logo

Cyber Intelligence Sharing and Protection Act

   

Added on  2020-05-28

6 Pages1944 Words44 Views
1Online Privacy

2To check whether the personal information of the users using loyalty cards is handled in accordance to the Privacy Act 1988 recently, the Australian Privacy Commissioner released few loyalty programs. The two loyalty programs were assessment of Coles and Woolworth’s.An individual should be aware of the information he shares and the acts of privacy when he sign up for loyalty programs[ CITATION Gov16 \l 16393 ].Privacy can be defined as the right of an individual to get freedom from any sort of interference. It can also be defined as the right of an individual to see and maintain his personal information[ CITATION DCh14 \l 16393 ]. In accordance to internet, privacy is determined as digital privacy which ensures protection of an individual’s information which was created on the internet or by using it[ CITATION MQu15 \l 16393 ]. Some of the digital privacy laws are;Cyber Intelligence Sharing and Protection ActElectronic Communications Privacy ActTrans Pacific-Partnership AgreementComputer Fraud and Abuse Act[ CITATION BBu13 \l 16393 ]Australian Privacy Principles are defined under Privacy Act 1988 which involves an agency or an organisation. To fall under APP, an organisation should function with another business and must have a turnover of minimum $3 million. It should also be a credit reporting body or is a contracted service provider for a commonwealth. Along with this business which provides a health service are also included. The principles of Australian Privacy Principles are:1.Open and transparent management of personal information2.Anonymity and pseudonymity3.Collection of solicited personal information4.Dealing with unsolicited personal information5.Notification of the collection of personal information6.Use or disclosure of personal information7.Direct marketing8.Cross-border disclosure of personal information9.Adoption, use or disclosure of government related identifiers10.Quality of personal information11.Security of personal information12.Access to personal information13.Correction of personal information[ CITATION Aus17 \l 16393 ]Digital materials are basically data or information which is over the internet. Few major threats to these digital materials are,Keeping the data safe-As the storage media decomposes slowly, and hence the files gets corrupted and it gets very difficult to keep the digital material. Therefore, the storage media must be checked regularly

3and should be refreshed on a regular basis. The location of the stored digital materials must be recorded and checksum should be used to check whether any data is lost.Accumulating trust-For digital preservation, a user must have all the information about the lifecycle of his digital material. He should check that data integrity techniques and audit trails are used on hiss digital material[ CITATION Low17 \l 16393 ].Effective actions on time-Proper digital preservation activities should be applied to the digital material in time. For example, the choice of file format and the description of key relationships in the metadata should be done before time and must be effective. Efficient actions can minimise the loss of digital material and may also reduce the future actions taken to protect it.Keep the context of the data and its dependencies-Some of the data of the digital material depends on few related files, referenced fonts or pointers therefore; a user should have a proper knowledge of these dependencies. If he will know all the dependencies then the content can be retained easily thereafter[ CITATION AKi08 \l 16393 ].To ensure digital privacy few measures can be taken like, securing the email id, keeping a backup plan. The user should also know how to put passwords virtually, and how to browse anonymously. The user can also use few applications like Opera browser and Libre office instead of Chrome and Microsoft office. Also avoid using windows as according to a recent survey Windows has been on an alert of threat.While using the internet it’s better to turn on private browsing as it hides the IP address of thePC.A virtual private network which is a web proxy can be used as it routes the traffic by the usage of servers which are being operated by volunteers. While making credit card purchases,never share the zip code because with the help of zip code all the information of the user can be accessed.All the platforms like Facebook, Google and iCloud uses two-factor authentication. With this authentication, whenever a user logs into any of these platforms hey will have to enter a special code which the site texts on the user’s phone. This technique is time consuming but prevents other from accessing the account[ CITATION PMa16 \l 16393 ].Google also sets an alarm of an individual’s name and sends notification depicting the types of web pages an individual should search and the email address which is used. Facebook usesSupport Inbox with the help of which the data send by user remains encrypted. It also uses Secure Socket Layer to encrypt the login credentials and the chat conversations.All people do not need same level of privacy but the basic information privacy is a right of every individual. Big companies and the people who use credit cards and loyalty programs are more vulnerable to more privacy. People who regularly use their credit cards or who sign

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Online Privacy: Protecting Your Personal Data and Security
|8
|2203
|260

Modeling IT Ethics: A Study in Situational Ethics
|8
|2120
|54

IT Profession and Ethics: Importance of Online Privacy and Protection Measures
|8
|2043
|334

ITC 568 Assignment on Cloud Privacy and Security
|31
|6988
|278

Online Privacy Assignment 2022
|7
|2308
|31

Online Privacy
|9
|2065
|55