Everything at your finger tips

Everything at your finger tips

Monday, 23 March 2015

Internet Security and Privacy


Privacy breach





Through the use of Google search,more than 15,775 Telstra customers had their information made public between February 2012 and May 2013. Telstra had breached the privacy of its customers through the internet. Data was made accessible to anyone that had used the Google search engine. Data that was exposed and made accessible for public viewing was customers names, telephone numbers and in some cases even their home and business address. Consequently by failing to take the proper measures and destroying personal information,Telstra had breached three National Privacy Principles .Furthermore due to the privacy laws that had been broken Telstra was fined $10,200. To ensure that this was not going to happen again Telstra agreed to replace the existing software platform ,on which it had occurred and to review contracts of the third parties that were managing the personal information.

So what can you do about privacy? It is good practice to -Tell people who and what information you disclose to others and to ask permission before collecting information online. Many websites have opt-out check boxes when collecting information – it would be better to have opt-in check boxes, but of course that presents a marketing dilemma.

It may be helpful to think of Security as Authentication and Privacy as Authorisation. This approach may seem to simplistic, BUT, this is a very useful concept in the development of a privacy policy. You may know the password (authentication) to your sister, brother’s or partner’s email account but are you authorised to use it????

Question 2
What AmI technologies are identified in the case?
There is a huge amount of Data collected through systems, these systems gather data through sources such as location implants, surveillance systems, sensor networks in homes and mobile phone tracking. Accordingly these systems endeavor to compare data and forecasting data about individuals. Once the data has been gathered and compiled then it is resold back to its original company. Some example of these companies may be mobile phone companies and insurance companies.


What drives DMC’s officers to take the actions they took?
DMC could have had possible financial losses if there was no actions taken. There was a need for them to protect their business, due to having information thieved. They had no alternative but to try and cover up the breach. Consequently this could have ruined the business and given them a bad reputation and would have lost considerable amounts of profit.
 
DMC is the clear market leader in the aggregation of AmI data. Are there any comparisons you can make to technology companies today?
Department of Human Services, Vic Roads, Centerlink and many other government bodies are all collecting data and information of individuals. Government corporations use this data for evidence or for predicting future of revenue and unemployment rates.
How realistic is the description of governments using the technology and prohibiting immigration from states with no AmI data aggregation information?
Governments using technology and prohibiting immigration can be considered as realistic. With the use of Ami data when traveling in or out of a country there is a need for information on the individual. If Immigrating or travelling to another country there is a requirement for authorities to know as much as possible on the individual. Countries do not allow for you to immigrate unless they know about you.


What would be the impact of this digital divide?
Digital divide impacts enormously on
individual and organizations that may be technologically, sociologically, or economically disadvantaged, they may not have access or lack knowledge in these areas. Therefore this is creating a gap between them and others that may have access. Countries that are heavily invested in technology will be advantaged and those that are poor will become poorer as they do not have the revenue and will be left behind in technologically.


List some of the ‘unintended consequences’ described in the case.
Data was stolen and individuals/public were unaware that there had been  access to their private information. The system was ineffective and had flaws , they were able to track information on the public but unable to find the employees involved. Subsequently with the company being sued by consumer activist groups, this may have forced the President of the company to resign.







Source:
Retrieved from http://cdn.c.photoshelter.com/img-get/I0000TZpSDtWWtPU/s/750/750/Computer-data-screen-illustration.jpg

Retrieved from http://www.security-faqs.com/wp-content/uploads/2009/11/How-Do-I-Backup-My-Computer-Data-Online.jpg


Riggins, F., & Dewan, S. (2005). The digital divide: Current and future research directions. Journal of the Association for information systems, 6(12), 13.

content/uploads/2011/04/telstra_logo.jpg
  




No comments:

Post a Comment