Data privacy is the relationship between collection and distribution of data and the public expectation of privacy and the legal issues surrounding them. There are many policies and ordinance that protect our data, but the big question is who is in contro

Authors Avatar

Ananya Huria

Who will be responsible for your personal data and will you

have any control over how it will be used?

What is privacy? Privacy is the ability of individual and groups to determine for themselves when, how and to what extend information about themselves is shared with others. In today’s world where the rapid growth of technology is questioning the privacy of our personal and sensitive data, how do we make sure our data is secure? Data privacy is the relationship between collection and distribution of data and the public expectation of privacy and the legal issues surrounding them. There are many policies and ordinance that protect our data, but the big question is who is in control of these rules and regulations?

Privacy issues arise wherever personally restricted information is collected and stored. In this 21st century, most of us use databases to store information, and make our life easier. Data privacy issues can arise in response to information from a wide range of sources, such as: Hospitals storing health records, social networking sites like Face book, introduction of biometrics, identity cards and internet databases.

Join now!

Databases provide us with many benefits. They make our life easier; they are less time-consuming and also quite cheap in the longer run. In the hospitals and medical centers technology has enhanced medical care through electronic medical and genetic records. Exposures of these records have allowed the scientists to diagnose rare diseases.

However, there are many security issued linked with technology. How can personal data be secure when it is shared by numerous organizations? We can take the example of social networking sites. These sites are mostly used by the young generation, who live their lives in ...

This is a preview of the whole essay

Here's what a star student thought of this essay

Avatar

The document contains a number of grammatical errors throughout, mainly incorrect use of certain words e.g. ‘extend’ instead of ‘extent’. The writer has used the expected technical terms at this level of qualification; however, they should consider a more formal approach to the style of writing and consider using fewer rhetorical questions in order to make their point. This in turn will produce a more clear and concise piece of writing.

The writer has not considered or even mentioned IT legislation which governs the information over the internet, nor permission masks or security measures in place for public forums and social networking sites, and therefore has not demonstrated an appropriate level of analytical skills. The final paragraph contains statistics without any citations and further directs the user to external sources as referenced at the end of the document; however, no such references are included.

The student immediately defines online privacy in the introductory paragraph for this document, which is very helpful to the reader as it outlines what the essay is based on. The student goes on to describe modern issues surrounding data protection and website content management systems i.e. database-driven social networking sites which store sensitive information, and briefly mentions the advantages of implementing relational database management systems (RDBMS). However, the content of the document is largely one-sided towards fear of information storage and fails to discuss security measures in place to prevent unauthorised access of data. The consequence of this is an overly opinionated essay and therefore not an accurate representation of online privacy in reality.