.

Tuesday, December 18, 2018

'Information Use Paper\r'

' entropy in government activity sack up be employ in more diverse substances depending on the specific personal line of credit you may turn out. whatsoever data is apply for the semipublic and near is more private than other(a)s. Information is habituated for databases, origin analytic s, business records, health records, facsimile machine, s poopned and m all a(prenominal) more different ways tuition is used in an system. Information is mostly used by sharing it though different directs of a business or sharing it because it is involved with more than upright one specific business it’s normally a department. Information can also be used as a way of marketing or advertising.Even though marketing usually merely collect certain information same(p) name, address, earpiece and maybe an email addresses for different things that benefits their company statistics. Some business ask for your information to rank break through coupons, special promotion or d eal breaker that could embark on you to purchase products from them again. Database systems which ar typically in every business type and level use information to track specifics on what they need and use. Information is a valuable piece of data that can determine the outcome of something. Information flow in an organization can depend on how the organization is setup.The information can either flow up and downcast or side by side. Up and down is flowing through the different levels or managers. Side by side is flowing of information through departments. Both of their flow ways are common in most organization because it could be tracked by who go through it or who had it. When I was active duty multitude, information flowed from the highest level down to the lowest and from the lowest to the highest depending on who was sending it. It was kind of like sending messaging through carriers to get it to the destination, which made the process slower than it really should be.In thi s font the information flowed through filters of people, the reason being is because they involve you to try to get any situation figure out at the lowest level if it is possible to do. The military have several(prenominal) database that stores information for different things for the utilization of tracking data. This different system record data that is inputted by different people depending on the level and skill type of the person. Sometimes we send information between specific departments depending on what the information contains. This way it doesnt get to department who doesnt benefit from it.When you apply for any type of loans this information is processed and sent to different departments and levels of the company. Once this process is started the application is sent to several different approvals to get them to say the big word. The bushels with by rights controlling this flow is different information would be exposed to people who shouldnt see it, in other words ha ve the clearance for it or have to correct training for it. When you send information like this it is not separate it is unclassified therefore anyone can see it, keep it, or even deliberate it to someone else without your authorization.In this particular case if the information is classified enough where certain eyes can tho see it, the information would be encrypted for those who have the gateway to see it. I know for medical information, the doctors or receptionist have you sign a HIPAA (Health Insurance Portability and answerability Act) statement for confidentiality and protection from other who should not be seeing it. Only those who are either on the HIPAA form or who have the right to view it such as doctors, nurse and you the patient. Another concern with information is being digital which means it is send over the internet for Wi-Fi technology.Many businesses either scan documents, fax them or email them which puts a big lay on the line every time it is sent, because of cybercrime can occur. The military have several different filters and firewalls this information sent and authorized for this purpose of cyber-crimes. PlayStation network was hacked and all the information that was stored was compromised and some people might even have been a victim of identity theft, depending on how much information they kept of their file. How this happened was someone hacked their database and downloaded all the information was in it.\r\n'

No comments:

Post a Comment