Preview

Leg 500 - Assignment 2: the Value of Digital Privacy in and Information Technology Age

Better Essays
Open Document
Open Document
1258 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Leg 500 - Assignment 2: the Value of Digital Privacy in and Information Technology Age
Assignment 2: The Value of Digital Privacy in and Information Technology Age
LEG 500 - Law, Ethics, and Corporate Governance

1. List and describe at least three (3) technologies that allow an individual to research citizens ' private data.
A technology that allows an individual to research private data is the Global Positioning System (GPS). This “is a navigation and precise-positioning tool” (Glasscoe, 1998) developed in the early seventy’s by the Department of Defense. Although GPS was originally designed for the military, its applications have extended into the public sector to provide researchers the specific location of an individual (Glasscoe, 1998).
A malicious technology that can be used to research an individual’s private data is spyware. In general, it is software that can be loaded on an internet ready device, such as a computer or smartphone, with the sole purpose of gathering and transmitting one’s private data to another person. Spyware is “designed to be difficult to remove,” and the collection and transmission of information can be completed without the individual’s consent (Microsoft, 2012).
In contrast to spyware, social networking services are freely provided with and individual’s private data. Social networking services are web based platforms built to facilitate communication between internet users. “When creating an account user[s] disclose private information about their social contacts and interests by including friends, business associates, and companies in their networks” (The White House, 2012). Services such as “Facebook, the largest social network service” (Halbert & Ingulli, 2012) can gather enormous amounts of private data that is associated with an individual including: “written updates, photos, videos, and location information” (The White House, 2012). 2. Discuss the advantages and disadvantages of public access to this information, both for the researchers and those who are being investigated.
“Personal



References: Glasscoe, M. (1998, August 13). What is gps?. Retrieved from http://scign.jpl.nasa.gov/learn/gps1.htm Halber, T. & Ingulli, E. (2012). Privacy and Technology. In Law & Ethics in the Business Enviorment (7th ed.). Mason, OH: South-Western Cengage Learning. Mao, C. (2012, March 28). Columbia business law review. Retrieved from http://cblr.columbia.edu/archives/12047 Microsoft. (2012). Microsoft. Retrieved from http://www.microsoft.com/security/pc-security/spyware-whatis.aspx SENGUPTA, S. (2012, February 04). Should personal data be personal?. Retrieved from http://www.nytimes.com/2012/02/05/sunday-review/europe-moves-to-protect-online-privacy.html?pagewanted=all&_r=0 The privacy act . (2010). Retrieved from http://www.justice.gov/opcl/1974privacyact.pdf The White House. (2012, February 23). Consumer data privacy in a networked world:a framework for protecting privacy and promoting innovation in the global digital economy. Retrieved from http://www.whitehouse.gov/sites/default/files/privacy-final.pdf U.S. Department of Justice. (2009, November). Your rights to federal records. Retrieved from http://publications.usa.gov/epublications/foia/foia.htm

You May Also Find These Documents Helpful

  • Powerful Essays

    With the development of digital technology, our data is not only being monitored, but it is being gathered and stored in such a way that makes it searchable. Daniel J. Solove had it right when he wrote, “Until recently, public records were difficult to access—finding information about a person often involved a scavenger hunt through local offices to dig up records. But with the Internet, public records are increasingly being posted online, where anybody anywhere can easily obtain and search them.”[1] Is there a form of protection against this invasion of privacy? Are we to trust these data controllers, the person or persons who control the functions and methods of the processing of our personal data? Are the government regulations decreasing our right to privacy? What is considered private these days?…

    • 3006 Words
    • 13 Pages
    Powerful Essays
  • Good Essays

    The article “Visible Man” written by Peter Singer discusses the issues that are involved with the topic of privacy. Many people feel that they are comfortable with the actions they are taking but they do not realize the information they are putting out into the real world. Singer explains how government officials use cell phone providers to gain insight on certain individuals. The idea that is stressed in this article is that too much privacy is never good, especially with government officials because the confidential information that gets leaked informs society on what it going on behind the scenes. The more information one can gather about a topic, the more informed they will be; furthermore, being well educated on a topic will allow one…

    • 276 Words
    • 2 Pages
    Good Essays
  • Good Essays

    The author makes a good point in his article by explaining that the violation of privacy due to technology is not something new. He backs that point up by evidence of two Boston lawyers at the Harvard Law Review who argued that privacy was under attack by inventions and also business methods in 1890.…

    • 760 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Spyware is a software that aims to gather information about a person or organization without their knowledge, and usually without consent. One opinion of spyware is highlighted in Harlan Coben’s essay, “The Undercover Parent” (2008). It claims that parents should install spyware in their…

    • 974 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    Gasser, Urs. "Recoding Privacy Law: Reflections On The Future Relationship Among Law, Technology, And Privacy." Harvard Law Review 130.2 (2016): 61-70. Academic Search Premier. Web. 5 Feb. 2017.…

    • 516 Words
    • 3 Pages
    Satisfactory Essays
  • Powerful Essays

    Final English 122

    • 1481 Words
    • 6 Pages

    References: Alderman, E. & Kennedy, C. (1997). The Right to Privacy: New York: Vintage Books. Retrieved from: http://www.yale.edu/hnhti/curriculum/units/html.…

    • 1481 Words
    • 6 Pages
    Powerful Essays
  • Powerful Essays

    Kurlander speaks the truth when he says, “We walk Main Streets and drive thoroughfares that are monitored by cameras and speed passes. We work at computer terminals that allow our bosses to monitor our behavior and work productivity, and we use social media and search engines that can track our usage and establish personality profiles to sell and share.” (Kurlander). Today, technology that analyzes and records our personal preferences becomes increasingly popular. For example, Netflix provides suggestions to its users, and Facebook recommends friends that people have in common. Kurlander brings up, “We now also routinely spy on our families and one another too in our homes, businesses, and elsewhere, simply [by] clandestinely hiding spy cameras or affixing and monitoring GPS [global positioning system] monitors to phones, computers, vehicles or possessions.” (Kurlander). New and advanced security systems allow the owners to view footage from their micro-sized cameras. Today, average people are able to spy on each other because this surveillance technology is not only owned by the government but can also be privately…

    • 1263 Words
    • 6 Pages
    Powerful Essays
  • Better Essays

    Rtyn

    • 5264 Words
    • 22 Pages

    _______ (1997). "Towards a Theory of Privacy in the Information Age," Computers and Society, Vol. 27, No. 3, September, 27–32.…

    • 5264 Words
    • 22 Pages
    Better Essays
  • Good Essays

    Personal Privacy

    • 813 Words
    • 4 Pages

    The purpose of this paper is to explain what I use to protect my personal privacy. There are many different things that can be use to protect someone’s information and keep hackers from accessing their computer. Some people use anti-virus, firewalls and anti-spam software to help protect their personal privacy. As we all know with today’s technology having just anti-virus or firewalls are not good enough, but having something is better than nothing. They do not protect you from new or custom-made viruses and evil-scripts. There is no one solution to protect you from Identity Theft, it’s just too many threats to keep up with, and having one software will not do the job for you. One key to protecting your information would be multi-layer protection; this means having more than one program monitoring you computer for different reasons.…

    • 813 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    Privacy and Security

    • 4774 Words
    • 20 Pages

    Stanford school of medicine, 2012, Why You Need to Secure Your Information, Viewed 23 Apr 2013, <http://med.stanford.edu/irt/security/information.html>.…

    • 4774 Words
    • 20 Pages
    Powerful Essays
  • Better Essays

    Technology is a magnificent thing. A majority of people use some form of technology on a daily basis such as their telephones, computers, tablets, and even many devices on their cars. Many of these things are a necessity for a person to have daily, especially if they have to use these devices for work and/or school. Technology also helps people communicate with other people all over the world. Although, technology is a wonderful thing, how private is our information? And, when is it okay for the government to gather this information on specific citizens without their consent, even…

    • 1433 Words
    • 6 Pages
    Better Essays
  • Good Essays

    Surveillance In 1984

    • 540 Words
    • 3 Pages

    Today, the advancement in surveillance secretly results in control of one’s life by the government and is hard to avoid in modern American society. The government collects phone and internet records from technology and communications companies. They track every phone call, purchases, emails, text messages, internet searches, social media communications, and more. If one wants privacy then it is best said by David Von Drehle that “Privacy is mostly an illusion”. It is a fact that over 85% of computers worldwide are being monitored by government agencies, banks, corporations, and others too.…

    • 540 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Contemporary information systems technology, including internet technologies, challenges traditional regimens for protecting individual privacy and intellectual property. Data storage and data analysis technology enables companies to easily gather personal data about individuals from many different sources and analyze these data to create detailed electronic profiles about individuals and their behaviors. Data flowing over the Internet can be monitored at many points. The activities of website visitors can be closely tracked using cookies and other web monitoring tools. Not all websites have strong privacy protection policies, and they do not always allow for informed consent regarding the use of personal information.…

    • 385 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    When it comes to the terms privacy, profit, and surveillance, there are many ethics that go into these three terms. Throughout this paper, I will talk about all the ethics that go into these three terms and how they affect everything and everyone. First I will start by defining each term and what it means to everyone to have privacy, provide profit and use surveillance. I will then talk about the ethics part of each term and what they mean in a business aspect of society.…

    • 315 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    ethics

    • 493 Words
    • 2 Pages

    1.10 : To help counter terrorism, many countries are planning or have developed computer systems to track large numbers of their citizens and their actions. Clearly this has privacy implications. Discuss the ethics of working on the development of this type of system.…

    • 493 Words
    • 2 Pages
    Satisfactory Essays