Free Essay

Value of Digital Privacy

In:

Submitted By crazymiguel1973
Words 1248
Pages 5
Assignment 2: The Value of Digital Privacy in an Information Technology Age

Since the personal computing revolution, popular entertainment has given us nightmare scenarios of computers and machines taking over the world or threatening our security. From War Games to The Matrix to the Terminator movies, each depiction has seemed like science-fiction at the time, but in the new digital age, they may be closer to reality than we care to admit. And while cyborgs from the future aren’t coming back to exterminate us or are we playing against a machine capable of setting off a doomsday attack, the implications of how much information is available about us on the World Wide Web can set off a personal doomsday.
Ways to Find Data
For many people with questions, the first step towards an answer is logging on to the popular search engine Google. Simply type in a subject and click the search button and users are provided with page after page of information. You can easily find that recipe you’ve been looking for, the latest news headlines or personal information on yourself or your family and friends. A Google search can provide background information, phone numbers, addresses, photos and even directions and maps to your address. The popular search engine also provides e-mail services and cloud-based storage for documents. And while these services are password protected, e-mails stored on Google’s server for more than 180 days can be turned over to governmental agencies without a warrant or a court order. For messages newer than 180 days, law enforcement only needs a subpoena, issued by a prosecutor, to search cloud-based storage (Chooney 2012).
Since it was introduced as a networking site for college students, Facebook has risen in popularity and use. And while the site features the ability to select how little or how much you choose to reveal about yourself, most users never click on or set the privacy settings. On Facebook, users can share preferences for items or services, background information such as schools or places lived and even photos of themselves and their families. While most users use the site to reconnect with old and new friends or to stay connected to family, they often don’t realize just how much information that can will reveal on-line without thinking twice.
Facebook has also introduced a new application for Android devices called Facebook Home. The app acts like a skin for the Android operating system, providing a replacement home screen that automatically gives the user updates from the popular social networking site. The app also collects information about the user’s location, communications and actions that Facebook could sell to advertisers. The application can track not only messages sent through Facebook but also text messages sent on the phone and e-mails (Kelly 2013).
While many of us may recall the phone books of old, printed phone books are becoming increasingly obsolete thanks to sites like WhitePages.com. This site allows you to find people or businesses by city, state or zip. In addition, users can use a reverse phone number or address look-up to find out information on users. By entering a name and state, you can find out not only the phone number for a person, but also people associated with that person and current and previous addresses (though this is limited to cities).
Advantages and Disadvantages
If you’re looking to find that old friend from high school or college, the advantage of using Google, Facebook or White Pages is the ease and amount of information that can quickly and easily be returned in just a matter of seconds. Social networking allows us to stay connected to family and friends in a way that wasn’t possible in the past.
Allowing these sites to have access to GPS data from your cell phone can also have certain advantages. Should you need directions, Google Maps can determine your current location and the best route to your destination. It can also provide information to emergency services should you need their assistance. Another advantage of GPS systems is certain applications can monitor and transmit data about your exercise route so you can determine if you are meeting your goals or call for assistance should something happen to you.
And while there are advantages, there are also disadvantages. One of the biggest is that you may not be aware of if and how your information is being shared. Another is that many people don’t understand how the privacy settings on social networking sites work or can be adjusted as needed. This can allow for too much personal information to be available to just anyone on-line, whether it be the names of family and friends or our financial information.
One of the simplest ways to protect your on-line privacy is to take the time to read the privacy policy of any social networking site a user joins. Users can also make sure that their on-line account settings are at the highest level for privacy. This may require some reading and understanding of various settings and what is shared.
Personal information can be scrubbed from the Internet as well, but it will require contacting the various services that provide it in order to do so. Sites that provide the information will require proof of your identity before they will remove personal information from on-line searchable records. This may also require a bit of research and diligence to determine the procedures for removing personal information and how long it will take before the information is taken down.
Another way to protect personal information is a service like LifeLock. These services monitor your credit information and protect you from identity theft. They can also help you recover your identity and personal information should a case of identity theft occur.
Privacy Laws and Protection
The Electronic Communications Privacy Act of 1986 extended government restrictions on wire taps from telephone calls to transmission of electronic data by computer. The act allows the government to read electronic messages stored on a server for more than 180 days without a court order, subpoena or warrant. The act makes it relatively easy for governmental agencies to demand service providers allow access to personal information on a server.
When the ECPA was enacted in 1986, the power and pervasiveness of the World Wide Web probably seemed like science-fiction. The current law allows the government to access a wide variety of information about a person that is collected daily by cell phone providers, social networking sites and other on-line sources.
In 2010, the Justice Department argued in court that cell phone users had given us their expectation of privacy about their location because they chose to share that information voluntarily with cell phone carriers (Helft 2011). The rules established by the ECPA depend on the type of information being sought and its age as well as how the courts in the local jurisdiction have interpreted the law. Citizens may not even be made aware that their records and date are being searched and often defendants can’t exclude the information gathered from court proceeding.
Most of us expect privacy and the ability to live life without fear or that our identity or possessions will be taken away. They should have the choice on if and how much of their personal information is shared and they should be made aware of the consequences of sharing too much or too little information.

Similar Documents

Premium Essay

Value of Digital Privacy

...The Value of Digital Privacy in an Information Technology Age A weekend getaway in Vegas…$400, dinner at a fine restaurant…$200, digital privacy in the information technology age…PRICELESS. No value can be put on the importance of digital privacy in today’s world of the Internet. There are numerous technologies that allow individuals to research citizens’ private data. Websites such as Facebook, Intelius, and Spokeo allow for easy access to individuals’ personal information. Technologies That Allow Research of Private Data For today’s generation, Facebook has become as conventional as the telephone. You will not find many people functioning in today’s technological environment without a Facebook page. With so many people using the website, it has become a prime source in gathering personal data about individuals. So many users post personal information about where they work, what schools they attend, what vacations they’ve taken, the names/ages of theirs kids, and much more. And, of course, there are usually pictures to go along with all of the unsolicited information that’s posted. Social networking sites usually allow their users to join and host their information for free. These companies sometimes make their money by helping marketers to target advertising campaigns--a service for which advertisers pay tremendously. This creates profit for social networking companies as they provide a free service to users (Petryni, 2013). Intelius is one example of a people search...

Words: 979 - Pages: 4

Premium Essay

The Value of Digital Privacy

...Assignment 2: The Value of Digital Privacy Strayer University Law, Ethics and Corporate Governance – LEG 500 1. List and describe at least three (3) technologies that allow an individual to research citizens’ private data. Google Inc. offers what may be the largest and most used tool to search for information over the internet. Their mission statement says it best: “Google’s mission is to organize the world’s information and make it universally accessible and useful.” (Google, Inc., 2013). By typing any word or set of words into the search field, Google is able to bring together information about individuals, businesses; just about any subject imaginable. Google is increasingly used by employers to gather information about job applicants. Private individuals use it to find information about family members, friends, or complete strangers. Features like Google Earth can give you a bird’s-eye view of someone’s home by simply typing in an address, and Google Maps can take you straight to their front door. The global reach of Google Online phone books and reverse directories such as White Pages provide a limited amount of information free of charge, but offer the opportunity to provide more information for a one-time or recurring fee. These directories normally display information such as current and past addresses, possibly phone numbers, age, and household members or relatives. These tools are useful for individuals who are simply looking...

Words: 1950 - Pages: 8

Premium Essay

The Value of Digital Privacy in an Information Technology Age

...The Value of Digital Privacy in an Information Technology Age Diana Flynn Strayer University Professor James Merola April 30, 2012 1. List and describe at least three (3) technologies that allow an individual to research citizen’s private data. Intelius.com is a technology that helps people find family members, friends, classmates, military buddies and almost anyone living in the United States. It sells background information to anyone or anybody regardless of who you are. DateCheck is a site hosted by Intelius which stores reports including names, addresses, birth dates, court records, and cell phone numbers. People can access personal records by name, social security number or phone number through Intelius. The second technology is Google.com. If you are looking for information on someone, searching the web using Google is one of the best places to start. A person can find background information, phone numbers, addresses, maps and more. On the flip side, anyone can find the same information about you. Information is given by citizens opening up an account. It is the basic information such as name, address, phone, email or credit card number. Information is shared with companies, organizations, and in individuals outside of Google with consent. Data searched on the web is stored to improve and maintain the security of their systems. Government agencies request information from...

Words: 1451 - Pages: 6

Premium Essay

Assignment 2: the Value of Digital Privacy in an Information Technology Age

...Assignment 2: The Value of Digital Privacy in an Information Technology Age Professor Weekley Law, Ethics and Corporate Governance May 5, 2013 There are many reasons you may want to get someone’s personal information, maybe you just need their address to send a card, but there are many people who have access to citizen’s private data with the click of a button. Your information can be searched for by anybody for any reason, and there are companies out there willing to help for a fee. The fourth amendment states, “The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall not be violated” (Halburt/Ingulli 2012). This law keeps people safe from searches for absolutely no reason, but the same protection does not expand to the internet, where these searches happen every day. There are a few ways of obtaining information about someone, and all you need to do is pay a small fee then you can have access to their address, phone number, criminal record and much more. You should only be able to get a background check on a person if you are a potential employer and after the person has signed a waiver. One such site offering these services is Spokeo.com. For $39.95 I can get the following information about anyone: Full Name, Photos & Profiles, Address, Property Records, Phone Number, Public Records, Relatives, Court Records, Month/Year of Birth, Sex Offender Check, Address History, and Criminal Check....

Words: 1128 - Pages: 5

Premium Essay

The Value of Digital Privacy in an Information Technology Age Brenda Steen Strayer University Leg/500 December 19, 2012 Professor: Dr. Pino the Following Assignment Contains Information Regarding Individual

...The following assignment contains information regarding individual privacy in this age of information technology. On today’s vast information superhighway, private information can be found on most individuals within a couple of clicks of a computer mouse. This assignment will describe a minimum of three technologies that allow people to research the private information of citizens. This report provides and analysis of the advantages and disadvantages of having this information made public. Additionally, this report includes options individuals have to protect their private information. Last, this report discusses the existence and effectiveness of electronic privacy laws enacted to protect private information. Google is probably the most used search engine on the internet. It is usually the first step used to research private information. Google collects all available private information and conveniently places it at a researcher’s fingertips. Such information as address, telephone numbers, pictures and work history is available on Google. Facebook is another popular website people use to obtain private information. Researchers can gain information such as posted pictures, family/friend information, and place of employment. Researchers can also find out recreational information such as local establishments a person frequents or when he or she is on vacation. Many states use have county property tax websites. A researcher can simply type in a person’s name and find...

Words: 951 - Pages: 4

Premium Essay

Digital Privacy

...The Value of Digital Privacy in the IT Age The Value of Digital Privacy in the IT Age Digital Privacy in the IT age is almost extinct. The World Wide Web houses information about anything and everyone. People use the digital technology everyday with the impression that what they are doing is protected from others, unless they chose. While few consumers are fully aware of how their data is being used and even fewer are capable of actively managing it, most individuals expect their digital identity to be treated responsibly and openly: 79%, for example, said companies should be more transparent about use of personal data. There are systems and technologies that people use to gain access to a person’s information. The information obtained can be an advantage or disadvantage. The government has implemented laws for years to try to establish some controls There are many technologies that will allow an individual to research citizens, but the three that will be discussed are Facebook, Intellus, and Google. Facebook is a web based social app use to contact friends. A person can either download for free or buy “apps” for a small amount of money. Apps are games, quizzes and sharing services. These “apps” are consists a host of personal information which includes emails, current locations, sexual preferences of “app” users and their friends. Intelius allows people to access personal records by name, social security number or phone number. People use this system to find family or do...

Words: 963 - Pages: 4

Free Essay

Management Info Systems Ethics Hw

...help define the solution. Second, you must define the conflict and identify the higher-order values involved. This is because the parties usually claim during a dispute they are all pursuing higher values. Third, stakeholders should be identified so you can figure out what they want, which might also be used later when figuring out a solution. Fourth, you must identify the options that you can reasonably take, even though this may not satisfy all the stakeholders. Finally, you must identify the potential consequences of your actions. This would include looking at the consequences from various points of views. There are also six ethical principles that can be used to help. One principle is called the Golden Rule, which is to do unto others as you would have them do unto you. Another principle is Descartes’ Rule of Change. This principle states that if an action cannot be taken repeatedly, it is not right to take at all. Another principle would be the Risk Aversion Principle. This one says you should take the action that produces the least harm or least potential cost. There is also Immanuel Kant’s Categorical Imperative, which first has you evaluate the action. If the action is not right for everyone to take, then it is not the right one to take at all. Another principle would be the Utilitarian Principle, which says that one should do the action that achieves the higher or greater value. Finally, there is the Ethical “no free lunch” Rule. This principle says that you should assume...

Words: 1596 - Pages: 7

Premium Essay

Project 1 - Ccjs 321 Digital Forensics

...INCIDENT rEPORT CCJS 321 – Digital Forensics | Stan Vos Date of submission: FEB 5, 2016 | INCIDENT rEPORT CCJS 321 – Digital Forensics | Stan Vos Date of submission: FEB 5, 2016 | Project 1 - CCJS 321 Digital Forensics For the purposes of this project, imagine you are an Information Security (InfoSec) Specialist, an employee of the Makestuff Company, assigned to the company’s Incident Response Team. In this case, you have been notified by Mr. Hirum Andfirum, Human Resources Director for the Makestuff Company, that the company has just terminated Mr. Got Yourprop, a former engineer in the company’s New Products Division, for cause.  Mr. Andfirum tells you that at Mr. Yourprop’s exit interview earlier that day, the terminated employee made several statements to the effect of “it is okay because I have a new job already and they were VERY happy to have me come from Makestuff, with ALL I have to offer.”  Mr. Yourprop’s statements made Mr. Andfirum fear he might be taking Makestuff’s intellectual property with him to his new employer (undoubtedly a Makestuff competitor).  In particular, Mr. Andfirum is worried about the loss of the source code for “Product X,” which the company is counting on to earn millions in revenue over the next three years.  Mr. Andfirum provides you a copy of the source code to use in your investigation.  Lastly, Mr. Andfirum tells you to remember that the Company wants to retain the option to refer the investigation to law enforcement in...

Words: 1700 - Pages: 7

Free Essay

Information System Ethics Notes

...wrong that individuals use to make choices to guide their behaviour. IS creates opportunities for intense social change, threatening existing distributions of power, money, rights and obligations. * Internet and digital firm techs make it easier to assemble, integrate and distribute info, unleashing new concerns about appropriate use of customer info, protection of personal privacy and protection of intellectual property * Other issues: establishing accountability, setting standards to safeguard system quality, and preserving values and institutions * 5 moral dimensions of the info age * Info rights and obligations individuals/firms possess in respect to themselves * Privacy – Claim of individuals to be left alone, free from surveillance/interference from other individuals, organizations, or the state; claim to be able to control info about yourself * Privacy in public spaces * Data storage & exchange * Laws & expectations in US Vs. EU & Australia * Protecting traditional intellectual property rights in digital society * Who is held accountable and liable for harm done to info and property rights * System quality: standards of data and system quality to protect individual rights * Quality of life: preservation of values in an info and knowledge based society * 4 technological trends of concern * Computing power doubles every 18 months Increased reliance on, and vulnerability to, computer sys * Data storage costs rapidly...

Words: 983 - Pages: 4

Premium Essay

Internet Challenges to Security and Privacy

...ASSIGNMENT ON TERM PAPPER INTERNET CHALLENGES TO SECURITY AND PRIVACY SUBMITTED BY : GIFTY KARUVELIL SAM ID NUMBER: 0160011 SUBMITTED TO : PROFESSOR . JOYCE JAMES MG. 650: MANAGING INFORMATION TECHNOLOGY ACROSS THE ENTERPRISE TABLE OF CONTENT : * INTRODUCTION * ANALYSIS OF SECURITY AND PRIVACY * CATEGORIZATION AND SESITIVITY * STATE OF RESEARCH * MAJOR PLAYERS I THE INTERNET * GLOBAL SENSOR NETWORK MIDDLEWEAR * RFID * PHYSICAL MECHANISM * CRYPTOGRAPHIC PROTOCOLS * RESEARCH FROM OTHER DOMAINS * INFORMATION ACCOUNTABIILITY * CRYPTOGRAPHIC IDENTIFIERS * KEY EXTRACTION FROM WIRELES CHANNL CHARACTERISTECS * CONCLUSION 1 1 Introduction The Internet has undergone severe changes since its first launch in the late 1960s as an outcome of the ARPANET. The initial four-node network has quickly grown into a highly interconnected and self-organized network that builds the daily basis for business, research, and economy. The number of people using this worldwide network has exponentially grown up to about 1.5 bn and hereby makes up about 20% of the world population. This sheer number of end...

Words: 4680 - Pages: 19

Premium Essay

Marketing Plan

...Marketing Strategy 7 Value Proposition 7 Segmentation 7 Targeting 7 Positioning 8 Actions 9 Website 9 Outbound Media Messaging 9 Social Media Promotion 9 Specific Initiatives 9 Budgets, Assumptions, & Risks 10 Controls 11 Appendices 12 References 14 Introduction The Marketing Plan to launch the new Gerrarrom service to new users, is summarised below for January to June 2014. UK based early adopter academics at three specific universities, fit the high knowledge, heavy digital usage profile most likely to value a cutting edge internet experience given their collaborative digital enterprise, and likelihood to rapidly grow usage. Viral marketing is used to secure digital word-of-mouth recommendations from the targeted influencers by competing for attention, referals, and useage activity. The service is positioned for digitally productive academics needing a superior layer of compartmentalised internet, a less intrusive interface and an evolved content feed that provides the one stop shop for all public and private Social Media (SM) productivity. The plan covers the logical flow of considerations, goals and actions defined by Armstrong and Kotler (2012), for creation, definition and communication of value to the target segment. Marketing Situation Gerraroom will drive adoption via unforeseen modes of web interaction but launches to existing SM users, so current and evolved trends are relevant. Mckinsey's Digital Economy report (2012)...

Words: 3010 - Pages: 13

Premium Essay

Dols of Mattel - Challenges on the Global Markets

...Mattel ­ Case Study ­ Dolls facing new challenges on the global market I. Executive Summary Mattel produces and sells various toys around the world and among these Barbie fashion doll is the flagship. This product was criticized from more aspects from other cultures of Aisa where the lifestyle Barbie represents is not commonly accepted. On the other hand privacy issues were raised by parents regarding the digital marketing activity of Mattel, as rights of children are related in this market. Mattel needs to consider whether these challenges are related specifically to the lifestyle Barbie represents, whether the lifecycle of Barbie can be expanded in a changing global environment. Or the issues are the signs of a general change regarding toys marketed internationally and also digitally. I came to the conclusion that Mattel needs to introduce a new doll which fits the new expectations. II. Problem/Issue Statement Mattel is the No 1. toy producer in the world, in terms of Sale. Their products with the strongest market presence are based on the concept of dolls / collectibles, where these characters are supported with background story, additional gadgets, additional releases of attached tools. The flagship brand of the company is the fashion Barbie doll, which was 50 years old in 2009. Barbie represents an independent, young American girl and as a fashion doll it acted in different professions and situations during the years. Thanks to this concept the lifecycle of the brand could been expanded on...

Words: 2127 - Pages: 9

Premium Essay

Big Brother Is Watching

...Information Privacy is a somewhat fresh concept. It is considered the third—and newest— layer controlled through digital technology (Anita Beveridge, 2014). Privacy is important in one’s personal and professional life. My definition of privacy is something that belongs to an individual person such as my personal information, things that I purchased myself, something that I have the right to that no one else does without my permission. According to Merriam Webster dictionary privacy is defined, “as the quality or state of being apart from company or observation” and/or “freedom from unauthorized intrusion.” The concept of information privacy has become more important as more systems controlling more information appear. It was suggested in about 1986 that information systems would increase privacy concerns (Bélanger, 2014), in present time this proves have been an accurate prediction. Information systems can develop the world with amplified access to information which includes communication and better productivity of large systems. We can enhance our lives with the usage of technology. With this same technology privacy can be destroyed and economies can be harmed by unethical acts such as cyber-attacks. The need to observe the go-ahead between information-sharing efforts and privacy and civil liberties is only likely to raise more pressing as the nature of the threats facing the United States shifts (Nelson, 2014). As technology continues to develop new ways to gather...

Words: 1769 - Pages: 8

Premium Essay

Pros And Cons Of A Cashless Society

...the main arguments against the establishment of a cashless society and demonstrate how they are neglectable. Author, advisor and commentator on digital financial services, David Birch has classified these arguments in his book “Before Babylon, Beyond Bitcoin: From money we understand to money that understands us” (London Publishing Partnership: June 2017). They are: conservatism, demographics, seigniorage, security and privacy. 1.4.1 Conservatism It is argued that every person has an innate sense of conservatism, a risk-averse attitude towards innovations, and anchors himself to traditional value. This is what brings some persons to think there...

Words: 1667 - Pages: 7

Free Essay

Digital Marketing

...The Survey of Digital Technology and Internet Use measures the adoption and use of various digital technologies, including the Internet.  The use of the Internet and digital technology has become pervasive in today's society. Like electricity, the Internet has become so ingrained in the way that business operates, it can be considered a General Purpose Technology (GPT) because it affects the way the entire economy functions. The use of digital technologies and electronic commerce, while of great potential, also pose numerous challenges to both businesses and policy makers. In order to understand the effects and impacts of these technologies, it is essential to first understand who is using them and how.  The data from this survey are used by businesses and policy makers to monitor the uptake and adoption patterns of Information and Communication Technologies (ICTs) and assess their impact on the economy. Results are also monitored by international organizations such as the Organization for Economic Co-operation and Development (OECD) for benchmarking purposes and to study the development and the influence of the digital economy. Statistical activity Science and technology (S&T) and the information society are changing the way we live, learn and work. The concepts are closely intertwined: science generates new understanding of the way the world works, technology applies it to develop innovative products and services and the information society is one of the results...

Words: 3974 - Pages: 16