Data Privacy Infringement

Posted: January 5th, 2023

Data Privacy Infringement

Student’s Name

Institutional Affiliation

Data Privacy Infringement

According to international law, personal data is considered to be private. Thus the various organizations that incorporate personal data into their system should uphold its privacy. This includes all platforms, such as social media platforms. The advancement in technology came along with both positive impacts as well as adverse outcomes in society. For instance, the advancement in technology has spearheaded the transformation being witnessed today in the communication and accessibility to the various sites for the company, which are concerned with technological innovation and invention as well as the various applications such as the social media platform. The social media application has increased communication among the various individuals and acted as a source of livelihood for the various individuals who depend on the platforms to sell off to the community through comedy and music. However, alongside the various advantages that the consumer of the social media application gain, there is a danger of the infringement of individual personal data through various technological devices. This unauthorized access of personal information on technological gadgets such as computers, laptops, and phones has been described as data privacy infringement attempts. The cases have been so rampantly reported in society, with most of the victims accounting for the access to various websites within the laptop and the phones being the root cause of the frustrations. Thus, data infringement is described as offensive acts targeting the specific issues within the computer, computer information systems, the infrastructure, and the computer networks, both the public and private networks.

Scope of Data Privacy

Data privacy infringement constitutes the latest challenges experienced by the various internet users, which jeopardizes the trust among the internet users as the attack invalidates the control of the particular phone or laptop.  The various misinformed government responses and the private individuals who have been affected by such a claim of data privacy infringement have witnessed the various threats to personal data. This has then inflicted fear and uncertainty of the security of the data provided via the various technology platforms such as social media applications, which account for the majority of sharing personal biodata (Habibzadeh et al., 2019). The continuous growth of internet services has shaped the response to data privacy cases within society. This is because an improvement in internet services is linked to the consequent increase in response to any particular organization. Besides, the governments are under pressure to respond to the claim through the ministry of national security. In addition, there is much-anticipated demand for the advancement of technology which boosts the improvement of the data privacy readiness as well as the vulnerabilities in the guaranteeing of the end-user security (Taeihagh and Lim, 2019). The complex nature of data privacy management is also demanding expertise-driven responses to help secure the digital society thrive and help rebuild the already lost trust.

The increased use of internet services across the globe also threatens the upholding of data privacy. This is because the significant data privacy infringement are aimed at the various institutions that have invested heavily in critical infrastructure to accommodate the current digital demands.  This has then exposed the institutions to more significant risks as they store relatively more extensive information as well as personal data, which is the primary target of the various terrorist groups (Greenleaf, 2017). The malicious groups use the information to track down the various confidential information, including the specific location and the financial transactions. Some of the data privacy issues have, however being a threat to the various multinational companies in the basis of the cold war in which some nations may design a virus over the technological platform and send to links affiliated to another enemy and tasked with the storage of personal data to such enemies (ONIK, Chul-Soo, and Jinhong, 2019). This is as witnessed in the state-sponsored malware, which was entitled Stuxnet. The malware was launched onto targeting Iran’s nuclear facility. It, however, resulted in the massive destruction of the nuclear facility.

Data Privacy and Security Ethics

Data privacy and security ethics are intertwined between law and ethics. The violation of privacy as demanded the data privacy translates to risk, which is a threat to national security. The law acts to aid in resolving the cases in which the ethics cannot, as the ethics are entitled to the provision of the context to the law (Hudnall, 2019). As outlined in the law, data privacy entails restricting access and data collection unless based on individual legal rights. This data privacy article hence incorporates the freedom provided for the unauthorized access to the private data, the inappropriate data usage in addition to the data content availability and the general rule of data inspection, update. The personal data information is only viable for the individual on whom the data is about (Reddy and Reddy, 2014). Data privacy is also correlated to the compensation costs for the data privacy breached.

Personal data privacy infringement ethics is a sensitive matter that demands data protection for various individuals by all institutions dealing with personal data (Christen, Gordijn, and Loi, 2020). Since the data privacy stipulates that the data is confidential, the organizations should explain to their employees the need to shun any activity which compromises the privacy of the data as violation will drive the company to be liable for the compensation for data leakage (Macnish and van der Ham, 2020). The data privacy on the electronic form is managed by soft law, which is faster and more effective than the complex law. Data security ethics also recognize the diversity of the law. The existing regulations are not internationally harmonized; hence, the principles should be applied based on existing dealings in such a particular context.

YMCA NSW Ransomware Case Study

The YMCA is a non-profit youth organization that has incorporated a variety of services on its bracket of operation, such as swimming lessons, gymnastic classes as well as the various out of school services which have led to the increase in the organization turnover to approximately realizing a $70 million turnover a year (Bansal et al., 2020). The company had considered itself such lucky that it is incapable of any infringement on data privacy up to 2019 when the company witnessed the ransomware attack, which crippled the computer operations in the company for almost 20 days. The data infringement occurred despite the regular back-ups as the organization had organized the data and the decent hygiene upheld in protecting the data from any breach by external unauthorized access. The customer information available on the company database was prone to compromisation by the data privacy infringement perpetrators hence thanks to the hasty efforts which salvaged the data stored by the organization on its database (Bhateja et al., 2020). Infringement on the database proved the ability of any organization to be prone to loss of the data stored on its database or the infringement of the privacy and the international ethics on the personal data privacy laws and thus the adoption of several mitigation measures to curb such infringement threats. As a result, the management proposed data privacy insurance in the same year and ensured the offsite storage of data to backup for the online database.

Conclusion and Recommendations

Ultimately, data privacy is a paramount aspect that should be embraced within any particular organization that deals with personal data and the organization’s ethics, which might demand the privacy of its database. The world is switching from the analog forms of data storage to the online forms of data storage that demand compliance with the law and data privacy. The digital form of data storage is vulnerable to being compromised by the various malicious software and viruses, which might include intent to use the information available on the database for personal gain. Therefore, the organization should train the affiliated employees to uphold the set data privacy ethics and guidelines. The companies should also invest in ultramodern technology, which aids in surveillance and detection of any database infringement attempts. The organizations should regularly review the personal data privacy updates according to the international standards, which ensure ethics compliance and give an insight into improvement in the personal data privacy laws and regulations on their constitutions. The YMCA, as illustrated above, encountered a data privacy breach in 2019.

References

Bansal, P., Tushir, M., Balas, V. E., & Srivastava, R. (Eds.). (2020). Proceedings of International Conference on Artificial Intelligence and Applications: ICAIA 2020 (Vol. 1164). Springer Nature. https://books.google.co.ke/books/2020.

Bhateja, V., Satapathy, S. C., Travieso-González, C. M., & Aradhya, V. M. (2020). Data Engineering and Intelligent Computing. https://link.springer.com/content/

Christen, M., Gordijn, B., & Loi, M. (2020). The Ethics of Cybersecurity (p. 384). Springer Nature. https://library.oapen.org/handle/20.500.12657/22489/2020

Greenleaf, G. (2017). Global data privacy laws 2017: 120 national data privacy laws, including Indonesia and Turkey. Including Indonesia and Turkey (January 30, 2017)145, 10-13. https://papers.ssrn.com/sol3/papers.cfm?abstract_id=2993035/2017

Habibzadeh, H., Nussbaum, B. H., Anjomshoa, F., Kantarci, B., & Soyata, T. (2019). A survey on cybersecurity, data privacy, and policy issues in cyber-physical system deployments in smart cities. Sustainable Cities and Society50, 101660, 2-41. https://www.sciencedirect.com/science/article/abs/pii/S2210670718316883/2019

Hudnall, M. (2019). Educational and workforce cybersecurity frameworks: comparing, contrasting, and mapping. Computer52(3), 18-28. https://ieeexplore.ieee.org/abstract/document/8677327/2019

Macnish, K., & van der Ham, J. (2020). Ethics in cybersecurity research and practice. Technology in Society63, 101382, 2p-10.  https://www.sciencedirect.com/science/article/pii/S0160791X19306840/2020

ONIK, M. M. H., Chul-Soo, K. I. M., & Jinhong, Y. A. N. G. (2019, February). Personal data privacy challenges of the fourth industrial revolution. In 2019 21st International Conference on Advanced Communication Technology (ICACT) (pp. 635-638). https://ieeexplore.ieee.org/abstract/document/8701932/2019

Reddy, G. N., & Reddy, G. J. (2014). A study of cybersecurity challenges and its emerging trends on the latest technologies. arXiv preprint arXiv:1402.1842.https://arxiv.org/ftp/arxiv/papers/1402/1402.1842/ 2014

Taeihagh, A., & Lim, H. S. M. (2019). Governing autonomous vehicles: emerging responses for safety, liability, privacy, cybersecurity, and industry risks. Transport Reviews39(1), 103-128. https://www.tandfonline.com/doi/full/10.1080/01441647.2018.1494640/2017

Expert paper writers are just a few clicks away

Place an order in 3 easy steps. Takes less than 5 mins.

Calculate the price of your order

You will get a personal manager and a discount.
We'll send you the first draft for approval by at
Total price:
$0.00