{"id":283,"date":"2022-12-10T02:24:43","date_gmt":"2022-12-10T02:24:43","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/kael-cepak\/?p=283"},"modified":"2022-12-10T02:24:52","modified_gmt":"2022-12-10T02:24:52","slug":"describe-four-ethical-issues-that-arise-when-storing-electronic-information-about-individuals","status":"publish","type":"post","link":"https:\/\/sites.wp.odu.edu\/kael-cepak\/2022\/12\/10\/describe-four-ethical-issues-that-arise-when-storing-electronic-information-about-individuals\/","title":{"rendered":"Describe four ethical issues that arise when storing electronic information about individuals."},"content":{"rendered":"\n<p>In cybersecurity, ethics is always a debate. There are four major ethical priorities for storing electronic information: privacy and confidentiality, security breaches, system implementation, and data inaccuracies. Justice Samuel Dennis Warren and Justice Louis Brandeis define privacy as the right \u201cto be let alone.\u201d Another way I would describe it is an individual\u2019s right to not give out information about themselves. If someone has their personal information stored online, then it should not be encroached upon by cyber specialists without proper authorization.<\/p>\n\n\n\n<p>Security breaches into shared databases threaten everyone\u2019s privacy on the internet. Someone\u2019s personal information may be made available to others without their consent which is a huge issue. It could be medical records, bank statements, or any type of federal document that isn\u2019t supposed to be public information. One example in particular has to do with hospitals. There have been many cases in which employees at a hospital use their position to illegally obtain and sell patients\u2019 private information. One incident at Howard University Hospital compromised over 34,000 patients&#8217; medical data.<\/p>\n\n\n\n<p>Many organizations face challenges in the course of system implementation. These challenges result in wasted resources, angry providers, and a loss of trust from current and potential clients. If it\u2019s clear that a company has difficulty setting up a network, who\u2019s to say they won\u2019t have difficulty maintaining it.<\/p>\n\n\n\n<p>Lastly, data inaccuracies are a huge ethical problem when it comes to information security. When storing information online, companies have to be especially careful because one mishap could tarnish their whole reputation. The loss or destruction of data happens frequently during data transfers. This can easily result in the misinput of data or even identity theft.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>In cybersecurity, ethics is always a debate. There are four major ethical priorities for storing electronic information: privacy and confidentiality, security breaches, system implementation, and data inaccuracies. Justice Samuel Dennis Warren and Justice Louis Brandeis define privacy as the right \u201cto be let alone.\u201d Another way I would describe it is an individual\u2019s right to&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/kael-cepak\/2022\/12\/10\/describe-four-ethical-issues-that-arise-when-storing-electronic-information-about-individuals\/\">Read More<\/a><\/div>\n","protected":false},"author":24734,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wds_primary_category":0},"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/kael-cepak\/wp-json\/wp\/v2\/posts\/283"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/kael-cepak\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/kael-cepak\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/kael-cepak\/wp-json\/wp\/v2\/users\/24734"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/kael-cepak\/wp-json\/wp\/v2\/comments?post=283"}],"version-history":[{"count":1,"href":"https:\/\/sites.wp.odu.edu\/kael-cepak\/wp-json\/wp\/v2\/posts\/283\/revisions"}],"predecessor-version":[{"id":284,"href":"https:\/\/sites.wp.odu.edu\/kael-cepak\/wp-json\/wp\/v2\/posts\/283\/revisions\/284"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/kael-cepak\/wp-json\/wp\/v2\/media?parent=283"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/kael-cepak\/wp-json\/wp\/v2\/categories?post=283"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/kael-cepak\/wp-json\/wp\/v2\/tags?post=283"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}