X hits on this document

38 views

0 shares

0 downloads

0 comments

9 / 17

* * * * * Every time you click on an advertisement or register a software product online, your information is entered into a database.

Computer technology can also threaten privacy through Spam. Spam is unsolicited e-mail messages, advertisements or newsgroup posting sent to many recipients at once.

WAYS COMPUTER TECHNOLOGY THREATEN OUR PRIVACY

Computer technology threatens our privacy through electronic profiling. For example, when we fill out a form such as a magazines subscription, purchasing products or contest entry form on the Internet, this data is kept in the database. It will include age, address, marital status and other personal details.

WHY DO WE NEED PRIVACY?

We need privacy for anonymity. Foe example, the Internet creates an elaborate trail of data detailing a person surfing on the web because all information is stored inside cookies. We do not want our trail to be detected.

We also need privacy for confidentiality. For example, online information generated in the course of business transaction is routinely used for a variety of other purposes without the individual's knowledge or consent.

We do not want our private lives and habits exposed to third parties.

CAN PRIVACY BE PROTECTED?

Privacy can be protected :

a)

Privacy Law

The privacy laws in Malaysia emphasis on the following:

-Security Services to review the security policy

-Security Management to protect the resources

-Security Mechanism to implement the required security services

-Security object, the important entities within the system environment.

Document info
Document views38
Page views38
Page last viewedSat Dec 03 16:29:22 UTC 2016
Pages17
Paragraphs278
Words3165

Comments