There are three primary premises for keeping data protected. Some data are protected to protect human life while others are for human privacy. Another and most common reason for protecting data is for pecuniary reasons. Human beings have always been a threat to one another for a variety of reasons hence the need to keep some information private as a security measure. To keep people safe, it is necessary for some sensitive information to remain privileged both in the public and the private sector (McDermott, 2017). In a big organization, for example, a single decision can have major ramifications and information about it can place the decision-maker in danger. With regard to privacy, there is pertinent information about most people that they would rather keep private such as medical records (Floridi, 2016). Keeping such information privileged is critical for the protection of that right to privacy. It is, however, to protect life or make money that most data in the modern world is kept private (Soomro, Shah, & Ahmed, 2016). Some trade secrets, for example, are worth billions of dollars.
My previous employer, a Bank, has three main kinds of protected data. The first set of data belong to employees, the second belong to customers and finally, privileged information about the bank itself. Among the privileged information belonging to employees are their social security numbers, how much each employee earns, and information regarding their employment contracts. Similarly, the bank by virtue of its operations has privileged information belonging to its customers, be they individuals or corporations. Among the privileged information that must be protected include the amount of money in each customers account, the nature of transactions that are carried out therein and the access codes for the accounts. Finally, for the Bank itself, trade secrets, access codes and the amounts available to the bank are among the protected information it holds. If a security breach on the banks servers made CNN News, the bank could collapse because of loss of funds, loss of information based trade tools, but most importantly, the massive lawsuits that would be visited upon it due to the breach of privacy occasioned.
Delegate your assignment to our experts and they will do the rest.
References
Floridi, L. (2016). On human dignity as a foundation for the right to privacy. Philosophy & Technology , 29 (4), 307-312
McDermott, Y. (2017). Conceptualizing the right to data protection in an era of Big Data. Big Data & Society , 4 (1), 2053951716686994
Soomro, Z. A., Shah, M. H., & Ahmed, J. (2016). Information security management needs more holistic approach: A literature review. International Journal of Information Management , 36 (2), 215-225