Assignment for Data Privacy need to focus on the aspects of data privacy &data security with increasing usage of data

Home, - Data Privacy

Data Privacy

Introduction to Data Privacy

Today, organizations and the governmental agencies need to focus on the aspects of data privacy and data security with the increasing usage of the data, Internet resources, and social networking. It is noticed in the recent times that the organizations and even the individual users are prone to risk of cyber-attacks in a given environment (Krueger & Moore, 2015).

Further, some of the organizations are also found selling the data of the users for personal gains and hence it becomes an important issue to address this aspect in the near future. The role of the security agencies and other regulatory authorities is to ensure protection of the users' data and also strengthen the laws pertaining to data privacy in a given environment.

This report will also discuss the major aspects of data privacy since there are several vulnerabilities associated with it. The role of the security organizations is also important as they need to make the organizations and individuals adhere to the privacy principles and norms and accordingly ensure of protecting the data in a given environment (Krueger & Moore, 2015).

However, it is necessary to inspect role of the governmental agencies, organizations, and other individuals so that it will help them identify their current gaps, modify the practices, and accordingly protect the data in a given environment.

Role of government in data ethics, management, and security

It is observed that today the government is dealing a lot of data for different purposes of the individuals as well as of the organizations. Hence, they need to remain more careful about the issues of data privacy in a given environment. They need to know that the growth of data is exponential since 1.7 megabytes of new data is created every second (Trainor, 2015).

Further, the organizations are also storing huge data-sets for their purpose and accordingly they need to protect them against the external threats. As per the reports, the cost of maintaining data privacy is more than US $10 million every year. Hence, they need to take the steps in the right direction, deploy security mechanisms, and provide necessary guidelines to these entities to ensure data privacy in a given environment (Trainor, 2015).

With the increasing usage of Internet of Things (IoT) in the daily life activities, it is observed that the security professionals need to adhere to it and accordingly make their strategies of protecting the data against the vulnerabilities of cyber-attacks in a given environment.

The role of the government will be vital as they will be responsible for spreading the required awareness about this issue, inform all the people of the communities about data privacy and also inform them about the recommendations that need to be followed while sharing the data with other entities in a given environment (Kraus & Gallagher, 2014).

Role of the organization in data ethics, management, and security

Today, despite the increasing usage of the technological means and techniques, it is noticed that nearly 52 percent of the people are still not aware of how to connect the technological devices and how to use the mobile apps for the daily usage. There are more than 40 percent of the people who are not aware of how to set passwords for their different Internet profiles and hence are exploited by the attackers.

Under such considerations and also considering the risk of cyber-attacks, it is the responsibly of the organizations to deploy Cybersecurity mechanisms that will protect their data-sets in a given vulnerable environment. Further, they also need to train their staff so that they can remain alert, overcome the challenges of Cybersecurity at the workplace, and thereby ensure protection of the data of the customers and other concerned stakeholders in a given environment (Kraus & Gallagher, 2014).

The role of the organizations will be also vital as they will be in charge of protecting the data of the customers and also data of the company from different perspectives. They also need to deploy monitoring mechanisms so that they can take necessary steps in this direction as and when required.

Role of the individual in having the freedom to choose how their data is used

It is important for the individuals to understand the usage of data from a holistic perspective. An individual today will be using social media platforms, will be performing Net-banking activities, will be providing their data to different companies, and also will be sharing the same data through different online platforms (Voss, 2014).

Hence, for the purpose of protecting the data-sets of such individuals, the role of the organizations is important in protecting this data; however, the role of the individual is also equally important in protecting their data from the perspective of data privacy. They need to get aware of this issue, determine the ways through which they will be sharing the data in a privacy manner and hence secure their data through both online and offline communication mediums.

Further, the individuals need to get aware of this aspect and learn different ways of protecting their data in the world of technology (Voss, 2014). They can learn and seek more information pertaining to this issue from the governmental organizations, regulatory authorities, and also other security agencies that are operating in this direction.

Levels of anonymity and Deciding on how long data will be stored

Research reports have highlighted that the data will be transferred to different levels in the organization and can be used by any entity in the organization for the purpose of preparing the reports in a given environment. It is the responsibility of the organization, the government, and also the security agencies to ensure that these data-sets are protected against the cyber-attacks in a given environment (Victor, 2013).

The major challenges that are identified in the case of data privacy include - virtualization issues, mobile cloud applications security issues, mobile device security issues, location privacy problems, identity privacy, and also other such challenges present in a given environment. There is a need to overcome these issues that will allow the individuals, the governments, and also the security agencies to take a better control over these problems and thereby ensure the usage of data in a safe and secure manner (Victor, 2013).

The security agencies need to recommend using encryption mechanisms to the organizations that are dealing into such transmission and usage of data on a frequent basis. It will thereby allow them to protect their data-sets in a better way.

Ownership rights that should and should not coexist with one's data

As per the research reports, it is found that the security agencies have highlighted the issue of data privacy and hence it is necessary to decide on the ownership rights of sharing and using the individual's data for different purposes. The major legal issues identified for data privacy include - privacy and data protection, labor law issues, cybercrime, tax law issues, insurance, and even intellectual property rights issue (Clement & Obar, 2016).

Hence, before using the data of the individuals by any of the private companies or firms, it is necessary for them to obtain relevant consent from the users. They need to inform them about the purpose of taking the data, the data collection approach and also the purpose of using the data in a given operational environment.

It will thereby keep both the users as well as the companies aware of the data usage and the data privacy norms and can accordingly follow them in a given environment. However, the role of the organizations will be more vital as they need to deploy security mechanisms and protect the data of the users against the different challenges of Cybersecurity (Ritchey et al., 2013).


They need to encrypt the data and make sure that no other third party entity is able to breach their networks and steal the data through different hacking methods. Hence, the government needs to issue norms and legal laws so that these organizations can follow to it while using the data of the users in a given environment. It will subsequently make them follow to these norms and ensure data privacy in a given working environment.


Leave a comment


Related :-