Preview

Personal Identifiable Information (Pii)

Best Essays
Open Document
Open Document
3978 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Personal Identifiable Information (Pii)
-------------------------------------------------
Personal Identifiable Information (PII)

Introduction & Background
This paper will discuss Information Technology (IT) and how there is value in the philosophy about ethical issues related to IT, chiefly, though not completely, issues concerning individuality and identity management, unequivocally in terms of respect for individual privacy and the responsibility of operators who access such personal identifiable information (PII) and understand the core values of IT ethics (Dillon, 2010).
The problem to be investigated in this paper is the challenges associated with the ethical usage of Information Technology (IT) within modern corporations and the mitigating factors associated with protecting Personal Identifiable Information (PII) within society.
Many scholars claim that societies are changing due to the advancements of IT. Their primary argument is that IT is creating ethical challenges to organizations and societies (Brooks, 2010). The ethical challenges associated with IT consist of privacy violations, job reductions, personal gain, security related issues, intellectual property, fraud, etc. Brooks (2010) found that the challenges of IT (when referring to PII) is stemmed from the lack of ethical standards, while (Cone, 2008) claims that the challenges of IT is caused by the lack of social responsibility. The principle of social responsibility is that everyone within the organization (in this case we will call it XYZ Company) has the responsibility to maintain the welfare of the privacy information at their fingertips (Jennings, 2012). In contrast, the lack of computer ethics is causing societies to change due to the advancements of IT and the violations associated with the lack of computer ethics (Brooks, 2010). Computer ethics was first identified in the early 1950s, but due to the lack of proper training in the IT field in the 1950s, the topic of computer ethics was ignored. Roughly



Bibliography: Data Breach Cost Part one: risks, costs and mitigation strategies for data breaches. (2011, Sept). Retrieved Jul 19, 2012, from Zurich American Insurance Corporation: www.zurichna.com Cost and Budget Estimators Chatterjee, S. (2008). Unethical behavior using information technology. Washington State University , College of Business. Ann Arbor: ProQuest LLC. Desai, M. S., & von der Embse, T. J. (2008). Managing electronic information; an ethics perspective. Information Management & Computer Security, 16(1), 20-27. doi:10.1108/09685220810862724 Dillon, R Federal Reserve Bank of Atlanta. (2008, Sep). Retrieved Jul 18, 2012, from Federal Reserve Bank of Atlanta: http://www.frbatlanta.org/ Friedenberg, M Griffiths, M. (2010). Internet abuse and internet addiction in the workplace. Journal of Workplace Learning, 22(7), 463-472. doi:10.1108/13665621011071127 Hardy, Q Mullane, J. V. (2002). The mission statement is a strategictool: when used porperly. Management Decision, 40(5), 448-455. Retrieved August 9, 2012 National Institute of Standards and Technology (NIST) Sandford, P., Parish, D. J., & Sandford, J. M. (2007, Apr). Understanding Increasing Traffic Levels for Internet Abuse Detection. Security Journal, 20(2), 63-76. doi:http://dx.doi.org.proxy1.ncu.edu/10.1057/palgrave.sj.8350051 Schweitzer, M US Identity Theft Solutions, LLC. (2012). Business Risks. Retrieved Jul 18, 2012, from US Identity Theft Solutions, LLC: http://www.usidtsolutions.com/risks.html Wilbanks, L

You May Also Find These Documents Helpful

  • Powerful Essays

    Mgt7019-5 It Challenges

    • 3406 Words
    • 14 Pages

    |Moor, J. H. (2001). The Future of Computer Ethics: You Ain’t Seen No thin’ Yet! Ethics |…

    • 3406 Words
    • 14 Pages
    Powerful Essays
  • Better Essays

    Cmgt 400 Week 2

    • 1100 Words
    • 3 Pages

    Whitman, M. E. (2011). Readings and Cases in Information Security: Law and Ethics. New York, NY: Cengage Learning.…

    • 1100 Words
    • 3 Pages
    Better Essays
  • Better Essays

    Whitman, M. E., & Mattord, H. J. (2011). Readings and cases in information security: Law and ethics. Boston, MA: Course Technology.…

    • 1432 Words
    • 5 Pages
    Better Essays
  • Good Essays

    The following assignment is part of the requirements for IT Organizational Behavior (CMGT/530). This Statement of personal ethics is part of the required coursework needed to complete the program for a Master’s degree in Information Systems at University of Phoenix.…

    • 1018 Words
    • 5 Pages
    Good Essays
  • Powerful Essays

    * Culnan, Mary J. and Williams, Cynthia C. 2009. "How Ethics Can Enhance Organizational Privacy: Lessons from the ChoicePoint and TJX Data Breaches," MIS Quarterly, (33: 4) pp.673-687.…

    • 2180 Words
    • 9 Pages
    Powerful Essays
  • Satisfactory Essays

    References: Bott, F. (2005), Professional Issues in Information Technology, The British Computer Society, Wiltshire. Data Protection (n.d.), http://www.bcu.ac.uk/health/research/ethics-and-indemnity/ethicsapplications/data-protection. Accessed: 05/01/2013. Lee, M. (2012), ‘Professional Computing module’, http://www.cs.bham.ac.uk/ mgl/profcomp/lectures/. Filetype: Pdf, Accessed: 02/01/2013.…

    • 434 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    This paper will explore two information technology acts; along with what ethical issues and information technology advances that caused the acts to be in place. The two acts that will be covered will be the electronic funds transfer act of 1978, and the children’s internet protection act of 2000. According to Rainer and Cegielski (2011) “Ethics refers to the principles of right and wrong that individuals use to make choices to guide their behaviors. Deciding what is right or wrong is not always easy or clear-cut. For this reason, many companies and professional organizations develop their own codes of ethics. A code of ethics is a collection of principles that is intended to guide decision making by members of the organization”.(Chapter 3, Ethics, Privacy, and information security).…

    • 640 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    This paper will look at the ethical issues and use of Personally Identifiable Information, commonly known as PII, in computer systems, applications, and the internet. We will discuss what PII is and how it is used. There will be information on why Personally Identifiable Information is used and what can happen if it is misused. We will also discuss and look at some sample polices from the government and other large companies that address the use and safeguarding of Personally Identifiable Information. The next section will discuss what you can do to protect your Personally Identifiable Information. Finally we will look at how everything discussed can affect you and who is ultimately responsible for protecting Personally Identifiable Information.…

    • 2169 Words
    • 7 Pages
    Powerful Essays
  • Powerful Essays

    Ethics

    • 7367 Words
    • 30 Pages

    Welcome to a new session of study at Charles Sturt University. The aim of this subject is to understand and examine a wide range of ethical and professional practice issues and concepts in the information and communication technology (ICT) field. The different types of widely used policies, the mechanisms that implement these policies and the principles underlying both policies and mechanisms will be examined. The ethical implications will also be explored, particularly with respect to privacy. Aspects of information technology (IT) professional practice will be investigated. The students will be also introduced to ethical issues and concepts. Specific topics will include ethical theories, organisational ethical codes and conducts, ethical and social issues such as privacy, intellectual property, the digital divide, and employment in an ICT-dependent work environment.…

    • 7367 Words
    • 30 Pages
    Powerful Essays
  • Powerful Essays

    When pertaining to ethics it is defined as the principles of right and wrong that individuals, acting as free moral agents, use to make choices to guide their behaviors. Prentice Hall states, “This is truer today than ever due to the challenges posed by the Internet and electronic commerce to the protection of privacy and intellectual property.” Along with this there are more ethical issues that are raised by the broad use of information systems, which include establishment of accountability pertaining to the consequences of information systems, establishing a thorough defense system which protects individuals, and securing values considered essential to the quality of life in an information society. Any business or large company, should be trained on being able to effectively deal with any issues. Firm technologies have made clear ways to assemble, integrate, and distribute information in the protection of personally identifiable information. Examples of these are; if you work in a career field such as finance or accounting, ensure that the information systems used are protected from computer fraud and abuse. In the field of human resources, developing and enforcing an ethics policy and providing special training to sensitize workers to new ethical issues that pertain to information systems. In the information systems field, the insurance of making management aware of the ethical implications of the technologies used and…

    • 1482 Words
    • 6 Pages
    Powerful Essays
  • Good Essays

    Anyone who uses computer technology today accepts the fact that their Personally Identifiable Information (PII) may or could be transmitted, collected, and used to benefit the one who receives that information. It is our responsibility to know what PII transmissions are being made available for public use over the web. Understanding all the aspects of PII and the approaches that are to be taken to protect our privacy will make us more aware of PII. As we continue to utilize the technology available, we expose ourselves to become donors of PII. Having knowledge of what PII is and how information is being compiled to identify our interest is necessary when accessing computer technology of today.…

    • 1078 Words
    • 5 Pages
    Good Essays
  • Better Essays

    Assignment B1 1

    • 866 Words
    • 4 Pages

    This assignment gives you an opportunity to analyze a key IT-related organizational ethical privacy issue subject to relevant laws, regulations, and policies. Both of the following sites provide sources and an excellent backdrop for issues relating to privacy protection and the law.…

    • 866 Words
    • 4 Pages
    Better Essays
  • Good Essays

    Life is about change; your ability to cope with and adapt to change will, on some level, define your capacity for success. Rapid continual change has been the theme of business since the onset of the digital revolution, also known as the new industrial revolution, which began around the mid to late twentieth century (Satell, 2014). The digital revolution sparked the inception of what is commonly referred to as the Information Age (Razin, 2016). Living and working within the Information Age has presented many unique ethical and practical challenges. Invasion of privacy has become one of the more hot button ethical debates that has risen as result of “at your fingertips” technology (Forbes, 2008). This paper will debate the ethical dilemma that…

    • 910 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    Laudon Mis 6ce Ch04

    • 13171 Words
    • 61 Pages

    4) Ethical issues in information systems have been given new urgency by the rise of the Internet and electronic commerce.…

    • 13171 Words
    • 61 Pages
    Satisfactory Essays
  • Powerful Essays

    Jennings, E. T., Jr., & Krane, D. (1998). IT ethics and standards. Policy Studies Review, 15(2-3), 170-201.…

    • 2523 Words
    • 11 Pages
    Powerful Essays

Related Topics