Privacy And Information Security

Improved Essays
Privacy and information security is an important measure to protect vital information from wrong hands. Information and privacy has become a big concern for the government and private organizations which try to ensure that the citizen information or government confidential information are as secure as they can be. But how it is the information and privacy controlled? How do the government and private organization ensure that they are sharing the right information and no more than the supposed to? There are different regulations to protect the information shared and also to release the information that needs to be shared, the perfect examples are; Freedom of Information Act (FOIA), HIPPA, and Sarbanes-Oxley Act.
The first act we will talk about
…show more content…
The FOIA generally provides that any person has the right to request access to federal agency records or information except to the extent the records are protected from disclosure by any of nine exemptions contained in the law (US Department of State) Under the FOIA agencies must release any information that is requested unless that information is protected from disclosure by law. The FOIA also requires that agencies automatically disclosure certain information, including frequently requested records.
How does citizens request the information? Well, first of all, we have to keep in mind that submitting a request for information is not difficult, however, a complete, well-written letter or email submitted to the right agency may increase your chances of getting a satisfactory response and avoiding delays or the need for further correspondence. A written request will serve as evidence of the requested information, as any other professional request must have your name, your address and the date, also it is very important to be as specific as your knowledge of the available records will allow. But it is more important to describe the information you are
…show more content…
Finally, the Sarbanes-Oxley Act which is commonly refer as SOX is a legislative response to a number of corporate scandals that sent shockwaves through the world financial markets, some of the biggest issues involved companies such as enron, tyco and WorldCom that rattled investor confidence.
The Sarbanes-Oxley Act not only affects the financial side of corporations, but also IT departments charged with storing a corporation 's electronic records. The act is not a set of business practices and does not specify how a business should store records; rather, it defines which records should be stored and for how long. SOX states that all business records, including electronic records and electronic messages, must be saved for "not less than five years." The consequences for noncompliance are fines, imprisonment or both (Rouse)
Information Technology providers need to create and maintain corporate records in a cost-effective fashion that satisfies the requirements of SOX. The retention, periods of storage the non-destruction, alteration or falsification of records and best practices need to be considered to avoid big

Related Documents

  • Improved Essays

    This of course must occur through proper procedures and without the violation of constitutional law, which we discussed though the beginning of this research paper. The main reason for the establishment of the Bill of Rights is to protect the people against governments’ power. A search occurs “when and expectation of privacy that society is prepared to consider reasonable is infringed (Cox, McCamey, & Scaramella, 2014, p. 207). Law enforcement first and foremost must establish probable cause or reasonable suspicion to detain a person or seize someone’s property. A seizure of property occurs when there is some meaningful interference with and individual’s possessory interests in that property (Cox, McCamey, & Scaramella, 2014, p. 207).…

    • 935 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Argument Rule-Making

    • 555 Words
    • 3 Pages

    Therefore, all proposals must be supported by objective analysis, facts, and laws that are binding on the courts with solid evidence. The Administrative agencies' rulemaking discretion need to be in accordance with the enabling ordinances not to risk judicial investigations under 5 U.S.C. § 701(a) (2006) of the APA. The intended statutes need to be published in the Federal Register so the people of interest could examine the…

    • 555 Words
    • 3 Pages
    Improved Essays
  • Superior Essays

    Security and privacy are two important elements aimed at protecting information and ensuring that no external factors interfere with them. These two elements may be incorporated in any instance of life, from personal information all the way to corporate information. The National Security Agency considers these two elements as necessities to ensure protection of citizens against criminal activities and attacks. However, each of these elements is significant in its own way as they have difference in meaning. In the next discussion, we shall explore the reasons why security is more vital in comparison to privacy.…

    • 1120 Words
    • 5 Pages
    Superior Essays
  • Improved Essays

    Operations security or OPSEC is the process of protecting unclassified information that can be used against us. According to the Operations Security Professional’s Association, Operations security presents us with challenge of putting ourselves in the shoes of our threats from individuals, groups, other countries, foreign espionages, or organizations (Operations Security Professional’s Association). Operation security is primarily related to the military, but operations security can be related to the government or police stations as well as preventing home break-ins or preventing fraud. Operations security is important within a government or police station because it creates the mindset of thinking like your enemy or opposition in order to…

    • 1133 Words
    • 5 Pages
    Improved Essays
  • Improved Essays

    A third challenge would be the HIPPA violations that may arise from the confidentiality. These rules can elevate the status of private agreements but can be legally binding I the parents signing a written agreement. The fourth challenge is informing the patients of their legal rights with confidentiality. This would support the technology world with emails, texts, and conference calls. Like with any other rule to be explained there are rights transferring the emails and making sure the client and the psychologist has decent technology to help with keeping track of emails or texts.…

    • 1050 Words
    • 5 Pages
    Improved Essays
  • Superior Essays

    Data integrity ensures that data is ultimately accurate. This is important when trying to analyze data that is stored in the database or data warehouse. Inaccurate data will lead to false results in reporting and analytics that will affect any business decisions that need to be made. When dealing with data integrity, having the full or complete set of data is a necessity. If only half or some of the data is entered than it cannot be considered accurate.…

    • 1257 Words
    • 5 Pages
    Superior Essays
  • Great Essays

    Cybersecurity Case Study

    • 1801 Words
    • 8 Pages

    Privacy of individuals is protected by through proper measures and oversight. Bayuk, et al, emphasize the privacy issue and warn against “terse” responses and point out the potential for discriminatory behavior by the government and private entities. The bill would have encouraged information sharing as opposed to mandating it. In line with bayuk’s approach, the goal of the policy should be set to reduce cyber security risk and not to meet a goal that is set externally, such as compliance with regulatory or industry’s best practices, although once cyber security risks (in line with business needs) are established, external compliance considerations can be easily achieved by performing an audit and closing gaps, if any are identified. At times, various agencies play conflicting roles.…

    • 1801 Words
    • 8 Pages
    Great Essays
  • Improved Essays

    Human Rights Definition

    • 786 Words
    • 4 Pages

    They are conditional and subject to lawful interference and restrictions. However, before these rights can be subject to any lawful interference or restrictions, they are subject to a test for legality as prescribed in the Articles of the Convention . The interference has to be prescribed by the law which means that it should have some reference to provisions made in domestic law. It is also required that the provisions be free from arbitrary interference by public authorities. Also, the law has to be accessible to those it will affect; and it should be formulated in a manner whereby the certain outcome of a conduct will be known to the individual.…

    • 786 Words
    • 4 Pages
    Improved Essays
  • Superior Essays

    Essay On Right To Privacy

    • 1469 Words
    • 6 Pages

    This right not only defends the freedoms of Americans by restricting government intrusion but also functions as an essential factor to the foundation of this country. Privacy is the backbone that supports many other rights of the American people. It sustains freedom, life, liberty, happiness and so many other rights and values that are important to the people. If privacy is not defended as a right that is respected and honored, people may lose their freedoms as Americans to an overreaching…

    • 1469 Words
    • 6 Pages
    Superior Essays
  • Improved Essays

    The NSA needs to be scrutinized more closely and put under investigation that calls for more transparency in the collection of data. We must also apply pressure to private corporations to ensure that marketing campaigns don’t jeopardize our privacy. The more information the public has, the better equipped they will be to fight against database marketing and protect their…

    • 760 Words
    • 4 Pages
    Improved Essays