Preview

Digital Privacy

Better Essays
Open Document
Open Document
1125 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Digital Privacy
Assignment 2
The Value of Digital Privacy
Ruben R Roybal Jr
Strayer University – LEG 500 Law, Ethics and Governance
Professor Lori Baggot
November 11, 2012

The Value of Digital Privacy

Introduction In this paper we will discuss three technologies that allow an individual to research citizen’s private data, and the advantages and disadvantages of public access to this information. We will look at what it means for both the researchers and the individual who are being investigated. What steps citizen’s can take from having their private information from being disclosed? We will also discuss what federal law that grants the federal government the legal right to make private information on U.S. citizen’s available to the public. Finally we will determine whether there are electronic privacy laws that can prevent others from having access to private information.
Technologies on Private Data
There are several different sites that offer personal information by the use of your phone number, name and address. One website is called BeenVerified. BeenVerified was founded with the goal of helping consumers build trust online. By giving our users affordable and easy access to public records, individuals can make more informed decisions about those they choose to meet and interact with. In the past, access to public records was confusing and expensive. BeenVerified aims to disrupt this trend by providing not only an affordable pricing model but also helpful customer service along the way (www.beenverified.com). This website claims to help people in making certain decisions on a roommate or information on a prospect employee, but who is to stop a person from stalking another person by using this information they can get from this website to their advantage? The other place where government employee’s information may be disbursed to anyone that may ask for it is the Freedom of Information Act. The Freedom of Information Act (FOIA) is a law that



References: BeenVerified, (n.d.). About Us. Retrieved November 11, 2012 from Website: http://www.beenverified.com/bv-vs-comp FOIA, (n.d.). Retrieved November 11, 2012 from Website: http://www.foia.gov/ IMLS.gov, (n.d.). About Us. Retrieved November 10, 2012 from Website: http://www.imls.gov/about/freedom_of_information_act_foia.aspx OJP.gov, (n.d.). Retrieved November 10, 2012 from Website: http://www.it.ojp.gov/default.aspx?area=privacy&page=1285 Spokeo, (n.d.). About Us. Retrieved from http://www.spokeo.com/about

You May Also Find These Documents Helpful

  • Satisfactory Essays

    What is a security feature you should always look for in any Web site that will ask for personal information to share with others?…

    • 418 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    It 244 Final

    • 2332 Words
    • 10 Pages

    Customers trust this organization with highly private personal and financial information. That makes it our responsibly to handle that information with the utmost respect and care. Through the controls and procedures outlined in this policy we can achieve those goals.…

    • 2332 Words
    • 10 Pages
    Powerful Essays
  • Satisfactory Essays

    Websites are routinely collecting information about customers and visitors to understand and serve their customers better. Personal information is collected and administrated with integrity, responsibility, and security.…

    • 423 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    With the development of digital technology, our data is not only being monitored, but it is being gathered and stored in such a way that makes it searchable. Daniel J. Solove had it right when he wrote, “Until recently, public records were difficult to access—finding information about a person often involved a scavenger hunt through local offices to dig up records. But with the Internet, public records are increasingly being posted online, where anybody anywhere can easily obtain and search them.”[1] Is there a form of protection against this invasion of privacy? Are we to trust these data controllers, the person or persons who control the functions and methods of the processing of our personal data? Are the government regulations decreasing our right to privacy? What is considered private these days?…

    • 3006 Words
    • 13 Pages
    Powerful Essays
  • Good Essays

    The author of this article is Daniel J. Solove. He discusses the different perspectives and opinions of various people of the government’s control of viewing personal information. The article demonstrates this through examples of what people say, book references, and the opinion of the article himself. In the article, “The Nothing to Hide Argument”, Daniel J. Solove argues that the information- gathering programs the government uses to track and record information from people are problematic.(739) This still remains the case even if the information gathered from these programs was information people did not mind being uncovered. (739).…

    • 572 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Task B Your Work Role

    • 597 Words
    • 3 Pages

    Data Protection - How the company uses the information we provide on the application form.…

    • 597 Words
    • 3 Pages
    Good Essays
  • Good Essays

    This website typically collects information either voluntarily-provided by you or automatically collected when you visit our website, which may include cookies, third party tracking technologies and server logs. Voluntarily provided information may include your name, address, email address, billing and credit card information, and are usually obtained when you fill out our contact forms.…

    • 631 Words
    • 3 Pages
    Good Essays
  • Good Essays

    It is important to secure their personal details as I must maintain the rights of an individual, as each individual has an equal right to have their information kept secured, if they have requested to keep their situation private I must protect their confidentiality and only allow authorized people to access their information.…

    • 762 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Due to the technology available today children of all ages have access to the internet. In the 1960’s the internet became a major source of marketing, sales, and distribution of both products and services. Unfortunately many of these services were used by children under the age of 13 years old (Children's Online Privacy Protection Act (COPPA), 2011). Marketers were able to collect personal information from children through chat room and/or discussion board registration to track behavior of web suffers through advertisement and the promise of gifts in exchange for advertisement (Children's Online Privacy Protection Act (COPPA), 2011). These marketers collected this information about children and their families and compiled it into files then sold it to third parties for various commercial purposes (Koby). Also discovered were dangerous list marketing abuses. Investigative reports revealed how easily this list can be purchased and the power that can be exercised over individuals through the use of their personal information. On December 14, 1995 CNN reported that look up services could be used to locate children: “There is no law on the books that prevent a stranger from calling a 900-number and getting information about your children. In fact, until a few weeks ago, a subsidiary of R. Donnelley provided a service that did just that.” A CBS television reporter was able to purchase a list of children’s names using the name of a notorious killer (Children's Online Privacy Protection Act (COPPA), 2011). On May 12, 1996 the San Francisco Examiner reported: “To prove how…

    • 800 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Privacy is a person’s right to control access to his or her personal information. Everybody value the protection of their personal information. No one wants to see some of their personal information made public, especially on the internet. However, the recent evolution of technology has started to threaten every individual’s privacy by reducing the amount of control that they had over their personal data and making it possible for people who do not have the proper authority to access them. According to Zalta (2014), the 21st century has become the century of Big Data and advanced Information Technology allows for the storage and processing of exabytes of data. The combination of increasing power of new technology and the declining clarity and agreement on privacy give…

    • 480 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Privacy is a fundamental moral right in a democratic society. It is the right bestowed upon individuals that strengthen the freedoms of speech, press, association, and assembly which are crucial for a free, democratic society. However, advancement in technology threatens privacy and autonomy which reduces the control over private data and exposes individuals to undesirable consequences. Thus, a loss of privacy leads to a loss of an individual’s freedom in society.…

    • 1755 Words
    • 8 Pages
    Good Essays
  • Good Essays

    Privacy Issues

    • 402 Words
    • 2 Pages

    The Privacy Act of 1974 protects records that can be retrieved by personal identifiers such as a name, social security number, or other identifying number or symbol. An individual is entitled to access to his or her records and to request correction of these records if applicable. The Freedom of Information Act is a disclosure statute that requires federal executive branch agencies to make records available…

    • 402 Words
    • 2 Pages
    Good Essays
  • Good Essays

    We also collect information from commercially available sources that we consider trustworthy. This is the contact information related to name, address, email address, interest, preferences and other relevant demographic or profile data. The information gathered from credible sources and when you use our services may be used. For instance, we may gather information to compare geographic information that is collected from commercial sources along with IP address to determine the general geographic area.…

    • 1357 Words
    • 6 Pages
    Good Essays
  • Satisfactory Essays

    Advances in Technology

    • 527 Words
    • 3 Pages

    In todays time many fraudulent companies have been able to simply purchase this information or tap into a buyer’s online account as for the cause to contact a consumer to solicit sales. With the Do Not Call and Telephone Consumer Protection Act legitimate companies only have the right to call consumers that are not on the do not call list. Companies also have strict guidelines that are to be followed or a large fine and lawsuit will be the result of breaking the law. Not to mention that in an event that a phone call is made to a consumer that is on the do not call list, than the company has to provide evidence that it was…

    • 527 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    100 S C I E N

    • 3543 Words
    • 17 Pages

    100 S C I E N T I F I C A M E R I C A N…

    • 3543 Words
    • 17 Pages
    Good Essays