Skip to main content
Business LibreTexts

1.6: Privacy

  • Page ID
    46408
  • \( \newcommand{\vecs}[1]{\overset { \scriptstyle \rightharpoonup} {\mathbf{#1}} } \) \( \newcommand{\vecd}[1]{\overset{-\!-\!\rightharpoonup}{\vphantom{a}\smash {#1}}} \)\(\newcommand{\id}{\mathrm{id}}\) \( \newcommand{\Span}{\mathrm{span}}\) \( \newcommand{\kernel}{\mathrm{null}\,}\) \( \newcommand{\range}{\mathrm{range}\,}\) \( \newcommand{\RealPart}{\mathrm{Re}}\) \( \newcommand{\ImaginaryPart}{\mathrm{Im}}\) \( \newcommand{\Argument}{\mathrm{Arg}}\) \( \newcommand{\norm}[1]{\| #1 \|}\) \( \newcommand{\inner}[2]{\langle #1, #2 \rangle}\) \( \newcommand{\Span}{\mathrm{span}}\) \(\newcommand{\id}{\mathrm{id}}\) \( \newcommand{\Span}{\mathrm{span}}\) \( \newcommand{\kernel}{\mathrm{null}\,}\) \( \newcommand{\range}{\mathrm{range}\,}\) \( \newcommand{\RealPart}{\mathrm{Re}}\) \( \newcommand{\ImaginaryPart}{\mathrm{Im}}\) \( \newcommand{\Argument}{\mathrm{Arg}}\) \( \newcommand{\norm}[1]{\| #1 \|}\) \( \newcommand{\inner}[2]{\langle #1, #2 \rangle}\) \( \newcommand{\Span}{\mathrm{span}}\)\(\newcommand{\AA}{\unicode[.8,0]{x212B}}\)

    Learning Objectives

    • Discuss the challenges to privacy in the business computing environment

    Information privacy, or data privacy, is the relationship between collection and dissemination of data, technology, the public expectation of privacy, and the legal and political issues surrounding them.

    Privacy concerns exist wherever personally identifiable information or other sensitive information is collected and stored—in digital form or otherwise. Improper or non-existent disclosure control can be the root cause for privacy issues. Data privacy issues can arise in response to information from a wide range of sources, such as:

    • Healthcare records
    • Criminal justice investigations and proceedings
    • Financial institutions and transactions
    • Biological traits, such as genetic material
    • Residence and geographic records
    • Ethnicity
    • Privacy breach
    • Location-based service and geolocation

    The challenge in data privacy is to share data while protecting personally identifiable information. The fields of data security and information security design and utility software, hardware and human resources exist to address this issue. As the laws and regulations related to Data Protection are constantly changing, it is important to keep abreast of any changes in the law and continually reassess your compliance with data privacy and security regulations.

    The Internet and Security

    The ability to control the information one reveals about oneself over the Internet, and who can access that information, has become a growing concern. These concerns include whether email can be stored or read by third parties without consent, or whether third parties can continue to track the web sites someone has visited. Another concern is web sites which are visited collect, store, and possibly share personally identifiable information about users.

    The advent of various search engines and the use of data mining created a capability for data about individuals to be collected and combined from a wide variety of sources very easily. The FTC has provided a set of guidelines that represent widely accepted concepts concerning fair information practices in an electronic marketplace called the Fair Information Practice Principles.

    Everything is accessible over the Internet nowadays. A major issue with privacy relates back to social networking. For example, there are millions of users on Facebook, Twitter, and other social media platforms, and regulations have changed. People may be tagged in photos or have valuable information exposed about themselves either by choice or most of the time unexpectedly by others.

    It is important to be cautious of what is being said over the Internet and what information is being displayed as well as photos because this all can searched across the web and used to access private databases making it easy for anyone to quickly go online and profile a person.

    Contributors and Attributions

    CC licensed content, Original
    • Practice Question. Authored by: Sherri Pendleton. Provided by: Lumen Learning. License: CC BY: Attribution
    CC licensed content, Shared previously

    1.6: Privacy is shared under a CC BY license and was authored, remixed, and/or curated by LibreTexts.

    • Was this article helpful?