meta data for this page
Strong data security is not optional
Lax security can lead to lawsuits, penalties and higher costs:
5 facets of data security
When securing data is not only a firewall and password issue
When confronted with the potential of data breaches, owners of this data and system administrators often consider first the most obvious angle of security: preventing individuals with malicious intentions to gain access to data. But there are several facets that need to be accounted for to ensure that confidential data is not found in places where it shouldn't be. -Securing data from malicious attacks -Securing data from unauthorized access -Securing data from unusual extraction -Securing data from unintended use -Securing data from unexpected dissemination
*Connect via Facebook, information sharing When you grant a company access to your Facebook FB +% profile, do you think about how it’ll use the info you’ll be handing over on an ongoing basis? Probably not. When you click that Facebook Connect button, you’re probably just thinking, “Awesome, that makes it easier to sign onto that website.” What you should actually be thinking is, “This company may now be mining everything I say and do from here on out to figure out what to sell to me.” At a conference organized by data warehouse company Teradata TDC +1.51% this week, one Japanese company laid out exactly how it’s leveraging insights from Facebook to better market to its customers and increase sales. Nissen Co., LTD is a catalog company that sends out over 200 million food, clothing, and consumer good catalogs in Japan each year. “We customize the page content for each customer,” said Shigeru Kakimaru of Nissen’s marketing team. The catalogs people now get in the mail reflect products chosen for them based on their Facebook chatter, though the customers probably don’t realize it. http://www.forbes.com/sites/kashmirhill/2012/10/25/how-a-company-takes-full-advantage-of-your-facebook-information/#5d16460c1380 . Sound Cloud Use of Information**
To operate and maintain your SoundCloud® account, and to provide you with access to the Website and use of the Apps and any Services that you may request from time to time. Your email address and password are used to identify you when you sign into the Platform. Your device-IDs are used to ensure that you are in control of the devices that have access to your Subscription.
To identify you as the creator of the sounds that you upload, the comments that you post and/or the other contributions that you make to the Platform.
To seek your participation in surveys, and to conduct and analyze the results of those surveys if you choose to participate.
To provide you with technical support.
To respond to you about any comment or enquiry you have submitted.
To provide other users with data regarding people's listening behavior of their sounds, i.e. streaming and downloading their sounds or playlists or following their profiles.
We use your month and year of birth to enable age restriction.
Q1. What do you think about compromising on privacy over security? To what extent you are willing to compromise your privacy? Give arguments with reasons?
Why it is good: The question is important because, it has big discussion and every individual has their own point of view its good to have various views.
Q2. Does fourth amendment control information collected? Does it guarantee any kind of privacy of information gathered? Explain?
Why it is good: The question gives idea how fourth amendment is important? And what measures have taken to make it secure.
Q3. How search warrants are important for security and privacy?
Why it is good: it can increase understanding about search warrants and show how security and privacy are important.
Why it is good: The question can be answered with real life experience of every individual and shows how we breach others privacy, does our own privacy is secure?