.

Thursday, May 2, 2019

Depersonalization as a method of representation and protection of Research Paper

Depersonalization as a method of theatrical performance and protection of personal information - Research Paper ExampleComputers and the Internet paved the way for much efficient and fast methods to gather, store and organize personal information. Since the 1970s the subject of computer data banks or databases became staggering. There are the databases from Social Security Administration, Federal Bureau of Investigation, Medical Information Bureau, state flagitious justice systems, municipal data systems, credit card companies, telephone companies, Medicaid, and, recently, Google, Facebook and so much more. The huge heart of information that governments and businesses collect from individuals have become a cause of concern. Personal data collection encroaches on the individuals right, particularly as it invades privacy or the right to control information closely ourselves there is a disclosure of private personal facts and, the information can be used in such a way that a pers on is cast in a bad slack or in a case of identity theft. The method of personal data collection, its use and security, hence, direct citizen protection. Through the years, laws have enacted that aim to protect personal privacy but they appear to be insufficient. This writing will explore depersonalization as an effective method of personal data collection, where privacy is all the similar protected. ... 3. Access or the level of access provided to individuals on the gathered data about them. 4. Security or the responsibility of data gatherers to provide adequate protection for the information collected (Bidgoli 2004, 98). Based from these principles, a number of laws were enacted dream uping individual privacy across different sectors. For instance, the Gramm-Leach-Bliley Act protects personal banking information the Fair belief Reporting Act provides the framework for handling personal credit data. There are also laws that cover the collection and use of medical and health data, government records, childrens privacy, and so forth. Laws are also enacted in other countries such as the European Union Data Protection Directive, the OECD privacy guidelines adopted by countries such as Mexico, Australia, Japan and Czech Republic (Conrad, Misenar and Feldman 2012, 401). But these laws and even some ethical guidelines (see Kluge 2000), no matter how specific and comprehensive, still fail to address privacy issues. Neubauer and Kolb (2009), for example, noted that approaches and methods for protecting privacy often do not comply with legal requirements or basic security requirements without suffering any penalty, (7). Szeto and Miri (2007) revealed the same findings when they studied the Canadian experience. According to Hildebrandt and Gutwirth (2008), this is because most statutes builds on traditional ways of thinking data, personal data and their abuse, without understanding or recognizing the new type of knowledge that result from modern data processing (321). It was march on argued that even when recent or updated laws were effective regarding personal data, they are still not equipped to dish with correlated data, which is persistent today

No comments:

Post a Comment