0% found this document useful (0 votes)
694 views9 pages

A Research Paper For Data Privacy PAHUNANG FINAL

The document is a research paper on data privacy written by John Patrick Pahunang to fulfill requirements for a Bachelor of Science in Information Technology degree. The paper aims to examine the current state of data privacy, how data is collected and used, relevant laws and regulations, potential consequences of data breaches, and recommendations for improving privacy protection. The methodology section outlines security best practices for implementing strong privacy controls in IT systems like encryption, access controls, and monitoring while following all applicable laws and regulations.

Uploaded by

Bomer Rang
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
694 views9 pages

A Research Paper For Data Privacy PAHUNANG FINAL

The document is a research paper on data privacy written by John Patrick Pahunang to fulfill requirements for a Bachelor of Science in Information Technology degree. The paper aims to examine the current state of data privacy, how data is collected and used, relevant laws and regulations, potential consequences of data breaches, and recommendations for improving privacy protection. The methodology section outlines security best practices for implementing strong privacy controls in IT systems like encryption, access controls, and monitoring while following all applicable laws and regulations.

Uploaded by

Bomer Rang
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
  • Objective of the Study
  • Introduction
  • Significance of the Study
  • Scope and Limitations
  • Review of Related Literature
  • Methodology
  • References

A Research Paper

For

Data Privacy

by

John Patrick Pahunang

Bachelor of Science Information Technology

University of Science and Technology of Southern Philippines

In Fulfillment of Social and Professional Issues Final Performance Innovative Task

January 2023
Introduction

It is important to understand the consequences of this data collecting and how it affects our

privacy given the prevalence of personal information and data being gathered, utilized, and stored

by both individuals and organizations. We shall examine the idea of data privacy and its

significance in the modern world in this research paper. We will study the rules and laws that are

in place to protect people's privacy as well as the many methods of data collection, use, and storage.

We will also go through the possible repercussions of data breaches and the precautions that people

and businesses may take to safeguard themselves. By understanding the current state of data

privacy and its importance, we can work towards creating a safer and more secure online

environment for all.

Objective of the Study

The objective of this study is to examine the current state of data privacy and its importance in

the modern world. The study aims to:

1. Define data privacy and its relevance in today's digital age.

2. Explore the various ways in which data is collected, used, and stored by individuals and

organizations.

3. Analyze the regulations and laws that are in place to protect individuals' privacy.

4. Discuss the potential consequences of data breaches and the steps that can be taken to

prevent them.

5. Provide recommendations for improving data privacy and protecting against potential

breaches.
By achieving these objectives, the study aims to increase awareness and understanding of data

privacy and its importance, as well as provide practical guidance on how to protect one's own

privacy in the digital age.

Significance of the Study

This study is essential in terms of data privacy for a number of reasons. In today's digital

world, data privacy is firstly a crucial problem. It is crucial to comprehend the ramifications of this

data collecting and how it affects our privacy given the prevalence of personal information and

data being gathered, utilized, and stored by both individuals and organizations. We may raise

awareness of and knowledge of data privacy and its significance by carrying out this study. As a

result, people may be better able to decide how to share their personal information and data and

how to safeguard their own privacy.

This analysis can also aid in locating any potential holes or flaws in the current system by assessing

the current state of data privacy and the rules and laws that are in place to safeguard it. This can

help with the creation of new laws and regulations that will better safeguard people's privacy in

the digital era. Overall, this work has the potential to significantly advance our knowledge of and

ability to preserve the privacy of personal information, as well as contribute to the development of

a more secure and safe online environment for everyone.


Scope and Limitations

This research paper will focus on the concept of data privacy and its importance in the

modern world. The study will examine the various ways in which data is collected, used, and stored

by individuals and organizations, as well as the regulations and laws that are in place to protect

individuals' privacy. The paper will also discuss the potential consequences of data breaches and

the steps that can be taken to prevent them. The focus of the study will be on data privacy as it

pertains to individuals in the general population, rather than specific industries or sectors.

One limitation of this study is that it will not delve into the specific technical details of how

data is collected, used, and stored. Instead, it will provide a general overview of these concepts

and their relevance to data privacy. Additionally, the study will not focus on the specific data

privacy regulations and laws of any one country, but rather will provide a broad overview of the

legal landscape surrounding data privacy. Finally, this study will not address the potential ethical

considerations involved in data collection and use, but will rather focus on the practical

implications of data privacy for individuals.


Review of Related Literature

Lloyd v Google LLC

The data protection class action against Google which found that they are permissible in the case

of DPA breaches for the Safari Workaround. The case sets a precedent for representative opt-out

style class actions for data protection breaches under UK law. An application for permission to

appeal to the Supreme Court is pending. INFORRM had a case comment. Coverage from legal

outlets was broad including Matrix Chambers, DLA Piper, Linklaters and Farrer & Co.

R (Bridges) v Chief Constable of South Wales Police and Others [2019] EWHC 2341 (Admin)

The decision of the Administrative Court that the police’s use of facial recognition software was

lawful. The case applied the UK’s pre-existing data protection framework to determine the

lawfulness of the software, a precedential exercise. An appeal to the Court of Appeal is pending.

We had a post on Inform and there were posts also on Panopticon, Law Gazette, Matrix

Chambers and the Privacy Law Barrister.

ZXC v Bloomberg LP [2019] EWHC 970 (QB)

A case bought on the grounds that those investigated by law enforcement have the right to privacy

generally. A newspaper named the claimant in the course of citing confidential information

obtained from a UK law enforcement agency. The claimant was successful and awarded

£25,000. We had a case comment on INFORRM. Matrix Chambers, 5RB, Wiggin and Practical

Law also had commentary.


Google LLC v CNIL[2019] EUECJ C-507/17

The Court of Justice found that the territorial scope of the right to be forgotten was jurisdictionally

limited and therefore could not be applied to worldwide domain names. We had an Inforrm post on

this. The case drew much commentary- see Harvard’s Law Blog, Monckton Chambers and The

European Law Blog.

R v Jarvis 2019 SCC 10

The Canadian Supreme Court’s important decision on “reasonable expectation of privacy” in the

context of the “voyeurism” offence, with wider implications for regulatory and common law

privacy. There were posts on the Canadian Privacy Law blog and on The [Link] blog.
Methodology

There are several ways to solve and prevent data privacy issues in the context of IT:

1. Implement strong security measures: This includes things like encrypting data, using strong

passwords, and regularly updating software and systems. These measures can help to

prevent unauthorized access to data and protect against data breaches.

2. Implement proper access controls: This involves setting up systems to ensure that only

authorized individuals are able to access certain data. This can include things like setting

up user accounts with unique login credentials and implementing multi-factor

authentication.

3. Regularly monitor systems: Regularly monitoring systems for potential security

vulnerabilities can help to identify and fix any issues before they are exploited.

4. Follow best practices for data storage: This includes things like storing data in secure

locations, such as encrypted servers, and regularly backing up data to prevent loss in the

event of a data breach.

5. Implement and follow proper data handling procedures: This involves setting up policies

and procedures for handling data, such as properly disposing of data when it is no longer

needed, and training employees on these procedures to ensure that they are followed.

By implementing these measures, organizations can help to protect the privacy of their customers

and users, and prevent data breaches and other security incidents.
There are several ways in which data privacy can be either safe or unsafe when implemented in IT

systems. Here are a few examples:

Safe:

• Encrypting data: Encrypting data means that it is converted into a code that can only be

accessed by someone with the proper decryption key. This can help to protect data from

being accessed by unauthorized parties.

• Implementing strong passwords: Using strong passwords and regularly updating them can

help to prevent unauthorized access to data.

• Regularly updating software and systems: By regularly updating software and systems,

organizations can ensure that they are protected against known security vulnerabilities.

Unsafe:

• Storing data in unsecured locations: Storing data in unsecured locations, such as on an

unencrypted computer or in an unsecured cloud storage system, can make it vulnerable to

being accessed by unauthorized parties.

• Using weak passwords: Using weak or easily guessable passwords can make it easier for

unauthorized parties to access data.

• Failing to properly secure data: Failing to properly secure data, such as by not encrypting

it or not implementing proper access controls, can make it vulnerable to being accessed by

unauthorized parties.
References

• [Link]

selection-suneet-sharma/

• [Link]

privacy/#:~:text=Data%20privacy%20is%20also%20important,trusted%20with%20their

%20personal%20data.

• [Link]

• [Link]

privacy/#:~:text=Data%20privacy%20is%20the%20right,regulated%20at%20the%20fed

eral%20level.

You might also like