Personal Identifiable Information

Personal Identifiable Information

Privacy has been a widely used concept. It can be defined simply as the right to be left alone. Personal information is can have varied definitions. Entities in the world can be classified as persons and non-persons. Thus in the information sphere, information can be classified as personal and non-personal information. Personal information is hence divided into two. These are personal identifiable information as well as personal non-identifiable information. In this paper, we shall analyze the personal identifiable information which is information about a specific person in which it included the unique identification of the person that is embedded.
The personal identifiable information can be classified as atomic and compound. Atomic can refer to a single proprietor while compound can refer to more than one proprietor. This brings out a relationship between individuals and their own atomic personal relationship whereby it can be called proprietorship. The proprietorship of the personal identifiable information can be different from concepts of ownership, possession as well as copyrighting. Any compound personally identifiable information is proprietary information of its referents. This means that all donors of the pieces of the atomic personally identifiable information can be embedded in the compound personally identifiable information. The compound information is also privacy reusable to set some kind of atomic personally identifiable information. The reduction of the compound personally identifiable information to atomic personally identifiable information refers to the isolation of the privacy aspects of the compound information as a singly identifiable person in this matter.

Ethics
The ethics of personal identifiable information can have a varied approach. Privacy has been observed as a human trait. Information also exists about a proprietor in reference to their thoughts, how they relate with other people as well as their minds. The personal identifiable information can be regarded to be more valuable than the personal non-identifiable information because of the privacy aspect. Some aspects such as the invisibility factor of the operations of the computers can lead to the creation of a loophole in the policies. Thus, the personal identifiable ethics are the ethics that are involved with creation, collection, processing and disclosure of personal information. This is recognized to have an intrinsic moral value, as well as concerned with the moral consideration. The moral considerations include the fact that personally identifiable information has always been considered to have a much higher intrinsic moral value as compared to the non-personal identifiable information.
The moral and ethical worth is based on the assumption that the proprietor of the information is based on the assumption that he is the proper beneficiary of the moral action. These ethical principles have the effect of regulating the behavior of the agents. This means that individuals could have proprietary rights to the personally identifiable information. Any action that is based on a piece of this information can be based in terms of how it contributes to the welfare of the environment of the information.
This has the effect of having an implication on the welfare of the proprietors which has some form of universality feature especially in terms of development that has been agreed upon. The personal identifiable information is based on the factor that there is non-retribution which is the lack of fear for punishment. This shows the desire of the particular proprietor to have control of this aspect. Personal data can receive protection when some form of reasonable security can be used in order to safeguard against some possible risks such as unauthorized access, loss, modification, use, disclosure of data or even destruction of the data. Some models can be used in this case, for example the conceptual model which serves to create a balance between the security needs that may arise as well as the solution that may be required so as to meet the needs in particular. It can involve the development of a network map which aims at having some security features such as password policy and the draw-in policy. Another model that can be sued is the flow model which aims at creating conceptual framework for the designing and the defining of a security strategy. This can be used for things such as configuration of firewalls as well as monitoring the intrusion that may occur.

Conclusion
Thus, personal identifiable information can have a relationship with ethics as well as privacy. This can be analyzed in the context of non-identifiable persons. Personal identifiable information can be attached to an identifiable human being, and this makes it be some valued type of information. Personal identifiable information may end up being significant or even insignificant, although, the most important thing is to ensure that it deserves some form of moral consideration which can be awarded to a human being in particular. This can be shown in the fact that personal identifiable information has some form of intrinsic moral value which can be placed upon a proprietor who is a human being.

References
Gibson, D. (2010) Managing Risk in Information Systems (Information Systems Security & Assurance Series. Jones & Bartlett Learning.
United States Government Accountability Office. (2009)Personal Identifiable Information and Data Breaches. Nova Science Pub Inc
Bennett, J. (2004) The Digital Umbrella: Technology’s Attack on Personal Privacy in America. Brwon Walker Press.
Rubin, M. (1989) Private Rights, Public Wrongs: The Computer and Personal Privacy. Ablex Publishing.