Everyone has the right to privacy. This is the right to not have details about our lives to be held or circulated without our knowledge/consent. Data of personnel nature are collect every so often by organisations.

Authors Avatar

Chapter 13 – Protecting Data

Issues of Privacy

Everyone has the right to privacy. This is the right to not have details about our lives to be held or circulated without our knowledge/consent. Data of personnel nature are collect every so often by organisations. For example:

  • Employers hold personnel records that include data on address, age, qualification, salary, sick leave and so on.

  • Stores hold detail on credit card payment, accounts history, items purchased;

  • Banks hold details on salary, income and withdrawals, direct debits to various organisations;

  • Insurance companies hold detail on property, cars, accidents, claims and health.

This list is endless. Modern technology has made it possible to store vast quantities of data, so that it can be viewed from all over the world and so that it can be used to create a profile of an individual.

Threats to information Systems

Organisations can protect the integrity of data (by preventing inaccurate data entry, malicious or accidental alteration), and simple measures can be taken to protect the security of data form theft or destruction.

Data Integrity

This refers to the correctness of data. The data held on a computer may become incorrect, corrupt or of ‘poor quality’. This could happen at different stages of data processing.

  1. Errors in the Input. Data may be keyed in wrongly.
  2. Errors in Operating Procedure. An update program may be ran twice in error, thus the master file would be updated twice.
  3. Program errors could lead to corruption of files. A new system may have errors in it which may not surface for some time, but they may be introduced during program maintenance.
Join now!

Standard Clerical procedures

To protect against input and operating, procedures can be documented and followed for both input and output.

Input

  • Data entry must be limited to authorized personnel only
  • In large volume data entry, data may be verified (keyed in twice), to guard against keying errors
  • Data control totals must be used wherever possible to verify the completeness and accuracy of the data, and to guard any copying/duplication or illegal entry.

Output

  • All output must be inspected for reasonableness and any inconsistencies investigated.
  • Printed output containing sensitive information should be shredded ...

This is a preview of the whole essay