Posted by: ahmedashfaque | April 30, 2017

Transparency of information – The limits


When any organization is computerized, one of the first things which is considered as a benefit is transparency. Computers ensure that all transactions are recorded cleanly and are available whenever required. All this transaction data can be kept for years and when required for purposes like tax records etc. can be shown. This aspect of computerization definitely curbs corruption and helps bring transparency.

But the other aspect of computerization is that all this sensitive data can be hacked and can be misused. For example, a person’s bank account information can be hacked and money can be stolen from his/her account. Then one more aspect is about privacy of people. If personal details of people can be hacked from a computer system then privacy of that person is compromised.

How to ensure that only the required information about people is taken and stored in a database? The other question is: how to ensure that only authorized people have access to data (information). The next question is: how to ensure that any sensitive data is never hacked.

Generally most governments like to get as much information about citizens as possible for many reasons. So through various computer systems they store information about citizens. But all this sensitive information about citizens is always in danger of being hacked by some unscrupulous people.

This fact puts a limit as to how much information any government can store about its citizens. If any private company stores sensitive information about its customers then again the misuse of this information is always a risk.

The best solution for these scenarios is 2 pronged: to put a limit as to how much information should be stored and how to provide a security mechanism so that this data is never hacked.

Advertisements

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s

Categories

%d bloggers like this: