This week I will be talking about privacy law and breaches of
security.
It is still particularly
relevant today and people should be aware that there are companies and
individuals who would seek to gain information from them.
Telstra has just as
recently as March been through an investigation into a breach in privacy.
Telstra went under investigation into their privacy breach of their customer’s
personal details which could be found on Google. Telstra has done the very best
to rectify the problem putting in place such as software management and
contract reviews. This has negatively impacted Telstra losing customers, trust
and being fined $10,200.
Telstra needs to maintain
the very best practice in keeping its customers detail private, build
appropriate policies and guidelines into keeping information private.
Looking at a scenario i
have read it addresses secruity concerns of a business and the discussion
surrounding those.
We looked at the a case study, you can find it here:http://mylams.com/ebusiness/topics-7-12/topic-12-security-and-privacy/
Read a dark scenario for more information relating back to the topics discussed.
What AmI technologies?
there are a number, iris scanners, boardroom video display, wafer thin video screens, Aml networks, location implants, sensor networks, high-capacity optical storage devices no larger than a deck of playing cards and surveillance systems.
there are a number, iris scanners, boardroom video display, wafer thin video screens, Aml networks, location implants, sensor networks, high-capacity optical storage devices no larger than a deck of playing cards and surveillance systems.
What actions do a corporate business need
to undertake to retrieve stolen information?
To begin with, corporate businesses generally have high level of security measures in place to stop this, such as giving employees partial access to databases and tracking device implants. Once there is a breach they frantically search for the employees and information missing and who had taken the information the business had acquired and disappeared with it.
To begin with, corporate businesses generally have high level of security measures in place to stop this, such as giving employees partial access to databases and tracking device implants. Once there is a breach they frantically search for the employees and information missing and who had taken the information the business had acquired and disappeared with it.
Are there any
comparisons you can make to technology companies today?
I am not aware of any Aml companies, i imagine that Telstra would have some sort of Aml or a third party supplier of information.
I am not aware of any Aml companies, i imagine that Telstra would have some sort of Aml or a third party supplier of information.
How realistic is the
description of governments using the technology and prohibiting
immigration from states with no AmI data aggregation information?
Not having enough information and denying people entry is wrong, however they do put people through an extensive screen process for the matter of the security of the nation. Not allowing certain individuals into a country based off information that is flawed or not detailed enough isn't good. However this information is mainly detailed towards individuals who are at high risk to others.
Not having enough information and denying people entry is wrong, however they do put people through an extensive screen process for the matter of the security of the nation. Not allowing certain individuals into a country based off information that is flawed or not detailed enough isn't good. However this information is mainly detailed towards individuals who are at high risk to others.
What would be the impact
of this digital divide?
A reasonable distance of communication, power of information and bargaining can create a void between nations and the interests of each.
A reasonable distance of communication, power of information and bargaining can create a void between nations and the interests of each.
List some of the
‘unintended consequences’ described in the case.
Looking at the case study, the Data Mining Corporation (DMC) has had its shares drastically drop, and a full investigation is underway.
Looking at the case study, the Data Mining Corporation (DMC) has had its shares drastically drop, and a full investigation is underway.
No comments:
Post a Comment