StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Protecting Individuals Privacy - Case Study Example

Cite this document
Summary
As the paper "Protecting Individual’s Privacy" tells, freedom is an inalienable right by default, but it appears that the government is trying to work out a semantic wiggle room between individual privacy and personal liberties, all for the sake of national interest…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER92.8% of users find it useful
Protecting Individuals Privacy
Read Text Preview

Extract of sample "Protecting Individuals Privacy"

The National Intelligence Grid (Natgrid) aims to monitor the activities of private citizens1, a move that presses on the boundaries of a citizen’s fundamental liberties. It’s an echo of Big Brother in the guise of public interest; the concept is noble, but there’s so much opportunity for abuse that it cancels all intended benefits. The Natgrid will surely speed up the functions of the bureaucracy with a centralized intelligence system, but it’ll also make data accessible to a lot of unscrupulous personalities and agencies.

Although a data protection law already exists (The Information Technology Act), it only goes so far as to cover an individual’s activity. The individual is set apart from the act. The UPA has to set specific ground rules to ensure both aspects coexist but remain separate. The freedom to information shouldn’t be absolute; there has to be a limit to how much the government can access. The law should protect the individual first and foremost. Everything else follows accordingly.
“Convenient and personal are the flip-side to private and anonymous” according to Greenfield. Indeed, convenience comes at a steep price nowadays, and the technological juggernauts of the Information Age admit it. P3P is an essential component of the Web-browsing experience; it allows users to navigate the byways of the Internet without leaving crumbs for the hounds to sniff and follow. This provides a perfect analogy to the online cookies implanted in your browser’s cache; they’re there to monitor online activities, but the exact coverage of this policy is never fully described. As a measure of courtesy, some sites do live up to their word by restricting their own access to user data.

The opportunities exposed by a database of unlimited information are too tempting to resist, though, especially when everything of value is now stored in a remote corner or crevice on the web. The competition for technological supremacy between Google, Microsoft, and everyone else is beside the point. Someone will suffer from the fallout. The infringement on personal privacy is a mere convenience to the technocrats, but it should never be an option to the lowly user. Microsoft Internet Explorer’s noble attempt to make P3P the industry standard is slowly dying a natural death, with people voluntarily providing and publishing personal information through Facebook, YouTube, Tumbler, and a plethora of other social networking and media sites.

Hacking has existed ever since computers became online. It’s still the running trend nowadays, except that it’s institutionalized and accepted as a necessary evil. We have no other choice but to accept the system.

Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Case study Example | Topics and Well Written Essays - 500 words - 15”, n.d.)
Case study Example | Topics and Well Written Essays - 500 words - 15. Retrieved from https://studentshare.org/e-commerce/1590164-case-study
(Case Study Example | Topics and Well Written Essays - 500 Words - 15)
Case Study Example | Topics and Well Written Essays - 500 Words - 15. https://studentshare.org/e-commerce/1590164-case-study.
“Case Study Example | Topics and Well Written Essays - 500 Words - 15”, n.d. https://studentshare.org/e-commerce/1590164-case-study.
  • Cited: 0 times

CHECK THESE SAMPLES OF Protecting Individuals Privacy

Data privacy in online business (using the example of Amazon.com)

Consumers have been very uneasy about the privacy of their personal information in the online marketplace, the Amazon.... Therefore, the purpose of this study was to determine the extent to which the privacy policy incorporated the fair information practice principles.... … The researcher evaluated the privacy policy of Amazon.... om privacy policy ranges from positive to apprehensive and negative.... om does not welcome comments or questions regarding their privacy policy....
66 Pages (16500 words) Dissertation

Tort Law Peculiarities

Challenges of procedure and damages in bringing actions to protect individuals privacy 3.... Introduction Thesis statement of the essay: English tort law is in need of urgent reform in order to protect the privacy of individuals.... Tort law and statutes that have been used to protect individual's privacy rights.... hellip; Definition of privacy.... What constitutes individual's right to privacy and when invasion occurs....
13 Pages (3250 words) Essay

Security and privacy on the Internet

Notions of Security and privacy on the Internet Your Name Your College/University Notions of Security and privacy on the Internet The revolutions in communication and relationships caused by the worldwide shift to utilizing the resources provided by the internet pose unprecedented and special kinds of ethical issues.... hellip; Most of these issues relate to the topics, or themes, or security and privacy as users tap into these resources.... Although these other parties may, in fact, have a role in ensuring internet privacy and security, ultimately the responsibility lies on the part of the individual person or entity in protecting his or her (or its) information....
4 Pages (1000 words) Research Paper

Privacy Law: Practical and Moral

The law of privacy's initial birth was intended as a form of protecting individuals against the state, primarily in response to the latter's powers of detention.... This paper will briefly examine the law of privacy in the UK, and analyse whether infringements of privacy can be linked to moral considerations.... nbsp;It thus seems that indeed both a moral and practical approach is required in relation to the infringement of privacy....
6 Pages (1500 words) Essay

The Law of Privacy in the UK

The birth of the law of privacy was intended to provide a method for protecting individuals against state infringements of privacy, particularly in relation to the state's powers of censorship, detention and expropriation.... privacy Law: Practical and Moral?... Introduction The law of privacy in the UK does not exist as a separate offence from its embodiment in the Human Rights Act 1998.... Before the Human Rights Act, privacy was formed and interpreted by a traditional approach based on the value of free press, which was considered to suitably protect the rights of individuals nonetheless....
7 Pages (1750 words) Essay

Civil Liability and Private Police

Following are the usual torts committed or imputed to private police: battery, assault, infliction of mental distress, false imprisonment, malicious prosecution, trespass to land, trespass to personal property, negligence, defamation, and invasion of privacy.... Similarly, in cases of invasion of privacy or defamation, the private police may rely only on exercise of reasonable limitations.... In fact, even the Courts have some apprehensions in applying the said provision against private entities and individuals....
5 Pages (1250 words) Essay

The Value of Digital Privacy in an Information Technology Age

Different cabling companies have different terms of use in regard to privacy.... Invasion of personal privacy shows inefficiency on the government's part and other organizations that keep citizens' records.... nother way through which individuals can access private information is through phishing.... Spear-phishing, in It involves hacking individuals' computers or accounts by sending e-mails to individuals' accounts....
4 Pages (1000 words) Research Paper

Invasion of Privacy in the Business World

The writer of this paper suggests that privacy protection is a dynamic process that continues to face challenges imposed by changing technological development and varying cultural assumptions.... Thus, this essay takes a look at privacy issues in the business world.... hellip; privacy is an essential human right to all natural or artificial persons.... Several countries have laid a lot of legislations to ensure that rights of privacy are observed....
3 Pages (750 words) Research Paper
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us