Posts

Showing posts from May, 2022

Conclusion (Essay)

 Conclusion To conclude, companies do have a great responsibility over securing consumer’s data or inform them how to secure it. Furthermore, big companies can take bigger actions to secure their consumer’s data. Even could go against government for the privacy of consumer. As in the example of Apple.     Reference(s): Baily, C., Garland, W., Nitchals, L. and O’Rourke, J., 2017. Apple, Inc.: Data Privacy and a Request from the FBI. London: SAGE Publications, Inc. Available at: <https://dx.doi.org/10.4135/9781526444783> [Accessed 8 May 2022]. Cloudian, 2022. Data Protection and Privacy: 12 Ways to Protect User Data. [online] Cloudian. Available at: <https://cloudian.com/guides/data-protection/data-protection-and-privacy-7-ways-to-protect-user-data/> [Accessed 8 May 2022]. EMOTIV, 2022. Data Privacy. [online] EMOTIV. Available at: <https://www.emotiv.com/glossary/data-privacy/> [Accessed 8 May 2022]. Gossels, 2022. Securing Sensitive Data. [online] Digital...

Main Body (Essay)

 Main Body Big companies such as Apple, Facebook, Samsung, etc. benefits from complying with data privacy laws. If they were not to comply with the General Data Protection Regulation (GDPR), penalties and fines imposed might be severe. GDPR requires not just the secure storage of user information, but also the exchange of data upon request. Effective processes for meeting these data governance standards can save money for the company (Emotiv, 2022). GDPR lays out seven principles for processing of personal data correctly. Such as, transparency, limitation, minimisation, accuracy, security, and accountability. Companies can avoid taking risk for data of their costumers by simply following the principles of GDPR (UHI, 2022).  In today's digital age, keeping sensitive data safe from theft and exposure isn't as simple as locking the file cabinet - especially with the increased adoption of cloud computing. Even if all precaution taken with online accounts and personal information, ...

Introduction (Essay)

INTRODUCTION Securing Data  In 2016, FBI asked Apple to give access for a device (iPhone 5C running iOS 9) of a criminal. However, right after the FBI request, Apple refused to comply with the FBI’s request and a court order was issued ordering Apple to help the FBI hack into criminal’s electronic device. (Baily et al. (2017, pp. 1-21) This is a great example for aim of this essay. As explained in the example as well, Apple’s commitment to protecting the privacy of its customers and the law came into conflict. Therefore, this essay seeks to explain what GDPR is and why it is important. Furthermore, show examples of securing data and the technologies used for securing data.