Data collection concerning various issues has to be collected by governmental and non-governmental institutions for research purposes. Without such researches, policies and other issues concerning the public would not be in line with the needs of the people in the society. However, a problem arises when personal information collected is used for the wrong purposes. Some business organizations use such information to create products that will attract people according to their personal information.
The people providing information should also be responsible. Protection of personal information should begin with the people providing information concerning them. Public awareness forums should be set to educate the public on how to ensure they are providing information to trustworthy entities. Anyone willing to provide information should also ensure that there is a non-disclosure clause in the terms and conditions of providing information to the concerned organization (Pipkin 50).
There are a number of precautious steps that organizations can take to protect personal information. To begin with, the people handling such data should be trained. The training should include a code of conduct while handling information about other people. Secondly, organizations that handle such data should formulate ironclad policies concerning data handling and protection. The policies should be able to protect new information and information in the archives. Lastly, organizations have to upgrade their technology. This involves employing updated software and hardware in data handling and storage. This will prevent access of stored information by hackers who sell the information to business organizations seeking to exploit the members of society (Mjølsnes 30).
Organizations should also use the data they collect for the intended purpose only. The purpose of data collection should be clearly stated. This should be adhered to even when concerning stored information. When a new need for data arises, new information should be collected from the field. The number of people with access to such information should be restricted. This will ensure accountability in case of any confidentiality breach (Mjølsnes 80).
Mjølsnes, Stig F. A Multidisciplinary Introduction to Information Security. Boca Raton: CRC Press, 2011. Print.
Pipkin, Donald L. Information Security: Protecting the Global Enterprise. Upper Saddle River, N.J: Prentice Hall PTR, 2000. Print.