StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...

Protection of Private Information - Assignment Example

Cite this document
Summary
The paper “Protection of Private Information” analyses the Data Protection Directive, which was conceded in the European Union in 1995 and the non-implementation by member nations before 1998 attracted European Court action. The directive was aimed to solve the issue of regional data protection law…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER98.4% of users find it useful
Protection of Private Information
Read Text Preview

Extract of sample "Protection of Private Information"

Download file to see previous pages

A stricter law sometimes paved way for hindrance for multinational companies that operated in European Union countries but in the broader sense, all member nations could exchange private information in the private and public segment (Data Protection and Privacy. n.d). The European Union authorities have signed a pact with the United States that enables officials in the United States to have wide access to private information like credit card transactions, travel histories and internet surfing nature of people in Britain.

The United States law enforcement organizations and security agencies will have the liberty to access the private information of European Union citizens. The pact will undermine the privacy of individuals and Americans will have the freedom to check on anyone it finds fit for scrutiny. The propaganda has evoked mixed results among authorities within the European Union and some comment that local offices are not to be trusted while handling sensitive private information and the revelation of this data to another nation may result in virtual abuse.

The pact is of advantage to the United States because it can intrude into the details of any person in the European Union and Britain through credit card companies, banks, and other establishments that collect personal details. Earlier, the European Union imposed sanctions if any firm gave information against the information protection law. The pact will now give better protection for the firm on the transfer of private information. The pact is set to allow European governments and firms to exchange private details of internet and credit card users and make it legally binding on both the United States and European Union.

However, the required law has not been drafted whereby European Union citizens can hold the American government liable for misuse of information. The pact calls for the exchange of information about airlines and international bank transfers. Though this is not a total transfer of information between European Union nations and the United States, the pact provides extensive access to private information which is considered to be protected according to the European Union law (Leppard, 2008).The decision has come up after a difference of opinion evolved between Europe and the United States in terms of sharing private information post the 9/11 attacks.

The United States demanded information about air passenger and bank transfer details which most of the European Union nations denied stating privacy laws. The common agreement is finalized to evade future problems in terms of information sharing. But from the corporate point of view, more companies will be in a dilemma to find a balance between European and American law (the U.S., EU near deal on private data: NYTimes. 2008). New Zealand has amended the Privacy Act 1993 in December 2000 to secure a revelation by the European Commission that New Zealand's privacy protection policy is adequate according to Article 25 of the Data Protection Directive of the European Union.

The amendment was passed when New Zealand's Privacy Act is applauded as the most detailed national privacy policy maintained outside the European continent. The Act specifies twelve data privacy principles with respect to the collection, disclosure, use, and storage of private information. The law is applicable to personal data in all kinds and it is applicable to all agencies in the private and public segment. The law has a separate rule for unique identifiers and the government.

...Download file to see next pages Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(Protection of Private Information Assignment Example | Topics and Well Written Essays - 750 words, n.d.)
Protection of Private Information Assignment Example | Topics and Well Written Essays - 750 words. Retrieved from https://studentshare.org/sociology/1505928-protection-of-private-information
(Protection of Private Information Assignment Example | Topics and Well Written Essays - 750 Words)
Protection of Private Information Assignment Example | Topics and Well Written Essays - 750 Words. https://studentshare.org/sociology/1505928-protection-of-private-information.
“Protection of Private Information Assignment Example | Topics and Well Written Essays - 750 Words”. https://studentshare.org/sociology/1505928-protection-of-private-information.
  • Cited: 0 times

CHECK THESE SAMPLES OF Protection of Private Information

Cybersecurity

The National Security Agencies rely on information from the private sector to develop the security mechanisms in the country.... Through the use of this approach, cyber threats are reduced since the government will monitor the flow of information, as well as the messages exchanged via the internet (Theohary, 2010).... The government can also justify involvement in issues that relate to cybersecurity is through regulation of the information market....
6 Pages (1500 words) Literature review

Victimisation of People in Power: The Victim Group Most Vulnerable to Identity Theft

Victimisation of People in Power: The Victim Group Most Vulnerable to Identity Theft Essay Name of of University Introduction The criminal justice system is one of the governmental branches that is heavily scrutinised by all political sectors.... hellip; Victim supporters, feminists, civil rights advocates, and conventional crime control supporters—criticise its rules and processes....
12 Pages (3000 words) Essay

Privacy from the information security perspect

The purpose of this paper is to analyze and compare privacy issues related to freedom from observation and privacy issues related to information security.... Privacy can be viewed as a very wide term which covers a lot different rights of persons or institution which all have the same common denominator of protecting people or institutions from revealing information which is secret and that the persons want to protect from others.... … Humans performed a lot of activities such as paying bills, online activity, private phone call conversations, decisions concerning ones professional future, buying preferences, financial records and many other events which are suppose to be private decisions and occurrences....
5 Pages (1250 words) Essay

Discussion for Week 6 Chapter 9 Question 1 Information Protection and Privacy

The acquisition and the utilization of personal and private information by various media channels such as internet, marketers, websites, legal enforcement institutions as well as network marketers has led to an increased concern over privacy issues.... Information regarded as… Protection of personal and private company information is imperative in all the societal dimensions and in the competitive business Introduction The acquisition and the utilization of personal and private information by various media channelssuch as internet, marketers, websites, legal enforcement institutions as well as network marketers has led to an increased concern over privacy issues....
1 Pages (250 words) Assignment

Privacy and Freedom in the Internet Age

Yet another conflict that arises is the difficulty in achieving a balance between protection of user privacy and content, while at the same time making information universally available on the Net (Gautschi, 2008:12).... … The paper “Privacy and Freedom in the Internet Age, Safeguarding Confidential information on the Internet" is an affecting example of a term paper on information technology.... The use of the Internet is proliferating, but how secure and private is the information transmitted over it?...
3 Pages (750 words) Essay

Information Security Strategy of IT Department at Eazee Shopping

This paper "information Security Strategy of IT Department at Eazee Shopping" focuses on the threats to information systems in the cyberspace.... nbsp;… The researcher will then discuss the compliance of information systems and security initiatives with ISO – 27001 Standard after which a conclusion will be presented to summarise the key findings and scope of security strategies.... The supermarket chain aims to simplify its business selling process by offering all products through an online information management system....
10 Pages (2500 words) Case Study

The SAS Anti-Money Laundering Enterprise

The base operational schematic of the enterprise is equivalent to a monitoring system that sifts through numerous transactional information and singles out possible violators of the Anti-Money Laundering Act (AMLA) through the detection of suspicious behavior (BusinessWire, 2011).... private entities, such as banks, have likewise adopted means to curtail the prevalence of such terror campaign by implementing systemic and operational adjustments into their companies....
10 Pages (2500 words) Research Paper

The Principles of Information Protection and Privacy in Australia

The organizations are dedicated to defending individual rights to and management of private information and issues and prevention of extra intrusion from the journalists.... The organization focuses on public interest in the protection of their private information and freedom.... protection of privacy rights The protection of personal information by the government is important because it ensures personal confidence and individuals are able to constantly engage themselves in government activities....
7 Pages (1750 words) Case Study
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us