...Is using social media for marketing a form of infringement of personal privacy? We are now in the 21st century and social media has become a very big hit. So the topic here is, is it an invasion of personal privacy when marketers use social media in marketing? First let me explain what personal privacy is. It is personal freedom from unwanted disturbance in someone’s private life meaning that we have the freedom to be not constantly disturbed. However, the internet is a public library, when you add something on the internet it is already public even if it wasn’t meant to be, and to be honest there are many people out there who just like to cause disturbance, but you have the choice to post it privately or publicly. It is not eavesdropping if you posted something publicly and a stranger saw it. There are also possibilities that the marketers collect personal data like workplace or home address so that he can personally meet face to face with the customer or consumer to conduct his survey. If the marketer constantly visits your workplace or home it is an invasion of privacy, but I find this very rare because it doesn’t benefit him, in fact it is a waste of time for him if he keeps getting rejected, in anyways so it is not practical. The reasons why marketers have started using social media for marketing is because the users are massive, like Facebook it has more than 1 billion users. Because of this massive amount of users’ marketers will use this advantage to gain knowledge...
Words: 883 - Pages: 4
...Process that has changed my life The internet has greatly changed the lives of many people in my country and definitely the world over. Now people are able to do things which they could not do before the coming of the internet. The following are how the internet has influenced many people: • E-banking • E-learning • Communication through emails, social networks and Skype, for example • Ecommerce • Surfing the internet for learning • Research. This list is not exhaustive. However one process that changed my life very much is through searching for jobs online. There are a lot of employment agencies that are online. People can register with them for their services. I registered with a number of employment agencies in my country. I can now search for jobs and apply for jobs on the internet in a fast and efficient manner. Before the use of the internet for that purpose people would be required to use express mails or postal services to apply for jobs. People could also travel for long distances in search of employment. I can no longer do that. I have changed jobs in the past ten years through online applications. It now takes very little time to search for employment. The employment agencies, can as well keep data bases of job seekers, so much that it is easier to find right candidates for employment. In the past ten years I changed jobs four times by the use of the internet. That has not been very expensive for me. Now I am earning a lot of money because I managed to search...
Words: 9963 - Pages: 40
...205 How would you feel if someone that had never met you and had never seen your face was able to tell you that your favorite movies were “50 First Dates, 10 Things I Hate About You, and The Princess Bride,” and that you “browse entertainment news and like to take quizzes” (Angwin, 2010). Would you feel your privacy had been sbreached because someone must have spied on you without your knowledge? That is what happened to Ashley Hayes-Beaty. “Miss Hayes-Beaty is being monitored by Lotame Solutions Inc., a New York company that uses sophisticated software called ‘beacon’ to capture what people are typing on a website” (Angwin, 2010). According to PCWorld Magazine (Sullivan, 2012), personal web habits are being tracked by companies such as Lotame Inc. and Facebook, advertisers, and corporations that “stalk” consumers on the web, and then sold to marketers and the government without web users being informed or aware of it. People like Ashley are suing data brokers that “sold consumer profiles to other companies without taking steps required under the U.S. Fair Credit Reporting Act to protect consumers” (Gross, 2012). Digital consumer monitoring is a breach of privacy that needs to be addressed. Personal data is being collected and sold without consumer consent, and the current regulatory environment is weak. As this issue becomes more prominent, a variety of solutions have been proposed, such as personal data “lockers,” Shine the Light Law, and transparency within companies....
Words: 4209 - Pages: 17
...providers of online services are currently unsettled both within the U.S. and abroad. Claims have been threatened and filed under both U.S. and foreign laws for defamation, invasion of privacy and other tort claims, unlawful activity, copyright and trademark infringement, or other theories based on the nature and content of the materials searched and the ads posted by our users, our products and services, or content generated by our users. In addition, the Digital Millennium Copyright Act has provisions that limit, but do not necessarily eliminate, our liability for hosting, or for listing or linking to, third-party websites that include materials that infringe copyrights or other rights, so long as we comply with the statutory requirements of this act. Various U.S. and international laws restrict the distribution of materials considered harmful to children and impose additional restrictions on the ability of online services to collect information from minors. In the area of data protection, many states have passed laws requiring notification to users when there is a security breach for personal data, such as California’s Information Practices Act. We face similar risks and costs as our products and services are offered in international markets and may be subject to additional regulations. Privacy concerns relating to our technology could damage our reputation and deter current and potential users from using our products and services. From time to time, concerns have been...
Words: 350 - Pages: 2
...and argues that although collection of DNA upon arrests was found justified under the Fourth Amendment, it does not necessarily mean that it will be found justified under the Canadian Charter of Rights and Freedoms. While s.8 of the Charter seems to give similar protection as the Fourth Amendment, they have very different requirements for judicial authorization, reasonableness and standard of “probable cause”. Scrutinizing those different requirements and standards, this paper holds that the process of DNA collection is highly intrusive and would be a serious violation of s.8 of the Charter as it could reveal an excessive amount of private information about an individual over which he/she has a strong reasonable expectation of privacy. Furthermore, it will deprive people from their right to be presumed innocent, which is protected under s.11 (d) and significantly impact socially marginalized groups. Finally, this paper conducts an analysis of the violations under s.1 of the Charter and indicates that none of the violations can be justified in a free and democratic society. INTRODUCTION: In a recent judgment, the Supreme Court of the United States approved the collection of a defendant’s DNA upon arrests under the Fourth Amendment. 1 Interestingly, it seems that Canadian legislatures found this decision very inspiring as the Minister of Justice, Peter...
Words: 7373 - Pages: 30
...nupurjoshi184@gmail.com TITLE OF THE PAPER: CYBER SPACE MASS SURVEILLANCE PROGRAMS,INFRINGEMENT OF PRIVACY OF INDIVIDUALS, BY STATE IN THE NAME OF NATIONAL SECURITY. ABSTRACT: In this present era of cyber revolution and globalization, citizens have turned into “Netizens”. The advancements in the field of technology is also accompanied with the development of various methods of surveillance and intervention by the State into individuals’ private information. Governments are keeping an eagle eye by monitoring individual's movements, businesses transactions and also the means of communication, which includes cyberspace. It is alleged that the United States of America’s National Security Agency runs a program known as PRISM, which enables the US government to gain access to e- mails , conversations, pictures, voice calls and even sign in details of people using websites and applications associated with 1|Page Facebook, Yahoo, Microsoft, to name a few. Failure of cyber law mechanisms and national authorities to advance legislation and frameworks along with the technological developments and the increasing trends on States’ surveillance practices has created an environment in which citizen’s right to privacy is easily violated, leading to human rights violations also and lack of accountability, which raises questions on the legitimacy of such act of state. This research paper will mainly be focusing on this issue of privacy...
Words: 6245 - Pages: 25
...edge technology with automobiles has caused some growing pains. The issues with providing a constant source of Wi-Fi capabilities, privacy concerns, distributing necessary software upgrades, and protecting the customers identity have been issues auto makers have faced since this endeavor started to enter the cars we buy. So companies like Ford, GM and BMW have been on the razor edge of break through innovation to draw the curious techy generation to friendlier interface systems, with high-tech navigation, Pandora music, Wi-Fi capabilities, and applications that car buyers and use to continue their social networking, technological dependent lives on the road. Together these advances suggest that auto makers are on the verge of entering an another industry to supplement their industry. Identifying the major issues and their outcomes Identifying the major issues in automakers exploring inclusion into technology within their cars is numerous, although the upside is great and there is evidence to support it. Of the many issues that automakers face, one of the more prominent is the lack of a central system to feed into to, or off of. This system does not exist yet to where these systems can receive traffic information, schedule reservations, or even connect to the internet under its own system similar to a cell phone. Privacy concerns similar to that of smart phones have become an issue, and tracking software can easily make someone a victim. Today, a company...
Words: 2054 - Pages: 9
...Running Head: THE EXISTENCE OF PRIVACY WITH TECHNOLOGY THE EXISTENCE OF PRIVACY WITH TECHNOLOGY Obediah Howard Bellevue University THE EXISTENCE OF PRIVACY WITH TECHNOLOGY Abstract This research paper will discuss the relationship between privacy and technology. It will attempt to ascertain if technology and privacy can share the same plane of existence. Benefits and deficiencies of a particular technology are not hereditary to that technology, but are depend on their application. The public insists on accountability of technological innovation and assurance that privacy will remain intact. Striking a balance between enabling technology to enrich lives and restricting it from invading privacy has to be addressed. Implementing controls to protect private data is imperative. Technological advances over the years have challenged the public’s perception and expectation of privacy. Technology and one of its preeminent by-products, convenience, will continue to grow exponentially for the foreseeable future; there is no evidence to suggest otherwise. Privacy finds itself in a precarious position in the face of evolving technology. The collective concept of privacy has to be revisited. With the advent of technological innovations and the accessibilities they bring, privacy in its purest form does not exist. From an anthropological perspective, privacy is a relatively modern development. Ancient cultures practiced communal...
Words: 1783 - Pages: 8
...2. Whether the right to privacy and confidentiality is a fundamental right under Article 21? 2.1. What is Right to Privacy and Confidentiality? Privacy may be regarded as a basic right of every human being. Stone in his textbook gave a narrow definition of privacy. He stated that it is the right to prevent, or to be compensated for, the unauthorized acquisition or publication of secret information. This definition, although narrow, is apt for the present facts of the case. The European court on human rights has also tried to define privacy in various cases. It has been termed as a circle around every individual human being which no government...ought to be permitted to overstep and some space in human existence then entrusted around and sacred...
Words: 1712 - Pages: 7
...Workplace Surveillance Explain where an employee can reasonably expect to have privacy in the workplace. Employees can be monitored through telephones, computers, the internet, voicemail, telephone conversations, instant message and surveillance. The employee will want to pay close attention to the company policy on privacy and electronic usage as much of these items are unregulated as stated on the privacyrights.org website. Your employer can listen, read and monitor most of your workplace communications. Even if the policy is paid attention to the employee will need to ensure they understand the implications of the privacy policy as it can be hard to say how a judge might decipher the policy which became clear to me during our reading of privacy in chapter four of our text (Halbert 2009). It is important for the employee to know when the communication crossed the line from being private to being property of the company. A big issue these days is how email and internet usage can be monitored and an employee can potentially lose their employment over misuse. It is said that some 28% of employers have fired their employees over misuse of internet as stated on the privacyrights.org website. Phone calls are also monitored when employees have conversations with customers. It stands to reason if an employee has communications with customers the business would have a right to monitor these calls. If an employee has a personal conversation the employer is required to stop...
Words: 1549 - Pages: 7
... Week 3 Assignment # 1 LEG 500 Law, Ethics, and Corporate Governance By Anthony McKenzie Presented to Prof. Moses Cowan February, 16, 2012 1) Explain where an employee can reasonably expect to have privacy in the workplace. The privacy rights of employees and the infringement on these rights, has caused employees to become even more frightened when it concerns their privacy, and they feel that they are losing these rights because of the advances being made in technology (Privacy in the Workplace and Conducting an Internal Investigation, n.d.). For example, these subsequent cases will explain to us more, about how the United States Supreme Court has come to establish the theory of “privacy” for the people of America (Supreme Court Decisions on Liberty 2012,). Katz vs. United States 389, U.S. 347 (1967) & Olmstead v. United States 277 U.S. 438 (1928). Some of the technological tools such as video surveillance cameras, face recognition software, and tracking software programs may be already in use by employers. In particular situations, For example, the employer may want to see closely what it is their employees are doing on company time. Employers may have to use some type of...
Words: 1643 - Pages: 7
...In the modern world, our privacy is constantly being violated without our consent. This is due to information that is easily available. Whether you’re walking down the street, taking the subway, purchasing online items or in a store, chatting online, we are constantly under someone’s watch. Hacking, picture leaks and theft of private information are becoming recurrent issues in the 21st century. Some believe this may not be an issue but others are concerned with the impact it could have on our lives. The twentieth century was particularly marked by the growth of the Internet and the rise of social media programs. This has raised the population’s awareness about their privacy rights. A lot of information can be found online including credit...
Words: 1336 - Pages: 6
...many topics of concern that raise red flags and force people to reevaluate what needs to change in order to make sure that the very principals we hold as a country are not bent to meet the demands of changing technologies. Concerns over personal and private data who can see what and at what point is personal data no longer private. Identity theft is another issue as people become more and more willing to use computers to bank and pay bills they are more at risk of another person electronically stealing their information. Ethics surrounding information processing, the information being inputted into database about you may be incorrect and if so, it can have very serious financial or medical ramifications. Now with digital media copyright infringement has a whole new level of concerns amongst artist and protecting their individual works. In the article titled Computing Ethics Surrounded...
Words: 1690 - Pages: 7
...B Broadway Cafe | Networks, Telecommunications, and Wireless Computing/ Customer Relationship Management/ Systems Development | | The following report provides a comprehensive analysis of Networks, Telecommunications, and Wireless Computing/ Customer Relationship Management/ Systems Development regarding the Broadway Café. | | | | Contents: 1. Introduction – p3 2. E-coupons vs. Paper coupons – p4 3. Risks involved with m-coupons – p5 4. Privacy Issues – p6 5. Benefit of tracking response rates of m-coupons and forwarding by customers – p7 6. Virtual world business in the real world – p9 7. Customer relationships in a virtual world – p10 8. Virtual Customer Service Strategy – p10 9. Difference in Supporting Second Life Customers vs. Real and Web Customers – p11 10. Security and Ethical Issues Regarding Second Life – p12 11. Pros and Cons of Using an Employee to Build you a Custom System – p13 12. Pros and cons of using of purchasing a COTS – p14 13. A Smooth Transition with Older Employees and the New System – p15 14. Conclusion – p16 15. References – p17 1. Introduction: Recently I have inherited a coffee shop from my late grandfather, the Broadway Café. The café is located in downtown Charleston, WV and offers many different kinds of specialized coffees, teas, a full service bakery, and homemade sandwiches, soups, and salads. Opened in 1952, the Broadway Café has enjoyed the benefit...
Words: 4198 - Pages: 17
...Children and adults alike are always craving privacy from one person or another, but can never seem to find the exact feeling of privacy that they desire. In the United States of America, the problem of surveillance dates back to the times of World War I, yet during these times it was a benefit for the people of the United States. As time progresses, the government continues to form new organizations to keep a “helpful” eye on the people that are housed within our nation. Many American people have begun to realize the problem with the government’s “helpful” eye, and this has lead them to see the abuse of surveillance by the United States government as it infringes on the First Amendment of the United States of America. The government and big...
Words: 1167 - Pages: 5