Neo De Jesus -- Period 5(GITA 2)
1. High cost of data compliance: Companies that collect personal data are needed to consent with a broad range of data privacy mechanisms across the world. This is due not only to the cross border nature of personal data arrangements, but also due to the extra-territorial nature of various data privacy mechanisms. In this regard, it would be well-advised for companies to take reference to the high watermark of data privacy principles across authorities, in order to ensure compliance with all mechanisms. 2. Who is responsible for ensuring compliance with data protection legislation:Collecting the personal data of a large amount of individuals also means the companies will need to be responsible towards a lot of individuals over how their personal data is used. Data subjects may even have the right to appeal for companies to provide info on how their personal data is used, and companies are needed to provide such individuals with accurate info on this -- this may depend on the authority as well as the nature of the personal data in question. 3. Risk of data breach Companies that suffer a data breach and are found to have failed to execute sufficient security measures could be subjected to very impliable penalties from regulators. Even if a company isn't found to have been guilty for such breaches, the negative exposure bordering such data breaches could've been a major impact on the company's influence in the marketplace.Examples: Identify theft, misuse of personal data, malware, ransomware, etc. Click Link 1 for more info about this topic :)
Data misuse is the use of information in ways it wasn't intended for. User agreements, cooperate policies, data privacy laws, and industry regulations all set conditions for how data can be collected and used. Data misuse violates these requirements. Unlike data theft, data misuse doesn’t necessarily happen as a result of a cyberattack or when data is collected without the owner’s consent. Although preventing data theft by employees —as covered in the Computer Misuses Act—is important to consider, misusing data often means that permissions are being ignored: a user might willingly provide a company with their personal data, only for the company to use or share this information for purposes that the user didn’t agree to. Often, data misuse happens when employees lack good data handling practices. As an example: when employees copy confidential work files or data over to their personal devices, they make that information accessible outside of its intended, secure environment. Without the proper protections in place, this data can be stolen or accidentally leaked.Examples: Google has fallen afoul of multiple European data regulators. Previously fined €50m by France for unclear data consent policies, Ireland’s Data Protection Commission is investigating claims that Google fed personal data to advertisers in violation of the GDPR.Back in 2015, Morgan Stanley announced the dismissal of a financial adviser for downloading account data on the firm’s wealth management clients and publicly posting a number of account details online. Click Link 2 for more info about this topic :)
Unauthorized access is when a person gains entry to a computer network, system, application software, data, or other resources without permission. Any access to an information system or network that violates the owner or operator’s stated security policy is considered unauthorized access. Unauthorized access is also when legitimate users access a resource that they do not have permission to use. Guessing passwords is a common entry vector for unauthorized access. Manual password guessing is done using social engineering, phishing, or by researching a person to come up with information that could be the password.A mistake in software is referred to as a bug. In most cases, these bugs are annoying, but harmless. However, some bugs are significant vulnerabilities that can be exploited to gain unauthorized access into applications, networks, operating systems, or hardware. Best Practices for Preventing Unauthorized Access: Electronic Data Protection, Backup and Disposal of Data, Password Management and Protection, System and Device Protection, and Coaching Employees to Avoid Risky Behaviors Examples of Unauthorized Access:Door Propping - common way unauthorized individuals gain access to a location and potentially create a dangerous situation for the people and assets within.Tailgating - a tactic used to gain physical access to resources by following an authorized person into a secure building, area, or room. Exploiting software vulnerabilities - Hackers tend to be skilled and patient. By meticulously exploring a company’s digital network, a hacker could figure out exactly where the weak points are and exploit them. Fraudulent use of access cards - Access cards that are lost, stolen, copied or shared pose an unauthorized access risk. Click Link 3 for more info about this topic :) Along with this link(more info about examples of unauthorized access)
Increasingly, computing innovations have come to play a role in more and more of these activities. As new innovations come out, people will change how they go about their day-to-day business to take advantage of the new technology. For example, companies like Amazon and Instacart have changed the way many people shop. Instead of going to a physical store, people can now buy their groceries, clothing, and other consumer goods online.Beneficial Effects of Computing Innovations: - Machines have vastly improved the medical field, saving countless lives. - Engineers take advantage of computing innovations to collect data and design products. - Communications have especially flourished; today, we can communicate instantaneously with people anywhere around the world. - The artistic world has also benefited from new ways to create, share, and sell creative works.Harmful Effects of Computing Innovations: - Loss of privacy, and the use of private information gathered by companies - Replacement of humans by computing innovations, leading to the loss of previously existing jobs and economic hardship for the now-unemployed workers - Dependence on technology - Negative health consequences Click Link 4 for more info about this topic :)
Computing innovations can be used in ways that the creator had not originally intended. For example, the World Wide Web was originally intended only for sharing information within the scientific community, but it has grown into a vital part of our social and economic lives. The large number of users that use the WWW in different ways has resulted in significant impacts beyond its original purpose.The total effects of a social media app cannot always anticipated in advance.Responsible programmers try to consider the unintended ways their computing innovations can be used and the potential beneficial and harmful effects of these new uses, although it is not possible for a programmer to consider all the ways a computing innovation can be used. Click Link 5 for more info about this topic :)