{"id":143,"date":"2011-02-20T06:00:00","date_gmt":"2011-02-20T06:00:00","guid":{"rendered":"https:\/\/pim.famnit.upr.si\/wp\/?p=143"},"modified":"2021-11-17T11:21:55","modified_gmt":"2021-11-17T11:21:55","slug":"personal-information-in-hands-of-others-how-safe-it-is","status":"publish","type":"post","link":"https:\/\/pim.famnit.upr.si\/wp\/?p=143","title":{"rendered":"Personal information in hands of others &#8211; how safe it is?"},"content":{"rendered":"<p>There are<strong> 4 groups of personal information<\/strong> (<a href=\"http:\/\/books.google.com\/books?id=byN4SPUt6RgC\">PIM, Jones &amp; Teevan, 2007<\/a>):<\/p>\n<ul>\n<li><strong>Information a person keeps<\/strong> directly or indirectly for personal use. This is information used to complete tasks (documents, email, etc.), to&nbsp; use for pleasure (music, videos, books, etc.), study &#8230;<\/li>\n<li><strong>Information about a person but managed under the control of others<\/strong>. This group includes health records, police records, ISP&#8217;s log files, tax agencies&#8217; records, libraries&#8217; logs, banks, etc. <\/li>\n<li><strong>Information experienced by a person but not under person&#8217;s control<\/strong>. This might be a borrowed book, DVD or similar items form a friend, a library or from internet; but in a broader sense it&#8217;s all information out there we come across.<\/li>\n<li><strong>Information directed to a person.<\/strong> This are received emails, software alerts, push ads on the web, RSS news, etc. Information from this group can fall into the first group after its acquisition.<\/li>\n<\/ul>\n<p>The second group of personal information is the most troublesome for most of us. In most cases is probably better to leave our sensitive information with professionals and agencies that have several security measures to prevent such information to be disclosed to third parties. But we hear about how credit card&#8217;s numbers leak to the internet and similar horrifying stories. <\/p>\n<p>The <a href=\"http:\/\/www.computerworld.com\/s\/article\/9210061\/U.S._patients_trust_docs_but_not_e_health_records_survey_shows\">soon-to-be-released study by <em>CDW <\/em>shows<\/a> that people in USA trust their doctors to store their physical health records, but fear that <strong>in electronic format, this records would bee exposed to greater risks<\/strong>. It also showed that a third of doctors don&#8217;t have basic security tools on their computers, such as antivirus software!!<\/p>\n<p>The conclusion is, that having documents and records in digital form brigs a lot of advantages and sadly, disadvantages. The only thing we can do about this second group of personal information, is to <strong>HOPE that whoever has to deal with our information, considers the security and privacy very seriously and uses expected tools to prevent leaks of such information<\/strong> to unauthorized users! And believe me,&nbsp; our health, tax and other records fly around from one office to the other, insurance companies, etc. So there&#8217;s a lot of hands who handle our personal information.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>There are 4 groups of personal information (PIM, Jones &amp; Teevan, 2007): Information a person keeps directly or indirectly for personal use. This is information used to complete tasks (documents, email, etc.), to&nbsp; use for pleasure (music, videos, books, etc.), study &#8230; Information about a person but managed under the control of others. This group&#46;&#46;&#46;<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[7],"tags":[],"class_list":["post-143","post","type-post","status-publish","format-standard","hentry","category-6-pim-research"],"_links":{"self":[{"href":"https:\/\/pim.famnit.upr.si\/wp\/index.php?rest_route=\/wp\/v2\/posts\/143","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/pim.famnit.upr.si\/wp\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/pim.famnit.upr.si\/wp\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/pim.famnit.upr.si\/wp\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/pim.famnit.upr.si\/wp\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=143"}],"version-history":[{"count":1,"href":"https:\/\/pim.famnit.upr.si\/wp\/index.php?rest_route=\/wp\/v2\/posts\/143\/revisions"}],"predecessor-version":[{"id":825,"href":"https:\/\/pim.famnit.upr.si\/wp\/index.php?rest_route=\/wp\/v2\/posts\/143\/revisions\/825"}],"wp:attachment":[{"href":"https:\/\/pim.famnit.upr.si\/wp\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=143"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/pim.famnit.upr.si\/wp\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=143"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/pim.famnit.upr.si\/wp\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=143"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}