Consensus-Building Road MapYou will complete this assignment as if you have been asked to provide an engaging and informative help resource for new administrators that addresses the following topics:Each point should receive a response between 300-400 words and should be informed by the textbook and a minimum of two additional academic resources.Prepare this assignment according to the APA guidelines found in the APA Style Guide, located in the Student Success Center. An abstract is not required.This assignment uses a rubric. Please review the rubric prior to beginning the assignment to become familiar with the expectations for successful completion.You are required to submit this assignment to LopesWrite. Refer to the LopesWrite Technical Support articles for assistance.

Draft

Why it is important for people to be concerned about data privacy and what is it? Data privacy is a branch of data security concerned with the proper handling of data consent, notice, and regulatory obligations. Digitalization has made many things possible and convenient but is it safe for us to store personal information as a form of data. First, we should know the fact whether or how data is shared with third parties, how data is legally collected or stored, regulatory restrictions (Data Privacy Guide). After researching several articles, I have reached a conclusion why protecting data privacy is important for everyone.

In this modern age, young generation might prefer the internet, but libraries are the corner stone to our civilizations and great to collaborate with other making significant impact in human progress (Admin). So, computer has become one of the most reliable sources to perform task conveniently leaving information commons far behind; computer functions electrically so, all the data needs to be stored either electrically or digitally. This means our personal information is saved digitally too which is why our daily activities could be carried out fluently. For example, using a credit/debit card, background check, credit history, etc. Basically, our personal info is stored in their domain which allows them to access our information whenever in need. When we perform a task with the host or companies’ digital footprint of our personal information is stored in their server for verification, safety, convenience but the most important thing to know; how our data are being collected, stored whether they sell it to third parties and rules of protection. There is a saying that “don’t judge a book by its cover”, likely we cannot judge a company just by its name. We have the right to know what the process is of collecting a data, do we have risk of data breach or third parties. The problem might not always be our host sometimes it could be the place or the device from where our personal information could be breached. There was a biggest data breach in the history which was announced in September 2016 that in 2014 it had been the victim. The attackers, which the company believed “state-sponsored actors,” compromised the real names, email address, dates of birth and telephone numbers of 500 million users (CSO online).

Similarly, eBay reported that an attack exposed its entire account list of 145 million users in May 2104, including names, address, dates of birth and encrypted passwords. The online auction giant said hackers used the credentials of three corporate employees to access its network and had complete access for 229 days more than enough time to compromise the user database. As the major social network for business professionals, LinkedIn has become an attractive proposition for attackers looking to conduct social engineering attacks. However, it has also fallen victim to leaking user data in the past. In 2012 the company announced that 6.5 million unassociated passwords were stolen by attackers and posted onto a Russian hacker forum which was not until 2016 that the full extent of the incident was revealed (CSO online).

Likewise, there are many examples which suggests us to give more importance to data privacy because hackers can use our private information for their own benefit. This might not be a big deal to a normal citizen but if someone with high profile could be in serious trouble. They can use the fraud identity for money transaction, marketing, crime, national security concern. Suppose someone from a higher military post personal identity is breached; the hackers could do anything even could engage a nation in war affairs. Similar incident happened in 9/11 where military radars and safeguard communications by using encryption tools lead by terrorists which killed thousands of people in New York city (Leonatti A.). The 9/11 incident has made a lot of changes in U.S. legislation forming a USA PATRIOT ACT with the view of anti-terrorism (epic.org). This act has given several upper hands to the government personal because they can easily monitor the privacy of an individual intercepting the communications if it is related to the national security. Does it mean our personal information is safe? From my opinion, we have certain level of privacy, but we cannot conclude that we are totally safe. In other words, person not involving in internet has less chance of data breach than one using it but remember no one is completely safe.

The use of encryption tools are needed to safeguard communications in cyberspace, yet these tools can be used by the terrorists and criminals to protect their communications in cyberspace due to this government plans to intercept communications, as provided for in the Homeland Security Act (Leonatti A.). This statement makes it clear that government could interfere with our private information if needed. Likely, if hackers could build same system then they could get access to information of millions of people resulting cybercrimes. Therefore, the system should be made strong enough to give people privacy which is even in the amendment of U.S. constitution. How could we afford to make the system more secure? The answer is let hackers fight with hackers. The companies should hire ethical or certified hackers whose purpose is to break into the firewall of an organization and fix the issue (EC Council). With the same level of understanding and intelligence as that of criminals these certified hackers could develop new ways to break into the system of company helping to fix the errors of the software. These people could also be utilized in military, police force to catch the criminals.

Moreover, biometrics are unique physical characteristics, such as fingerprints, that can be used for automated recognition. At the Department of Homeland Security, biometrics are used to detect and prevent illegal entry into the U.S., grant and administrator proper immigration benefits, vetting and credentialing, facilitating legitimate travel and trade, enforcing federal laws, and enabling verification for visa applications to the U.S. (Biometrics). Biometric technologies such as face-recognition programs and iris scanners are used in public places to catch criminals. But what if about the public whose does not have any criminal record; do they have any liberty? I do not think they can enjoy their freedom to the fullest. It is necessary to find the criminals in the mass public participation, but we need to take care public liberty too.

Similarly, protection of proprietary can be indirectly involved in privacy concern. Proprietary software is any software that is copyrighted and bears limits against use, distribution and modification that are imposed by its publisher, vendor, or developer. Proprietary software remains the property of its creator and is used by end users under predefined conditions (Techopedia). Protection for proprietary software has gone too far because some manufacturers have lost millions of dollars of potential revenue with large number of software piracy in developing countries. Basically, they have not lost the revenue, but it would not sell on the open market because of its expensive cost which people could not afford in many developing countries consequence software piracy. The users from pirated software could easily get access to perform many activities and there are low chances to shut down the software program incase needed or even track it. This gives full advantage to hackers for breaching out others information without being able to track them back.

Next, everyone is familiar with iphone or apple products, but do you guys shave any idea about apple hearing aids. They make it easier to stay in conservation if you are deaf or hard hearing. It supports RTT and TTY phone calls without the need for TTY hardware and have better conservations in loud places, but I think you need an air pod for that (Hearing accessibility). Have you notice if you leave your phone in one room you can hear in another room via air pod this could be very handy as well as dangerous. If it is by intention things could go way worst. Are you more curious about this topic? How much safe do you think your phones or computers are? The answer is totally unsafe. Government security agencies like the NSA can also have access to your devices through built-in doors. This means that these security agencies can tune in to you phone calls, read your message, capture pictures of you, stream videos of you, read your emails, steal your files whenever they please (spying on you). So, do we believe no one is watching us or you do not have to worry about your privacy the answer to this question is complicated. Its true government can access all your information if needed but you do not have to worry it all the time. But be curious about the other third party whose intention is just to sell your information for illegal purpose.

In conclusion, data privacy is one of the most important concern for everyone even if we could protect it from several degree of hackers like normal people there would be less cybercrimes. The above examples about the data breach gives short idea about the importance of data privacy. We have the right to protect our personal information so, we should raise awareness about it and make effort for developing more secure protocols required to make personal information safe.

References

Read, B., & Rebecca Herold·September 3, 2. (2019, May 23). 12 Reasons Why Data Privacy Protection Brings Business Value. Retrieved September 14, 2020, from https://www.cpomagazine.com/blogs/privacy-intelligence/12-reasons-why-data-privacy-protection-brings-business-value/

6/17/2020, J. (2020, June 18). Data Privacy Guide: Definitions, Explanations and Legislation: Varonis. Retrieved September 14, 2020, from https://www.varonis.com/blog/data-privacy/

Swinhoe, D. (2020, April 17). The 15 biggest data breaches of the 21st century. Retrieved September 27, 2020, from https://www.csoonline.com/article/2130877/the-biggest-data-breaches-of-the-21st-century.html

Center, E. (n.d.). EPIC – USA PATRIOT Act (H.R. 3162). Retrieved September 28, 2020, from https://www.epic.org/privacy/terrorism/hr3162.html

Leonatti, A. (2020, September 30). Takin’ It to the Lawyers: Bill Murray, Doobie Bros. Face Off in Boomer IP Battle. Retrieved October 04, 2020, from https://blogs.findlaw.com/legally_weird/2020/09/takin-it-to-the-lawyers-bill-murray-doobie-bros-face-off-in-boomer-ip-battle.html

EC-Council. (n.d.). Certified Ethical Hacker. Retrieved October 04, 2020, from org/certified-ethical-hacker.html”>https://cert.eccouncil.org/certified-ethical-hacker.html
Admin. (2017, July 18). Why We Must Talk About The Information Commons. Retrieved October 25, 2020, from http://www.ala.org/aboutala/offices/oitp/publications/infocommons0204/brollier

What is Proprietary Software? – Definition from Techopedia. (2019, January 21). Retrieved October 25, 2020, from https://www.techopedia.com/definition/4333/proprietary-software

Biometrics. (2020, July 13). Retrieved October 25, 2020, from https://www.dhs.gov/biometrics

Hearing Accessibility – iPhone. (n.d.). Retrieved November 09, 2020, from https://www.apple.com/accessibility/iphone/hearing/

Are your laptop, phone camera and microphone spying on you? (2018, April 10). Retrieved November 09, 2020, from https://www.scmp.com/lifestyle/article/2140934/are-your-laptop-phone-camera-and-microphone-spying-you-why-you-should

Get professional assignment help cheaply

Are you busy and do not have time to handle your assignment? Are you scared that your paper will not make the grade? Do you have responsibilities that may hinder you from turning in your assignment on time? Are you tired and can barely handle your assignment? Are your grades inconsistent?

Whichever your reason may is, it is valid! You can get professional academic help from our service at affordable rates. We have a team of professional academic writers who can handle all your assignments.

Our essay writers are graduates with diplomas, bachelor, masters, Ph.D., and doctorate degrees in various subjects. The minimum requirement to be an essay writer with our essay writing service is to have a college diploma. When assigning your order, we match the paper subject with the area of specialization of the writer.

Why choose our academic writing service?

Plagiarism free papers
Timely delivery
Any deadline
Skilled, Experienced Native English Writers
Subject-relevant academic writer
Adherence to paper instructions
Ability to tackle bulk assignments
Reasonable prices
24/7 Customer Support
Get superb grades consistently

Get Professional Assignment Help Cheaply
Are you busy and do not have time to handle your assignment? Are you scared that your paper will not make the grade? Do you have responsibilities that may hinder you from turning in your assignment on time? Are you tired and can barely handle your assignment? Are your grades inconsistent?
Whichever your reason may is, it is valid! You can get professional academic help from our service at affordable rates. We have a team of professional academic writers who can handle all your assignments.
Our essay writers are graduates with diplomas, bachelor’s, masters, Ph.D., and doctorate degrees in various subjects. The minimum requirement to be an essay writer with our essay writing service is to have a college diploma. When assigning your order, we match the paper subject with the area of specialization of the writer.
Why Choose Our Academic Writing Service?

Plagiarism free papers
Timely delivery
Any deadline
Skilled, Experienced Native English Writers
Subject-relevant academic writer
Adherence to paper instructions
Ability to tackle bulk assignments
Reasonable prices
24/7 Customer Support
Get superb grades consistently

How It Works
1.      Place an order
You fill all the paper instructions in the order form. Make sure you include all the helpful materials so that our academic writers can deliver the perfect paper. It will also help to eliminate unnecessary revisions.
2.      Pay for the order
Proceed to pay for the paper so that it can be assigned to one of our expert academic writers. The paper subject is matched with the writer’s area of specialization.
3.      Track the progress
You communicate with the writer and know about the progress of the paper. The client can ask the writer for drafts of the paper. The client can upload extra material and include additional instructions from the lecturer. Receive a paper.
4.      Download the paper
The paper is sent to your email and uploaded to your personal account. You also get a plagiarism report attached to your paper.

 

PLACE THIS ORDER OR A SIMILAR ORDER WITH Essay fount TODAY AND GET AN AMAZING DISCOUNT

The post consensus-building road map appeared first on Essay fount.


What Students Are Saying About Us

.......... Customer ID: 12*** | Rating: ⭐⭐⭐⭐⭐
"Honestly, I was afraid to send my paper to you, but you proved you are a trustworthy service. My essay was done in less than a day, and I received a brilliant piece. I didn’t even believe it was my essay at first 🙂 Great job, thank you!"

.......... Customer ID: 11***| Rating: ⭐⭐⭐⭐⭐
"This company is the best there is. They saved me so many times, I cannot even keep count. Now I recommend it to all my friends, and none of them have complained about it. The writers here are excellent."


"Order a custom Paper on Similar Assignment at essayfount.com! No Plagiarism! Enjoy 20% Discount!"