Privacy refers to a group or an individual ability to conceal their information and therefore express themselves as they want. The average person's privacy is defined as one's ability to have control over their individual information. The legal definition of privacy, on the other hand, refers to the people’s right to make individual choices involving intimate matters. Privacy is a fundamental right as it helps define which data a person would be willing to share about themselves, the time those individuals can access the information, and which individuals are allowed to know the information ( Higham, 2016). This essay discusses the relevance of PIAs on an individual and organizational perspective.
Organizations should limit the usage, retention along with an individual collection of identifiable information to what is precisely needed to achieve the mission and the purpose of the business. They should develop a fault management plan for dealing with breaches associated with PIA (McCallister, 2010). Another best practice to be incorporated by organizations is to audit the flow of information, involving the outsourced partners and vendors that access to customer's data.
Delegate your assignment to our experts and they will do the rest.
The federal government organizations in the United States are expected to utilize a PIA as a result of the electronic government act in 2002. The PIA is not needed for each information technology federal system; however, particular guidelines determine when to accomplish one. PIA is carried out if there is the development of new technology and the development of system revision. PIA cannot be accomplished if an informational system does not maintain PIA for national security purposes ( Sudarsan et al ., 2015). Utilization of PIA has helped citizens in different ways, such as reducing the cost of management time, legal expenses, and public concern through early identification of the privacy problem. PIA also helps organizations avoid costly mistakes related to privacy.
References
Higham, L. (2016). Best Practices of Big Data Analytics Applied to PII Security (Doctoral dissertation). https://dash.harvard.edu/bitstream/handle/1/33825785/HIGHAM-DOCUMENT-2017.pdf?sequence=1&isAllowed=y
McCallister, E. (2010). Guide to protecting the confidentiality of personally identifiable information (Vol. 800, No. 122). Diane Publishing.
Sudarsan, S. D., Jetley, R. P., & Ramaswamy, S. (2015). Security and privacy of big data. In Big Data (pp. 121-136). Springer, New Delhi. http://www.ttcenter.ir/ArticleFiles/ENARTICLE/3400.pdf