•For all practical purposes the abuse of this information has slipped out from under the legislative umbrella.
•Antiquated laws, combined with judicial unfamiliarity with computers, make policing, and prosecuting, abuses of the privacy of personal information difficult and, in many case, impossible.
Computer matching
•Computer matching is a procedure whereby separate databases are examined and individual common to both are identified.
•Computer matching has been referred to as Orwellian by some, while auditors think it is a great help in their jobs.
•The focus of most computer-matching application is to identify people engaged in wrong doing.
Securing the integrity of
personal information
personal information
•Computer experts feel that the integrity of personal data can be more secure in computer data bases than in file cabinets.
•They contend that we can continue to be masters and not victims if we implement proper safeguards for the maintenance and release of this information and enact effective legislation to cope with the abuse of it.