Preview

Leg 500 - Assignment 2: the Value of Digital Privacy in and Information Technology Age

Better Essays
Open Document
Open Document
1258 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Leg 500 - Assignment 2: the Value of Digital Privacy in and Information Technology Age
Assignment 2: The Value of Digital Privacy in and Information Technology Age
LEG 500 - Law, Ethics, and Corporate Governance

1. List and describe at least three (3) technologies that allow an individual to research citizens ' private data.
A technology that allows an individual to research private data is the Global Positioning System (GPS). This “is a navigation and precise-positioning tool” (Glasscoe, 1998) developed in the early seventy’s by the Department of Defense. Although GPS was originally designed for the military, its applications have extended into the public sector to provide researchers the specific location of an individual (Glasscoe, 1998).
A malicious technology that can be used to research an individual’s private data is spyware. In general, it is software that can be loaded on an internet ready device, such as a computer or smartphone, with the sole purpose of gathering and transmitting one’s private data to another person. Spyware is “designed to be difficult to remove,” and the collection and transmission of information can be completed without the individual’s consent (Microsoft, 2012).
In contrast to spyware, social networking services are freely provided with and individual’s private data. Social networking services are web based platforms built to facilitate communication between internet users. “When creating an account user[s] disclose private information about their social contacts and interests by including friends, business associates, and companies in their networks” (The White House, 2012). Services such as “Facebook, the largest social network service” (Halbert & Ingulli, 2012) can gather enormous amounts of private data that is associated with an individual including: “written updates, photos, videos, and location information” (The White House, 2012). 2. Discuss the advantages and disadvantages of public access to this information, both for the researchers and those who are being investigated.
“Personal



References: Glasscoe, M. (1998, August 13). What is gps?. Retrieved from http://scign.jpl.nasa.gov/learn/gps1.htm Halber, T. & Ingulli, E. (2012). Privacy and Technology. In Law & Ethics in the Business Enviorment (7th ed.). Mason, OH: South-Western Cengage Learning. Mao, C. (2012, March 28). Columbia business law review. Retrieved from http://cblr.columbia.edu/archives/12047 Microsoft. (2012). Microsoft. Retrieved from http://www.microsoft.com/security/pc-security/spyware-whatis.aspx SENGUPTA, S. (2012, February 04). Should personal data be personal?. Retrieved from http://www.nytimes.com/2012/02/05/sunday-review/europe-moves-to-protect-online-privacy.html?pagewanted=all&_r=0 The privacy act . (2010). Retrieved from http://www.justice.gov/opcl/1974privacyact.pdf The White House. (2012, February 23). Consumer data privacy in a networked world:a framework for protecting privacy and promoting innovation in the global digital economy. Retrieved from http://www.whitehouse.gov/sites/default/files/privacy-final.pdf U.S. Department of Justice. (2009, November). Your rights to federal records. Retrieved from http://publications.usa.gov/epublications/foia/foia.htm

You May Also Find These Documents Helpful

  • Good Essays

    Privacy is the state of being free from intrusion in one’s personal life, or so it used to be. In Simson Garfinkel’s article “Privacy Under Attack” he discusses how technology has invaded people’s privacies over the years and continues to do so. From telephone systems and mail to car computers and surveillance cameras.…

    • 760 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    The year is 2010, the era is the 21st century; and we, citizens of the world, are living in the Information Age. Our information is made available on the Internet where it can be viewed by millions. The days where our data was recorded on scraps of paper and left in a box in an office along with thousands of other registers are long gone. Our personal data is permanently recorded in the hard drives of computers where they can be analysed and exploited by anyone with access to that computer; or worse, identity thieves and hackers may get their hands on the data.…

    • 3006 Words
    • 13 Pages
    Powerful Essays
  • Good Essays

    The article “Visible Man” written by Peter Singer discusses the issues that are involved with the topic of privacy. Many people feel that they are comfortable with the actions they are taking but they do not realize the information they are putting out into the real world. Singer explains how government officials use cell phone providers to gain insight on certain individuals. The idea that is stressed in this article is that too much privacy is never good, especially with government officials because the confidential information that gets leaked informs society on what it going on behind the scenes. The more information one can gather about a topic, the more informed they will be; furthermore, being well educated on a topic will allow one…

    • 276 Words
    • 2 Pages
    Good Essays
  • Better Essays

    Solove, D (2012).United States v. Jones and the Future of Privacy Law: The Potential Far-Reaching Implications of the GPS Surveillance Case. Retrieved on September 4, 2014 from http://docs.law.gwu.edu/facweb/dsolove/files/BNA-Jones-FINAL.pdf…

    • 1433 Words
    • 6 Pages
    Better Essays
  • Good Essays

    Spyware is a software that aims to gather information about a person or organization without their knowledge, and usually without consent. One opinion of spyware is highlighted in Harlan Coben’s essay, “The Undercover Parent” (2008). It claims that parents should install spyware in their…

    • 974 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    Final English 122

    • 1481 Words
    • 6 Pages

    Privacy is perhaps one of the most personal issues in today’s society. Privacy is an intensely personal issue, and perhaps not only to the right of the individual to dress the way he or she desires, worship in any way he chooses, but also to expect that those rights be protected by the government that upholds them. At one point or another, every individual in our society has asked the question, “Is privacy in the 21st Century possible?” The answer lies in the exploration of what privacy really means, and what privacy issues society faces in today’s modern, informational, and digital age of what we call the 21st Century.…

    • 1481 Words
    • 6 Pages
    Powerful Essays
  • Good Essays

    Surveillance In 1984

    • 540 Words
    • 3 Pages

    Today, the advancement in surveillance secretly results in control of one’s life by the government and is hard to avoid in modern American society. The government collects phone and internet records from technology and communications companies. They track every phone call, purchases, emails, text messages, internet searches, social media communications, and more. If one wants privacy then it is best said by David Von Drehle that “Privacy is mostly an illusion”. It is a fact that over 85% of computers worldwide are being monitored by government agencies, banks, corporations, and others too.…

    • 540 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    This article focuses in how devices can transmits a consumer private information to third parties, and how consumers have little knowledge that their information is kept in databases to be sold. In 2020 most home devices will interconnected both wire and wireless to each other across a network, giving unlimited potential to create personal profiles…

    • 516 Words
    • 3 Pages
    Satisfactory Essays
  • Powerful Essays

    Kurlander speaks the truth when he says, “We walk Main Streets and drive thoroughfares that are monitored by cameras and speed passes. We work at computer terminals that allow our bosses to monitor our behavior and work productivity, and we use social media and search engines that can track our usage and establish personality profiles to sell and share.” (Kurlander). Today, technology that analyzes and records our personal preferences becomes increasingly popular. For example, Netflix provides suggestions to its users, and Facebook recommends friends that people have in common. Kurlander brings up, “We now also routinely spy on our families and one another too in our homes, businesses, and elsewhere, simply [by] clandestinely hiding spy cameras or affixing and monitoring GPS [global positioning system] monitors to phones, computers, vehicles or possessions.” (Kurlander). New and advanced security systems allow the owners to view footage from their micro-sized cameras. Today, average people are able to spy on each other because this surveillance technology is not only owned by the government but can also be privately…

    • 1263 Words
    • 6 Pages
    Powerful Essays
  • Better Essays

    Rtyn

    • 5264 Words
    • 22 Pages

    _______ (1997). "Towards a Theory of Privacy in the Information Age," Computers and Society, Vol. 27, No. 3, September, 27–32.…

    • 5264 Words
    • 22 Pages
    Better Essays
  • Good Essays

    Personal Privacy

    • 813 Words
    • 4 Pages

    The purpose of this paper is to explain what I use to protect my personal privacy. There are many different things that can be use to protect someone’s information and keep hackers from accessing their computer. Some people use anti-virus, firewalls and anti-spam software to help protect their personal privacy. As we all know with today’s technology having just anti-virus or firewalls are not good enough, but having something is better than nothing. They do not protect you from new or custom-made viruses and evil-scripts. There is no one solution to protect you from Identity Theft, it’s just too many threats to keep up with, and having one software will not do the job for you. One key to protecting your information would be multi-layer protection; this means having more than one program monitoring you computer for different reasons.…

    • 813 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    Privacy and Security

    • 4774 Words
    • 20 Pages

    Stanford school of medicine, 2012, Why You Need to Secure Your Information, Viewed 23 Apr 2013, <http://med.stanford.edu/irt/security/information.html>.…

    • 4774 Words
    • 20 Pages
    Powerful Essays
  • Satisfactory Essays

    When it comes to the terms privacy, profit, and surveillance, there are many ethics that go into these three terms. Throughout this paper, I will talk about all the ethics that go into these three terms and how they affect everything and everyone. First I will start by defining each term and what it means to everyone to have privacy, provide profit and use surveillance. I will then talk about the ethics part of each term and what they mean in a business aspect of society.…

    • 315 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Contemporary information systems technology, including internet technologies, challenges traditional regimens for protecting individual privacy and intellectual property. Data storage and data analysis technology enables companies to easily gather personal data about individuals from many different sources and analyze these data to create detailed electronic profiles about individuals and their behaviors. Data flowing over the Internet can be monitored at many points. The activities of website visitors can be closely tracked using cookies and other web monitoring tools. Not all websites have strong privacy protection policies, and they do not always allow for informed consent regarding the use of personal information.…

    • 385 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    ethics

    • 493 Words
    • 2 Pages

    1.10 : To help counter terrorism, many countries are planning or have developed computer systems to track large numbers of their citizens and their actions. Clearly this has privacy implications. Discuss the ethics of working on the development of this type of system.…

    • 493 Words
    • 2 Pages
    Satisfactory Essays