There are many concerns, precautions, rules, and regulations to consider when handling electronic information. Ethical issues that can arise include gaining unauthorized access to internet resources, intentionally wasting resources, destroying the integrity of computer-based information, conducting internet-wide experiments, as well as compromising the privacy of others, etc.  

Since technology and the need for its protection are so large other aspects of computer ethics concern include Privacy, Confidentiality, Security breaches, System implementations, and Data inaccuracies. Privacy presents to be the most important as people tend to have sensitive information stored like passwords, credit card information, or even health records. Confidentiality involves preserving authorized restrictions on information and there are ways to protect against it. Means to protect against ethical concerns and privacy issues include multi-factor authentification, encryptions, firewalls, and even backup plans.  Privacy and confidentiality present high importance, especially in fields like healthcare and financial services. With healthcare, there are many laws and regulations to protect private health information like HIPPA and state laws on reporting and exceptions for sharing and viewing medical documents. Data inaccuracies are addressed by integrity which works to make sure data has not been tampered with causing misinterpretation. Pampering includes but is not limited to editing, and cutting/ pasting, all of which can be detrimental to information accuracy.

There are many instances where hacking is not the only thing that poses a threat to sensitive information like natural disasters or system malfunctions. In this case, protective measures like a backup plan are important. A backup plan involves the sensitive information being processed, backed up, and saved in a separate location so it can be accessed by authorized persons after the incident has occurred. Firewalls are another means of protection for businesses and individuals looking to protect different kinds of information and include 2 types -hardware and software. 

No matter what document needs protection or who is in charge of them it is important that at every level things are done properly so that the integrity, confidentiality, and accessibility by authorized personnel are maintained.