SlideShare a Scribd company logo
1 of 3
Surname 1
Name
Professor
Course
Date
Week 2 Discussion
The issue involving John and other employees regarding personal data being collected by
cell phone providers is sensitive; thus, it needs to be explored from a critical perspective. The
situation is even worse when we consider that such information can be misused to the detriment
of the employees if accessed by malicious people. In this sense, I advise adopting a clear
personal data collection policy and guidelines that articulately outline the type of data that
cellphone providers should be allowed to collect and the data that need to be eliminated from
being collected/stored. I also recommend that binding sanctions be outlined, highlighting the
penalties imposed on any service provider who breaks the formulated rules.
In my view, the very minimum data possible for operation should be allowed to be
collected, while the gathering of customers’ sensitive information should be avoided. The first
kind of data that I feel should be eliminated from being collected includes the client’s passwords.
Such data can easily be used to hack into the client’s accounts, resulting in dreadful
consequences (Buckey 82). Additionally, it is important to restrict the collection of contacts,
pictures, and videos stored in the users’ phones. Such data is excessively private, thus should
only be accessed by other third parties only with the consent of the owner. If such information
falls into the wrong hands, it can be used for unethical acts such as cyberbullying and extortion
Surname 2
of the users (Buckey 148). Lastly, data such as calendar information and the user’s location
should also be eliminated from the data to be collected and stored for security purposes.
The adopted policies should require companies to notify consumers of the specific data
being collected, and the data is stored, shared, and used. The issue involving John that involves
collecting his data can be viewed as an ethical practice since the act is tantamount to infringing
one’s privacy. I would address this issue by ensuring that the customers are informed and
consent before cell phone providers collect and store their private information.
Surname 3
Work Cited
Buckey, A W. Personal Data Collection. 2020. Print.

More Related Content

What's hot

Social engineering power point
Social engineering power pointSocial engineering power point
Social engineering power pointericwinn
 
E mail fraud
E mail fraudE mail fraud
E mail fraudslire
 
Principles of mobile privacy
Principles of mobile privacyPrinciples of mobile privacy
Principles of mobile privacyEuphodia Maluleke
 
Ps sir privacy-statement
Ps   sir privacy-statementPs   sir privacy-statement
Ps sir privacy-statementdivasia
 
Gdpr ready reckoner for marketers
Gdpr ready reckoner for marketersGdpr ready reckoner for marketers
Gdpr ready reckoner for marketersSmarteInc
 
Illegal video recording & violation of privacy
Illegal video recording & violation of privacyIllegal video recording & violation of privacy
Illegal video recording & violation of privacyDhruveshPatel31
 

What's hot (6)

Social engineering power point
Social engineering power pointSocial engineering power point
Social engineering power point
 
E mail fraud
E mail fraudE mail fraud
E mail fraud
 
Principles of mobile privacy
Principles of mobile privacyPrinciples of mobile privacy
Principles of mobile privacy
 
Ps sir privacy-statement
Ps   sir privacy-statementPs   sir privacy-statement
Ps sir privacy-statement
 
Gdpr ready reckoner for marketers
Gdpr ready reckoner for marketersGdpr ready reckoner for marketers
Gdpr ready reckoner for marketers
 
Illegal video recording & violation of privacy
Illegal video recording & violation of privacyIllegal video recording & violation of privacy
Illegal video recording & violation of privacy
 

Similar to 359763713 other rev

Business communication (zayani)
Business communication (zayani)Business communication (zayani)
Business communication (zayani)hassan777898
 
Introduction to Data Security Breach Preparedness with Model Data Security Br...
Introduction to Data Security Breach Preparedness with Model Data Security Br...Introduction to Data Security Breach Preparedness with Model Data Security Br...
Introduction to Data Security Breach Preparedness with Model Data Security Br...- Mark - Fullbright
 
Information Ethics
Information EthicsInformation Ethics
Information EthicsUMaine
 
The Summary Guide to Compliance with the Kenya Data Protection Law
The Summary Guide to Compliance with the Kenya Data Protection Law The Summary Guide to Compliance with the Kenya Data Protection Law
The Summary Guide to Compliance with the Kenya Data Protection Law Owako Rodah
 
Privacy and Data Security | Data Collection | Social Media
Privacy and Data Security | Data Collection | Social MediaPrivacy and Data Security | Data Collection | Social Media
Privacy and Data Security | Data Collection | Social Mediadevbhargav1
 
Research on Privacy Protection in Big Data Environment
Research on Privacy Protection in Big Data EnvironmentResearch on Privacy Protection in Big Data Environment
Research on Privacy Protection in Big Data EnvironmentIJERA Editor
 
Research on Privacy Protection in Big Data Environment
Research on Privacy Protection in Big Data EnvironmentResearch on Privacy Protection in Big Data Environment
Research on Privacy Protection in Big Data EnvironmentIJERA Editor
 
2012 05 30 Report of the Acting General Counsel concerning social media cases
2012 05 30 Report of the Acting General Counsel concerning social media cases2012 05 30 Report of the Acting General Counsel concerning social media cases
2012 05 30 Report of the Acting General Counsel concerning social media casesKrishna De
 
Golden Gekko, 10 burning questions on privacy
Golden Gekko, 10 burning questions on privacyGolden Gekko, 10 burning questions on privacy
Golden Gekko, 10 burning questions on privacyDMI
 
FTC Emphasizes Privacy Protections, Truth in Advertising in Business Guide fo...
FTC Emphasizes Privacy Protections, Truth in Advertising in Business Guide fo...FTC Emphasizes Privacy Protections, Truth in Advertising in Business Guide fo...
FTC Emphasizes Privacy Protections, Truth in Advertising in Business Guide fo...Patton Boggs LLP
 
Avoiding Privacy Pitfalls When Using Big Data in Marketing
Avoiding Privacy Pitfalls When Using Big Data in MarketingAvoiding Privacy Pitfalls When Using Big Data in Marketing
Avoiding Privacy Pitfalls When Using Big Data in MarketingTokusoudeka
 
FTC Protecting Info A Guide For Business Powerpoint
FTC  Protecting  Info A  Guide  For  Business  PowerpointFTC  Protecting  Info A  Guide  For  Business  Powerpoint
FTC Protecting Info A Guide For Business PowerpointBucacci Business Solutions
 
Ethics in Data Management.pptx
Ethics in Data Management.pptxEthics in Data Management.pptx
Ethics in Data Management.pptxRavindra Babu
 
1. Reply to Discussion ( Minimum 200 Words)1. What types of et.docx
1. Reply to Discussion ( Minimum 200 Words)1. What types of et.docx1. Reply to Discussion ( Minimum 200 Words)1. What types of et.docx
1. Reply to Discussion ( Minimum 200 Words)1. What types of et.docxambersalomon88660
 
Data Security: A field guide for franchisors
Data Security: A field guide for franchisorsData Security: A field guide for franchisors
Data Security: A field guide for franchisorsGrant Thornton LLP
 
Data privacy Legislation in India
Data privacy Legislation in IndiaData privacy Legislation in India
Data privacy Legislation in IndiaLATHA H C
 

Similar to 359763713 other rev (20)

Business communication (zayani)
Business communication (zayani)Business communication (zayani)
Business communication (zayani)
 
ScifoBYODSample
ScifoBYODSampleScifoBYODSample
ScifoBYODSample
 
Introduction to Data Security Breach Preparedness with Model Data Security Br...
Introduction to Data Security Breach Preparedness with Model Data Security Br...Introduction to Data Security Breach Preparedness with Model Data Security Br...
Introduction to Data Security Breach Preparedness with Model Data Security Br...
 
Information Ethics
Information EthicsInformation Ethics
Information Ethics
 
1307 Privacy Act
1307 Privacy Act1307 Privacy Act
1307 Privacy Act
 
The Summary Guide to Compliance with the Kenya Data Protection Law
The Summary Guide to Compliance with the Kenya Data Protection Law The Summary Guide to Compliance with the Kenya Data Protection Law
The Summary Guide to Compliance with the Kenya Data Protection Law
 
Privacy and Data Security | Data Collection | Social Media
Privacy and Data Security | Data Collection | Social MediaPrivacy and Data Security | Data Collection | Social Media
Privacy and Data Security | Data Collection | Social Media
 
Research on Privacy Protection in Big Data Environment
Research on Privacy Protection in Big Data EnvironmentResearch on Privacy Protection in Big Data Environment
Research on Privacy Protection in Big Data Environment
 
Research on Privacy Protection in Big Data Environment
Research on Privacy Protection in Big Data EnvironmentResearch on Privacy Protection in Big Data Environment
Research on Privacy Protection in Big Data Environment
 
2012 05 30 Report of the Acting General Counsel concerning social media cases
2012 05 30 Report of the Acting General Counsel concerning social media cases2012 05 30 Report of the Acting General Counsel concerning social media cases
2012 05 30 Report of the Acting General Counsel concerning social media cases
 
Golden Gekko, 10 burning questions on privacy
Golden Gekko, 10 burning questions on privacyGolden Gekko, 10 burning questions on privacy
Golden Gekko, 10 burning questions on privacy
 
FTC Emphasizes Privacy Protections, Truth in Advertising in Business Guide fo...
FTC Emphasizes Privacy Protections, Truth in Advertising in Business Guide fo...FTC Emphasizes Privacy Protections, Truth in Advertising in Business Guide fo...
FTC Emphasizes Privacy Protections, Truth in Advertising in Business Guide fo...
 
Trade secret-10-step-guide
Trade secret-10-step-guideTrade secret-10-step-guide
Trade secret-10-step-guide
 
Avoiding Privacy Pitfalls When Using Big Data in Marketing
Avoiding Privacy Pitfalls When Using Big Data in MarketingAvoiding Privacy Pitfalls When Using Big Data in Marketing
Avoiding Privacy Pitfalls When Using Big Data in Marketing
 
FTC Protecting Info A Guide For Business Powerpoint
FTC  Protecting  Info A  Guide  For  Business  PowerpointFTC  Protecting  Info A  Guide  For  Business  Powerpoint
FTC Protecting Info A Guide For Business Powerpoint
 
Ethics in Data Management.pptx
Ethics in Data Management.pptxEthics in Data Management.pptx
Ethics in Data Management.pptx
 
Mobileprivacyazahir
MobileprivacyazahirMobileprivacyazahir
Mobileprivacyazahir
 
1. Reply to Discussion ( Minimum 200 Words)1. What types of et.docx
1. Reply to Discussion ( Minimum 200 Words)1. What types of et.docx1. Reply to Discussion ( Minimum 200 Words)1. What types of et.docx
1. Reply to Discussion ( Minimum 200 Words)1. What types of et.docx
 
Data Security: A field guide for franchisors
Data Security: A field guide for franchisorsData Security: A field guide for franchisors
Data Security: A field guide for franchisors
 
Data privacy Legislation in India
Data privacy Legislation in IndiaData privacy Legislation in India
Data privacy Legislation in India
 

More from Kestone

Wk 8 la_complete.docx
Wk 8 la_complete.docxWk 8 la_complete.docx
Wk 8 la_complete.docxKestone
 
Power point template (2)
Power point template (2)Power point template (2)
Power point template (2)Kestone
 
Order #944473372
Order #944473372Order #944473372
Order #944473372Kestone
 
Bmgt380 learning activity(original)
Bmgt380 learning activity(original)Bmgt380 learning activity(original)
Bmgt380 learning activity(original)Kestone
 
Order #944473373
Order #944473373Order #944473373
Order #944473373Kestone
 
Order #944473372 (1)
Order #944473372 (1)Order #944473372 (1)
Order #944473372 (1)Kestone
 
Cyber kill chain.docx
Cyber kill chain.docxCyber kill chain.docx
Cyber kill chain.docxKestone
 
Sense of belonging
Sense of belongingSense of belonging
Sense of belongingKestone
 
Fa21 essay 3 fem lit theory prompt 2
Fa21 essay 3 fem lit theory prompt 2Fa21 essay 3 fem lit theory prompt 2
Fa21 essay 3 fem lit theory prompt 2Kestone
 
Bmgt 380 project_ii_joshua_shipman_.docx
Bmgt 380 project_ii_joshua_shipman_.docxBmgt 380 project_ii_joshua_shipman_.docx
Bmgt 380 project_ii_joshua_shipman_.docxKestone
 
Phc372 paper assignment(3)
Phc372 paper assignment(3)Phc372 paper assignment(3)
Phc372 paper assignment(3)Kestone
 
Phc 314 paper assignment 1 7 ke eman al anizy
Phc 314 paper assignment 1 7 ke eman al anizyPhc 314 paper assignment 1 7 ke eman al anizy
Phc 314 paper assignment 1 7 ke eman al anizyKestone
 
Phc 314 paper assignment 1
Phc 314 paper assignment 1Phc 314 paper assignment 1
Phc 314 paper assignment 1Kestone
 
Phc 151 assignment (1) 202110
Phc 151 assignment (1) 202110Phc 151 assignment (1) 202110
Phc 151 assignment (1) 202110Kestone
 
Assignment 1 week-4
Assignment 1 week-4Assignment 1 week-4
Assignment 1 week-4Kestone
 

More from Kestone (17)

Wk 8 la_complete.docx
Wk 8 la_complete.docxWk 8 la_complete.docx
Wk 8 la_complete.docx
 
Power point template (2)
Power point template (2)Power point template (2)
Power point template (2)
 
Order #944473372
Order #944473372Order #944473372
Order #944473372
 
Bmgt380 learning activity(original)
Bmgt380 learning activity(original)Bmgt380 learning activity(original)
Bmgt380 learning activity(original)
 
Order #944473373
Order #944473373Order #944473373
Order #944473373
 
Paper4
Paper4Paper4
Paper4
 
Order #944473372 (1)
Order #944473372 (1)Order #944473372 (1)
Order #944473372 (1)
 
Cyber kill chain.docx
Cyber kill chain.docxCyber kill chain.docx
Cyber kill chain.docx
 
Sense of belonging
Sense of belongingSense of belonging
Sense of belonging
 
Fa21 essay 3 fem lit theory prompt 2
Fa21 essay 3 fem lit theory prompt 2Fa21 essay 3 fem lit theory prompt 2
Fa21 essay 3 fem lit theory prompt 2
 
Bmgt 380 project_ii_joshua_shipman_.docx
Bmgt 380 project_ii_joshua_shipman_.docxBmgt 380 project_ii_joshua_shipman_.docx
Bmgt 380 project_ii_joshua_shipman_.docx
 
Phc372 paper assignment(3)
Phc372 paper assignment(3)Phc372 paper assignment(3)
Phc372 paper assignment(3)
 
Phc 314
Phc 314Phc 314
Phc 314
 
Phc 314 paper assignment 1 7 ke eman al anizy
Phc 314 paper assignment 1 7 ke eman al anizyPhc 314 paper assignment 1 7 ke eman al anizy
Phc 314 paper assignment 1 7 ke eman al anizy
 
Phc 314 paper assignment 1
Phc 314 paper assignment 1Phc 314 paper assignment 1
Phc 314 paper assignment 1
 
Phc 151 assignment (1) 202110
Phc 151 assignment (1) 202110Phc 151 assignment (1) 202110
Phc 151 assignment (1) 202110
 
Assignment 1 week-4
Assignment 1 week-4Assignment 1 week-4
Assignment 1 week-4
 

Recently uploaded

Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...Dave Litwiller
 
KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...
KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...
KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...Any kyc Account
 
RSA Conference Exhibitor List 2024 - Exhibitors Data
RSA Conference Exhibitor List 2024 - Exhibitors DataRSA Conference Exhibitor List 2024 - Exhibitors Data
RSA Conference Exhibitor List 2024 - Exhibitors DataExhibitors Data
 
Monte Carlo simulation : Simulation using MCSM
Monte Carlo simulation : Simulation using MCSMMonte Carlo simulation : Simulation using MCSM
Monte Carlo simulation : Simulation using MCSMRavindra Nath Shukla
 
Dr. Admir Softic_ presentation_Green Club_ENG.pdf
Dr. Admir Softic_ presentation_Green Club_ENG.pdfDr. Admir Softic_ presentation_Green Club_ENG.pdf
Dr. Admir Softic_ presentation_Green Club_ENG.pdfAdmir Softic
 
Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...
Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...
Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...Lviv Startup Club
 
The Coffee Bean & Tea Leaf(CBTL), Business strategy case study
The Coffee Bean & Tea Leaf(CBTL), Business strategy case studyThe Coffee Bean & Tea Leaf(CBTL), Business strategy case study
The Coffee Bean & Tea Leaf(CBTL), Business strategy case studyEthan lee
 
Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...
Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...
Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...lizamodels9
 
Famous Olympic Siblings from the 21st Century
Famous Olympic Siblings from the 21st CenturyFamous Olympic Siblings from the 21st Century
Famous Olympic Siblings from the 21st Centuryrwgiffor
 
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service AvailableCall Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service AvailableDipal Arora
 
Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...
Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...
Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...amitlee9823
 
HONOR Veterans Event Keynote by Michael Hawkins
HONOR Veterans Event Keynote by Michael HawkinsHONOR Veterans Event Keynote by Michael Hawkins
HONOR Veterans Event Keynote by Michael HawkinsMichael W. Hawkins
 
Boost the utilization of your HCL environment by reevaluating use cases and f...
Boost the utilization of your HCL environment by reevaluating use cases and f...Boost the utilization of your HCL environment by reevaluating use cases and f...
Boost the utilization of your HCL environment by reevaluating use cases and f...Roland Driesen
 
Organizational Transformation Lead with Culture
Organizational Transformation Lead with CultureOrganizational Transformation Lead with Culture
Organizational Transformation Lead with CultureSeta Wicaksana
 
How to Get Started in Social Media for Art League City
How to Get Started in Social Media for Art League CityHow to Get Started in Social Media for Art League City
How to Get Started in Social Media for Art League CityEric T. Tung
 
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...Aggregage
 
Cracking the Cultural Competence Code.pptx
Cracking the Cultural Competence Code.pptxCracking the Cultural Competence Code.pptx
Cracking the Cultural Competence Code.pptxWorkforce Group
 
Insurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usageInsurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usageMatteo Carbone
 
It will be International Nurses' Day on 12 May
It will be International Nurses' Day on 12 MayIt will be International Nurses' Day on 12 May
It will be International Nurses' Day on 12 MayNZSG
 

Recently uploaded (20)

Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
 
KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...
KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...
KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...
 
RSA Conference Exhibitor List 2024 - Exhibitors Data
RSA Conference Exhibitor List 2024 - Exhibitors DataRSA Conference Exhibitor List 2024 - Exhibitors Data
RSA Conference Exhibitor List 2024 - Exhibitors Data
 
Monte Carlo simulation : Simulation using MCSM
Monte Carlo simulation : Simulation using MCSMMonte Carlo simulation : Simulation using MCSM
Monte Carlo simulation : Simulation using MCSM
 
Dr. Admir Softic_ presentation_Green Club_ENG.pdf
Dr. Admir Softic_ presentation_Green Club_ENG.pdfDr. Admir Softic_ presentation_Green Club_ENG.pdf
Dr. Admir Softic_ presentation_Green Club_ENG.pdf
 
Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...
Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...
Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...
 
The Coffee Bean & Tea Leaf(CBTL), Business strategy case study
The Coffee Bean & Tea Leaf(CBTL), Business strategy case studyThe Coffee Bean & Tea Leaf(CBTL), Business strategy case study
The Coffee Bean & Tea Leaf(CBTL), Business strategy case study
 
Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...
Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...
Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...
 
Famous Olympic Siblings from the 21st Century
Famous Olympic Siblings from the 21st CenturyFamous Olympic Siblings from the 21st Century
Famous Olympic Siblings from the 21st Century
 
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service AvailableCall Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
 
Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...
Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...
Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...
 
HONOR Veterans Event Keynote by Michael Hawkins
HONOR Veterans Event Keynote by Michael HawkinsHONOR Veterans Event Keynote by Michael Hawkins
HONOR Veterans Event Keynote by Michael Hawkins
 
Boost the utilization of your HCL environment by reevaluating use cases and f...
Boost the utilization of your HCL environment by reevaluating use cases and f...Boost the utilization of your HCL environment by reevaluating use cases and f...
Boost the utilization of your HCL environment by reevaluating use cases and f...
 
Organizational Transformation Lead with Culture
Organizational Transformation Lead with CultureOrganizational Transformation Lead with Culture
Organizational Transformation Lead with Culture
 
How to Get Started in Social Media for Art League City
How to Get Started in Social Media for Art League CityHow to Get Started in Social Media for Art League City
How to Get Started in Social Media for Art League City
 
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
 
Cracking the Cultural Competence Code.pptx
Cracking the Cultural Competence Code.pptxCracking the Cultural Competence Code.pptx
Cracking the Cultural Competence Code.pptx
 
Mifty kit IN Salmiya (+918133066128) Abortion pills IN Salmiyah Cytotec pills
Mifty kit IN Salmiya (+918133066128) Abortion pills IN Salmiyah Cytotec pillsMifty kit IN Salmiya (+918133066128) Abortion pills IN Salmiyah Cytotec pills
Mifty kit IN Salmiya (+918133066128) Abortion pills IN Salmiyah Cytotec pills
 
Insurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usageInsurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usage
 
It will be International Nurses' Day on 12 May
It will be International Nurses' Day on 12 MayIt will be International Nurses' Day on 12 May
It will be International Nurses' Day on 12 May
 

359763713 other rev

  • 1. Surname 1 Name Professor Course Date Week 2 Discussion The issue involving John and other employees regarding personal data being collected by cell phone providers is sensitive; thus, it needs to be explored from a critical perspective. The situation is even worse when we consider that such information can be misused to the detriment of the employees if accessed by malicious people. In this sense, I advise adopting a clear personal data collection policy and guidelines that articulately outline the type of data that cellphone providers should be allowed to collect and the data that need to be eliminated from being collected/stored. I also recommend that binding sanctions be outlined, highlighting the penalties imposed on any service provider who breaks the formulated rules. In my view, the very minimum data possible for operation should be allowed to be collected, while the gathering of customers’ sensitive information should be avoided. The first kind of data that I feel should be eliminated from being collected includes the client’s passwords. Such data can easily be used to hack into the client’s accounts, resulting in dreadful consequences (Buckey 82). Additionally, it is important to restrict the collection of contacts, pictures, and videos stored in the users’ phones. Such data is excessively private, thus should only be accessed by other third parties only with the consent of the owner. If such information falls into the wrong hands, it can be used for unethical acts such as cyberbullying and extortion
  • 2. Surname 2 of the users (Buckey 148). Lastly, data such as calendar information and the user’s location should also be eliminated from the data to be collected and stored for security purposes. The adopted policies should require companies to notify consumers of the specific data being collected, and the data is stored, shared, and used. The issue involving John that involves collecting his data can be viewed as an ethical practice since the act is tantamount to infringing one’s privacy. I would address this issue by ensuring that the customers are informed and consent before cell phone providers collect and store their private information.
  • 3. Surname 3 Work Cited Buckey, A W. Personal Data Collection. 2020. Print.