Tuesday, April 9, 2019

The Value of Digital Privacy in and Information Technology Age Essay Example for Free

The Value of Digital Privacy in and Information engineering Age Essay1. List and describe at least three (3) technologies that every last(predicate)ow an separate to investigate citizens orphic breeding. A technology that allows an individual to research individual(a) entropy is the Global Positioning trunk (GPS). This is a navigation and precise-positioning tool (Glasscoe, 1998) developed in the early seventys by the segment of Defense. Although GPS was originally designed for the military, its applications have extended into the public sector to provide researchers the specific location of an individual (Glasscoe, 1998). A malicious technology that undersurface be apply to research an individuals private data is spyw be. In general, it is software that can be loaded on an internet ready device, much(prenominal)(prenominal) as a computer or smartphone, with the sole purpose of gathering and transmitting ones private data to a nonher person. Spyware is designed to b e difficult to remove, and the collection and transmission of instruction can be completed without the individuals consent (Microsoft, 2012).In contrast to spyware, social networking assistances are freely provided with and individuals private data. Social networking services are web based platforms construct to facilitate communication mingled with internet users. When creating an account users disclose private information about their social contacts and interests by including friends, business associates, and companies in their networks (The etiolate House, 2012). Services such as Facebook, the largest social network service (Halbert Ingulli, 2012) can gather enormous amounts of private data that is associated with an individual including written updates, photos, videos, and location information (The discolour House, 2012). 2. Discuss the advantages and disadvantages of public entranceway to this information, both for the researchers and those who are being investigated. person-to-person data is valuable and companies put across up to $2 billion a year to collect that information (SENGUPTA, 2012).Retailers use the data to manoeuvre advertising to consumers based on their geographic location, person-to-person demographics, or interests. Annually personal data is used to generate as much as $145 billion in online sales (The light House, 2012). Personal information is often shared freely in a mutually beneficial relationship between an individual and researchers. Those who are being investigated whitethorn sign up for online services which deliver them free content, such as music or games. Consumers are paying for the service by agreeing to receive targeted ads (Microsoft) from researchers. Security failures involving personal data can cause harm (The White House, 2012) to both the researcher, and those being researched. If a researchers data is breached resulting in the release of private data the organizations reputation could be tarnished. Sub sequently on that point would be financial impacts to the researcher as consumers and business partners sever their relationships.On the other hand, those being researched may be discriminated against due to misleading information or fall victim to potentially life-disrupting identity element stealing (The White House, 2012). 3. Determine what measures citizens can take to protect private information or information they do not want to be disclosed. First and foremost, citizens should carefully read all disclosures, including the license agreement and hiding statement (Microsoft, 2012) prior to downloading any software, shareware, or freeware to their computer or smartphone. Secondly, they should properly protect themselves utilizing updated anti-virus software and firewalls on their electronic devices.Finally, citizens should be familiar with loneliness-enhancing technologies such as Do Not Track which enables individuals to exercise nearly control over how third parties use p ersonal data or whether they receive it at all (The White House, 2012). 4. Discuss a federal official virtue that lets the federal government the legal serious to influence private information on U.S. citizens available to the public, and whether or not you agree with this law. Any person has the right field to request access to virtually every federally held record. Enacted in 1966, The Freedom of Information Act (FOIA) is federal law which provides public access to all federal agency records except for those records that are protected from disclosure. gild exemptions and three exclusions to the FOIA prohibit the release of information in relation, but not limited to information involving matters of personal privacy (U.S. Department of Justice, 2009). In the wake of Watergate Congress enacted the Privacy Act of 1974 to protect citizens private data in the face of growing concerns of illegal surveillance and investigation of individuals by federal agencies (The privacy act , 2010).This federal law restricts disclosure of government held records which personally identify individuals, and increases an individuals right to obtain and amend government held records kept on themselves. The Privacy Act also establishes a encipher of fair information practices which requires agencies to comply with statutory norms for collection, maintenance, and dissemination of records (The privacy act , 2010). As Americans we have forever and a day cherished our privacyand we have the right to be let alone (The White House, 2012). Much to a greater extent than the right to solitude, Americans have the right to freely participate in commerce without the costly threat of identity theft. We should be empowered with the freedom to seek employment or heath care without discrimination.Federal laws should grant citizens peace of mind that our personal information it protected, and we have a choice regarding when and what portions of our personal information made available to the public. 5. Determine whether there are electronic privacy laws that can prevent others from having access to private information as well as how effective they are. Laws protecting electronic privacy admit the 1968 Federal Wiretap Law, as amended by the Electronic Communications Privacy Act 1986 (ECPA), which constrain it illegal to intercept, disclose, or access messages without authorization (Halbert Ingulli, 2012).As with the FOIA there are exemptions to the ECPA which eliminate protection from communications that are readily accessible to the general public (Halbert Ingulli, 2012) and current federal law may not protect all of an individuals private data. As of 2012, forty-seven States have Security appall Notification (SBN) laws. These laws vary from state to state, however they promote the protection of sensitive personal data (The White House, 2012) which is not currently protect by federal law. In February of 2012, the Obama Administration presented the Consumer Privacy step of Rights to Congress. This Bill of Rights attempts to establish a much needed national baseline to protect citizens private information and acts as a blueprint for privacy in the information age (The White House, 2012).ReferencesGlasscoe, M. (1998, August 13). What is gps?. Retrieved from http//scign.jpl.nasa.gov/ watch over/gps1.htm Halber, T. Ingulli, E. (2012). Privacy and Technology. In Law Ethics in the Business Enviorment (7th ed.). Mason, OH South-Western Cengage Learning. Mao, C.(2012, March 28). Columbia business law review. Retrieved from http//cblr.columbia.edu/archives/12047 Microsoft. (2012). Microsoft. Retrieved from http//www.microsoft.com/security/pc-security/spyware-whatis.aspx SENGUPTA, S. (2012, February 04). Should personal data be personal?. Retrieved from http//www.nytimes.com/2012/02/05/sunday-review/europe-moves-to-protect-online-privacy.html?pagewanted=all_r=0 The privacy act . (2010). Retrieved from http//www.justice.gov/opcl/1974privacyact.pdf The White House. (2012, February 23). Consumer data privacy in a networked worlda framework for protecting privacy and promoting intromission in the global digital economy. Retrieved from http//www.whitehouse.gov/sites/default/files/privacy-final.pdf U.S. Department of Justice. (2009, November). Your rights to federal records. Retrieved from http//publications.usa.gov/epublications/foia/foia.htm

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.