Please boost your Plan to download papers
Privacy of Information - Assignment Example
In considering the issue of privacy of information as pertains to online customer transactions, there are a number of key issues that need to be considered. These issues include the fact that some websites can be able to automatically collect information every time that an…
This is because it is possible for companies and organizations to use this data in an unauthorized manner.
The main stakeholders around the privacy of information include the internet users, the websites visited by these internet users and the United States National Security Agency that has the ability to access internet communication from across the globe.
In considering the issue of privacy of information in respect to online customer transactions, there are a number of factors that the team needs to consider. One of these is the question as to whether there are currently any legal restrictions that target the issue of privacy of information. This is important as it is essential for the company to ensure that it constantly remains within the legal parameters. Another aspect that the team needs to think about is the question as to what is the current prevailing feeling among customers about the collection of their personal information from the online transactions that they make. This is important as it will help in informing the company’s decision making process. To learn more about the main issues, the best action that the team can engage in is to organize a professional training course whereby the team members can be educated on the latest main issues surrounding the issues of privacy of information and exactly how to tackle them.
There are a number of difficulties that surround the maintaining of privacy of information. Some of these include the difficulty facing users in preventing cookies spyware from illegally accessing their information. Companies such as social media sites, email service providers and banks are faced with the risk of having their customer information becoming illegally accessed by hackers (Easttom and Taylor, 10).
Some of the possible solutions that can be employed by users to help in better securing their personal information include the ...