Since the beginning of the use of computer technology in all spheres of human activity, there are many problems associated with the protection of privacy. This is mainly due to the processing of documents using computer technology. Many of the administrative measures to protect the privacy of individuals and organizations have lost their power due to the transfer of documents in a completely new environment.
When receiving personal letters, in contract, during the service, if telephone conversations with acquaintances and strangers, people used various means of authentication. Personal letters were sent with an indication of the current mailing address or have the stamp of precisely those post offices that have been the treatment of such letters.
At the conclusion of contracts used forms produced by printers that are using typewriters, had the unique serial number, printed text, which is then signed by an official and the seal of the organization. When talking on the telephone and reliably has been known that the conversation was conducted with the man whose voice was previously known. Many hundreds of administrative measures aimed at protecting privacy in communication between people.
With the introduction of computer technology in human life, much has changed. If you are using, for example, e-mail an opportunity to specify a non-existent return address or simulate receiving a letter from an acquaintance. In daily communication via the Internet are many signs that identify a particular person in real life (sex, age, educational level), have ceased to be. There was a so-called "virtual reality".
Quickly and efficiently solve problems associated with the protection of privacy in computer systems is impossible. There is a need for an integrated approach to solving these problems. This approach must involve the use of organizational and legal measures, as well as software and hardware that protect the confidentiality, integrity and availability.
To date, the organizations to work correctly with the information of a confidential nature there is a set of rules. Head of the organization signs the list of information of a confidential nature. The contract signed by the employee and the employer, there is an item which refers to the liability for incorrect work with confidential information resulting in non-compliance with prescribed standards in the agreement to work with this information, there is a legal basis for the use of such personnel to civil or criminal liability.
As well as organizing a series of measures aimed at protecting confidential information. For example, such measures may include: recruitment of qualified personnel, prediction of possible threats, and actions to prevent them, using various levels of staff access to information with a different privacy.