Preview

Personally Identifiable Information

Good Essays
Open Document
Open Document
908 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Personally Identifiable Information
Information gathering, through networking, social media, and both on and offline storage have made it easier to collect information about an individual than ever before, with many concerns having arisen over the years about privacy and the ability to protect that privacy. As debates over personally identifiable information continue, one cornerstone remains a constant, ethics. Ethics are defined as “the standard by which human actions can be judged right and wrong (Online, 2012)”, but even that can be debated when discussed within the realm of information technology. Have you ever been to an internet shopping site and “trusted” the secure connection? Essentially, you are entrusting an inanimate system developed by an individual or group of them that may or may not believe in an ethical code. Knowing this, could there be an adverse impact on you or someone you know through personally identifiable information? Theft has been around since recorded history began. It is not new a new way of thinking, but the manner in which it can happen has drastically changed with the technological advancements of society. If someone stole something from you or your family it was a physical act, but in the world today you can have your entire life stolen and not even be in the same country. Finger prints, medical records, a social security number and even just a name are forms of personality identifiable information that can be stolen. While some forms of information alone are not enough to cause harm, some can be devastating and can often be found where you would least expect them. The U.S. Department of Homeland Security Handbook for Safeguarding Sensitive Personally Identifiable Information says “an individual’s SSN might be available in a public record maintained by a local court. (Security, 2012) ” The court is doing nothing wrong by maintaining this record, but it might be viewed that ethically holding it as a public record compromises that individual. While there is


References: Articles.CNN. (2001, November 7). Retrieved from CNN.Tech: http://articles.cnn.com/2001-11-07/tech/snoopware.idg_1_spyware-products-pc-security-hacker?_s=PM:TECH Cellucci, L. W. (2011). Integrating Healthcare Ethical Issues Into IS Education. Journal of Information Systems Education. Online, E. B. (2012). www.reference.com/browse/ethics. Retrieved from www.reference.com: www.reference.com/browse/ethics Richardson, S. K. (2011). Electronic Medical Records and You. PT in Motion, 47. Security, U. o. (2012, March). Department of Homeland Security. Retrieved from Department of Homeland Security: http://www.dhs-privacy/safeguardingsensitivepiihandbook-march2012.pdf

You May Also Find These Documents Helpful

  • Powerful Essays

    References: Grebner, L. A. (2009). Ethics case studies for health information management. Clifton Park, NY: Cengage.…

    • 1161 Words
    • 4 Pages
    Powerful Essays
  • Good Essays

    In today’s society, technology has made countless advances skyrocketing towards the future. Thus the arguments about whether or not security is needed for this amount of power. There are many good aspects of the internet; including social media, messaging, games, and even dating. But, with these things, comes bad that we don't know much about; including catfishing, tracking, and also spying. With the click a button, everything done online can be seen by anyone.…

    • 974 Words
    • 4 Pages
    Good Essays
  • Better Essays

    Rtyn

    • 5264 Words
    • 22 Pages

    Spinello, Richard A. (1997). Case Studies in Information and Computer Ethics. Upper Saddle River, NJ: Prentice Hall.…

    • 5264 Words
    • 22 Pages
    Better Essays
  • Better Essays

    Data has become a prominent source for information about people to be discovered over the past few years. While the collection of personal data is no immediate harm to anyone, it becomes an issue when the data is used for malicious purposes. This includes spying and tracking people based on their internet history. Furthermore, data can be used by police forces to predict crimes and their victims before they occur. Although this may seem like a flawless idea, it can have harmful side-effects, such as removing the opportunity for decisions to be made by the person.…

    • 1537 Words
    • 7 Pages
    Better Essays
  • Good Essays

    This paper will explore two information technology acts; along with what ethical issues and information technology advances that caused the acts to be in place. The two acts that will be covered will be the electronic funds transfer act of 1978, and the children’s internet protection act of 2000. According to Rainer and Cegielski (2011) “Ethics refers to the principles of right and wrong that individuals use to make choices to guide their behaviors. Deciding what is right or wrong is not always easy or clear-cut. For this reason, many companies and professional organizations develop their own codes of ethics. A code of ethics is a collection of principles that is intended to guide decision making by members of the organization”.(Chapter 3, Ethics, Privacy, and information security).…

    • 640 Words
    • 3 Pages
    Good Essays
  • Better Essays

    Federal Tort Claims Act

    • 1331 Words
    • 6 Pages

    Assistant Secretary of Defense for Homeland Defense and America 's Security Affairs. (n.d.). Retrieved September 22, 2004 from http://policy.defense.gov…

    • 1331 Words
    • 6 Pages
    Better Essays
  • Good Essays

    Privacy is a fundamental moral right in a democratic society. It is the right bestowed upon individuals that strengthen the freedoms of speech, press, association, and assembly which are crucial for a free, democratic society. However, advancement in technology threatens privacy and autonomy which reduces the control over private data and exposes individuals to undesirable consequences. Thus, a loss of privacy leads to a loss of an individual’s freedom in society.…

    • 1755 Words
    • 8 Pages
    Good Essays
  • Good Essays

    Information Acts Paper

    • 418 Words
    • 2 Pages

    Technology advancements made it necessary to protect everyone’s privacy since it had become much easier to store and access an individual’s personal data within a corporation’s database. According to our text: “privacy is the right to be left alone and to be free of unreasonable personal intrusions. Information privacy is the right to determine when, and to what extent, information about yourself can be gathered and/or communicated to others (Rainer & Cegielski, 2011, pg. 79). Identity theft has become a very serious issue since technology advancements have made it easier for criminals to commit Identity Theft or allow companies to track one’s habits and create a personal profile of a consumer within seconds.…

    • 418 Words
    • 2 Pages
    Good Essays
  • Better Essays

    Purtilo, R., & Doherty, R. (2011). Ethical dimensions in the health professions (5th ed.). St.…

    • 1081 Words
    • 5 Pages
    Better Essays
  • Better Essays

    Nursing Research

    • 1568 Words
    • 7 Pages

    Purtilo, R., & Dohorty, R. (n.d.). Ethical Dimensions in the Health Professions (Fifth ed.). Elsevier Saunders. Retrieved May 11, 2013, from http://evolve.elsevier.com…

    • 1568 Words
    • 7 Pages
    Better Essays
  • Good Essays

    Communication Modalities

    • 1870 Words
    • 8 Pages

    References: Goldberg, I. (2000). Electronic medical records and patient privacy. Health Care Manager, 18(3), 63-69. Retrieved from EBSCOhost.…

    • 1870 Words
    • 8 Pages
    Good Essays
  • Better Essays

    Evolution of Health Care

    • 1007 Words
    • 5 Pages

    References: Bates, D.W. (2005, September). Physicians And Ambulatory Electronic Health Records. Health Affairs, 24(5), 1180-1189. doi:10.1377/hlthaff.24.5.1180…

    • 1007 Words
    • 5 Pages
    Better Essays
  • Powerful Essays

    According to identityguard.com, identity theft is defined as, "when someone uses your name or personal information to open a credit account, take out a loan, or make a major purchase. And if they can do it once, they can do it repeatedly, using each new account as a reference for the next one. The result is that identity thieves can run up thousands of dollars worth of charges or obligations all in your name." In our current society, since there have been a great deal of technological advances made, it is easier than ever for a common criminal to steal a social security number, a bank account number, or any other piece of information which could help a criminal gain access to ones personal finances. Identity thieves can retrieve vital information in many different ways. They can look through your trash at home or at work and retrieve a discarded bill, a piece of mail, or a credit application. They can intercept your mail…

    • 2175 Words
    • 9 Pages
    Powerful Essays
  • Satisfactory Essays

    Of this week’s reading by Julia Angwin draw on her observation and experience that highlights how the technology we use every day to converse, could easily be used against us by interfering with our privacy .Because our privacy is not really private, it could it up hurting up as well, Angwin found this to be true when Face book decided to change its policy, which made it possible for people to see you friends list even if you had a private account. As a result, not only was her life in danger but everyone she communicates with.…

    • 261 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Contemporary information systems technology, including internet technologies, challenges traditional regimens for protecting individual privacy and intellectual property. Data storage and data analysis technology enables companies to easily gather personal data about individuals from many different sources and analyze these data to create detailed electronic profiles about individuals and their behaviors. Data flowing over the Internet can be monitored at many points. The activities of website visitors can be closely tracked using cookies and other web monitoring tools. Not all websites have strong privacy protection policies, and they do not always allow for informed consent regarding the use of personal information.…

    • 385 Words
    • 2 Pages
    Good Essays