You are on page 1of 1

Chapter 6 : Informational Privacy: Concepts, Theories, Controversies

Quote : " The challenge in data privacy is to share data while protecting person
ally identifiable information. The fields of data security and information secur
ity design and utilize software, hardware and human resources to address this is
sue"
What I expect o learn :
I expect to learn how to hide my private pictures and files in web.
Review:
Data privacy is the relationship between collection and dissemination of data,
technology, the public expectation of privacy, and the legal and political issue
s surrounding them. Privacy concerns exist wherever personally identifiable info
rmation is collected and stored - in digital form or otherwise. Improper or non-
existent disclosure control can be the root cause for privacy issues. Data priva
cy issues can arise in response to information from a wide range of sources, suc
h as Healthcare records, Criminal justice investigations and proceedings, Financ
ial institutions and transactions, Biological traits, such as genetic material,
Residence and geographic records, Ethnicity. The information about a person's fi
nancial transactions, including the amount of assets, positions held in stocks o
r funds, outstanding debts, and purchases can be sensitive. If criminals gain ac
cess to information such as a person's accounts or credit card numbers, that per
son could become the victim of fraud or identity theft. Information about a pers
on's purchases can reveal a great deal about that person's history. such as plac
es that has visited him/her, whom he/she contracted with, products he/she used,
his/her activities and habits, or medications he/she has used. In some cases cor
porations might wish to use this information to target individuals with marketin
g customized towards those individual's personal preferences, something which th
at person may or may not approve of.The unitary-based conceptions versus right-b
ased conceptions of privacy. There are four distinct kinds of privacy such as ph
ysical or accessibility, decisional, psychological or mental and informational p
rivacy. It also discussed that privacy includes non-interference involving one's
thoughts and one's personal identity of psychological privacy. Political privac
y has been a concern since voting systems emerged in ancient times. The secret b
allot is the simplest and most widespread measure to ensure that political views
are not known to anyone other than the voter themself-it is nearly universal in
modern democracy, and considered to be the basic right of citizenship. In fact
even where other rights of privacy do no exist, this type of privacy very often
does the United States has laws governing privacy of private health information.
The legal protection of the right to privacy in general and of data privacy in
particular-varies greatly arounf the world.
There is a significant challenge for organizations that hold sensitive data to
achieve and maintain compliance with so many regulations that have relevance to
information privacy.
What I have learned:
I learned that Data privacy is not highly legislated or regulated in the U.S. .
In the United States, access to private data contained in for example third-par
ty credit reports may be sought when seeking emplyment or medical care, or makin
g automobile, housing or other purchases on credit terms.
Integrative Questions
1.) What is social privacy?
2.) What is modern hacking?
3.) What are the theories of Informational privacy?
4.) What is Informational Portability?
5.) What is Data-Privacy?

You might also like