Confidentiality is something all human beings hold dearly. They like having control over who gets to know what about their lives and would trade anything to keep their delicate data as private as possible. This has however been breached by the up to date advancement in the field of information technology which has consequently made it a lot easier to access people’s personal information and along comes an array of harmful consequences. The current century is proving to be the most informed about other individuals’ affairs. Recent events concerning big corporations have brought the message closer home that what humans have been worrying about are a reality and the equipment of acquiring, keeping and evaluating great amounts of data from handset discussions, bank statements and internet scrutiny are now available and are often utilized by management organizations when need arises.
This is a problem that even big firms have not been able to run from as they also at risk. On the same note, the connotation and worth of confidentiality is an element of substantial debate in the world today. The constant increase in the development of technology as well as the dwindling transparency and the concurrence on seclusion has created a good environment for crises in ethics and policy. Fresh knowledge and the internet incessantly come up with guiding principles on the subject of confidentiality. Many country legislators have managed to deal with a lot of privacy problems linked to online actions.
In the state of California there are laws put in place to protect child privacy an aspect referred to as an “eraser” bill. It is a bill enabling minors to request for content removal from particular websites. It also restricts web operators from providing certain adverts of precise merchandise or services to young people. In order to look after the private information of consumers of technology and digital services Delaware has put in place laws to prohibit prying eyes from accessing peoples private browsing information. They are only allowed to provide the data to federal agents when the safety of others is at stake. This law also necessitates a manuscript package supplier to put in order in addition to providing a yearly statement on the revelation of special information online unless otherwise stated. In case these requirements are not adhered to, the Justice department is authorized to look into and take legal action.
There is also a bill passed by the congressmen in Connecticut requiring any individual who has a Social Security identity in any trade course to construct a confidentiality security guiding principle. The bill also insists that the policy is displayed where people can locate it easily by uploading it on a web page and it ought to limit or eliminate unauthorized confessions and shield the privacy of social security numbers.
Nevada and Minnesota are the two states which necessitate Internet Service Providers to store without disclosing clandestine data pertaining to their clients unless the customer demands otherwise. They forbid leak of personally classifying information with Minnesota requiring the Internet Service Providers to acquire authorization directly from the subscribers before they decide to give away their data. Along with these, laws in California and Utah need all nonfinancial industries to let their customers know by any means possible the sorts of delicate data the corporation distribute to other people.
There are various ways through which individuals can protect their private information using the same information technology which undermines them in the first place. There are regulations and courses of action that can be applied on the particular systems in order to make this happen. There are Value Sensitive Designs which offer an assortment of approaches the technological designs that report human morals in an ethical manner” (Friedman et al. 2006). Cavoukian (2009) advocates for the Privacy by Design approach which can be regarded as a sensitive way of solving the problem. The principles created by these researchers are proof that this technique is highly effective and is not just a one-time thing (Cavoukian 2010). The Privacy Impact Assessment Approach also proposes a reliable process for analyzing the potential factors that affect the privacy of corporations’ activities Clarke (2009). Many internet service providers are now investing in software materials that anonymously provide privacy for them and their clients (Danezis & Gürses 2010). They often incorporate several cryptographic modus operandi and safety sets of rules in order to ensure their objectives are met.