Personal information
One of the frightening aspects of the Internet is that just about everything you see, buy or do online is recorded in a database somewhere. Moreover, unless you have never signed up for any form of online service or network, your personal information is also out there for someone else to access. In many cases, you give this personal information willingly and knowingly (e.g., when you sign up for a social network). Other times, however, you give this information less obviously (e.g., when you ‘Like’ pages on Facebook). 
To what extent should a person or corporation be allowed to collect and hold information about individuals? What if the information collected is already publicly available, although scattered among several sources?
For this Discussion, analyse the implications of storing this personal data as well as the dangers of it getting accessed by individuals (or companies) you did not give access permission to.
To prepare for this Discussion:
 
·         Review your Weekly Learning Resources with a focus on methods of indexing data.
·         Research the ways in which companies collect and hold information.
·         Research ways in which collected data could be accessed and by whom.
·         Reflect on who should protect collected information.
 
To complete this Discussion:

Post: Create an initial post in which you take a position on the extent in which a person or corporation should be allowed to collect and hold information about individuals. Address the following:
 
·         Analyse the implications of a person or corporation collecting information about an individual to defend your position.
 
·         Analyse the implications of a person or corporation collecting information about an individual if the information is already publicly available through scattered sources.
 
·         Evaluate the extent a person or company should be expected to protect collected information about individuals. Base your evaluation on the following:
 
o   Who can access the information.
o   How someone can access information.
o   The risk of information being accessed by a person who did not originally collect the data.
 
·         Fully state and justify any choices, assumptions or claims that you make using the suggested Learning Resources for this Week and/or your own research.
 
 
 


What Students Are Saying About Us

.......... Customer ID: 12*** | Rating: ⭐⭐⭐⭐⭐
"Honestly, I was afraid to send my paper to you, but you proved you are a trustworthy service. My essay was done in less than a day, and I received a brilliant piece. I didn’t even believe it was my essay at first 🙂 Great job, thank you!"

.......... Customer ID: 11***| Rating: ⭐⭐⭐⭐⭐
"This company is the best there is. They saved me so many times, I cannot even keep count. Now I recommend it to all my friends, and none of them have complained about it. The writers here are excellent."


"Order a custom Paper on Similar Assignment at essayfount.com! No Plagiarism! Enjoy 20% Discount!"