Saturday, May 24, 2014

security and privacy

This week I will be talking about privacy law and breaches of security.
It is still particularly relevant today and people should be aware that there are companies and individuals who would seek to gain information from them.

Telstra has just as recently as March been through an investigation into a breach in privacy. Telstra went under investigation into their privacy breach of their customer’s personal details which could be found on Google. Telstra has done the very best to rectify the problem putting in place such as software management and contract reviews. This has negatively impacted Telstra losing customers, trust and being fined $10,200.

Telstra needs to maintain the very best practice in keeping its customers detail private, build appropriate policies and guidelines into keeping information private.

Looking at a scenario i have read it addresses secruity concerns of a business and the discussion surrounding those.


We looked at the a case study, you can find it here:
http://mylams.com/ebusiness/topics-7-12/topic-12-security-and-privacy/
Read a dark scenario for more information relating back to the topics discussed.

What AmI technologies?
there are a number, iris scanners, boardroom video display, wafer thin video screens, Aml networks, location implants, sensor networks, high-capacity optical storage devices no larger than a deck of playing cards and surveillance systems.
What actions do a corporate business need to undertake to retrieve stolen information?
To begin with, corporate businesses generally have high level of security measures in place to stop this, such as giving employees partial access to databases and tracking device implants. Once there is a breach they frantically search for the employees and information missing and who had taken the information the business had acquired and disappeared with it.
Are there any comparisons you can make to technology companies today?
I am not aware of any Aml companies, i imagine that Telstra would have some sort of Aml or a third party supplier of information.
How realistic is the description of governments using the technology and prohibiting immigration from states with no AmI data aggregation information?
Not having enough information and denying people entry is wrong, however they do put people through an extensive screen process for the matter of the security of the nation. Not allowing certain individuals into a country based off information that is flawed or not detailed enough isn't good. However this information is mainly detailed towards individuals who are at high risk to others.
What would be the impact of this digital divide?
reasonable distance of communication, power of information and bargaining can create a void between nations and the interests of each.
List some of the ‘unintended consequences’ described in the case.
Looking at the case study, the Data Mining Corporation (DMC) has had its shares drastically drop, and a full investigation is underway.

No comments:

Post a Comment