Privacy and Safety on the Internet

Do you need this or any other assignment done for you from scratch?
We have qualified writers to help you.
We assure you a quality paper that is 100% free from plagiarism and AI.
You can choose either format of your choice ( Apa, Mla, Havard, Chicago, or any other)

NB: We do not resell your papers. Upon ordering, we do an original paper exclusively for you.

NB: All your data is kept safe from the public.

Click Here To Order Now!

This paper deals with the issue of safeguarding privacy on the internet. It outlines safety policies to follow when disseminating or allowing personal private data to be used. Further, the paper the paper considers ethical principles or conduct individuals should develop in order to promote their personal security and their information on the internet. In conclusion, this essay reiterates the importance of adhering to safe practices when using the internet.

Privacy protection on the internet is pegged on surveillance and individuals anticipating control of how personal information is disseminated and used. This has become a major concern because of modern information technology advancement that makes it easy to compromise information safety on the internet (Weber 200).

Privacy of personal information on the internet encompasses three major aspects. The first one is individual space. Individuals feel comfortable when performing in a protected environment; guarded against undesirable objects and signals which they haven’t anticipated (Weber 203).

The second aspect is freedom to make personal decisions in relation to the information flow and dissemination. Freedom to share information is what users demand in the cyberspace. Individuals do not want to be interfered with and they feel they should be in control of their personal data and how it is processed at their own discretion (Weber, 205). Modern information technology innovations pose serious security concerns for users of the internet.

Quick stream, cookies and electronic data warehousing have caused digital discomfort because it leads to exposure of personal information. There has been no thorough surveillance technology developed to comprehensively monitor how malicious applications steal or make away with personal data (Khosrow-Pour 68). Privacy should therefore encompass safety in three major ways i.e. confidentiality of personal information, anonymity and attention paid to an individual (Khosrow-Pour 73).

To enhance privacy and security on the internet, data should be accessed in a confidential way so that it cannot be divulged to third parties. A policy to govern internet usage is vital. Data controllers, which are parties empowered by the law to guarantee safety on the internet should be competent enough as to handle the contents of personal data with utmost care.

The data controllers should enforce security measures to ensure collection, storage, processing and dissemination is performed in secure environment to protect the recipients (Imparato 99).

A privacy guideline plays an important role with regard to personal information collected on the internet. Sound policies enable users to feel comfortable because it enables the user in identifying safe sites on the internet. Secondly, privacy guidelines foster trust between users and the developers as they read from the same script when it comes to security on the internet. When users feel comfortable and confident about a given website, they can interact more or use the website more, which is the aim of developers (Imparato 119).

Policy should strive towards transparency in internet transactions. The user should have knowledge of how his or her information is being collected, the purpose of collection and how the party is going to use the information. This knowledge builds the trust of the user because incase the information is taken into wrong hands; the user can hold the liable party basing on policies they have outlined.

To ensure effective internet policy and promote accountability in the use internet technology, the following policy guideline should be considered. The first important aspect of a guideline is responsibility (Schell 112). The party collecting data should be responsible for the data collected i.e. he or she should account for personal information in his or her possession.

The second guideline is that the purpose of personal information collected and processed should be clear at the onset of collection and its limit specified; this will ensure that an individual feels safe with his data on the internet (Schell 114). The third guideline is that the information collected should be limited to the task of accomplishing a set purpose.

The final guideline is that a person whom the information is collected from should have access to the information collected and should have the freedom to correct and make it accurate as possible. An individual should be notified within a reasonable time and in a form which he can clearly understand. If the data collected is not about him, he can challenge to have data discarded, to be completed or amended to safeguard his safety (McBride, 56).

Finally, the principle regarding personal data and protection or full disclosure in relation to all security concerns is critical. There should be a policy which outlines development and practices. A policy to solely screen and enhance integrity should exist within established framework to ensure openness prevails (Schell 124).

Security protection policy is essential towards ensuring that individuals are protected while using the internet. The internet has evolved with set of complex challenges and realizing security for individuals and data has been a major concern. However, several methods can be used to safeguard an individual and resources while interacting with the internet. The first security measure that can be considered is encryption (McBride, 112).

Encryption involves using an algorithm to transform txt messages to human unreadable format. It is performed using a special key which is needed to decrypt it back to human readable form. To securely disseminate information on the net, this security method is useful because it prevents potential hackers who intercept the data from understanding (McBride, 124).

The second measure for enhancing safe internet computing is instituting firewall. Firewalls play a significant role in the network by barring unwarranted users. It screens inbound and outbound information hence no threat is allowed to enter into and individual network thereby improving internet security (Imparato 134).

The final security measure to ensure safety and protection is achieved on the internet is use of password. Password provide efficient protection on stored data, however, the password should often be changed to enhance its effectiveness because they have been prone to hacking (Imparato, 135). Password practices when practiced promotes users protection while on the internet

In conclusion, effective policy guidelines facilitate individual protection while on the internet. Proper guidelines and practice prevent situations where identity theft and other security breaches happen; impacting negatively on individuals and organizations. Precaution is necessary when divulging personal information to guarantee safety and confidentiality.

When inputting some personal information on some website, individuals have to be extremely conscious about how safe the website is; some sites have been technically advanced in that they use cookies and other methods to tap into personal information that can later be used against the user.

Some sites can tap into credit card information which is later use to transact businesses without the owners’ consent. For effective safety, guidelines or policy regarding personal data and how it is used can be very helpful for individuals. Safeguarding safety on internet leads to user confidence and trust thus enabling realization of maximum benefits from internet usage.

Works Cited

Imparato, Nicholas. Public Policy and the Internet: Privacy, Taxes, and Contract. California: Hoover Press, 2000.

Khosrow-Pour, Mehdi. Web Technologies for Commerce and Services Online. Pennsylvania: Idea Group Inc (IGI), 2008.

McBride, Patrick. Secure Internet Practices: Best Practices For Securing Systems In The Internet And E-Business Age. Boca Raton: CRC Press, 2002.

Schell, Bernadette, Hlubik. The Internet and Society: a Reference Handbook. California: ABC-CLIO, 2007.

Weber, Rolf, H. Shaping Internet Governance: Regulatory Challenges. Michigan: Springer, 2010.

Do you need this or any other assignment done for you from scratch?
We have qualified writers to help you.
We assure you a quality paper that is 100% free from plagiarism and AI.
You can choose either format of your choice ( Apa, Mla, Havard, Chicago, or any other)

NB: We do not resell your papers. Upon ordering, we do an original paper exclusively for you.

NB: All your data is kept safe from the public.

Click Here To Order Now!