logo

Importance of Privacy and Digital Security in Information Technology

   

Added on  2023-04-21

9 Pages2079 Words382 Views
It Profession and Ethics
Laptop04072

1 | P a g e
Introduction
Information technology is used to store, retrieve and transmit the data. It is a subset
of information and communication technology. In this essay the importance of privacy and
its use in various sectors are discussed. The concept of digital privacy and ways to ensure
security are also discussed. From the analysis, it was found that it is the duty of an individual
to take care of all the information (Kangasniemi, Pakkanen & Korhonen, 2015). Information
technology has a very important concept that is security that assures that integrity, privacy
and availability of data is maintained. The comparison between law of European Union and
Australia are discussed. From the analysis it was also found that individual should bear the
responsibility of protecting their data. Privacy can be considered as a fundamental right of
an individual by allowing them to deal with the entire power imbalance. The privacy of
sensitive information means that data is been collected, stored and shared in an appropriate
way.4d
Privacy is a fundamental right that make sure that data is protected from all the
unwanted interferences and allows only valid user to access the data. It helps in establishing
the boundaries so that privacy is maintained. Privacy can be considered as a fundamental
right of an individual by allowing them to deal with the entire power imbalance. The privacy
of sensitive information means that data is been collected, stored and shared in an
appropriate way (Rendtorff, 2015). In general privacy is the ability to keep the data
protected and assure that security is not breached. It is important to maintain privacy of data
as it limits the power and gained by offering respect to an individual. It also enables people
to manage their reputations. It is important as it maintains autonomy and individuality of a
person. Privacy can be considered about an individual, an organisation or data

2 | P a g e
(Kangasniemi, Pakkanen & Korhonen, 2015). It also offers some functional benefits by
maintaining people in all social boundaries. Privacy offers a freedom to perform any social
or political activity without the fear of information being leaked. To be more presided digital
privacy is also important as cybercrimes and use of internet have increased. It takes into
account information privacy, communication privacy and individual privacy (Xia, Wang,
Zhang, Qin, Sun & Ren, 2016). The information privacy deals that all the information is
only accessed or modified by the valid user. There are privacy laws developed by all the
countries to regulate the collection and consumer information. The communication privacy
is also considered as a part of digital privacy it is concept that allow an individual to
communicate with each other digitally via a secure platform. Individual privacy on the other
hand is a right to access the data freely over the internet and takes care of all the unwanted
spams and viruses (Sulaiman, Zaharim, Mastor & Basri, 2016). Thus, privacy deals with
protecting the information offline also wherein digital privacy protects the personal
information over the internet.
If discussing the privacy of Australia many laws are enforced like Australian Law Reform
commission that takes in account digital privacy of the company. The privacy amendments
are updated every year and describe privacy remedies for serious issues (Parent, 2017). It
strengthens the functions to resolve complaints and use external services to promote
compliance. They also create new provisions for binding agencies and organisation and
making sure that integrity, confidentiality and availability is met. Australian privacy
principals manage all the personal information and keep the communication channels
transparent (Coulson, 2017). There are various issues related to the digital material like the
information can be accessed by an unauthorised user or anyone can modify the data in
between. Additionally, accessing the digital material can also lead to viruses in our system if
it is accessed from non-certified certificates (Lindell, Yehuda, 2018). There are various

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
IT Profession and Ethics
|7
|2127
|453

Modeling IT Ethics: A Study in Situational Ethics
|8
|2120
|54

Privacy Enhancing Technologies
|6
|1314
|15

The information law and society
|14
|3253
|21

Protecting Personal Information and the Existing Dilemma
|5
|937
|201

Cyber Security: Threats, Challenges, and Mitigation Strategies
|12
|3967
|307