1 May 2022


Your life is somewhere in a database

Format: APA

Academic level: College

Paper type: Coursework

Words: 284

Pages: 1

Downloads: 0

A heated debate has been witnessed over the recent years on the level of confidentiality records of various individuals are being handled with. There are different views among people on whether criminal, financial, insurance and telephone records should be shared or not. 

In my opinion, records concerning criminal, finances, insurance and telephone should be kept away from public. Financial, insurance, and telephone records should be completely confidential and should never be shared with any other party unless there is a formal permission from the owner or if there is a security reason for sharing such information. Crime records, on the other hand, can be shared among security agencies for the purpose of tracking crime record of an individual if need be and using that information to make an informed decision on a person based on records. Moreover, the information regarding crime can cross the border and may be utilized by international security agencies such as Interpol for purposes of safety (Blankley, 2004). 

It’s time to jumpstart your paper!

Delegate your assignment to our experts and they will do the rest.

Get custom essay

Information of an individual regarding telephone, insurance and financial status of a person should be handled by telephone companies, insurance companies, and banks respectively and availed to the security agencies only on request or after formal permission from the owner has been obtained. 

For those who have committed a crime however, all the information should be shared by the people who are responsible for the records such as financial institutions, insurance companies, and even telephone companies because they are required to bringing the perpetrator to justice. This can be done even without the permission of the owner being obtained. However, the information of those who have not been paroled should not be made public to avoid the former convicts being victimized or stigmatized for their past mistakes. 


Blankley, K. M. (2004). Are Public Records Too Public-Why Personally Identifying Information Should Be Removed from Both Online and Print Versions of Court Documents. Ohio St. LJ , 65, 413.

Cite this page

Select style:


StudyBounty. (2023, September 14). Your life is somewhere in a database.


Related essays

We post free essay examples for college on a regular basis. Stay in the know!

Security Implication of the Internet of Things

The Internet of Things (IoT) can be described as s system of interconnected devices that have the ability to transfer information over a computer network without the need of human-to-computer or human-to-human...

Words: 892

Pages: 3

Views: 96

Modern Day Attacks Against Firewalls and VPNs

Introduction The need to have an enhanced security of the computer connectivity happens to be one of the reasons that attract companies and organizations towards wide usage of VPNs. Several simple techniques...

Words: 2025

Pages: 7

Views: 134

How to Deploy and Administer Windows Server 2012

Securing a reliable, and expandable configuration for a company is important to build a strong network. The new and enhanced features of the Windows Server 2012 can be used to implement the network. In this...

Words: 1673

Pages: 6

Views: 87

Deployment Model in Cloud Computing

Deployment model is a representation of a cloud environment primarily distinguished by parameters such as accessibility, proprietorship, and storage size. The National Institute of Standards and Technology gives the...

Words: 254

Pages: 1

Views: 81

How to Use Web Search Engines for Business Research

The advancement of technology has made it possible for many people around the world to have easy access to information whenever they want. The development of the Wide World Web-enabled different kinds of information...

Words: 773

Pages: 3

Views: 86

Distributed Database Management System (DDBMS)

Introduction Data management has been a headache to many technology enthusiasts for quite a long period of time. They have successfully managed to logically collect interrelated data and share it. If the data is...

Words: 799

Pages: 3

Views: 127


Running out of time?

Entrust your assignment to proficient writers and receive TOP-quality paper before the deadline is over.