DATA and Information Security Essay

Exclusively available on Available only on IvyPanda® Made by Human No AI

In the recent past, several instances of data breaches have happened and successfully led to the compromise of the information systems of various companies resulting into organizational and individual implications (Smyth 2015). For instance, a report by Smyth (2015) shows Medicaid’s information systems were successfully compromised, leading to massive losses of individual data. Other companies in the list include Excellus Blue Cross and Blue Shield that had their information systems compromised in September 09, 2015.

Besides, Cancer Care Group reported data breach attacks on September 02, 2015, that caused personal and organizational loss of data. Exploitations of the vulnerabilities of information systems of CareFirst BlueCross BlueShield Company that has significant operations in the healthcare industry had serious implications on the integrity, confidentiality, and availability of individual and organizational data.

Information security incident that happened through a successful cyber-attack of BlueShield’s information systems in May 2015 caused a data loss belonging to 1.1 million customers. Data breaches were noted to have implications at individual and organizational levels because of the loss of personal and organizational data (Nelson, Phillips & Steuart 2015).

The discovery of the data breaches was discovered when Mandiant-led conducted a security review of BlueCross BlueShield’s information systems. It was established that hackers had exploited the vulnerability of the information system and gained entry into the database customers used to access the company’s websites for online services.

Smyth (2015) notes that the implications include the loss of sensitive personal data that consists of birth dates, subscriber information, names, and email addresses at individual and company levels. That led to the breach of confidentiality, integrity, availability, and privacy, the core defining elements of computer ethics.

Despite that, the social security numbers of the members were not accessed because their passwords were already encrypted, which made it impossible for the hackers to decrypt them. Encrypted passwords made it impossible for the hackers to access data consisting of financial claims, medical claims, employment data, and credit card information.

According to Smyth (2015), the consequences related to the loss of data that was in the custody of the organization demonstrate the vulnerability of the organization’s information systems. Besides, various questions arise on the effectiveness of the information security measures, observance and application of existing laws and standards, policies, honesty, integrity, and employee practices to protect the information assets.

Issues such as the use of encryption to protect data under the State security breach notification law known as the safe harbor arise. However, important questions arise on the credibility of the notifications issued to the customers that the data breaches happened through unauthorized access to the companies’ information systems. That is besides loss of trust in the side of the customers, especially because the events led to the misuses of sensitive personal data.

The ethical implications at company level resulting from the loss of data were related to the loss of privacy. The principles that guide the behavior of people and organizations in protecting other people’s data and organizational information assets were breached. According to the Health Insurance Portability and Accountability Act Regulations (HIPAA), failure to adequately protect personal data contravenes the regulations and leads to loss of trust (Nelson, Phillips & Steuart 2015).

Privacy issues include unauthorized access to sensitive data, which leads to the breach of privacy principles, identity theft, confidentiality, and intrusion. Privacy principles include security privacy that was violated because the organization failed to adequately control logical and physical access to data. Besides, the ethical issues of infringement of copyright laws and intellectual property regarding unauthorized access to private data contrary to the belief that information should be free happened.

References

Nelson, B, Phillips, A & Steuart, C 2015, Guide to computer forensics and investigations, Cengage Learning, New York.

Smyth, V 2015, ‘Cyber-security fortresses built on quicksand’, Network Security, vol. 8, no. 2015, pp. 5-8.

More related papers Related Essay Examples
Cite This paper
You're welcome to use this sample in your assignment. Be sure to cite it correctly

Reference

IvyPanda. (2019, June 2). DATA and Information Security. https://ivypanda.com/essays/data-and-information-security/

Work Cited

"DATA and Information Security." IvyPanda, 2 June 2019, ivypanda.com/essays/data-and-information-security/.

References

IvyPanda. (2019) 'DATA and Information Security'. 2 June.

References

IvyPanda. 2019. "DATA and Information Security." June 2, 2019. https://ivypanda.com/essays/data-and-information-security/.

1. IvyPanda. "DATA and Information Security." June 2, 2019. https://ivypanda.com/essays/data-and-information-security/.


Bibliography


IvyPanda. "DATA and Information Security." June 2, 2019. https://ivypanda.com/essays/data-and-information-security/.

If, for any reason, you believe that this content should not be published on our website, please request its removal.
Updated:
This academic paper example has been carefully picked, checked and refined by our editorial team.
No AI was involved: only quilified experts contributed.
You are free to use it for the following purposes:
  • To find inspiration for your paper and overcome writer’s block
  • As a source of information (ensure proper referencing)
  • As a template for you assignment
Privacy Settings

IvyPanda uses cookies and similar technologies to enhance your experience, enabling functionalities such as:

  • Basic site functions
  • Ensuring secure, safe transactions
  • Secure account login
  • Remembering account, browser, and regional preferences
  • Remembering privacy and security settings
  • Analyzing site traffic and usage
  • Personalized search, content, and recommendations
  • Displaying relevant, targeted ads on and off IvyPanda

Please refer to IvyPanda's Cookies Policy and Privacy Policy for detailed information.

Required Cookies & Technologies
Always active

Certain technologies we use are essential for critical functions such as security and site integrity, account authentication, security and privacy preferences, internal site usage and maintenance data, and ensuring the site operates correctly for browsing and transactions.

Site Customization

Cookies and similar technologies are used to enhance your experience by:

  • Remembering general and regional preferences
  • Personalizing content, search, recommendations, and offers

Some functions, such as personalized recommendations, account preferences, or localization, may not work correctly without these technologies. For more details, please refer to IvyPanda's Cookies Policy.

Personalized Advertising

To enable personalized advertising (such as interest-based ads), we may share your data with our marketing and advertising partners using cookies and other technologies. These partners may have their own information collected about you. Turning off the personalized advertising setting won't stop you from seeing IvyPanda ads, but it may make the ads you see less relevant or more repetitive.

Personalized advertising may be considered a "sale" or "sharing" of the information under California and other state privacy laws, and you may have the right to opt out. Turning off personalized advertising allows you to exercise your right to opt out. Learn more in IvyPanda's Cookies Policy and Privacy Policy.

1 / 1