14 Aug 2022

49

Examples of Protected Data

Format: APA

Academic level: Master’s

Paper type: Essay (Any Type)

Words: 343

Pages: 1

Downloads: 0

There are three primary premises for keeping data protected. Some data are protected to protect human life while others are for human privacy. Another and most common reason for protecting data is for pecuniary reasons. Human beings have always been a threat to one another for a variety of reasons hence the need to keep some information private as a security measure. To keep people safe, it is necessary for some sensitive information to remain privileged both in the public and the private sector (McDermott, 2017). In a big organization, for example, a single decision can have major ramifications and information about it can place the decision-maker in danger. With regard to privacy, there is pertinent information about most people that they would rather keep private such as medical records (Floridi, 2016). Keeping such information privileged is critical for the protection of that right to privacy. It is, however, to protect life or make money that most data in the modern world is kept private (Soomro, Shah, & Ahmed, 2016). Some trade secrets, for example, are worth billions of dollars. 

My previous employer, a Bank, has three main kinds of protected data. The first set of data belong to employees, the second belong to customers and finally, privileged information about the bank itself. Among the privileged information belonging to employees are their social security numbers, how much each employee earns, and information regarding their employment contracts. Similarly, the bank by virtue of its operations has privileged information belonging to its customers, be they individuals or corporations. Among the privileged information that must be protected include the amount of money in each customer’s account, the nature of transactions that are carried out therein and the access codes for the accounts. Finally, for the Bank itself, trade secrets, access codes and the amounts available to the bank are among the protected information it holds. If a security breach on the bank’s servers made CNN News, the bank could collapse because of loss of funds, loss of information based trade tools, but most importantly, the massive lawsuits that would be visited upon it due to the breach of privacy occasioned. 

It’s time to jumpstart your paper!

Delegate your assignment to our experts and they will do the rest.

Get custom essay

References 

Floridi, L. (2016). On human dignity as a foundation for the right to privacy.  Philosophy & Technology 29 (4), 307-312 

McDermott, Y. (2017). Conceptualizing the right to data protection in an era of Big Data.  Big Data & Society 4 (1), 2053951716686994 

Soomro, Z. A., Shah, M. H., & Ahmed, J. (2016). Information security management needs more holistic approach: A literature review.  International Journal of Information Management 36 (2), 215-225 

Illustration
Cite this page

Select style:

Reference

StudyBounty. (2023, September 15). Examples of Protected Data.
https://studybounty.com/examples-of-protected-data-essay

illustration

Related essays

We post free essay examples for college on a regular basis. Stay in the know!

Security Implication of the Internet of Things

The Internet of Things (IoT) can be described as s system of interconnected devices that have the ability to transfer information over a computer network without the need of human-to-computer or human-to-human...

Words: 892

Pages: 3

Views: 97

Modern Day Attacks Against Firewalls and VPNs

Introduction The need to have an enhanced security of the computer connectivity happens to be one of the reasons that attract companies and organizations towards wide usage of VPNs. Several simple techniques...

Words: 2025

Pages: 7

Views: 135

How to Deploy and Administer Windows Server 2012

Securing a reliable, and expandable configuration for a company is important to build a strong network. The new and enhanced features of the Windows Server 2012 can be used to implement the network. In this...

Words: 1673

Pages: 6

Views: 88

Deployment Model in Cloud Computing

Deployment model is a representation of a cloud environment primarily distinguished by parameters such as accessibility, proprietorship, and storage size. The National Institute of Standards and Technology gives the...

Words: 254

Pages: 1

Views: 82

How to Use Web Search Engines for Business Research

The advancement of technology has made it possible for many people around the world to have easy access to information whenever they want. The development of the Wide World Web-enabled different kinds of information...

Words: 773

Pages: 3

Views: 87

Distributed Database Management System (DDBMS)

Introduction Data management has been a headache to many technology enthusiasts for quite a long period of time. They have successfully managed to logically collect interrelated data and share it. If the data is...

Words: 799

Pages: 3

Views: 128

illustration

Running out of time?

Entrust your assignment to proficient writers and receive TOP-quality paper before the deadline is over.

Illustration