Free Essay

Location Privacy

In:

Submitted By camillia88
Words 998
Pages 4
Kamelya Teague
Ersin Soylu
English 101-120
October 10, 2013 Privacy on Current Technological Devices “Location Privacy: Who Protects?” written by Caitlin D. Cottril is an objective educational essay published in URISA Journal’s 2011 Edition. A conference held on April of 2011 directed by Alasdair Allan and Pete Warden showed that some technological devices such as the Apple iPhone and the 3G iPad had the capability of saving user’s locations to a hidden file. This file called “Locationgate”, led to more research on other mobile telephones and “apps”, and conceded that an impressive amount of data regarding the location of user’s was being gathered and saved. (Cottrill, 1) This information is significant because it shows that mobile phone user’s location is being collected onto the spatial environment and therefore is no longer safe. In this essay the author informs her readers that people may watch them through their usage of technological gadgets, however, there are some methods, such as laws and legal issues, that protect people from violations of location privacy. The author’s arguments on the accessibility of user’s location, and the regulations about location privacy, and the method’s users can impliment in order to keep their personal information safe are all strong arguments supported by reliable examples, quotations, explanations, and factual data. “The author claims that apps can trace into people’s web habits, track their location, and examine their files. In addition, it is also stated that apps can gather a person’s phone number and unique ID number.” (Cottrill, 2) This shows that applications on technological devices can access personal information which makes personal information no longer private as most users expect it to be. This information can be accessed by apps through the usage of the unique phone ID’s at any given time. The author supports her claim by giving real life examples of how Google Street View and Twitter’s Geo API have the ability to do so. Google Street View is able to create a visual representation of a person’s geographical location, and Twitter’s GeoAPI allows a person’s current location to be displayed. This argument is a strong argument because it is supported by real examples of how apps can track people’s web habits, location, files, phone number, and unique ID number. Similar to the previous argument, the argument about regulations that protect people’s privacy is also strong. The author claims that “there are some privacy policies that protect user’s rights” (Cottrill, 5), and supports her claim by writing about the privacy policy in the United States of America. The author refers to Title 13 of the Federal Code in the US Census. Under the section titled “Protection of Confidential Information”, regulations concerning issues of privacy in regard to the Census Bureau show how information regarding citizen data will be protected and kept confidential. “The Census Bureau claims that they use various approaches to protect the US citizen’s personal information including computer technologies, statistical methodologies, and security procedures to protect personal information such as names, telephone numbers, addresses.” (Cottrill, 5) The Census Bureau explains that only a limited amount of people have access to this private information, and that violating these rules strict penalties that include prison or a fine up to $250,000. The regulations written about the Census Bureau support the author’s argument that there are, in fact, rules concerning privacy policy, and restrictions that enable privacy policy. Similar to the previous two arguments the argument about what users can do to ensure that their location is secure is also a strong argument. The author claims that there are three things that a person can do to ensure that his or her personal information is private. This means that users can actually do something about their information being secure. These three things are (1) reading application’s privacy policies, (2) not using application’s that do not have privacy policies, and (3) using strong passwords. (Cottrill, 6) Firstly, it is important to read privacy policies to beware of the information that the application may access. Secondly, it is important to not use applications that do not have a privacy policy because one can never know what the application can do with his or her information. Thirdly, it is important to use a strong password in order to prevent other users, or “other bruce methods” (Cottrill, 6) such as computer system’s from discovering one’s passsword. The author further explains the last method by giving an example of how people on Facebook or Foursquare can establish complicated passwords which would disable other users from being able to hack into their account. This argument is strong as well because it claims three ways that users of technological devices can further keep his or her personal information more secure and all three of the ways support Cottrill’s topic sentence. In conclusion, Cottril’s main aim in writing this essay is to make people aware that their location privacy may not be safe, and to inform them that there are some methods that are trying to protect location privacy. All of the author’s arguments on the accessibility of user’s location, and the regulations about location privacy, and the method’s users can implement in order to keep their personal information safe are all strong arguments. Apps are able to access personal information through people’s useage of technological devices. As stated in the US Constitution, there are some regulations that that try to protect users’ rights. There are also things that users can do such as reading privacy policies, not using application’s that do not have privacy policies, and using strong passwords. It is believed that Cottril has achieved her purpose in this essay by making strong arguments supported by examples, explanations, quotations, and factual data. As a great American author, Marshall McLuhan, once said, “Publication is an invasion of privacy”. This quote may be translated to its modern definition of, “As long as we continue to publish things on Facebook, Twitter, Foursquare, we will continue to let others invade our privacy!
-----------------------
0

Similar Documents

Premium Essay

Privacy

...Running Head: THE EXISTENCE OF PRIVACY WITH TECHNOLOGY THE EXISTENCE OF PRIVACY WITH TECHNOLOGY Obediah Howard Bellevue University   THE EXISTENCE OF PRIVACY WITH TECHNOLOGY Abstract This research paper will discuss the relationship between privacy and technology. It will attempt to ascertain if technology and privacy can share the same plane of existence. Benefits and deficiencies of a particular technology are not hereditary to that technology, but are depend on their application. The public insists on accountability of technological innovation and assurance that privacy will remain intact. Striking a balance between enabling technology to enrich lives and restricting it from invading privacy has to be addressed. Implementing controls to protect private data is imperative. Technological advances over the years have challenged the public’s perception and expectation of privacy. Technology and one of its preeminent by-products, convenience, will continue to grow exponentially for the foreseeable future; there is no evidence to suggest otherwise. Privacy finds itself in a precarious position in the face of evolving technology. The collective concept of privacy has to be revisited. With the advent of technological innovations and the accessibilities they bring, privacy in its purest form does not exist. From an anthropological perspective, privacy is a relatively modern development. Ancient cultures practiced communal...

Words: 1783 - Pages: 8

Premium Essay

Privacy in the 21st Century

...Privacy in the 21st Century Eng 122 Mrs. Samaniego 10 June, 2013 In today’s society cameras are watching every step you take and every move you make. How do you feel about that? Someone is watching you, whether it is the surveillance cameras at a gas station or it’s the security guard in a shopping mall. Does this make you feel uncomfortable? You post something on Facebook and decide to delete it 5 minutes later, but did you know that it will always be on the internet although you deleted it? You may not see it but others will. In today’s society, personal privacy rarely exists. There are certain devices and tools that people use when trying to invade someone’s privacy including hidden cameras and satellites. Privacy no longer exists due to all of the new technologies and programs enabling the invasion of someone’s privacy. What is privacy? Do people today really understand what privacy is? Have they had the opportunity to experience privacy? The definition of privacy is “allowing an individual or group to seclude themselves or information about themselves and thereby reveal them selectively.” When something is private it is usually something personal or valuable to someone. Everyone likes privacy but...

Words: 1903 - Pages: 8

Premium Essay

Government Invasion Of Privacy

...With advancements in today’s technology there has been many changes in how the government manages information about the public. Technology has allowed for great changes in how people live and has expanded ways in which individuals can communicate to those close and far distances. Along with great advancements, technology has brought changes in which our privacy and information are affected. Not only do strangers monitor us but the government can too. With the constant monitoring of our privacy both in public, private, and governmental level we are left with little information actually hidden from the public. Some of the ways that our home privacy is invaded is through convenient tools or apps that expand conveniences. The government isn’t...

Words: 1444 - Pages: 6

Premium Essay

Persuasive Essay On American Privacy

...As technology advances throughout the years, American’s privacy slowly corrodes over time. It is almost impossible to not be tracked in the United States since there are so many technologies that invades American civilian’s privacy, like cellphone’s applications and satellites. Surely near the future, there will be a device that will allow anyone who uses it to be anonymous from all technologies. For now, this device can be called Personal Anonymous Device (or PAD). PAD will bring American back their privacy when used, but at the price that it could be potentially used for crimes. It is important to mention on how American’s privacy is being threaten over the past few years. According to http://www.pewresearch.org/fact-tank/2017/01/12/evolution-of-technology/, as of 2016, 77% of Americans own a smartphone and it is growing steadily yearly. Smartphones usually has many features, in which almost all smart phones have a GPS system, which...

Words: 1544 - Pages: 7

Free Essay

Privacy and Technolgy

...social network website in the world, but use of Facebook is becoming a controversial issue as it has potential hazards that threaten users’ privacy. Facebook is a great innovation since it makes people easily contact friends and families, but when users upload their personal information on profile pages, their privacy may be confirmed by strangers. Nevertheless, some people believe that users’ privacy can be protected with technological tools. Although some technology experts claim that companies can protect users’ personal information, modern technology is an invasion of privacy. Using modern technology allows other people to track users’ movements, so it invades people’s privacy. GPS devices can reveal users’ physical location information to others. Leah Yamshon, the author of “Mobile Apps Can Compromise Your Privacy” suggests that if people use GPS technology without sufficient understanding of the system, their movements may be easily tracked by other people (par. 1). Using GPS devices without controlling data transition processes may let other people easily know users’ location, yet most consumers do not know how to control data transition processes. Dishonest people can also steal users’ location information though smart phone applications. Patrick Leahy, the chairman of Senate Judiciary Committee, points out that users’ location information can be collected and stored in an unsafe way by smart phone applications without consumer’ agreement, which can allow criminals...

Words: 1368 - Pages: 6

Premium Essay

My Privacy In The Millennium Era

...When I think of privacy in the millennium Era, I am starting to get more concern about the direction it is going in. I can remember using my GPS on my cell phone when I first got it and I found a Google App that was monitoring my location. It would tell me everywhere I had been while driving. I was very concerned and I later found out how to turn that particular setting off. I think it has pros and cons.For instance, this tracking is good for locating love ones and keeping them safe. However as an adult, I did not want to be linked to a setting that followed my every move. It felt like my privacy was invaded. I wonder how many people activate GPS and are not aware that it can track locations if it is linked to location settings. Radio frequency identification is a bit disturbing to me. It is a technical term that is used to describe radio waves that identify people or objects for business(Turri, Smith & Koop, 2017). I deleted my personal Facebook due to privacy being invaded. People and businesses will look you up on Facebook, and create ideas or solicitations based off suspected financial, education,social status. So, I decided it was...

Words: 422 - Pages: 2

Premium Essay

The Information Age in Which You Live: Changing the Face of Business

...CHAPTER 1 THE INFORMATION AGE IN WHICH YOU LIVE: CHANGING THE FACE OF BUSINESS JUMP TO THE SUPPORT YOU WANT • Lecture Outline • Modules, Projects, and Data Files • Slide Reviews • Closing Cases • Short-Answer Questions • Assignments and Exercises • Discussion Questions • Industry & Global Perspectives • Additional Assignments and Exercises CONTACT INFORMATION: Stephen Haag (shaag@du.edu) STUDENT LEARNING OUTCOMES 1. Define management information systems (MIS) and describe the three important organizational resources within it – people, information, and information technology. 2. Describe how to use break-even analysis to assess the financial impact of information technology. 3. Describe how to use Porter’s Five Forces Model to evaluate the relative attractiveness of and competitive pressures in an industry. 4. Compare and contrast Porter’s three generic strategies and the run-grow-transform framework as approaches to the development of business strategy. CHAPTER SUMMARY This chapter serves two primary purposes. First the chapter introduces your students to the broad notion of management information systems within an organization and the three key resources on which MIS focuses – people, information, and information technology. Second, the chapter jumps right into the process of appropriately selecting which technologies to use based on the industry in which your organization operates, the identified...

Words: 3890 - Pages: 16

Premium Essay

Thuong

...The Blocker Tag: Selective Blocking of RFID Tags for Consumer Privacy Ari Juels RSA Laboratories Ron Rivest MIT CSAIL Mike Szydlo RSA Laboratories What is a Radio-Frequency Identification (RFID) tag? • In terms of appearance… Chip (IC) Antenna What is an RFID tag? • You may own a few RFID tags… – Contactless physical-access cards – Automated toll payment • At present, an RFID tag simply calls out its (unique) name or static data over a short distance “Plastic #3” “74AB8” “5F8KJ3” The capabilities of basic RFID tags • No power – Receives power from reader – Range a few meters • Little memory – Static 64-to-128-bit identifier in current ultra-cheap generation (five cents / unit) – Hundreds of bits soon • Little computational power – A few thousand gates – No cryptographic functions available – Static keys for read/write permission The grand vision: RFID as next-generation barcode Barcode RFID tag Fast, automated scanning Line-of-sight Specifies object type Radio contact Uniquely specifies object Provides pointer to database entry for every object Commercial applications • Smoother inventory tracking – Military supply logistics • Gulf War I: Placement of double orders to ensure arrival • Gulf War II: RFID renders supply chain much more reliable • Product recalls • Anti-counterfeiting • Maintaining shelf stocks in retail environments – Gillette Mach3 razor blades • Parenting logistics – Water park uses RFID bracelets...

Words: 1064 - Pages: 5

Premium Essay

Integrated Distributors Incorporated (Idi), a Publically Traded Company, Has Its Home Office Located in Billings, Montana. Idi Has More Than 4000 Employees in the Following Locations:

...[pic] Incident Response Plan Template for Breach of Personal Information Notice to Readers Acknowledgments Introduction Incident Response Plan Incident Response Team Incident Response Team Members Incident Response Team Roles and Responsibilities Incident Response Team Notification Types of Incidents Breach of Personal Information – Overview Definitions of a Security Breach Requirements Data Owner Responsibilities Location Manager Responsibilities When Notification Is Required Incident Response – Breach of Personal Information Information Technology Operations Center Chief Information Security Officer Customer Database Owners Online Sales Department Credit Payment Systems Legal Human Resources Network Architecture Public Relations Location Manager Appendix A MasterCard Specific Steps Visa U.S.A. Specific Steps Discover Card Specific Steps American Express Specific Steps Appendix B California Civil Code 1798.82 (Senate Bill 1386) Health Insurance Portability and Accountability Act of 1996 (HIPAA) Gramm-Leach-Bliley Act (GLBA) Appendix C Escalation Members (VP Level of Management) Auxiliary Members (as needed) External Contacts (as needed) Notification Order Escalation Member Notification List Notice to Readers Incident Response Plan – Template for Breach of Personal Information does not represent an official position of the American Institute...

Words: 8476 - Pages: 34

Free Essay

Life on the Grid, Iphone Becomes Itrack

...BlackBerry) want to track where their customers go? Cell phone manufacturers want to track customer’s location because they can use information gathered to provide better services, identify poorly selling products and following customers buying habits. It also enables mobile carriers and retailors to identify when a unit is shipped received, returned and refurbished. In addition, manufacturers use tracking information to locate and identify cell phones to improve location-based services for customers. Manufacturers also use these tracking software as a means to distribute customer’s usage data for profit, even though these company deny that they sell this information to third party companies. Finally, location services allow providers to location customer’s lost or stolen cell phones. 2. Do you think cell phone customers should be able to turn tracking off? Should customers be informed when they are being tracked? Why or why not? Yes, customers should be able to turn of tracking services on their device. Customers should also be informed that they are being tracked if indeed they are. This will ensure that users have some control over the data that manufacturers collect which helps to protect their privacy. Sometimes customers do not want others to know where they are or what they are using their devices to do. Apart from the fact that it is a vast invasion of privacy, it also makes it easy of customers to be targeted to receive ads they do not interest them. These ads...

Words: 472 - Pages: 2

Premium Essay

Your Cellphone Is Spying On You: Article Analysis

...In Ronald Bailey’s (2013) article “Your Cellphone is Spying on You,” he claims that with the recent evolution of technology the public has had less privacy, due to GPS and tracking systems. While GPS and location systems within cell phones can be viewed as beneficial to the people, it can also be used by third parties to view a person’s location at any given time. Not only can these parties access locations, they also have access to personal information within the cell phone itself. As stated by Sonia Sotomayor, a U.S. Supreme Court Justice, “Awareness that the Government may be watching chills associational and expressive freedoms” (para. 10). This means that with the knowledge that the government may be watching at any given time, the people...

Words: 333 - Pages: 2

Free Essay

Electronic Surveillance of Employees

...are being productive during work hours and are working to achieve company goals. This report will address the following: Where an employee can reasonably expect to have privacy in the workplace? Is there a difference if an employee is in an open area or in an enclosed office? Does a supervisor of a dealership have sufficient grounds for utilizing electronic employee surveillance? To what extent an employer can engage in electronic surveillance of employees? Lastly, to what extent the inclusion of innocent, unaware third-parties in such surveillance determine whether it is legal? Employee Expectation of Privacy in the Workplace With the challenging economy, employers are finding new ways to protect their assets and increase employee performance. Whether it is through surveillance or monitoring internet usage, companies are trying to protecting what is rightfully theirs. In many companies employees privacy rights are granted by regulations and specific laws. There are a number of cases when these rules would come into play. Say for instance, new employees are required to provide Human Resources Department with large amounts of personal information during orientation. It is the employer’s responsibility to make sure that information is kept private. Other circumstances employees would expect privacy would normally be in the restroom or in a closed office room where work related personal concerns are being discussed. Now if the employer has a policy allowing for reasonable...

Words: 1427 - Pages: 6

Premium Essay

Employee Privacy Rights in the Workplace

...Employee Privacy Rights in the Workplace Vicki Puckett COM 120 Allyson Wells October 8, 2006 Do you think that your employee rights entitle you to workplace privacy? Well, think again. The fact is that most employers monitor their employee in one way or another. In the workplace, many employers are violating the privacy rights of their employees by surveillance, genetic testing, and sexual orientation. According to some workplace privacy studies, there is a good chance that your employer is monitoring your internet activities, including the Web pages you read, and messages you read and post in forums, blogs, and chat rooms. Your employer could also be spying on you in several other ways as well. Some may include recording your phone conversations, videotaping your every move within the company, and tracking your location with the company cell phone. Such monitoring is almost entirely unregulated. Therefore, unless company policy specifically states otherwise, your employer may listen, watch and record most of your workplace communications. The rapid growth of workplace monitoring and surveillance technology has far out paced the development of laws that protect worker privacy interests. Modern technology has provided employers with more advanced and effective means of monitoring their employees. As a result, electronic monitoring of employees in the workplace has become far more prevalent in recent years...

Words: 1146 - Pages: 5

Premium Essay

Surveillance In George Orwell's Novel 'Big Brother Is Watching'

...Lejla Hodzic Mrs.Monroe English III(H) Period 3 Privacy Assignment According to George Orwell's novel 1984 “Big Brother is always watching” and in a contemporary case so is your local law enforcement. Methods of surveillance have excelled through the years, not only can police hold physical documentation about you but they can also request cellphone companies for personal records. This allows officers to attain texts you have sent and calls you have made. What many fail to realize is that state and local law enforcement can easily violate one's privacy. Those who hold positions in this field are able to record video and audio through body cameras, track license plates, obtain location data through cellular devices, and even go as far as searching...

Words: 984 - Pages: 4

Premium Essay

The Internet: an Unrestrained Accomplice in Unlawful Search and Seizure

...205 How would you feel if someone that had never met you and had never seen your face was able to tell you that your favorite movies were “50 First Dates, 10 Things I Hate About You, and The Princess Bride,” and that you “browse entertainment news and like to take quizzes” (Angwin, 2010). Would you feel your privacy had been sbreached because someone must have spied on you without your knowledge? That is what happened to Ashley Hayes-Beaty. “Miss Hayes-Beaty is being monitored by Lotame Solutions Inc., a New York company that uses sophisticated software called ‘beacon’ to capture what people are typing on a website” (Angwin, 2010). According to PCWorld Magazine (Sullivan, 2012), personal web habits are being tracked by companies such as Lotame Inc. and Facebook, advertisers, and corporations that “stalk” consumers on the web, and then sold to marketers and the government without web users being informed or aware of it. People like Ashley are suing data brokers that “sold consumer profiles to other companies without taking steps required under the U.S. Fair Credit Reporting Act to protect consumers” (Gross, 2012). Digital consumer monitoring is a breach of privacy that needs to be addressed. Personal data is being collected and sold without consumer consent, and the current regulatory environment is weak. As this issue becomes more prominent, a variety of solutions have been proposed, such as personal data “lockers,” Shine the Light Law, and transparency within companies....

Words: 4209 - Pages: 17