Preview

The Value of Digital Privacy in an Information Technology Age

Powerful Essays
Open Document
Open Document
1849 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
The Value of Digital Privacy in an Information Technology Age
Running head: The Value of Digital Privacy in an Information Technology Age 1

The Value of Digital Privacy in an Information Technology Age

Tara Brooks

Professor Bristow, J.D.

Law, Ethics and Corporate Governance, LEG 500

4 May 2012

Abstract
How many of us have paused during conversation in the past several years, suddenly aware that you might be eavesdropped on? Probably it was a phone conversation, although maybe it was an e-mail or instant-message exchange or a conversation in a public place. Maybe the topic was terrorism, or politics, or your church service. You pause suddenly, momentarily afraid that your words might be taken out of context, and then you laugh at your paranoia and go on. But your demeanor has changed, and your words are subtly altered. Privacy is a growing concern in the United States and around the world. As we increasingly use the Internet and the seemingly boundary less options for collecting, saving, sharing, and comparing information trigger consumer’s worries. Online practices of business and government agencies may present new ways to compromise privacy, and e-commerce and technologies that make a wide range of personal information available to anyone with a Web browser only begin to hint at the possibilities for inappropriate or unwarranted intrusion into our personal lives. Privacy is very important-especially on the Internet. It is amazing how many websites are designed to reveal private details about people—actually it is a little scary. In this paper, I will be discussing different topics on the value of digital privacy. Keywords: privacy, personal information, digital privacy

1. List and describe at least three (3) technologies that allow an individual to research citizens’ private data.

The three technologies that allow an individual to research citizens’ private data are Bluetooth, GPS, and Google (Internet).



References: Halbert, T., & Ingulli, E. (2012). Law & ethics in the business environment (7th ed.). Mason, OH: South-Western Cengage Learning http://autos.aol.com/article/gps-thief-home-invasion/ http://www.ehow.com/list_6068148_bluetooth-advantages-disadvantages.html#ixzz1u3e6jVDc http://hassam.hubpages.com/hub/Types-Of-Bluetooth-Hacks-And-Its-Security-Issues http://techgyo.com/index.php/3-major-advantages-gps-tracking-system/#ixzz1u44hGdujsOME

You May Also Find These Documents Helpful

  • Good Essays

    Privacy is the state of being free from intrusion in one’s personal life, or so it used to be. In Simson Garfinkel’s article “Privacy Under Attack” he discusses how technology has invaded people’s privacies over the years and continues to do so. From telephone systems and mail to car computers and surveillance cameras.…

    • 760 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    With the development of digital technology, our data is not only being monitored, but it is being gathered and stored in such a way that makes it searchable. Daniel J. Solove had it right when he wrote, “Until recently, public records were difficult to access—finding information about a person often involved a scavenger hunt through local offices to dig up records. But with the Internet, public records are increasingly being posted online, where anybody anywhere can easily obtain and search them.”[1] Is there a form of protection against this invasion of privacy? Are we to trust these data controllers, the person or persons who control the functions and methods of the processing of our personal data? Are the government regulations decreasing our right to privacy? What is considered private these days?…

    • 3006 Words
    • 13 Pages
    Powerful Essays
  • Good Essays

    The article “Visible Man” written by Peter Singer discusses the issues that are involved with the topic of privacy. Many people feel that they are comfortable with the actions they are taking but they do not realize the information they are putting out into the real world. Singer explains how government officials use cell phone providers to gain insight on certain individuals. The idea that is stressed in this article is that too much privacy is never good, especially with government officials because the confidential information that gets leaked informs society on what it going on behind the scenes. The more information one can gather about a topic, the more informed they will be; furthermore, being well educated on a topic will allow one…

    • 276 Words
    • 2 Pages
    Good Essays
  • Better Essays

    Nowadays, with the advancements in modern technology, it is easy for the government to monitor our every single act in our daily lives. Everywhere there are public-surveillance cameras. Our phone calls, emails, bank transactions and any other activities are being tracked. Every second, the government is collecting numerous amounts of information from us to detect any unusual activities in the society. Although what the government does can somehow create a safer society for us, our privacy rights are gradually diminishing. Not only is…

    • 1062 Words
    • 5 Pages
    Better Essays
  • Powerful Essays

    Final English 122

    • 1481 Words
    • 6 Pages

    Privacy is perhaps one of the most personal issues in today’s society. Privacy is an intensely personal issue, and perhaps not only to the right of the individual to dress the way he or she desires, worship in any way he chooses, but also to expect that those rights be protected by the government that upholds them. At one point or another, every individual in our society has asked the question, “Is privacy in the 21st Century possible?” The answer lies in the exploration of what privacy really means, and what privacy issues society faces in today’s modern, informational, and digital age of what we call the 21st Century.…

    • 1481 Words
    • 6 Pages
    Powerful Essays
  • Good Essays

    Surveillance In 1984

    • 540 Words
    • 3 Pages

    Today, the advancement in surveillance secretly results in control of one’s life by the government and is hard to avoid in modern American society. The government collects phone and internet records from technology and communications companies. They track every phone call, purchases, emails, text messages, internet searches, social media communications, and more. If one wants privacy then it is best said by David Von Drehle that “Privacy is mostly an illusion”. It is a fact that over 85% of computers worldwide are being monitored by government agencies, banks, corporations, and others too.…

    • 540 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Everyone leaves personal digital tracks in systems whenever he or she make a purchase, takes a trip, uses a bank account, make a phone call, walks past a security camera, obtains a prescription, send or receives a package, files income tax forms, applies for a loan, e-mails a friend, sends a fax, rent a video, or engages in just about any other activity. The security camera increases the scope and nature of available data. Law-abiding citizens, criminal and terrorist leave extensive digital tracks. Gathering and analyzing electronic and behavioral information can play major roles in detecting and preventing terrorist…

    • 432 Words
    • 2 Pages
    Satisfactory Essays
  • Better Essays

    There are many Americans that worry about the invasion of their privacy. An American’s privacy can be lost by- an IP address internet cookies, government surveillance cameras, and social networking sites. There are many ways Americans can control their privacy, but sometimes the invasion of privacy is out of their control. For example, computers save all of the American’s private information without their consent.…

    • 1379 Words
    • 6 Pages
    Better Essays
  • Good Essays

    Privacy is a person’s right to control access to his or her personal information. Everybody value the protection of their personal information. No one wants to see some of their personal information made public, especially on the internet. However, the recent evolution of technology has started to threaten every individual’s privacy by reducing the amount of control that they had over their personal data and making it possible for people who do not have the proper authority to access them. According to Zalta (2014), the 21st century has become the century of Big Data and advanced Information Technology allows for the storage and processing of exabytes of data. The combination of increasing power of new technology and the declining clarity and agreement on privacy give…

    • 480 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Privacy is a fundamental moral right in a democratic society. It is the right bestowed upon individuals that strengthen the freedoms of speech, press, association, and assembly which are crucial for a free, democratic society. However, advancement in technology threatens privacy and autonomy which reduces the control over private data and exposes individuals to undesirable consequences. Thus, a loss of privacy leads to a loss of an individual’s freedom in society.…

    • 1755 Words
    • 8 Pages
    Good Essays
  • Good Essays

    Privacy Matters Analysis

    • 849 Words
    • 4 Pages

    citizen has the right of privacy when it comes to their houses, personal belongings, and documents, there is a loophole when it comes to information stored in databases. This is due to “the Fourth Amendment and technology [having] always had a volatile relationship” as stated in “Social Networks, Government Surveillance, and the Fourth Amendment Mosaic Theory” (Monu Bedi 2). In short, this article connects the lack of privacy in social networks to the loophole in the Fourth Amendment, and how the government uses that loophole (Monu Bedi’s, “Social Networks, Government Surveillance, and the Fourth Amendment”). But, this flaw in the system isn’t entirely the fault of our founding fathers. Part of the reason it is so difficult to enforce privacy is due to the tense relationship between the Supreme Court and privacy laws, which “The Supreme Court and Privacy Information” goes into detail about (F. Cate and B. Cate’s, “The Supreme Court and Privacy Information”). While “it [the Fourth Amendment] only prohibits ‘unreasonable’ searches and seizures,” the amendment “. . . is silent about what makes a search or seizure ‘unreasonable’” (F. Cate and B. Cate 261). Yes, there are many ways to cheat the “system” when it comes to finding out information of citizens of the United States. However, it’s not only the government that can access information and data without authorization, companies and third parties can as…

    • 849 Words
    • 4 Pages
    Good Essays
  • Good Essays

    least half of each discussion was spent in trying to narrow the gap in our collective…

    • 13321 Words
    • 54 Pages
    Good Essays
  • Good Essays

    People use computers on a daily basis. They are a familiar modern convenience that employers and households are accustomed to. While they offer a wealth of services that make life much easier, many may not fully comprehend that paying bills, purchasing an item, or even applying for a job on the computer may put their privacy at risk.…

    • 800 Words
    • 4 Pages
    Good Essays
  • Better Essays

    Farhan

    • 3202 Words
    • 13 Pages

    12. No one shall be subjected to arbitrary interference with his privacy, family, home or correspondence, nor to attacks upon his honour and reputation. Everyone had the right to the protection of the law against such interference or attacks.…

    • 3202 Words
    • 13 Pages
    Better Essays
  • Good Essays

    Mmc 4200 Exam 2

    • 3513 Words
    • 15 Pages

    Publication of a private matter that is: (1) highly offensive to a reasonable person, AND (2)is not of legitimate concern to the public.…

    • 3513 Words
    • 15 Pages
    Good Essays