Wednesday, May 15, 2019

Information Privacy and Electronic Privacy Essay

Information Privacy and Electronic Privacy - Essay precedentThis type of silence is however not limited to information stored in computer systems al whiz still in other electronic devices as hearty such as fax machines, mobile phones, telephones and even in emails. It pertains to any information that is transmitted or stored electronically in a digital manner.This reputation is going to focus on differentiating the two kinds of privacy mentioned above. Even though they seem interrelated, they have their deliver differences including differences in legislative acts governing them as well as their sources and the potential privacy breaches as well as what measures can be taken to ensure the information remains private unless it is absolutely needed for third parties to have such information (Eyob, 2009).Information privacy concerns information that is stored in records. This means that it covers sole(prenominal) the information that the owner has provided about himself or herse lf depending on where it was needed for example in hospitals it is the medical records or in financial institutions it is the financial records about transactions among others. However, when it comes to electronic privacy, it is concerned with not only the stored ain information but the information in transit as well. This therefore means information one has just sent to another and even the recipient has yet to receive it but it is intercepted mid-way.Information privacy is mostly breached by individuals and private institutions seeking information that can be sold in industrial espionage or to taint the name of an individual. People seeking this kind of information therefore hire hackers and spies to go through the physical and electronic records in storage containing the information they need about the individual. In electronic privacy, the information is mainly sought by the government and law enforcement institutions in order to incriminate an individual. This is the moderate ness they tap into conversations over the phone as well as

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.