TOPIC 4: Data and Information Privacy

4.1.3 ICT security

In the era of developing the use of ICT, a number of issues in education need to be changed including in the teaching and learning process. This then poses challenges in security and whether academicians can be able to ensure safe use of ICT in teaching (Miron & Ravid, 2015). When it comes to ICT security, individuals require protecting both the physical devices that make up a computer system (computer hardware) as well as the information that the computer hardware holds from unauthorised use, access, theft or damage. However, ICT security measures should also ensure that the hardware and the information stored on it remain accessible and useful to legitimate users. It is advisable to consider ICT security measures and the protection of personal information to be a part of the decision whether to use, purchase, build or upgrade ICT systems rather than addressing it after a privacy infringement has occurred. Entities who provide online customer services or engage in electronic commerce, such as online retail businesses are advised to utilise ICT security measures to ensure that their website, along with smart phones, apps, terminals, kiosks and other environments that are connected to a network are secure and that they provide a safe environment for individuals to make payments or provide their banking and personal information.

Implementing ICT security procedures help individuals to protect themselves against malicious hackers, computer viruses and other harmful programs as well as the damage caused by them. These programs are being used to gain unauthorised access to computer systems and disrupt their operations or steal any stored personal information. Furthermore, ICT security can also protect information against unauthorised use or disclosure as a result of human error, hardware or software malfunction, power failure and natural disasters.