Question

In: Operations Management

1- Do students believe that there are sufficient protections for privacy in law? If not, what...

1- Do students believe that there are sufficient protections for privacy in law? If not, what are possible methods of developing appropriate privacy protections? (2)

(l want short answer)

Solutions

Expert Solution

Indeed, even with the selection of legitimate and different securities, infringement of protection stay a worry. In numerous nations, laws have not stayed aware of the innovation, leaving critical holes in assurances. In different nations, law implementation and knowledge offices have been given critical exclusions. At long last, without sufficient oversight and requirement, the unimportant nearness of a law may not give satisfactory security. Enormous scope corporate information breaks and unseemly utilization of individual information appear to happen all the more regularly. It is a higher priority than at any other time that laws made to ensure us give clear, reachable principles for security insurance, and rouse information handlers to improve best practice. Enactment should likewise be innovation unbiased, so it supports enduring assurance of individual information without hurting the foundation of the Internet. All around made administrative arrangements will ensure clients, consider the developing idea of innovation, and support valuable and useful advancement.

Techniques to guarantee security:

A decent security law should:

1)   Require Privacy-by-Design: Require security by-structure, from the beginning, when new items or administrations are created. Security by-structure incorporates standards, for example, information minimization, away from of planned use, and cutoff points on sharing and maintenance.

2)   Promote Clarity: Require plain language on all security related understandings, to guarantee clients can give educated assent dependent on a genuine comprehension of what will be shared, how, and with whom.

3)   Enforce Privacy Protection: Ensure that security guideline can be successfully implemented, and that information handlers are responsible for their security rehearses. Expect protections to improve information security by and large, in light of acknowledged best practice.

4) Strengthen Oversight and Enforcement: Undergo customary audit to guarantee that the law stays important and fit for reason, gives authorizes and solutions for protection infringement, and urges organizations to be straightforward about consistence.

5)   Give Users Control: Give clients viable power over their own protection, requiring information handlers to give clients more noteworthy command about whether, and how, individual information is shared, including the capacity to quit. On the off chance that clients select to share information, the law should empower them to demand its evacuation later. Also, if clients quit sharing, this ought not pointlessly limit their entrance to administrations.

6)   Increase Accountability: Require straightforwardness and responsibility for security practices and breaks. In the case of something turns out badly, information handlers must be considered responsible and give a valiant effort to contain the mischief, give fitting help to help those influenced, and guarantee convenient notice of any infringement.


Related Solutions

How do you define privacy? Do you believe privacy is a moral right? Why or why not?
  How do you define privacy? Do you believe privacy is a moral right? Why or why not? Are there any cases in which public health policy justifies the violation of the right to privacy?
1) Why do economists believe it is better to trade than to remain self-sufficient? Is this...
1) Why do economists believe it is better to trade than to remain self-sufficient? Is this always true? Explain in detail. 2) Explain the principle of opportunity cost and provide a detailed example.
Since Pennsylvania has little specific statutory law on AID (artificial insemination by donor}, what protections do...
Since Pennsylvania has little specific statutory law on AID (artificial insemination by donor}, what protections do you recommend for parents and donors?
2. Is competition in privacy sufficient to protect users? Facebook and online Privacy. business and its...
2. Is competition in privacy sufficient to protect users? Facebook and online Privacy. business and its environment
Should the law give greater protections to workers in the workplace or should the law be...
Should the law give greater protections to workers in the workplace or should the law be changed to give employers more flexibility in hiring and firing? Please provide detailed support for your answer.
4. Do you believe the major employment laws offer sufficient protection for all workers in the...
4. Do you believe the major employment laws offer sufficient protection for all workers in the United States? Why or Why not? 5. How do performance appraisal and selection complement each other? How are these two very important processes dependent on each other?
What is the Family Educational Rights and Privacy Act (FERPA)? Why was it passed into law?...
What is the Family Educational Rights and Privacy Act (FERPA)? Why was it passed into law? How does it affect the IT part of an organization? (150+ words, please)
What role do you believe local law enforcement should play in emergency management (for example, in...
What role do you believe local law enforcement should play in emergency management (for example, in an exposure to a deadly virus)? Think of any emergency and apply the concept of emergency management to the role of law enforcement.
What do you believe is the current immediate threat in malware? and What do you believe...
What do you believe is the current immediate threat in malware? and What do you believe will be the most threatening malware or attack-vector in the next few years?
Research on the Internet and discuss the following: What role does data privacy law play in...
Research on the Internet and discuss the following: What role does data privacy law play in helping to promote an ethical way of thinking about data and analytics? Compare and contrast the European Union’s General Data Protection Regulation to the United States’ privacy laws. As an American citizen, would you prefer to have the stricter privacy laws that the European Union has implemented? Explain your reasoning.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT