1.
What information about you is being held, who is
holding it, and what is this information being used for?
Answer:
A clerk shopping into the records of
a friend, a neighbor, or an ex-spouse. These incidents are not widespread and
involve only a tiny fraction of employees. This data is a tempting target for
identity thieves. Moreover , the money they collects funnds that federal
government. On the other habd, information about people is gathered, stored,
analyzed and reported because organizations can use it to make better
decisions.
2.
What measures are being taken to safeguard this
information, and what happens if it is inadvertently disclosed or deliberately
stolen?
Answer:
The auditors fund that the disaster
recovery plan was deficient and that the systems were vulnerable in other ways
backup tapes stored at an off.site location were not being tested regularly to
check that data had been retrived correctly and should be used to restore the
system if necessary. Many people object to the data collection policies of
government and business on the basis that they strip individuals of the power
to control their our personal information.
CASE STUDY CHAPTER#4 “Is Google Watching You”
Discussion Question
1.
How does Google’s business model use personal data?
Answer:
It is not surprising that Googleinspires a
host of privacy concerns. First and perhaps foremost is the concern generated
by the wealth of personal information Google is able to assemble using user’s
login identity.
2.
What do you think are the major privacy concerns
raised by Google’s businessmodel and applications?
Answer:
Other privacy concerns have arisen over
the malfunctioning of Google’s applications. For example, on february 24,2009,
an employee of a Dutch marketing firm reported
bug related to Google’s document with sharing applications, Google Docs.
3.
Do you think Google has taken adequate measures to
protect it user’s privacy?
Answer:
The corporation
argued that Google had pledge to keep it user’s personal information private
and that to handing over this data, the company would be forced to reveal trade
secrets regarding its search technology. The best way for user to prevent the
taken adequate measures is protect from its users privacy.
No comments:
Post a Comment