The definition of privacy has evolved thru the years. With technological advancements, there has been a need to protect information of organizations and individuals. Laws tend to fall behind the times and not keep up with technologies of today. Laws vary from state to state. California enacted a legislation to require businesses to inform consumers when their personal information is to be sold for compensation or for marketing purposes. Utah forces businesses to provide written consent with a specific notice included. Organizations need to take necessary steps to prevent unauthorized access. Without policies and procedures in place, unauthorized breach of personal information within the organization’s information system could endanger employees from identity theft or damage to the company’s structure. Consequences could be severe. Past legal cases become learning tools for management to understand and not repeat. Examples are Lazette v. Kulmatycki (Case No. 3:12CV2416), ChoicePoint inaccuracies with personal information, and identity theft cases.
Privacy
Collection and dissemination of private information by federal and private institutions has changed throughout the years. By the late 20th century, technology has evolved and gave a new definition to privacy. People’s privacy has been opened to new threats and businesses had to take necessary steps to protect personal information from unauthorized personnel. Without the proper protection in place, it could cost millions of dollars in damages for the individual or for the company. Several legislations have been put into place to protect data contained in federal, state, and private sector hands. But is it enough?
Privacy is defined as freedom from unauthorized intrusion (Merriam-Webster, 2013). The Constitution of the United States of America does not express any rights to privacy but it is inferred in the Bill of Rights, such as the right to their privacy of beliefs or religion (First
References: Cornell University Law School-Legal Information Institute. (2013). Bill of Rights. Retrieved from http://www.law.cornell.edu/constitution/billofrights Harris, B. (2013). Employers May Be Liable for Reading Employees’ Personal Emails on Company Devices. Retrieved from http://www.mmmtechlaw.com/2013/08/16/employers-may-be-liable-for-reading-employees-personal-emails-on-company-devices/ Lazette v. Kulmatycki. Case No. 3:12CV2416 (2013). Retrieved from http://scholar.google.com/scholar_case?case=1620452354671290461&hl=en&as_sdt=6&as_vis=1&oi=scholarr McCreary, L. (2008, October). What is Privacy? Retrieved from http://hbr.org/2008/10/what-was-privacy/ar/1 Merriam-Webster. (2013). Privacy. Retrieved from http://www.merriam-webster.com/dictionary/privacy Phillips, Z., & Paine, L. S. (2008, March 21). ChoicePoint (A). Harvard Business School, 9-306-001(A), 1-19. Simpson, G. R. (2001, April 13). FBI 's Reliance on the Private Sector Has Raised Some Privacy Concerns. Retrieved from http://online.wsj.com/article/SB987107477135398077.html