Privacy and Compliance
Name
Institution
Importance of privacy and compliance with privacy regulations.
Compliance with privacy guidelines helps enhance the level of integrity and understanding of better processes that focus on understanding necessary limits. Privacy regulations ensure that there is a commitment to better procedures and policies that have been developed. Every organization develops privacy guidelines that must be complied with by all employees (Chua et al., 2017). Failure to comply is associated with an adverse impact, which can lead to termination of employment. Compliance also ensures enhanced information protection where an organization can depend on its employees to preserve sensitive and classified information (Parks et al., 2017). Thus, it is crucial to develop a strong focus on the developed guidelines and ensure total compliance. Compliance in this context means there is a total commitment to meet the policies that have been put in place. The development of a strong system presents a more organized context where everyone can understand what needs to be followed.
Identify information that is protected by the Privacy Act.
Privacy is protected under the United States constitution. The privacy act of 1974 focused on ensuring the protection of individual information that could directly identify and incriminate them without any warrant. The information protected under the privacy act includes name, social security number, or any number that identifies someone or a symbol. Other critical information protected includes payroll number, information on individual education, conducted financial transactions, medical history, employment, and criminal history. An individual can only share this information based on their discretion (Arrigo, 2018).
When such information is given to organizing, there is a need to ensure that such information is classified and protected. An individual is protected under the act means a sole individual who acts on his own rather than an organization. Most organizations have been considering investing in data protection (Zhou & Li, 2014). Any breach of individual privacy is illegal. An individual without consent shares information protected under the Privacy act can be sued for breach for sharing protected information.
References
Arrigo, B. A. (2018). Privacy Act of 1974. In The SAGE Encyclopedia of Surveillance, Security, and Privacy. https://doi.org/10.4135/9781483359922.n352
Chua, H. N., Herbland, A., Wong, S. F., & Chang, Y. (2017). Compliance to personal data protection principles: A study of how organizations frame privacy policy notices. Telematics and Informatics. https://doi.org/10.1016/j.tele.2017.01.008
Parks, R., Xu, H., Chu, C. H., & Lowry, P. B. (2017). Examining the intended and unintended consequences of organisational privacy safeguards. European Journal of Information Systems. https://doi.org/10.1057/s41303-016-0001-6
Zhou, T., & Li, H. (2014). Understanding mobile SNS continuance usage in China from the perspectives of social influence and privacy concern. Computers in Human Behavior. https://doi.org/10.1016/j.chb.2014.05.008