System and Security Having Secure Essay

Total Length: 1131 words ( 4 double-spaced pages)

Total Sources: 3

Page 1 of 4

If they need to access a site for business purposes, they may not be able to do so, and that can lead to frustration and even lost contracts and opportunities (Miller, 2005). With that being the case, it would seem as though there should be a way to get around these restrictions. If people start avoiding restrictions, though, where does that end? At what point does it become unacceptable and dangerous, and at what point does it jeopardize the privacy, safety, and security of other people who have their information online?

The people who own the information (i.e. The people whose information is being collected) should be the ones to control how secure that information is in the sense of who can see it and access it. Because their names, dates of birth, addresses, phone numbers, and other information belongs only to them, they should be able to determine whether they want that information to be available online (Miller, 2005). With public records laws, that is not the case. So, should the law be changed to protect people who do not want their information made public? What about people who need to protect their identity because of stalking, identity theft, celebrity status, or other factors? The argument could be made that these people should not receive special treatment, but they are clearly more vulnerable to problems than the average person on the street who most people do not know and who does not have any enemies or reasons to believe that others would be 'out to get them.'

Currently, the government decides how secure information is when that information is part of public record (DiBattiste, 2009).
For information that is voluntarily given, such as to an internet company with which one is doing business, the company decides how secure that information is and what is done with it. The consumer has very little say in what happens to that information, even if the company insists that it is safe (Cranor, 2008). Regulations do not appear to be changing in this regard, but that does not mean that they should not be changed. Information that is given to companies voluntarily must be protected, and to truly keep information safe a person would most likely also want to protect their public records information and keep it from being accessible to anyone and everyone online.

Whether changes will be made to reduce the number of identity theft cases remains to be seen. Right now, there are passwords and other security measures in place that are used when people have sensitive information online such as bank accounts, but they are often not enough to truly protect those people and their information. If entire databases can be hacked, what good are individual passwords? The overall scope of hacking and other privacy concerns must be considered on a grand, global scale......

Show More ⇣


     Open the full completed essay and source list


OR

     Order a one-of-a-kind custom essay on this topic


sample essay writing service

Cite This Resource:

Latest APA Format (6th edition)

Copy Reference
"System And Security Having Secure" (2011, September 24) Retrieved May 6, 2025, from
https://www.aceyourpaper.com/essays/system-security-having-secure-45700

Latest MLA Format (8th edition)

Copy Reference
"System And Security Having Secure" 24 September 2011. Web.6 May. 2025. <
https://www.aceyourpaper.com/essays/system-security-having-secure-45700>

Latest Chicago Format (16th edition)

Copy Reference
"System And Security Having Secure", 24 September 2011, Accessed.6 May. 2025,
https://www.aceyourpaper.com/essays/system-security-having-secure-45700