future uses of this information. In the scenario of an individual’s private data being collected or an individual storing someone else’s private data, these questions are and essential proper step in security. In what ways will this individuals data be stored, what users will have access to the data, and what security protocols are in place to keep this individuals information safe. A clear and concise informative and descriptive statement regarding security answering these important steps in organizational confidentiality will answer most to all inquiries of how someone’s data is being used, furthering the reliability and depth of an organizations reputation.

Leave a Reply

Your email address will not be published. Required fields are marked *