Preview

Monetisation of personal information: technology, policies and regulatory framework

Good Essays
Open Document
Open Document
587 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Monetisation of personal information: technology, policies and regulatory framework
Data monetization can be described as a process of transforming data objects into commodities others will be prepared to pay a premium for (Perler, 2012). This concept of monetisation is rooted in the value placed on minerals like gold and diamonds, because of their intrinsic values. Thus, things possessing no intrinsic value or intrinsically worthless items could also be monetised or transformed into a legitimate money making venture, provided the holder is capable of providing the services others want, or if the holder of such information can add value to such information. Effective management of personal identity information is making it increasingly possible to track and trace individuals’ preferences and social connections. Thus, personal information can plays a pivotal role in facilitating contemporary business transactions and social interactions, if the factors that account for its optimal take-off are properly addressed. This study focuses on understanding major technological and regulator imperatives in the monetisation of personal identity information stored by government agencies.
The 2012 global information technology report (Dutta & Bilbao-Osorio, 2012) rated Ghana and many African countries at the lowest in all the indices. For instance Ghana was ranked 97th out of the 142 countries covered whilst the top 20 positions were all occupied by either European or OECD countries. Credential Issuers in Ghana and many developing economies (acting as identity providers1) implement Identity Management Systems (IDMS) primarily to facilitate the discharge of their primary constitutional obligation – e.g. voters’ identity cards are used for electoral purposes. Besides these primary functions, personal identity information

collected and stored by such government agencies are usually made redundant. For instance banks and even hospitals are currently unable to verify in real time, the identity credentials presented by customers and patients. In spite of the data

You May Also Find These Documents Helpful

  • Powerful Essays

    The proposed social health insurance system will implement a smart card system to easily transfer health information data between providers. Each individual covered by a health insurance fund will have a personalized smart card with basic information: photo identification, state, name, address, and birthdate on the face of the card. The card will have a barcode for providers to scan to allow them to access all of an individual’s information relating to their medical history and basic identification information. The smart cards’ information will be accessible in every health care system database across the nation, and the system will be maintained by the federal government. Providers will have personalized logins and passwords to access the database and the medical information of every individuals to ensure security and privacy of patient information. The smart cards will allow health care providers to transfer data, scans, and imaging to other providers in different parts of the country more quickly and efficiently. These cards will reduce the cost of shipping scans, wait time for individuals, and improve quality outcomes by improving the transparency and flow of health care. If an individual loses their smart card or does not have their card accessible when receiving medical care, providers can look up an individual’s information in the database by social…

    • 5252 Words
    • 22 Pages
    Powerful Essays
  • Best Essays

    The department is responsible for educating and assisting in working through the company’s policy and in dealing with policy breaches. Data security, quality, and integrity are valued commodities for a business who wishes to continue to prosper and grow, but the improper handling can also easily jeopardize its future (Pratt, 2008). Riordan’s need to consolidate data that has been created offline and potentially could be out-of-date is a data manager idea of a horror story. Through the use of data management solutions that support transactions processing in one location supports a more secure and efficient high-volume business. What also need to be considered are the multinational laws that Riordan had to adhere to because of its global footprint; legal requirements relating to data vary by country. It would be remiss to overlook the security of employees within the company because security falls under the domain of human resources. To take a safer, smarter approach toward personnel security the proposal will also include recommendations for company badges. A badge policy would keep track of employees as they come and go plus alert employees to the presence of a visitor. Monitoring equipment should also be considered as this would be ideal for public gathering places to record any activity after hours by using a motion sensor…

    • 3105 Words
    • 13 Pages
    Best Essays
  • Good Essays

    These days, the internet has become the center of livelihood for countless people around the world. As we continue down this path of interconnectivity throughout our businesses, educational institutions, and home life, we are leaving trails of information wherever the internet superhighway takes us. That trail of information, or web cookie, is utilized by companies to help track usage in an attempt to tailor your visits to their webpages. With those crumbs of information being stored, privacy ultimately becomes a concern but is often an afterthought. What are these companies discovering about us and what other entity could be applying this data toward less-than-noble causes? How does one react to the possibility of having one’s personally identifiable information stolen? I analyzed two…

    • 794 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    The year is 2010, the era is the 21st century; and we, citizens of the world, are living in the Information Age. Our information is made available on the Internet where it can be viewed by millions. The days where our data was recorded on scraps of paper and left in a box in an office along with thousands of other registers are long gone. Our personal data is permanently recorded in the hard drives of computers where they can be analysed and exploited by anyone with access to that computer; or worse, identity thieves and hackers may get their hands on the data.…

    • 3006 Words
    • 13 Pages
    Powerful Essays
  • Satisfactory Essays

    Nvq Unit 209

    • 484 Words
    • 2 Pages

    The information stored digitally on computers or manually through written records needs to be kept secure due to the personal nature of the information. These records usually contain personal and sensitive information about the Service Users such as medical history, details of family background, financial information, behavioural problems etc... The people who provide this information whether they be family members or the Service User themselves must feel confident that such information goes no further then is vital to ensure their treatment and care.…

    • 484 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Assignment 209

    • 385 Words
    • 2 Pages

    it is the law to document and record information and it should be done to comply with legislation. Organisations must have measures in place to make sure all individuals personal information is not unlawfully processed, lost or destroyed. All information is to be kept up to date and accurate and stored securely in a locked cupboard or computer with passwords so only certified people can access it, information is only to be used for a specific purpose . This is to protect the individual’s human rights to privacy and confidentiality.…

    • 385 Words
    • 2 Pages
    Satisfactory Essays
  • Better Essays

    Health Records Structures

    • 1567 Words
    • 7 Pages

    Data collection and how the data will be utilized within the structure is a big consideration when implementing system of this type as well. During the course of this presentation, we discuss how health record structure's capture data and evaluate it’s effectiveness. In addition, we will look at how record structures in their current state as well as evolution of the system will impact the delivery of health care, the implications managing privacy and security…

    • 1567 Words
    • 7 Pages
    Better Essays
  • Good Essays

    Privacy is a person’s right to control access to his or her personal information. Everybody value the protection of their personal information. No one wants to see some of their personal information made public, especially on the internet. However, the recent evolution of technology has started to threaten every individual’s privacy by reducing the amount of control that they had over their personal data and making it possible for people who do not have the proper authority to access them. According to Zalta (2014), the 21st century has become the century of Big Data and advanced Information Technology allows for the storage and processing of exabytes of data. The combination of increasing power of new technology and the declining clarity and agreement on privacy give…

    • 480 Words
    • 2 Pages
    Good Essays
  • Better Essays

    Privacy becomes a luxury good because obtaining it means a level of computer literacy that is not accessible to an average person and is associated with high education levels, higher income and certain classes of people that reflect the dominant inequalities in society. The right to privacy as a luxury good divides users into those who have and those who do not have, therefore, creating a privacy divide. This divide is further increased by high-income elasticity of demand. People who are ore literate can afford greater access to privacy. The goal of regulations on privacy are intended to turn it into a normal good or a public good…

    • 1751 Words
    • 8 Pages
    Better Essays
  • Good Essays

    Management have the final responsibility in ensuring information held on residents is wherever possible non-identifiable, used only when necessary and by the people who need to know and is stored securely. Most importantly that the company’s policies are adhered to and are working in relation to the handling and collecting and using and storing of information.…

    • 611 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    As Americans in the 21st century, living amidst Facebook, Twitter, internet technology, satellite surveillance, GPS tracking and chips, the lack of privacy regarding the ability to provide acceptable and appropriate protection to individual identity and personal information have risen. Despite advancements in current security configuration, users of these products are still not receiving the privacy they deserve. Some views state that privacy is a right guaranteed to citizens by the United States Privacy Act of 1974, limiting the use of personal data by Federal agencies.…

    • 2210 Words
    • 9 Pages
    Powerful Essays
  • Good Essays

    “Terms and Conditions May Apply” offers an illuminating look at privacy in the digital age, and the potential dangers of it as our online information (data) is shared with the government, and sold to the highest bidder. In the documentary, Cullen Hoback shows how those “terms and conditions” and agreed policies allows corporations to do things with our personal information that we could never imagine. What are we really agreeing to when we click “I agree”? Through Interviews with tech enthusiasts and futurists such as Facebook’s Mark Zuckerberg, Google’s Chief Engineer Ray Kurzweil, Eric Schmidt, Christopher Soghoian and more, the documentary brilliantly examines and documents the erosion of online privacy and how the government and private…

    • 960 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    There can be no dispute that the facilities and services that are available to these unfortunate countries are way below the standards the developed world is accustomed to. The evidence for this has been collated by the World Resource Institute in Washington , which found that more than four billion people worldwide remain untouched by the IT revolution. A pertinent example is the waiting time for a business phone in Ghana is over 5 years and that positive alteration's or developments are not expected in the upcoming years.…

    • 291 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    focus on the collection and use of personal data. He argues that the process of information storage and…

    • 2748 Words
    • 11 Pages
    Powerful Essays
  • Good Essays

    Contemporary information systems technology, including internet technologies, challenges traditional regimens for protecting individual privacy and intellectual property. Data storage and data analysis technology enables companies to easily gather personal data about individuals from many different sources and analyze these data to create detailed electronic profiles about individuals and their behaviors. Data flowing over the Internet can be monitored at many points. The activities of website visitors can be closely tracked using cookies and other web monitoring tools. Not all websites have strong privacy protection policies, and they do not always allow for informed consent regarding the use of personal information.…

    • 385 Words
    • 2 Pages
    Good Essays