Digital Legacy & Privacy in Australia

Requirement

Question: Digital Legacy & Privacy

Solution

Introduction

In this present paper, we will discuss digital privacy in Australia, and the issues rising around digit digital material. The paper also describes the options which are considered to ensure digital privacy, digital legacy, measures to ensure the protection of deceased and alive users, legislation in another country and the measures to ensure ownership of digital property.

Privacy    

The privacy is defined as the right of an individual to protect from intrusion in their personal lives. According to the Australian Law Reform Commission, the reference is given to the Australian Privacy Law. There is no definition of universal application of privacy. The privacy is divided into different segments such as Bodily privacy, Information privacy, Communication privacy and territorial privacy (Cao et al., 2014). The information privacy includes the personal information such as medical reports, credit information, Bank account details, signature, medical records and others. The privacy of communication includes personal mails, telephones, and others. The bodily privacy includes drug testing, genetic test reports, and others. The territorial information includes the intrusion into domestic, workplace, public space and another environment such as Checking of ID. 

Why take stress when you can take financial management assignment help from the professional experts of Allassignmenthelp.com. You can pay and easily avail of our management accounting assignment help and score good grades. The talented and professional experts on our website will help you and provide you with conflict management assignment help at the most affordable price. 

Digital privacy 

It is defined as the trend of social concern which provides the privacy of cloud storage and social media. According to the privacy act 1988, the handling of personal information is regulated by the privacy act. The personal information can be in any form such as recorded or not, true or not, or the information is reasonably identified. It mainly concerns with the privacy of personal identity over the public networks. The digital privacy includes the right of personal privacy which concerns about the articulated from the starting of large scale computer sharing. It entails personal identification information or non-personal identification information. The personal identification information is used to identify information. According to the experts, the digital privacy is no more exists whereas "The value of privacy" essay explains that the privacy helps to protect an individual from the powerful persons. It is mainly concerned with the protection of user's personal information. The digital privacy enables to access the account of an individual after the death in the US whereas the information cannot be accessed in Australia. It creates an issue for Ricky Rash to get the clue about Eric's suicide. The Ricky wants to access the account of his so that he can get any clue about beside his suicide mystery.

Digital privacy in Australia

The data is retained in Australia across the country which covers the monitoring of communication industry. The information is retained by the Telco and internet service providers in Australia. The information includes calls and messages, all emails including personal emails, location information. The Metadata expose all the digital communication including emails, professional communication, subscriptions and others. The information access can be done by taking permission from Federal parliament. The personal privacy overtakes by the access of information. The Australia has the range of laws which helps to protect the privacy. The act regulates the sensitive and private information of an individual (Butler et al., 2015). The Australian laws are unable to access the information of deceased person due to which Rick Rash didn't get the access to his son's Facebook account.

Issues of concern around digital material

There are many issues to secure the digital material such as ethical issue to preserve the Electronic information system. Following are the issue of concern around digital material:

  1. Maintenance of trust in the  data: The digital material had a characteristic of remain fluid over the time due to which the data can be altered or modified. The maintenance of trust in the data is a major issue to concern. The authenticity and integrity are very important to maintain in every sector. For example The citation of legal laws will remain same which helps to create authenticity in the research process (Gulotta et al., 2013).

  2. Retain the meaning of data: The reconstruction of the data is encoded in binary language which needs to be decoded which helps to understand the meaning of data.  It is very major concern to retain the meaning of data which is a challenge for the company.

  3. Preserving of data: The digital material needs to concern about the preservation of data which is encoded in binary digits. The data preservation ensures the survival of digital material. The systematic process maintenance helps to ensure the data preservation.

  4. Possess the context of data and it’s dependencies: The understanding of information is a vital role maintaining the digital material which enables the capture for preservation in an appropriate manner.

  5. Duplicate with the data deluge: The data maintenance is very challenging because the rate of data creation is increasing rapidly which is supported by the capacity of data storage. The simple preservation process enables to work easily with huge data. Thus the retention of the meaning of data is an issue to concern.

Options to consider digital privacy

There are various options which help to maintain the digital privacy. Following are the options to ensure digital privacy:

  1. Encryption of data: The encryption technology helps to encrypt the access of emails or any other private information. For example: The Apple Mail program verifies the email through OpenOGP standard.

  2. Backup creation of data: The backup creation through cloud helps to maintain the privacy of data. 

  3. Anti-malware protection: Malware software provides the protection to private information such as emails (Mantelero et al., 2014).

  4. Secure wireless networks: The security on wireless networks helps to prevent the access to unauthorized users. It helps to protect the information accessed through a particular wireless network.

  5. Disable file and media sharing: The disabled property of file helps to hide the file for other users which helps to protect the private information.

Digital legacy

The digital legacy is defined as the process of handling electronic data through digital media in the form of digital assets which provide the beneficiaries rights to an individual. The digital legacy of Australia deletes all the relevant information of the deceased person from the social media such as removal of Facebook page (Eichler et al., 2016). It unable to access the information due to which 

Measures to ensure users

Following are the measures which ensure that the users are protected on the platforms such as Facebook, icloud, and Google:

  1. Password security: The password used by the user should be a mixture of upper case, lower case, and special character which unable to identify the password by the hacker.

  2. Avoid using social sites from public computers: The accessing of social sites from the public computer might have key logger which helps to access the account later.

  3. Beware of links click and installed: The users must be aware of the links because it may help to disable the security of the account.

  4. Dead social commercial: It helps to provide tweet from the account of the deceased person and to send the messages from the account of a deceased person which helps to protect the account from the hackers.

Legislation in another country 

The legislation in another country helps to access the Facebook page of the deceased person. The account of the deceased person can be accessed by the guardian or family members in the US whereas the Australia should also adopt the same policies which help to reveal the clues of Eric's murder. 
Measures to ensure ownership of digital property
The digital property ownership can be ensured through digital rights management. IT helps to protect the digital property from copied and use of the digital property for illegal purposes. It acts as a physical lock to protect the digital property (Favale et al., 2012).  The digital rights management can be passed on the digital estate through the permission of the country government.

Conclusion

The privacy is defined as the protection from intrusion in their personal lives. The protection can be divided into different categories such as: Bodily privacy, information privacy, communication privacy, and territorial privacy. The digital privacy in Australia in regulated by the privacy act 1988, which unable to access the information of the deceased person by removing all relevant information. The information of the deceased person can be accessed by the guardian in the US. The regulations of Australia unable to access the information of Eric’s by Ricky Rash. The Australia should implement the access of deceased information to the guardians. 

Place Order For A Top Grade Assignment Now

We have some amazing discount offers running for the students

Place Your Order

References

  • Cao, N., Wang, C., Li, M., Ren, K., & Lou, W. (2014). Privacy-preserving multi-keyword ranked search over encrypted cloud data. IEEE Transactions on parallel and distributed systems, 25(1), 222-233.

  • Butler, D. A., & Rodrick, S. (2015). Australian media law. Thomson Reuters (Professional) Australia Limited.

  • Gulotta, R., Odom, W., Forlizzi, J., & Faste, H. (2013, April). Digital artifacts as legacy: exploring the lifespan and value of digital data. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (pp. 1813-1822). ACM.

  • Mantelero, A. (2014). Toward a New Approach to Data Protection in the Big Data Era.

  • Eichler, A. C. (2016). " OWNING" WHAT YOU" BUY": HOW ITUNES USES FEDERAL COPYRIGHT LAW TO LIMIT INHERITABILITY OF CONTENT, AND THE NEED TO EXPAND THE FIRST SALE DOCTRINE TO INCLUDE DIGITAL ASSETS. Hous. Bus. & Tax LJ, 16, 208-252.

  • Favale, M. (2012). The Right of Access in Digital Copyright: Right of the Owner or Right of the User?. The Journal of World Intellectual Property, 15(1), 1

Get Quality Assignment Without Paying Upfront

Hire World's #1 Assignment Help Company

Place Your Order