NCJ Number
25196
Date Published
1975
Length
14 pages
Annotation
EXAMINATION OF THE ISSUES SURROUNDING THE TECHNICAL IMPLICATIONS OF PRESENT AND PENDING PRIVACY LEGISLATION.
Abstract
THIS DISCUSSION IS USED AS A VEHICLE TO PRESENT A CANDIDATE FOR A CONSENSUS POSITION ON 'AN ADEQUATE LEVEL OF SECURITY FOR PRESERVING THE INDIVIDUAL'S RIGHT TO PRIVACY.' THE PROPOSED MODEL ENCOMPASES INFORMATION MANAGEMENT, DISCLOSURE ACCOUNTING (KEEPING RECORDS ON WHO DOES WHAT TO THE INFORMATION WHICH IS KEPT ON INDIVIDUALS), AND SECURITY. IT IS CONCLUDED THAT A REASONABLE MAN TASKED WITH PROVIDING SECURITY TO PROTECT AN INDIVIDUAL'S RIGHT TO PRIVACY (GIVEN LIMITED RESOURCES AND THE STATE OF THE ART IN COMPUTER SECURITY) SHOULD TAKE STEPS TO PROTECT PERSONAL INFORMATION FROM ABUSE BY THE AUTHORIZED, BUT DISHONEST, EMPLOYEE OR USER OF THE COMPUTER SYSTEM, RATHER THAN THE UNAUTHORIZED, WELL-SUPPORTED PENETRATOR FROM OUTSIDE. (AUTHOR ABSTRACT MODIFIED)